Chat now with support
Chat with Support

Spotlight on DB2 6.10 - User Guide

Spotlight on IBM DB2 LUW (Linux, Unix, and Windows)
New in This Release Getting started with Spotlight on IBM DB2 LUW Desktop features specific to Spotlight on IBM DB2 LUW Spotlight on IBM DB2 LUW drilldowns
About Spotlight on IBM DB2 LUW drilldowns Buffer Pool Analysis drilldown Client Application Analysis drilldown Database Analysis drilldown Database Manager Summary drilldown Diagnostic Log drilldown FCM Analysis drilldown Tablespace Analysis drilldown Top SQL drilldown Operating System drilldown Workload Management Analysis drilldown
Spotlight on IBM DB2 LUW alarms Spotlight on IBM DB2 LUW Options Tuning SQL statements in Spotlight on IBM DB2 LUW
Spotlight Basics
Spotlight Connections Monitor Spotlight Connections Alarms Charts, Grids And Home Page Components View | Options Troubleshooting
Spotlight History Spotlight on Windows
Connect to Windows Systems Background Information Home Page Alarms Drilldowns View | Options Troubleshooting
Spotlight on Unix About us Third-party contributions Copyright

Permissions Page

The Permissions page lists the trustees assigned to the shared resource currently chosen in the Shares page of the Network drilldown, together with the rights granted or denied to the trustees.

Note: Microsoft defines a trustee as:

"The user account or group account to which an access control entry (ACE) applies. Each ACE in an access control list (ACL) has one security identifier (SID) that identifies a trustee. User accounts include accounts that users or programs such as Windows services use to log on to the local computer. Group accounts cannot be used to log on to a computer, but are useful in ACEs to allow or deny a set of access rights to one or more user accounts."

To open the Permissions page

  1. Select the Spotlight connection in the Spotlight Browser.
  2. Click Network | Shares.

  3. Double click on the resource in the grid.
  4. Click Permissions.

For each shared resource, information on its assigned permissions is displayed in the columns of a single table (grid).

Note: Not all of these columns will be visible by default. To view hidden columns, right-click a column heading and choose Organize Columns... from the shortcut menu. See Show, Hide & Order Columns for more information.

Column Description

User

The name of the trustee identified by the User SID.

User Type

The trustee can be one of the following types of user:

  • UNKNOWN — The trustee type is unknown, but not necessarily invalid.
  • USER — A Windows user account.
  • GROUP — A Windows group account.
  • DOMAIN — A domain.
  • ALIAS — A unique SID with a specified User alias.

    Example, BUILTIN\Administrators can have different local names on different resources:

    • serverA\Administrators on server A
    • serverB\Administrators on server B
  • KNOWN GROUP — A well known group (for example, the Authenticated Users or Everyone groups, which are available on all Windows systems).

Grant

The access types (READ ONLY, CHANGE, FULL CONTROL) that have been granted to the current trustee.

Deny

The access types that have been specifically DENIED to the current trustee. Deny rights take precedence over Grant rights.

Full Name

The full name of the trustee. Hide this column if you do not need this information, as Spotlight obtains it by querying the domain controller for the remote machine; this may cause a significant delay when refreshing data. See Show, Hide & Order Columns for more information.

Share

The name of the shared resource.

User SID

The security identifier for the current trustee of the shared resource. Every account on a network is issued a unique SID when the account is first created.

 

Related Topics

Open Ports Page

The Open Ports page is not available if the Windows SNMP protocol is not installed on:

  • The Windows machine under diagnosis, AND
  • The machine running the Spotlight client.

Installing The SNMP Protocol

The open communication ports on a Windows machine are not necessarily in use. They may be the inadvertent consequence of a now-stopped service or some other application, or they may have been opened by a virus.

The Open Ports page on the Network drilldown summarizes the status of all the communication ports on the machine under diagnosis. Each row in the table (grid) represents an open port, and the columns in the grid display the properties associated with it.

To open the Open Ports page

  1. Select the Spotlight connection in the Spotlight Browser.
  2. Click Network | Open Ports.

Note: In the Open Ports page, the term local refers to the Windows machine under diagnosis. Remote refers to any machines connected to a port on the diagnosed (local) machine.

Column Description
Protocol The communication protocol associated with the open port (for example, TCP or UDP).
Local Address The address of the diagnosed machine.
Local Port The registered name of the port on the diagnosed machine, if available. Otherwise it is the number of the port on the diagnosed machine.
Remote Address The IP address of a remote host connected to the specified local port.
Remote Port The port number by which the specified remote host is connected to the local port.
Status The current status of the network connection between the two machines (for example, Listening, Established, or Time_wait.)

