Spotlight is powerful diagnostic and monitoring tool for Unix operating systems. Its unique user interface provides you with an intuitive, visual representation of the activity on your host machine. Graphical flows illustrate the rate at which data is moving between system components. Icons display the value of key statistics and measurements (metrics).
The power of Spotlight lies in its ability to provide visual and audible warnings if the performance metrics exceed acceptable thresholds. The components and dataflows change color to show you the source of the problem.
A range of visual graphs and tabular grids provide you with detailed information about your Unix hosts. This information can be viewed on the screen or printed.
You can set Spotlight to warn you when a threshold is reached. You may set a number of thresholds so that warning messages are displayed well before the traffic levels into or out of a host become critical. Spotlight uses a number of different techniques to warn you when a Unix host is exceeding a threshold.
When Spotlight detects a condition that it considers is a potential problem, it not only informs you about it, but also advises you what you could look at to diagnose the problem further, and suggests corrective actions.
Some of the main features and benefits of Spotlight on Unix are that it:
Provides a visual representation of process flows within Unix, allowing you to observe actual host activity in real time.
Visually identifies bottlenecks and provides extensive drilldown capabilities.
Displays the details of problem areas, including CPUs, disks, processes, and system calls statistics for rapid problem identification.
Provides visual and audible warnings to alert you when performance metrics exceed acceptable thresholds.
Provides detailed information about specific components through the use of drilldowns, therefore allowing you to pin point the source of problems.
Assesses the normal rate of process flows via a calibration process, and sets the display speed of the visual indicators accordingly.
Is easy to install.
Spotlight is powerful diagnostic and problem-resolution tool for Unix and Linux operating systems. Its unique user interface provides you with an intuitive, visual representation of the activity on your host machine.
For information on Spotlight on Unix, see these sections
Introductory material to Spotlight on Unix.
|Connect to a Unix System||Create / Modify / Delete connections to Unix systems.|
|Home Page||The Spotlight home page shows the flow of information and commands between various sub-components and the size and status of internal resources such as processes, disk files and memory structures.|
Spotlight alerts you to problems with your system by issuing an alarm. You can configure Spotlight in the level of severity that constitutes an alarm, to disable an alarm, and the actions Spotlight takes on raising the alarm.
|Drilldowns||When you have isolated a problem, you can display a drilldown page, whose charts and tables provide a detailed breakdown of the underlying statistics.|
|View | Options||Customize Spotlight.|
|Troubleshooting||Solve problems using Spotlight.|
For information on using Spotlight applications See
To monitor a Unix system with Spotlight, ensure the Unix system is configured as follows.
Unix servers and versions.
Spotlight supports the following server operating systems:
Ensure the following Unix programs are accessible to the Unix login (through Spotlight):
For HP-UX, additionally
For AIX, additionally
For Solaris, additionally
Unix User Permissions and Installation Settings
Remote Connectivity: SSH or REXEC
Spotlight on Unix will require you to select the connection type: SSH or REXEC. Information on SSH and REXEC is freely available on the Internet. We recommend SSH as password data is transmitted encrypted. REXEC does not encrypt password data.
Notes (Specific to SSH):
Public-key encryption is supported under SSH2 only. DSA and RSA are supported.
Note (Specific to REXEC): When Spotlight is monitoring a Unix operating system via REXEC with a valid user ID and password, remote commands may not work on the Unix host unless that user ID is added to the /etc/hosts.equiv file on the host.