지금 지원 담당자와 채팅
지원 담당자와 채팅

Spotlight on Oracle 10.8 - Getting Started Guide

Welcome to Spotlight Install Spotlight Start Spotlight Spotlight on Oracle Spotlight on Oracle Data Guard Spotlight on Oracle RAC Spotlight on Unix Spotlight on Windows Spotlight on MySQL Troubleshooting: Connection Problems

Spotlight on Unix Alarms

Spotlight alerts you to problems with your system by issuing an alarm.

Alarm Description

Blocked Process Alarm

Blocked processes are processes that are waiting on information to become available in memory, or that are waiting for a shared resource, or for the completion of disk I/O or network I/O. A high level of blocked processes may indicate an under-configured machine.

Input Error Packets Flow Alarm

The Input Error flow represents the number of erroneous network packets coming into the machine per second. The Input Error Packets Flow alarm may warrant investigation as even a low error rate can indicate network problems.

Output Error Packets Flow Alarm

The Output Error flow represents the number of erroneous network packets sent by the machine per second. The Output Error Packets Flow alarm may warrant investigation as even a low error rate can indicate network problems.

Page In Alarm

A large number of page-ins may be a symptom of a large number of recent page-outs (see Page Out alarm below). To find out what process is reading these pages in, check the resident size of the processes you are running, and see which ones are increasing in size. Alternatively, a large number of page-ins may occur when a large process has just stopped, and the kernel decides to fill that space with memory pages owned by other processes. Check if an important process has ended unexpectedly.

Page Out Alarm

If an active process asks the kernel for more memory than there is immediately available, the kernel will write old memory pages out to swap space. This is known as paging. To stop paging, make sure that there is enough RAM available to support the size of the processes you want to run.

Percentage Busy Alarm (Most Active Disk)

The Most Active Disk gauge shows the disk with the highest read/write rates. The Percentage Busy alarm is triggered when the read/write rate of the most active disk exceeds a specified threshold. The type of alarm that is activated is determined by the percentage of read/write activity experienced by the disk.

Disk I/O wait time

The Disk I/O wait time alarm is triggered when one of the disks' I/O wait time exceeds a specified threshold.

Disk I/O service time

The Disk I/O Service Time alarm is triggered when one of the disks' I/O service time exceeds a specified threshold.

Swap Space Alarm

If the total amount of swap space allocated to a Unix host becomes full, the machine may halt all processes, or critical actions may be prevented from occurring. The Swap Space alarm may indicate a runaway process or an under-configured machine.

Swap In Flow Alarm

The Swap In flow represents the number of processes swapped from disk per second. The Swap In Flow alarm may indicate a machine that is under-configured for its workload.

Swap Out Flow Alarm

The Swap Out flow represents the number of processes swapped to disk per second. The Swap Out Flow alarm may indicate a machine that is under-configured for its workload.

Unix Status Alarm

Spotlight is re-establishing its connection to the Unix system.

Used Percentage Alarm

The Least Space / Disk Space container displays the percentage of used disk space for a specified filesystem. The Used Percentage alarm indicates that the specified filesystem is full or filling up. If the filesystem fills up completely, no more data can be written to it.

Zombie Processes Alarm

The Zombie button in the CPU panel shows the number of terminated child processes that have not been acknowledged by their parent process. The Zombie Processes alarm may indicate the presence of an inferior program, or an entry in /etc/inittab (or equivalent) that prevents init from completing its startup sequence.

 

Related Topics

Spotlight on Unix Drilldowns

Once a problem is isolated you can display a drilldown page with charts and tables that provide a detailed breakdown of the underlying statistics.

Drilldown Click to open Keyboard Shortcut Drilldown Pages Description
Processes and Services CTRL+P

Processes Page | Zombies Page | Services Page

The Processes and Services drilldown lists all the processes running on the Unix machine (including "zombie" processes), and all the services found in the /etc/services file (running or not).

Activity Summary CTRL+A

Activity Page | Disk Page | Memory Page | CPU Page | Network Page | Logins Page

Use the Activity Summary drilldown to show details of the activity on the Unix system.

Filesystems CTRL+S Filesystems And Disk Information

Use the Filesystems drilldown to show disk usage for each filesystem on the Unix system, and the proportion of disk space used by each filesystem.

Alarm Log CTRL+L

Alarm log | Alarms by Time | Spotlight Today

The Alarm Log drilldown displays information on the alarms associated with the Windows system, including the name of the component that issued the alarm, the date and time the alarm was logged, and the severity of the alarm.

Note: The Alarm Log drilldown is common to all Spotlight applications. The alarms are specific to the current Spotlight connection. Spotlight on Unix Alarms

 

Related Topics

Spotlight on Windows

Use Spotlight on Windows to monitor Windows operating systems, detect and resolve problems.

Section

Description

Connect to Windows Systems Create / Modify / Delete connections to Windows systems.
Spotlight on Windows Home Page The Spotlight home page shows the flow of information and commands between various sub-components and the size and status of internal resources such as processes, disk files and memory structures.
Spotlight on Windows Alarms

Spotlight alerts you to problems with your system by issuing an alarm. You can configure Spotlight in the level of severity that constitutes an alarm, to disable an alarm, and the actions Spotlight takes on raising the alarm.

Spotlight on Windows Drilldowns When you have isolated a problem, you can display a drilldown page, whose charts and tables provide a detailed breakdown of the underlying statistics.
Troubleshooting Spotlight on Windows

This section identifies general problems that you may encounter when using Spotlight on Windows, and details how to address those problems.

 

Connect to Windows Systems

  1. From the Spotlight Browser select All connections | Spotlight on Windows
  2. Select the Windows system.

     

Add a Windows system to the list of connections

You will need Description
Administrator access

Ensure your login to the Windows machine has Administrator access privileges.

To add a new connection to the Windows machine you are currently using, ensure you are logged in to the machine with Administrator access privileges. If necessary, logout and login again.

Privileges

Spotlight on Windows retrieves its data from Windows performance counters and the windows registry of the monitored system. An administrator login to the Windows machine has such access.

Remote connectivity

To add a new connection to a Windows machine other than the one you are currently using, ensure the machine is accessible to the Spotlight client. Spotlight uses NetBIOS traffic to retrieve perfmon and registry information, so any firewalls between the Spotlight on Windows client and the machine being monitored must allow this traffic to pass through. Troubleshooting Spotlight on Windows

 

  1. Click File | Connect to open the Spotlight Connection Manager

  2. Select Spotlight on Windows on the Connections menu.

  3. Double-click Add new connection.

  4. Fill in the connection Properties | Details page. Windows Connection Details

 

Related Topics

Spotlight Browser

Troubleshooting Spotlight on Windows

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택