 

Related Topics

cLAN Gigabit Page

The cLAN Gigabit page of the Spotlight on Windows Network drilldown shows recent activity to and from the current system via cLAN Gigabit cards.

Note: The cLAN Gigabit network interface card (NIC) enables high-speed communications across a network. This page in the Network drilldown is enabled only if the current network contains one or more of these cards.

To open the cLAN Gigabit page

  1. Select the Spotlight connection in the Spotlight Browser.
  2. Click Network | cLAN Gigabit.

Charts on the cLAN Gigabit page

Notes:

  • Click an item in the legend to highlight its series (line) in the chart. Click a second time to return the series to its normal appearance.
  • Move the mouse pointer over an item in the legend to view the current value for that series within the chart.
Chart Description
Total MB in/out

Sent — The rate at which megabytes are sent over cLAN Gigabit network cards from this machine.

Received — The rate at which megabytes are received by this machine from cLAN Gigabit network cards.

Frames per second

Sent — The rate at which frames are sent over cLAN Gigabit network cards from this machine.

Received — The rate at which frames are received by this machine from cLAN Gigabit network cards.

Interrupts per second

Async sent — The rate at which interrupt requests are sent by the cLAN network cards (such as those to CPUs).

Async received — The rate at which interrupt requests are received by the cLAN network cards.

Errors

Note: This chart does NOT show the rate of errors detected, but the number of errors detected since the chart was last refreshed.

VPI/VCI Rx errors — The number of receive errors in VCI (Virtual Channel Identifier) and VPI (Virtual Path Identifier) packets.

Rx NIB congestion — The number of receive errors originating from the NIB (Network Interface Board).

Rx Cell Drop — The number of received packets dropped for any reason.

Received HEC Errors — The number of received packets with HEC (Header Error Control) errors.

Received 10b characters — The number of invalid 10 bit characters received.

 

Related Topics

Activity Summary

The Activity page displays summaries of recent Windows activity.

To open the Activity Summary page

  1. Select the Spotlight connection in the Spotlight Browser.
  2. Click Activity Summary.

Charts on the Activity Summary page

Notes:

  • Click an item in the legend to highlight its series (line) in the chart. Click a second time to return the series to its normal appearance.
  • Move the mouse pointer over an item in the legend to view the current value for that series within the chart.
Chart Description
Processor

Shows the total CPU utilization across all processors in the machine, categorized into User Time and Privileged Time.

  • User Time is the total time the processor(s) spends in user mode. This is a restricted processing mode designed for applications, environment subsystems, and integral subsystems.
  • Privileged Time is the time the processor(s) spends in privileged mode. This is designed for operating system components and allows direct access to hardware and all memory.

Note: The User Time and Privileged Time series are each represented by a single line, and by an item in the legend at the right of the chart.

Paging

Shows the rate at which pages are being swapped in and out of memory.

  • The Paging Rate (In) (or Page Reads) value includes hard pages (paging requests that have to go to the paging file on disk) - not soft pages (requests for memory pages that are not in the program's working set, but still in memory).
  • The Paging Rate (Out) (or Page Writes) value provides the rate of write requests to the paging file on disk.

A sustained high rate of paging can cause problems with overall system degradation due to disk thrashing and CPU load.

Note: Each Paging Rate series is represented by a single line, and by an item in the legend at the right of the chart.

Network Packets

Shows the incoming and outgoing packet rates as an aggregate across all network cards in the system.

Note: The Packets Sent and Packets Received series are each represented by a single line, and by an item in the legend at the right of the chart.

Processor Queue Length

Shows the total number of threads (program execution units) that are waiting to be run on ALL processors. A sustained processor queue length greater than three times the number of processors can indicate processor congestion.

Note: To view Server Work Queues for the individual CPUs in the system, see the CPUs Page in the CPU drilldown.

Disk Queue Length

Shows the number of I/O requests that were queued for each logical disk.

Disk Queue Length indicates how heavily loaded a disk subsystem is. High queue lengths mean the disks are struggling to process the I/O load being put on them.

Note: Each logical disk on the system is represented by a single line on the chart, and by an item in the legend at the right of the chart.

Memory

Shows how much physical memory (RAM) and Virtual Memory Windows is using.

Physical Memory usage will normally remain close to the total amount of physical memory installed on the system unless the amount of physical memory you have exceeds the amount of virtual memory that Windows is using.

Windows normally keeps some physical memory available (free) for immediate reuse.

Virtual Memory usage increases and decreases as Windows processes requests and gives up memory and as processes are started and stopped.

A steady increase in Virtual memory usage can indicate that a process on the system has a memory leak.

Note: The Virtual Used and Physical Used series are each represented by a single line, and by an item in the legend at the right of the chart.

 

Related Topics

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating