Chat now with support
Chat with Support

Spotlight on SAP ASE 2.11 - User Guide

Spotlight on SAP ASE
Background Information Desktop Features Connect to SAP ASE Spotlight® on SAP ASE Drilldowns Spotlight® on SAP ASE Alarms Glossary
Spotlight Basics
Spotlight Connections Monitor Spotlight Connections Alarms Charts, Grids And Home Page Components View | Options Troubleshooting
Spotlight History Spotlight on Windows
Connect to Windows Systems Background Information Home Page Alarms Drilldowns View | Options Troubleshooting
Spotlight on Unix About us Third-party contributions Copyright

Network Page

The Network page contains several charts.

To open the network page

  1. Select the Spotlight on Unix connection in the Spotlight Browser.
  2. Click Activity Summary | Network.

Charts on the Network page

Notes:

  • Every chart has a legend (list of symbols) to its right that describes the various series (line graphs) on the chart.
  • Click an item in the legend to highlight its series (line) in the chart. Click a second time to return the series to its normal appearance.
  • Move the mouse pointer over an item in the legend to view the current value for that series within the chart.
Chart Description
Network Utilization

The total rate of data traffic across all network cards (NICs) for the Unix host, measured in packets/second.

Separate graphs on the chart indicate the rates at which data packets are being:

  • Received by the Unix host from the network (Packets In).
  • Transmitted by the Unix host to the network (Packets Out).
Connections

The number of external services with which the Unix host is communicating. The graphs on this chart represent three types of connections:

  • Established - The total number of TCP/IP connections to this machine in the ESTABLISHED state.
  • TIME_WAIT - The total number of TCP/IP connections to this machine in the TIME_WAIT state, where the local socket has closed, and it is waiting for the remote end to signal that it has done the same.
  • CLOSE_WAIT - The total number of TCP/IP connections to this machine in the CLOSE_WAIT state, where the remote end of the connection has shut down, and it is waiting for the local end to do the same.
Network Utilization by Kilobytes

The total rate of data traffic across all network cards (NICs) for the Unix host, measured in kilobytes/second.

Separate graphs on the chart indicate the rates at which data is being:

  • Received by the Unix host from the network (KB In).
  • Transmitted by the Unix host to the network (KB Out).
Packets by Network Card

This chart shows the rate of data traffic for every network card (NIC) in the Unix host, measured in packets/second. For every NIC, a separate graph represents the data packets:

  • Received by the NIC from the network (Packets In).
  • Transmitted by the NIC to the network (Packets Out).
Error Rates by Network Card

This chart shows error rates for the data transferred by every network card (NIC) in the Unix host, measured in errors/second. For every NIC, a separate graph represents the errors in data:

  • Received by the NIC from the network (Errors In).
  • Transmitted by the NIC to the network (Errors Out).
Collisions by Network Card

A collision is the result of two devices trying to transmit data packets across the network at the same time. The network detects the collision of the two transmitted packets as an error, and discards them both. Both devices then need to re-send the data.

This chart shows the rate at which collisions occur for every network card (NIC) in the Unix host.

 

Related Topics

Logins Page

The Logins page displays the users currently logged in to the selected connection.

To open the logins page

  1. Select the Spotlight on Unix connection in the Spotlight Browser.
  2. Click Activity Summary | Logins.

Data in the Logins page

For each login, you can view the information that follows.

Note: Not all of the columns in the Logins table may be visible by default. To view hidden columns, right-click the grid heading and select Organize columns....

Column Description
UserName The name of a user logged in to the Unix host.
Line The terminal device associated with this connection.
LoginTime The date and time when the user logged in for this session.
Idle The time elapsed since the user's last activity (if available).
PID The Process ID of the connection or login.
Comments Additional information about the connection, including the address from which the connection was made (if available).

 

Related Topics

Filesystems And Disk Information

The Filesystems drilldown displays information on the disk usage for each filesystem on the Unix system, and the proportion of disk space that has been used for each filesystem.

Note: Refer to man df(1) for further details on the values shown in the Filesystems page.

To open the Filesystems and Disk Information drilldown

  1. Select the Spotlight on Unix connection in the Spotlight Browser.
  2. Click Filesystems.

To view disk usage in a chart

Right-click the Filesystems page and select View as Chart.

The information is displayed on a set of bar graphs that represent used and free disk space. Use the drop-down By Megabyte / By Percentage control to specify how to view disk usage.

To view disk usage in a table

Right-click the Filesystems page and select View as Grid.

Column Description
Filesystem The Unix device that holds a filesystem.
Used Space The amount of used space on the filesystem.
Free Space The amount of free space on the filesystem.
Mounted On The mount point for the filesystem.

To view disk usage for NFS mounted disks

NFS (Network File System) was developed by Sun Microsystems to allow a Unix host to use disk space on a remote machine as if it were local storage. Spotlight provides a shortcut option to allow you to show or hide disk usage for NFS mounted disks.

Right-click the Filesystems page and select Show NFS mounted Filesystems.

 

Related Topics

Alarm Log

The Alarm Log drilldown displays information on the alarms associated with the selected connection.

To open the alarm log

  1. Select the Spotlight on Unix connection in the Spotlight Browser.
  2. Click Alarm Log.

Notes:

  • The Alarm Log drilldown is common to all Spotlight applications. See Spotlight Alarms for more information.
  • The alarms are specific to the current Spotlight connection. Spotlight Alarms

 

Related Topics

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating