Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8...

31
sybase Guide v3.5 series Nimsoft® Monitor™

Transcript of Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8...

Page 1: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

sybase Guide v3.5 series

Nimsoft® Monitor™

Page 2: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Legal Notices Copyright © 2012, Nimsoft Corporation

Warranty

The material contained in this document is provided "as is," and is subject to being changed, without notice, in future editions. Further, to the maximum extent permitted by applicable law, Nimsoft Corporation disclaims all warranties, either express or implied, with regard to this manual and any information contained herein, including but not limited to the implied warranties of merchantability and fitness for a particular purpose. Nimsoft Corporation shall not be liable for errors or for incidental or consequential damages in connection with the furnishing, use, or performance of this document or of any information contained herein. Should Nimsoft Corporation and the user have a separate written agreement with warranty terms covering the material in this document that conflict with these terms, the warranty terms in the separate agreement shall control.

Technology Licenses

The hardware and/or software described in this document are furnished under a license and may be used or copied only in accordance with the terms of such license.

No part of this manual may be reproduced in any form or by any means (including electronic storage and retrieval or translation into a foreign language) without prior agreement and written consent from Nimsoft Corporation as governed by United States and international copyright laws.

Restricted Rights Legend

If software is for use in the performance of a U.S. Government prime contract or subcontract, Software is delivered and licensed as "Commercial computer software" as defined in DFAR 252.227-7014 (June 1995), or as a "commercial item" as defined in FAR 2.101(a) or as "Restricted computer software" as defined in FAR 52.227-19 (June 1987) or any equivalent agency regulation or contract clause. Use, duplication or disclosure of Software is subject to Nimsoft Corporation’s standard commercial license terms, and non-DOD Departments and Agencies of the U.S. Government will receive no greater than Restricted Rights as defined in FAR 52.227-19(c)(1-2) (June 1987). U.S. Government users will receive no greater than Limited Rights as defined in FAR 52.227-14 (June 1987) or DFAR 252.227-7015 (b)(2) (November 1995), as applicable in any technical data.

Trademarks

Adobe®, Acrobat®, Acrobat Reader®, and Acrobat Exchange® are registered trademarks of Adobe Systems Incorporated.

Intel® and Pentium® are U.S. registered trademarks of Intel Corporation.

Java(TM) is a U.S. trademark of Sun Microsystems, Inc.

Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.

Netscape(TM) is a U.S. trademark of Netscape Communications Corporation.

Oracle® is a U.S. registered trademark of Oracle Corporation, Redwood City, California.

UNIX® is a registered trademark of the Open Group.

Page 3: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Contact Nimsoft

For your convenience, Nimsoft provides a single site where you can access information about Nimsoft products.

At http://support.nimsoft.com/, you can access the following:

■ Online and telephone contact information for technical assistance and customer services

■ Information about user communities and forums

■ Product and documentation downloads

■ Nimsoft Support policies and guidelines

■ Other helpful resources appropriate for your product

Provide Feedback

If you have comments or questions about Nimsoft product documentation, you can send a message to [email protected].

Page 4: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...
Page 5: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Contents 5

Contents

Chapter 1: sybase

This description applies to sybase version 3.5x.

The Nimsoft Sybase Probe constantly monitors the internal performance and space allocation throughout the Sybase server. The information is presented to the database-administrator as alarms and/or as a report showing areas that need attention.

An extensive range of pre-defined alerts is delivered with the Sybase Probe, and these can quickly be extended to meet the needs of specific monitoring requirements.

The probe supports the SLM product-line by sending Quality of Service (QoS) messages.

A lot of information can be extracted and monitored, such as:

■ Server uptime

■ Local and/or remote monitoring of Sybase Servers

■ Amount of free log-file space

■ Data file size for each database.

■ Data and log-file cache hit ratio.

■ Reports the number of:

■ Active users

■ Databases available

■ Users currently logged onto the servers

■ granted and waited page- and table locks

■ transactions and deadlocks pr. second

■ database page reads/writes pr. second

■ disk IO, disk reads and disk writes

■ Committed transactions

For details, please see Checkpoint description.

Page 6: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

6 sybase Guide

sybase Requirements

Software: Sybase OCS client 12.5.x or ASE 15.0.x. For advanced monitoring either Sybase Monitoring Server of Monitoring Tables need to be installed and enabled. Sybase libraries have to be in system PATH.

Platform: Windows 2000 / XP / 2003 / Vista, Linux glibc 2.3 or higher, Solaris 8 or higher on Sparc processor.

Sybase: Sybase Monitoring Server has to be up and running

User-id authorization

To run the probe in basic mode, access to following tables is needed:

■ sysdatabases

■ spt_values

■ sysusgaes

■ sysprocesses

■ syscurconfigs

■ sysconfigures

To run the probe in advanced mode using Monitoring Tables, the user-id used need the 'mon_role' authorization.

To run the probe in advanced mode using Monitoring Server API, 'sa' user-id needs to be used.

Page 7: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 7

Installation notes

The probe must be installed on a Windows/Linux/Solaris Robot with the Sybase client installed. This can be the Sybase server itself. Sybase Monitoring Server or Monitoring Tables have to be installed and activated.

1. Get the package sybase.zip from Internet Updates.

2. Get a valid license from http://www.nimsoft.no http://www.nimsoft.no.

3. Install sybase.zip on the machine running Sybase Client (use drag & drop from the Nimbus Archive).

4. Double-click on the sybase probe to launch the probe configurator.

5. Go to the Connection tab and setup Sybase Server and Monitoring server connections.

6. Define and activate at least one monitoring profile.

Migration from previous releases

If you migrate from previous releases, the probe will migrate the old configuration file (sysbase_monitor.cfg) into a release 3 configuration file (sysbase_monitor_v3.cfg). Every instance from V2 will be converted into one connection and one monitoring profile in V3. Every profile starts one thread for SQL queries and one process as Monitor Server data collector.

Known issues

With Sybase OCS 12.5.0 and 15.0 the Sybase Monitoring Server API can end in a CPU loop, if the probe agent does not have the possibility to close connection properly. This issue is solved by applying Sybase maintenance (12.5.3 or higher, 15.0.2 or higer).

Page 8: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

8 sybase Guide

ASE configuration for Monitoring Tables data collection: ■ buf_cachehit_ratio: enable monitoring = 1

■ lock_requests, lock_requests_db, lock_requests_granted_db, lock_requests_waited_db: enable monitoring = 1, per object statistics = 1, object lockwait timing = 1

■ total_disk_io: enable monitoring = 1

■ stp_cachehit_ratio: enable monitoring = 1

■ locked_users (advanced, with sql text): enable monitoring = 1, max SQL text monitored = 1024 or more, SQL batch capture = 1, sql text pipe active = 1, sql text pipe max messages = 256 or more (depends on interval length and server activity)

sybase Configuration

Initial configuration of the sybase probe is done by using the UI, defining connections and profiles for monitored instances. The probe may be running locally on the database server, or it may be configured to run as a remote client. Every profile will run in its own thread and start, if necessary one monitoring server data collector as separate process.

All windows containing lists are resizable.

Page 9: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 9

Sybase Setup tab

This property-sheet will set the general run-time parameters regarding the sybase probe.

Field Description

Generate status only Instructs the probe to only generate status, not to issue an alarm when a threshold is breached.

Select the Status tab to see the status for the different checkpoints.

Alarm Severity filter Sets a "filter" on which severity levels to be considered as alarms.

The oracle probe is capable of checking many areas of the Oracle databases. Some events that are generated are vital and key to the performance and availability of the database. As a database administrator, you may want to pass the important events on to the operations centre or helpdesk, so the event can trigger pagers, email etc. The Alarm severity filter will consider the events matching the selected severity level and higher as alarms, and pass these on whenever the Generate status only option is unchecked.

If you e.g. set this to be major, then only messages with severity major and upward are considered as alarms.

Status Auto-Update Check this box to automatically update the status after defined time.

Page 10: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

10 sybase Guide

Log Size Sets the size of the probe’s log file to which probe-internal log messages are written. The default size is 100 KB.

When this size is reached, the contents of the file are cleared.

Log-level Sets the level of details written to the log file. Log as little as possible during normal operation, to minimize disk consumption.

Message pool tab This tab contains a list of all alarm messages available. You select messages from this list when editing the properties for a checkpoint.

Right-clicking in the list, allows you to add, edit, copy or delete messages.

Sybase: Defining a message, using the Message pool

Select the Message pool tab, right-click in the list and select New.

Page 11: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 11

You must specify a name in the small dialog popping up.

Tip: Use the name of the checkpoint for which you create the alarm message as name. That makes it easier to find the alarm message when selecting an alarm message in the properties dialog for the checkpoint.

Select the checkpoint for which you create the alarm message in the drop-down list, and all variables available for that check-point will be listed in the right part of the dialog. Type the message and pick the variables you need. Click the OK button when finished. The new message should now appear in the message pool.

Page 12: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

12 sybase Guide

Sybase Connections tab

This list will be populated with the various connections to servers that the sybase probe will monitor. You need to specify user name, password and service name you want to use to connect to the instance. The password information is encrypted and placed into the configuration file. A connection can be used by more than one profile.

Page 13: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 13

The list contains one predefined connection, which you may modify to your preferences. You may add, edit delete and copy connections.

Selecting the connection and choose Edit from the right popup-menu, opens the connection property window for editing.

Field Description

Advanced Monitoring Provides an option for enabling / disabling advance monitoring from the probe

Monitor Option Specify monitoring tables / monitoring server for advance monitoring

Description Short description of the connection.

User User-Id with authorization to read v$… views.

Password Valid password.

Server name Service name, as defined in the interface files.

Monitoring server Monitoring server name. This field becomes visible when monitoring option is set to monitoring server.

Retry attempts Number of attempts the probe should try to repeat connection in case of failure. "0" means only the initial connection will be done.

Page 14: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

14 sybase Guide

Retry delay Time, the probe will wait between two connection attempts.

Timeout Connection timeout

Test button Will test if the connection can be made. In positive case, it will return the instance name and its version number, in negative case the Sybase error message. The button will test first the SQL server, than the Monitoring server connection.

Sybase Profiles tab

The list contains a sample profile that you may modify to your preferences. Every profile will run as a separate thread, more than one profile can be used to monitor one instance. If the selected checkpoints need data from the Monitoring server, every profile will start its own data collector, which will run as a separate process. This way the probe can be configured to deploy available resources in best way and allows independent monitoring of several instances simultaneously.

Icons in the profile list

■ Green icon in the profile line means the profile is active and running

■ Yellow icon means the profile is active but suspended (the ‘suspend’ /’resume’ button in the profile properties dialog allows stopping / starting profile monitoring dynamic, without deactivating /activating the probe).

■ Black icon shows the profile is inactive.

Page 15: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 15

You may add, edit delete and copy profiles.

Selecting the profile and choose Edit from the right popup-menu, opens the profile property window for editing.

The ‘suspend’ /’resume’ commands allows stopping / starting profile monitoring dynamic, without deactivating /activating the probe.

The upper part of the window shows general profile properties and defaults; at the bottom is a list of available checkpoints.

Field Description

Active Check this option to activate the profile.

Page 16: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

16 sybase Guide

Description

Short description of the profile

Heartbeat Defines the interval, in which all profile checkpoints schedules will be tested and trigger eventual checkpoint execution. This number should be common denominator to all used check interval values. The higher the value the lower is the profile overhead.

Connection

Connection used in this profile. It has to be defined in "Connections" dialog before creating a profile.

Check interval

Default value for check interval in the profile. Will be used if nothing else is defined in the checkpoint and overwrites the default checkpoint list setting

Clear message

Message name for clear alarm

SQL timeout

Every checkpoint query run asynchronously. In case the query reaches the SQL timeout, the checkpoint processing will be terminated and the next checkpoint will be started. Alarm is issued.

Message Message name used for SQL timeout alarm

Profile timeout

Defines the maximum processing time for all checkpoints in the profile. If this timeout is reached, the interval processing is finished and the probe waits for next heartbeat to evaluate any checkpoint schedules. Alarm message is issued.

Message Message name used for profile timeout alarm.

Timeout severity

Severity for timeout messages.

Connection

Connection used in this profile. It has to be defined in "Connections" dialog before creating a profile.

Suspended/Resumed

Diode shows if the profile is running (green) or suspended (red)

Alarm source

Possibility to change the source for issued alarms. If not used, default is assumed (robot IP).

Page 17: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 17

Note on checkpoint types

Defining a profile, you can use two different strategies how to handle Checkpoints in a profile. You can decide to use checkpoint templates dynamic, which means that the checkpoints are defined globally (under the "Templates" tab) and represent the default settings. Every time you change the template value, it will reflect on all profiles using dynamic templates strategy.

If you want to have specific settings valid just for one profile, you should right-click the checkpoint in the list and select Change to static.

Page 18: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

18 sybase Guide

Now you can double-click the checkpoint to modify the properties, and the settings will be valid for this profile only.

Note: If attempting to modify a template checkpoint in the Profile dialog without changing it to static as described above, you will get a warning like this:

Of course, there can be both "template" and "static" checkpoints mixed in one profile.

If a checkpoint is managed as static, the checkpoint name will appear in the list with a blue color, and it will be marked as static in the column Type.

Conclusion:

■ Static

To manage the properties for a checkpoint locally, "change" the checkpoint to static in your profile before modifying it. When modified, the new settings will be valid for this profile only.

■ Template

To edit the properties for a checkpoint template, double-click the checkpoint in the profile list or Templates tab. When modified, the new settings will be valid for all profiles, unless overruled by static settings in the profile.

See the section Sybase: Editing a checkpoint for a description of the checkpoint properties.

When deciding which checkpoints to activate/deactivate for a profile, see the section Checkpoints description for a description of the different checkpoints.

Page 19: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 19

Sybase Templates tab

The list contains the predefined set of checkpoints that you may use in your profiles. These checkpoints can be modified to your preferences.

By default, most checkpoints are active with a reasonable default threshold value. The checkpoint properties may be used in a profile, either dynamic (using the template values), or they can be added to the profile and managed statically in the profile.

See the section Sybase: Editing a checkpoint for a description of the checkpoint properties.

Page 20: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

20 sybase Guide

Sybase status tab

The status is presented in a hierarchal fashion, with a profile name nodes and one or more checkpoint nodes (only active checkpoints are considered here). The highest status is propagated. Select the checkpoint in the navigation tree (to your left) to bring up the corresponding events.

Changing the individual values for checkpoints:

The properties for an individual checkpoint object can also be modified here. Select a profile and a monitored checkpoint in the left pane. Then double-click an object in the right pane.

If the object belongs to a template object, you will be warned that a modification will make the checkpoint static for the selected profile.

Page 21: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 21

See the section for a description of the checkpoint properties.

Page 22: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

22 sybase Guide

Sybase: Editing a checkpoint

The checkpoint properties may be used in a profile either dynamic, using the template values, or they can be added to the profile and managed static in the profile.

■ Static

To edit the properties for a checkpoint locally for a profile, right-click the profile in the Checkpoints list in the profile dialog and change it to static. Then double-click the checkpoint to modify it. When modified, the new settings will be valid for this profile only.

■ Template

To edit the properties for a checkpoint template, double-click the checkpoint in the profile list or Templates tab. When modified, the new settings will be valid for all profiles, unless overruled by static settings in the profile.

The properties for checkpoints are described below:

Page 23: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 23

The upper part of the window contains general checkpoint settings. At the second part are two lists with threshold and schedule settings.

Field Description

Description Short description of the purpose of the checkpoint

Condition Information, describing how the threshold values are evaluated

Clear severity Severity, used for message issued in normal state.

Send Quality of Service Activates QoS values being sent into the QoS database If not available in a checkpoint, checkbox is disabled.

Check interval Interval value used for this checkpoint. Every checkpoint can have a different check interval value. Default is taken from the profile definition, if not defined than from the default checkpoint list.

Clear message Message name used for clear alarm message.

Scheduling

This field lets you select how to use the schedules settings, if any (see description below the table).

Rules

Selecting Rules means to run according the rules described in the Schedules settings.

Exceptions

Selecting Exceptions means to run except the rules described in the Schedules settings.

Threshold/Schedules See description below the table.

Page 24: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

24 sybase Guide

Sybase: Thresholds

The list contains the predefined set of monitoring profiles that you may use in your profiles and that you can modify to your preferences. By default, most profiles are active with a reasonable default threshold value. The threshold values may be defined by modifying checkpoints in the respective profile. Every checkpoint has to have at least one threshold, but there can be additional thresholds defined.

The threshold identification consists of an object name (if applicable), like tablespace name, userid etc. and a threshold ID, numbered from 0. Threshold values have to be descending or ascending, depending on condition used in a checkpoint, starting with the highest severity threshold condition.

Field Description

Threshold object name Monitoring object name, if applicable or default. Some special checkpoints have a second threshold called ‘count" (e.g. "locked_users").

Threshold value Value used for threshold evaluation

Current value Severity, used for message issued in normal state.

Severity Alarm severity.

Message Name of message used for threshold alarm.

Message text Text of the message, containing variables, which will be replaced in run time. If the message text is changed from a profile list, you will be forced to create new message.

Page 25: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 25

Variables List of variables, available in the checkpoint.

Sybase: Schedules

If the schedules list is empty, the checkpoint will be executed in interval matter, 24 hours a day. Additional to it there can be defined number of schedules per checkpoint, which can define additional "rules" to the check interval or "exceptions" of it. "Rules" and "exceptions" cannot be mixed in one checkpoint.

In principle, a schedule is a definition of an execution period (or execution break if ‘exceptions’ used) with specified days, time from/to and date from/to values. Additionally, if only ‘date from’ and ‘time from’ is defined, first execution can be defined. ‘Run once’ will cause the checkpoint run only once a day in the defined period (unlike multiple times if ‘interval’ used).

Page 26: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

26 sybase Guide

Checkpoints metrics

Count

Absolute number of events in the interval. It is calculated as delta between count at the beginning of the interval and at the end. In the first interval, counts are not checked because their interval value cannot be calculated. If there is a "total" value in the message, it means "since the start of the instance".

Gauge

Absolute number, describing the actual state of the system.

Ratio

Calculated percentage, using interval counts. In the first interval, it is calculated from total counts (as the interval count cannot be calculated).

Average

Calculated using interval counts. In the starting interval, it is calculated from absolute counts.

Status

Absolute value like ‘ONLINE’ etc.

Page 27: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 27

Checkpoint description

■ Active_users – count: Monitors number of users, having at least one active transaction at the moment of the snapshot.

Source – query.

Table: sysprocesses, status = 'running'.

■ Buf_cachehit_ratio – ratio: Monitors buffer affectivity in interval. Calculated as (1 – (physical reads / logical reads)) *100

Source: API.

Item: SMC_NAME_DATA_CACHE_HIT,

SMC_NAME_DATA_CACHE_MISS

■ Check_dbalive – status: monitors SQL server availability (connection and query execution).

Source: query.

select isnull(@@servername,'not available')+':'+@@version

■ Check_msalive – status: Monitors Monitoring server availability (connect).

Source: API (connect).

■ Commited_transactions – count: Monitors number of transactions committed in interval.

Source: API.

Item: SMC_NAME_XACT.

■ Database_count – count: Monitors number of databases in server.

Source: query.

Table: sysdatabases.

■ Database_size – ratio: Monitors free space in database and log files in %.

Source: query.

Table: sysusages.

■ Database_size_mb – count: Monitors free space in database and log files in MB.

Source: query.

Table: sysusages.

■ Dead_locks – ratio: Monitors number of deadlocks per second in interval in database.

Source: API.

Item: SMC_NAME_DEADLOCK_CNT.

■ Lock_requests – ratio: Monitors total number of lock requests per second in interval.

Page 28: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

28 sybase Guide

Source: API.

Item: SMC_NAME_LOCK_CNT.

■ Lock_requests_db – ratio: Monitors number of lock requests per second per database in interval.

Source: API.

Item: SMC_NAME_LOCKS_GRANTED_IMMED,

SMC_NAME_LOCKS_GRANTED_WAITED,

SMC_NAME_LOCKS_NOT_GRANTED.

■ Lock_requests_granted_db – ratio: Monitors number of granted locks per second per database in interval.

Source: API.

Item: SMC_NAME_LOCKS_GRANTED_IMMED,

SMC_NAME_LOCKS_GRANTED_WAITED,

SMC_NAME_LOCKS_NOT_GRANTED.

■ lock_requests_waited_db – ratio: Monitors number of lock request waits per second per database in interval.

Source: API.

Item: SMC_NAME_LOCKS_GRANTED_IMMED,

SMC_NAME_LOCKS_GRANTED_WAITED,

SMC_NAME_LOCKS_NOT_GRANTED.

■ login_count – count: Monitors number of users currently logged to the server.

Source: query.

Table: sysprocesses.

■ Page_locks – ratio: Monitors number of page lock requests per second per database in interval.

Source: API.

Item: SMC_NAME_LOCK_CNT.

■ Server_startup – count: Monitors number of days the SQL server is up.

Source: query.

DATEDIFF(dd,crdate,getdate())).

■ Table_locks – ratio: Monitors number of table lock requests per second per database in interval.

Source: API.

Item: SMC_NAME_LOCK_CNT.

Page 29: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 29

■ Total_disk_io – ratio: Monitors total number of I/O per second per device in interval.

Source: API.

Item: SMC_NAME_DEV_IO.

■ Total_disk_reads – ratio: Monitors number of read I/O per second per device in interval.

Source: API.

Item: SMC_NAME_DEV_READ.

■ Total_disk_writes – ratio: Monitors number of write I/O per second per device in interval.

Source: API.

Item: SMC_NAME_DEV_WRITE.

■ stp_cachehit_ratio – ratio: Monitors stored procedure cache efficiency in interval. Caluclated as (1 – (physical reads / logical reads)) *100.

Source: API.

Item: SMC_NAME_STP_LOGICAL_READ,

SMC_NAME_STP_PHYSICAL_READ.

■ total_memory – count: Monitors total size of memory in kb/Mb, Sybase SQL server has allocated at the moment of snapshot.

Source: API.

Item: SMC_NAME_MEM_CODE_SIZE

SMC_NAME_MEM_KERNEL_STRUCT_SIZE

SMC_NAME_MEM_SERVER_STRUCT_SIZE

SMC_NAME_MEM_PAGE_CACHE_SIZE

SMC_NAME_MEM_PROC_BUFFER

SMC_NAME_MEM_PROC_HEADER.

■ buffer_memory – count: Monitors size of memory in kb/Mb, Sybase SQL server has allocated to data cache at the moment of snapshot.

Source: API.

Item: SMC_NAME_MEM_PAGE_CACHE_SIZE.

■ stp_memory – count: Monitors size of memory in kb/Mb, Sybase SQL server has allocated to stored procedure cache at the moment of snapshot.

Source: API.

Item: SMC_NAME_MEM_PROC_BUFFER

SMC_NAME_MEM_PROC_HEADER.

Page 30: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

30 sybase Guide

■ log_contention – ratio: Monitors the percentage of times, of the total times when a user log cache was flushed into the transaction log, that it had to wait for the log semaphore in interval.

Source: API.

Item: SMC_NAME_LOG_CONTENTION_PCT.

■ locked_users – ratio: Monitors number of users waiting for a lock in interval.

Source: query.

Table: sysprocesses.

■ log_size – ratio: Monitors free space (%) in the log-file of a database.

Source: query.

Table: sysusages, sysdatabases.

■ db_device_size – ratio: Monitors free space (%) in database devices.

Source: query.

Table: sysdevices, sysusages, sysdatabases.

■ tempdb_device_size – ratio: Monitors free space (%) in temporary database devices.

Source: query.

Table: sysdevices, sysusages, sysdatabases.

■ device_size– ratio: Monitors free space (%) in devices.

Source: query.

Table: sysdevices, sysusages, sysdatabases.

■ active_connection_ratio - ratio

Source: Query

Table: sysprocesses, syscurconfigs, sysconfigures

Chapter 1: sybase 5

sybase Requirements ................................................................................................................................................... 6

User-id authorization ............................................................................................................................................ 6

Installation notes .......................................................................................................................................................... 7

Migration from previous releases ................................................................................................................................ 7

Known issues ................................................................................................................................................................ 7

ASE configuration for Monitoring Tables data collection: ........................................................................................... 8

sybase Configuration .................................................................................................................................................... 8

Sybase Setup tab ................................................................................................................................................... 9

Sybase: Defining a message, using the Message pool ........................................................................................ 10

Sybase Connections tab ...................................................................................................................................... 12

Page 31: Nimsoft Monitor sybase Guidedocs.nimsoft.com/prodhelp/en_US/Probes/Catalog/sybase/3.5/sybase.pdf8 sybase Guide ASE configuration for Monitoring Tables data collection: ...

Chapter 1: sybase 31

Sybase Profiles tab .............................................................................................................................................. 14

Sybase Templates tab ......................................................................................................................................... 19

Sybase status tab ................................................................................................................................................ 20

Sybase: Editing a checkpoint ............................................................................................................................... 22

Sybase: Thresholds .............................................................................................................................................. 24

Sybase: Schedules ............................................................................................................................................... 25

Checkpoints metrics ............................................................................................................................................ 26

Checkpoint description ....................................................................................................................................... 27