지금 지원 담당자와 채팅
지원 담당자와 채팅

Spotlight on Oracle 10.10 - Getting Started Guide

Welcome to Spotlight Install Spotlight Start Spotlight Spotlight on Oracle Spotlight on Oracle Data Guard Spotlight on Oracle RAC Spotlight on Unix Spotlight on Windows Troubleshooting: Connection Problems

Spotlight on Unix

Use Spotlight on Unix to monitor Unix and Linux operating systems, detect and resolve problems.

Section

Description

Connect to Unix Systems Create / Modify / Delete connections to Unix systems.
Spotlight on Unix Home Page The Spotlight home page shows the flow of information and commands between various sub-components and the size and status of internal resources such as processes, disk files and memory structures.
Spotlight on Unix Alarms

Spotlight alerts you to problems with your system by issuing an alarm. You can configure Spotlight in the level of severity that constitutes an alarm, to disable an alarm, and the actions Spotlight takes on raising the alarm.

Spotlight on Unix Drilldowns When you have isolated a problem, you can display a drilldown page, whose charts and tables provide a detailed breakdown of the underlying statistics.

 

Configure the Unix System

To monitor a Unix system with Spotlight, ensure the Unix system is configured as follows.

Unix servers and versions.

Spotlight on Unix supports the following server operating systems:

  • Oracle Solaris 9, 10, 11
  • HP-UX 11i, 11i v2, 11i v3
  • IBM AIX 5.2, 5.3, 6.1, 7.1
  • Red Hat operating system based on Linux 2.4, 2.6 and 3.10 kernels
  • SUSE operating system based on Linux 2.4, 2.6 and 3.0 kernels
  • Oracle Enterprise Linux (OEL) based on Linux 2.4, 2.6 and 3.8 kernels

Unix programs.

Ensure the following Unix programs are accessible to the Unix login (through Spotlight):

  • Perl 5.x
  • awk
  • cat
  • date
  • df
  • grep
  • ifconfig
  • iostat (not HP-UX)
  • netstat
  • ps
  • sar
  • sed
  • tr
  • uname
  • uptime
  • vmstat
  • wc
  • who

For HP-UX, additionally

  • bdf
  • cstm
  • getconf
  • swapinfo
  • /usr/sbin/ioscan

 

For AIX, additionally

  • lsattr
  • lsdev
  • lsps
  • prtconf

For Solaris, additionally

  • /etc/swap
  • mpstat
  • nawk
  • prtconf

Unix User Permissions and Installation Settings

  • The Unix user should have no special processing on log-on. In particular there must be no input required from the user, and nor should any special login banners be displayed.
  • On AIX, the user must be a member of the "adm" group to be able to run the sar command.
  • On Linux, the sysstat package must be installed to enable the user to get detailed disk I/O information.
  • On Linux the /proc filesystem must be present.
  • For connection using SSH, the sshd daemon must be installed and running.

Remote Connectivity: SSH or REXEC

Spotlight on Unix will require you to select the connection type: SSH or REXEC. Information on SSH and REXEC is freely available on the Internet. We recommend SSH as password data is transmitted encrypted. REXEC does not encrypt password data.

Notes:

  • Make sure the relevant SSH or REXEC daemon is running on the Unix machine and is configured to receive remote connections.
  • Commands to observe system activity (for example, netstat, vmstat, iostat, sar) must be accessible to REXEC / SSH sessions for Spotlight to observe Unix activity. Ensure these commands are located in the search path for REXEC / SSH sessions. If not, Spotlight will display an error.

Notes (Specific to SSH):

  • Spotlight supports both SSH1 and SSH2 protocols.
  • To allow Spotlight to make SSH connections to any Unix or Linux hosts that permit SSH connections, you may need to alter the PasswordAuthentication configuration item in the sshd_config file. Set the value of PasswordAuthentication to yes. Once you have modified the sshd_config file you must restart the sshd process to apply the new setting.
  • Public-key encryption is supported under SSH2 only. DSA and RSA are supported.

Note (Specific to REXEC): When Spotlight is monitoring a Unix operating system via REXEC with a valid user ID and password, remote commands may not work on the Unix host unless that user ID is added to the /etc/hosts.equiv file on the host.

 

Related Topics

Spotlight Browser

Connect to Unix Systems

  1. From the Spotlight Browser select All connections | Spotlight on Unix
  2. Select the Unix system to connect to.

     

Add a Unix system to the list of connections

Note: Ensure the Unix system is configured before you connect to it. Configure the Unix System

  1. Click File | Connect to open the Spotlight Connection Manager

  2. Select Spotlight on Unix on the Connections menu.

  3. Double-click Add new connection.

  4. Fill in the connection Properties | Details page. Unix Connection Details

 

Related Topics

Spotlight Connection Manager

Spotlight Browser

Unix Connection Details

Field Description
Connection name

Enter the preferred display name for the Unix machine.

Note: If left blank, the Connection name field resets to the value of the Address field.

Server Connection Details

Field Description
Address

Enter the hostname or IP address to the Unix machine.

User

Enter the user name to login to the Unix machine.

Note: The root user is not allowed. Remote login as "root" has been disallowed for security reasons.

Password

Enter the password to login to the Unix machine.

Note: Not applicable when Use SSH Public / Private Keys is selected. Applicable when Save password details (for this connection) is selected.

Connection Type

Select according to the Unix system's configuration. The options are: REXEC and SSH. Configure the Unix System

Port Number

Enter the port number for SSH (secure shell) connection to the Unix machine. The default value is 22.

Note: Applicable when the Connection Type is SSH.

SSH Key Authentication

Note: Applicable when the Connection Type is SSH.

Field Description
Use SSH Public / Private Keys

Select according to the Unix machine's configuration.

SSH Key Type

Choose the type of key to use when making the Spotlight connection: RSA or DSA. For more information, see Configure the Unix System.

SSH Private key Filename

Locate the file that contains the private key for the Spotlight connection.

Either click

or type the filename and location.

SSH Passphrase

Type the passphrase used to decrypt the private key.

Note: Applicable when Save password details (for this connection) is selected.

Select Save password details (for this connection) to save all entered password details.

Close the dialog.

Click Description
Connect

Save changes and open the connection in Spotlight.

Note: If you experience problems connecting there may be an issue with the Unix configuration. For more information, see Configure the Unix System.

OK Save changes. Do not open the connection in Spotlight.
Cancel Do not save changes.

 

Related Topics

Spotlight Connection Manager

All connections

Spotlight Today

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택