3 |
4 |
Click the Monitor tab on the top-left corner. |
This view is made up of the following embedded views:
• |
• |
• |
• |
• |
| |||||||
To drill down to CPU details, click any of the available metrics. For complete information about the CPU details that appear, see “Viewing A Host’s Performance” in the Foglight User Guide. |
| |||||||||||||||
For more information about these views, see “Viewing A Host’s Performance” in the Foglight User Guide. |
| |||||||||||||
Drill down on Used Space. Links to the Disk details view. Drill down on Utilization. Links to the Storage Details view. NOTE: The Foglight for Infrastructure agent only supports collecting the “Available” metric for ZFS® mounted as Loopback File Systems (LOFS), due to the limitation of the available commands within the zone.
The Disk Name was updated to include “(Loopback ZFS) after the disk name, to identify the Loopback ZFS. The Logical Disks table now includes two new columns, including “Available” and “Filesystem Type”. For more information about these views, see “Viewing A Host’s Performance” in the Foglight User Guide. |
| |||||||||
Drill down on Utilization or Utilization History. Links to the Memory details view. For more information about this view, see “Viewing A Host’s Performance” in the Foglight User Guide. |
Displays information about the existing network interfaces and network utilization in general. | |||||||||||
| |||||||||||
Drill down on Network Utilization. Links to the Network details view. For more information about this view, see “Viewing A Host’s Performance” in the Foglight User Guide. |
This view displays the percentage of paging space that is currently available. | |
Drill down on Available Paging Space. Links to the Memory details view. For more information about this view, see “Viewing A Host’s Performance” in the Foglight User Guide. |
This view shows the number of alarms associated with the monitored device. | |||
|
The Processes dashboard provides a summary of CPU and memory usage by process, as well as a table of process details. If a host does not have process data (for example, because it is monitored by a virtual agent which does not collect process data), then it is possible to create an agent to monitor processes directly from this drill-down view.
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center