サポートと今すぐチャット
サポートとのチャット

Spotlight on DB2 6.10 - User Guide

Spotlight on IBM DB2 LUW (Linux, Unix, and Windows)
New in This Release Getting started with Spotlight on IBM DB2 LUW Desktop features specific to Spotlight on IBM DB2 LUW Spotlight on IBM DB2 LUW drilldowns
About Spotlight on IBM DB2 LUW drilldowns Buffer Pool Analysis drilldown Client Application Analysis drilldown Database Analysis drilldown Database Manager Summary drilldown Diagnostic Log drilldown FCM Analysis drilldown Tablespace Analysis drilldown Top SQL drilldown Operating System drilldown Workload Management Analysis drilldown
Spotlight on IBM DB2 LUW alarms Spotlight on IBM DB2 LUW Options Tuning SQL statements in Spotlight on IBM DB2 LUW
Spotlight Basics
Spotlight Connections Monitor Spotlight Connections Alarms Charts, Grids And Home Page Components View | Options Troubleshooting
Spotlight History Spotlight on Windows
Connect to Windows Systems Background Information Home Page Alarms Drilldowns View | Options Troubleshooting
Spotlight on Unix About us Third-party contributions Copyright

What is Spotlight on Unix

Spotlight is powerful diagnostic and monitoring tool for Unix operating systems. Its unique user interface provides you with an intuitive, visual representation of the activity on your host machine. Graphical flows illustrate the rate at which data is moving between system components. Icons display the value of key statistics and measurements (metrics).

The power of Spotlight lies in its ability to provide visual and audible warnings if the performance metrics exceed acceptable thresholds. The components and dataflows change color to show you the source of the problem.

A range of visual graphs and tabular grids provide you with detailed information about your Unix hosts. This information can be viewed on the screen or printed.

You can set Spotlight to warn you when a threshold is reached. You may set a number of thresholds so that warning messages are displayed well before the traffic levels into or out of a host become critical. Spotlight uses a number of different techniques to warn you when a Unix host is exceeding a threshold.

When Spotlight detects a condition that it considers is a potential problem, it not only informs you about it, but also advises you what you could look at to diagnose the problem further, and suggests corrective actions.

Features of Spotlight on Unix

Some of the main features and benefits of Spotlight on Unix are that it:

  • Provides a visual representation of process flows within Unix, allowing you to observe actual host activity in real time.

  • Visually identifies bottlenecks and provides extensive drilldown capabilities.

  • Displays the details of problem areas, including CPUs, disks, processes, and system calls statistics for rapid problem identification.

  • Provides visual and audible warnings to alert you when performance metrics exceed acceptable thresholds.

  • Provides detailed information about specific components through the use of drilldowns, therefore allowing you to pin point the source of problems.

  • Assesses the normal rate of process flows via a calibration process, and sets the display speed of the visual indicators accordingly.

  • Is easy to install.

Connect to Unix Systems

Spotlight is powerful diagnostic and problem-resolution tool for Unix and Linux operating systems. Its unique user interface provides you with an intuitive, visual representation of the activity on your host machine.

For information on Spotlight on Unix, see these sections

Section

Description

Background Information

Introductory material to Spotlight on Unix.

Connect to a Unix System Create / Modify / Delete connections to Unix systems.
Home Page The Spotlight home page shows the flow of information and commands between various sub-components and the size and status of internal resources such as processes, disk files and memory structures.
Alarms

Spotlight alerts you to problems with your system by issuing an alarm. You can configure Spotlight in the level of severity that constitutes an alarm, to disable an alarm, and the actions Spotlight takes on raising the alarm.

Drilldowns When you have isolated a problem, you can display a drilldown page, whose charts and tables provide a detailed breakdown of the underlying statistics.
View | Options Customize Spotlight.
Troubleshooting Solve problems using Spotlight.

For information on using Spotlight applications See

Spotlight Basics

 

Configure the Unix System

To monitor a Unix system with Spotlight, ensure the Unix system is configured as follows.

Unix servers and versions.

Spotlight supports the following server operating systems:

  • Sun Solaris 9, 10, 11
  • HP-UX 11i, 11i v2, 11i v3
  • IBM AIX 5.2, 5.3, 6.1
  • Red Hat and SUSE operating systems running Linux 2.4 and 2.6 kernels

Unix programs.

Ensure the following Unix programs are accessible to the Unix login (through Spotlight):

  • Perl 5.x
  • awk
  • cat
  • date
  • df
  • grep
  • ifconfig
  • iostat (not HP-UX)
  • netstat
  • ps
  • sar
  • sed
  • tr
  • uname
  • uptime
  • vmstat
  • wc
  • who

For HP-UX, additionally

  • bdf
  • cstm
  • getconf
  • swapinfo
  • /usr/sbin/ioscan

 

For AIX, additionally

  • lsattr
  • lsdev
  • lsps
  • prtconf

For Solaris, additionally

  • /etc/swap
  • mpstat
  • nawk
  • prtconf

Unix User Permissions and Installation Settings

  • The Unix user should have no special processing on log-on. In particular there must be no input required from the user, and nor should any special login banners be displayed.
  • On AIX, the user must be a member of the "adm" group to be able to run the sar command.
  • On Linux, the sysstat package must be installed to enable the user to get detailed disk I/O information.
  • On Linux the /proc filesystem must be present.
  • For connection using SSH, the sshd daemon must be installed and running.

Remote Connectivity: SSH or REXEC

Spotlight on Unix will require you to select the connection type: SSH or REXEC. Information on SSH and REXEC is freely available on the Internet. We recommend SSH as password data is transmitted encrypted. REXEC does not encrypt password data.

Notes:

  • Make sure the relevant SSH or REXEC daemon is running on the Unix machine and is configured to receive remote connections.
  • Commands to observe system activity (for example, netstat, vmstat, iostat, sar) must be accessible to REXEC / SSH sessions for Spotlight to observe Unix activity. Ensure these commands are located in the search path for REXEC / SSH sessions. If not, Spotlight will display an error.

Notes (Specific to SSH):

  • Spotlight supports both SSH1 and SSH2 protocols.
  • To allow Spotlight to make SSH connections to any Unix or Linux hosts that permit SSH connections, you may need to alter the PasswordAuthentication configuration item in the sshd_config file. Set the value of PasswordAuthentication to yes. Once you have modified the sshd_config file you must restart the sshd process to apply the new setting.
  • Public-key encryption is supported under SSH2 only. DSA and RSA are supported.

Note (Specific to REXEC): When Spotlight is monitoring a Unix operating system via REXEC with a valid user ID and password, remote commands may not work on the Unix host unless that user ID is added to the /etc/hosts.equiv file on the host.

 

Related Topics

Spotlight Browser

Troubleshooting Spotlight on Unix

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択