Chat now with support
Chat with Support

Spotlight on SAP ASE 2.11 - User Guide

Spotlight on SAP ASE
Background Information Desktop Features Connect to SAP ASE Spotlight® on SAP ASE Drilldowns Spotlight® on SAP ASE Alarms Glossary
Spotlight Basics
Spotlight Connections Monitor Spotlight Connections Alarms Charts, Grids And Home Page Components View | Options Troubleshooting
Spotlight History Spotlight on Windows
Connect to Windows Systems Background Information Home Page Alarms Drilldowns View | Options Troubleshooting
Spotlight on Unix About us Third-party contributions Copyright

Configure the Unix System

To monitor a Unix system with Spotlight, ensure the Unix system is configured as follows.

Unix servers and versions.

Spotlight supports the following server operating systems:

  • Sun Solaris 9, 10, 11
  • HP-UX 11i, 11i v2, 11i v3
  • IBM AIX 5.2, 5.3, 6.1
  • Red Hat and SUSE operating systems running Linux 2.4 and 2.6 kernels

Unix programs.

Ensure the following Unix programs are accessible to the Unix login (through Spotlight):

  • Perl 5.x
  • awk
  • cat
  • date
  • df
  • grep
  • ifconfig
  • iostat (not HP-UX)
  • netstat
  • ps
  • sar
  • sed
  • tr
  • uname
  • uptime
  • vmstat
  • wc
  • who

For HP-UX, additionally

  • bdf
  • cstm
  • getconf
  • swapinfo
  • /usr/sbin/ioscan


For AIX, additionally

  • lsattr
  • lsdev
  • lsps
  • prtconf

For Solaris, additionally

  • /etc/swap
  • mpstat
  • nawk
  • prtconf

Unix User Permissions and Installation Settings

  • The Unix user should have no special processing on log-on. In particular there must be no input required from the user, and nor should any special login banners be displayed.
  • On AIX, the user must be a member of the "adm" group to be able to run the sar command.
  • On Linux, the sysstat package must be installed to enable the user to get detailed disk I/O information.
  • On Linux the /proc filesystem must be present.
  • For connection using SSH, the sshd daemon must be installed and running.

Remote Connectivity: SSH or REXEC

Spotlight on Unix will require you to select the connection type: SSH or REXEC. Information on SSH and REXEC is freely available on the Internet. We recommend SSH as password data is transmitted encrypted. REXEC does not encrypt password data.


  • Make sure the relevant SSH or REXEC daemon is running on the Unix machine and is configured to receive remote connections.
  • Commands to observe system activity (for example, netstat, vmstat, iostat, sar) must be accessible to REXEC / SSH sessions for Spotlight to observe Unix activity. Ensure these commands are located in the search path for REXEC / SSH sessions. If not, Spotlight will display an error.

Notes (Specific to SSH):

  • Spotlight supports both SSH1 and SSH2 protocols.
  • To allow Spotlight to make SSH connections to any Unix or Linux hosts that permit SSH connections, you may need to alter the PasswordAuthentication configuration item in the sshd_config file. Set the value of PasswordAuthentication to yes. Once you have modified the sshd_config file you must restart the sshd process to apply the new setting.
  • Public-key encryption is supported under SSH2 only. DSA and RSA are supported.

Note (Specific to REXEC): When Spotlight is monitoring a Unix operating system via REXEC with a valid user ID and password, remote commands may not work on the Unix host unless that user ID is added to the /etc/hosts.equiv file on the host.


Related Topics

Spotlight Browser

Troubleshooting Spotlight on Unix

Connect to Unix Systems

  1. From the Spotlight Browser select All Connections | Spotlight on Unix
  2. Select the machine to connect to. If the Unix machine is not listed then follow the instructions to add a new connection.


Add a new connection

Note: Ensure the Unix system is configured before you connect to it. Configure the Unix System

  1. Click File | Connect

  2. Select Spotlight on Unix on the Connections menu.

  3. Double-click Add new connection.

  4. Fill in the Details page of the Properties window:

    Field Description
    Connection name

    Enter the preferred display name for the Unix machine.

    Note: If left blank, the Connection name field resets to the value of the Address field.

    Server Connection Details

    Field Description

    Enter the hostname or IP address to the Unix machine.


    Enter the user name to login to the Unix machine.

    Note: The root user is not allowed. Remote login as "root" has been disallowed for security reasons.


    Enter the password to login to the Unix machine.

    Note: Not applicable when Use SSH Public / Private Keys is selected. Applicable when Save password details (for this connection) is selected.

    Connection Type

    Select according to the Unix system's configuration. The options are: REXEC and SSH. Configure the Unix System

    Port Number

    Enter the port number for SSH (secure shell) connection to the Unix machine. The default value is 22.

    Note: Applicable when the Connection Type is SSH.

    SSH Key Authentication

    Note: Applicable when the Connection Type is SSH.

    Field Description
    Use SSH Public / Private Keys

    Select according to the Unix machine's configuration.

    SSH Key Type

    Choose the type of key to use when making the Spotlight connection: RSA or DSA. Configure the Unix System

    SSH Private key Filename

    Locate the file that contains the private key for the Spotlight connection.

    Either click

    or type the filename and location.

    SSH Passphrase

    Type the passphrase used to decrypt the private key.

    Note: Applicable when Save password details (for this connection) is selected.

    Select Save password details (for this connection) to save all entered password details.

  5. Close the dialog.

    Click Description

    Save changes and open the connection in Spotlight.

    Note: If you experience problems connecting there may be an issue with the Unix configuration. Configure the Unix System

    OK Save changes. Do not open the connection in Spotlight.
    Cancel Do not save changes.


Related Topics

Spotlight Browser

Home Page


Spotlight is powerful diagnostic and problem-resolution tool for Unix and Linux operating systems. Its unique user interface provides you with an intuitive, visual representation of the activity on your host machine.

For information on Spotlight on Unix, see these sections



Background Information

Introductory material to Spotlight on Unix.

Connect to a Unix System Create / Modify / Delete connections to Unix systems.
Home Page The Spotlight home page shows the flow of information and commands between various sub-components and the size and status of internal resources such as processes, disk files and memory structures.

Spotlight alerts you to problems with your system by issuing an alarm. You can configure Spotlight in the level of severity that constitutes an alarm, to disable an alarm, and the actions Spotlight takes on raising the alarm.

Drilldowns When you have isolated a problem, you can display a drilldown page, whose charts and tables provide a detailed breakdown of the underlying statistics.
View | Options Customize Spotlight.
Troubleshooting Solve problems using Spotlight.

For information on using Spotlight applications See

Spotlight Basics


Spotlight Home Page

Spotlight Home Page

The Spotlight home page shows the flow of information and commands between various sub-components and the size and status of internal resources such as processes, disk files and memory structures.

Related operating system statistics are grouped together on panels that are connected by a series of graphical flows and icons. Spotlight updates these flows in real time so you can see how quickly data is moving through the system. The icons change color as Spotlight alarms are raised, upgraded, downgraded and canceled.

To see the Spotlight on Unix Home Page

  1. Select the Spotlight on Unix connection from the Spotlight browser.
  2. Click .


Related Topics

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating