Tivoli Monitoring for Databases Sybase Server Agent
Tivoli Monitoring for Databases Sybase Server Agent
Version 6.1.0
User’s Guide
SC32-9451-00
Tivoli Monitoring for Databases: Sybase Server Agent
®
Version 6.1.0
User’s Guide
SC32-9451-00
Note
Before using this information and the product it supports, read the information in Appendix E, “Notices,” on page 147.
iv IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Tables
1. Requirements for the Monitoring Agent for 16. General problems and solutions for
Sybase Server . . . . . . . . . . . . 5 uninstallation . . . . . . . . . . . 133
2. Viewing real-time data about Sybase Server 15 17. General agent problems and solutions 134
3. Investigating an event . . . . . . . . . 16 18. Agent problems and solutions on the UNIX
4. Recovering the operation of a resource . . . 17 operating system . . . . . . . . . . 134
5. Customizing your monitoring environment 17 19. Tivoli Enterprise Portal problems and
6. Monitoring with custom situations . . . . . 19 solutions . . . . . . . . . . . . . 136
7. Collecting and viewing historical data . . . 20 20. Remote deployment problems and solutions 136
8. Capacity planning for historical data . . . . 80 21. Workspace problems and solutions . . . . 137
9. Workspace group choices mapping . . . . . 95 22. Specific situation problems and solutions 137
10. Overview of event slots to event classes 97 23. Problems with configuring situations that you
11. Information to gather before contacting IBM solve in the Situation Editor . . . . . . 138
Software Support . . . . . . . . . . 117 24. Problems with configuration of situations that
12. Trace log files for troubleshooting agents 120 you solve in the Workspace area . . . . . 139
13. Problems and solutions for installation and 25. Problems with configuration of situations that
configuration for agents that run on UNIX you solve in the Manage Tivoli Enterprise
systems . . . . . . . . . . . . . 127 Monitoring Services window . . . . . . 140
14. Problems and solutions for installation and 26. Sybase problems and solutions . . . . . . 141
configuration for agents that run on Windows
systems . . . . . . . . . . . . . 128
15. Problems and solutions for installation and
configuration of specific database agents:
Microsoft SQL Server, Sybase, and Oracle . . 130
Use the configuration chapter in this guide with the IBM Tivoli Monitoring
Installation and Setup Guide to set up the software.
Use the information in this guide with the IBM Tivoli Monitoring User’s Guide to
monitor Sybase Server resources.
Publications
This section lists publications relevant to using the Monitoring Agent for Sybase
Server and describes how to access these publications online and how to order
these publications.
Prerequisite publications
To use the information in this guide effectively, you must have some knowledge of
IBM Tivoli Monitoring products, which you can obtain from the following
documentation:
v IBM Tivoli Monitoring Installation and Setup Guide
v IBM Tivoli Monitoring Problem Determination Guide
v IBM Tivoli Monitoring: Upgrading from Tivoli Distributed Monitoring
v Introducing IBM Tivoli Monitoring, Version 6.1.0
v IBM Tivoli Monitoring Administrator’s Guide
v IBM Tivoli Monitoring User’s Guide
Related publications
The following documents also provide useful information:
v IBM Tivoli Enterprise Console Adapters Guide
v IBM Tivoli Enterprise Console Event Integration Facility User’s Guide
viii IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
v IBM Tivoli Enterprise Console Reference Manual
v IBM Tivoli Enterprise Console Rule Builder’s Guide
http://publib.boulder.ibm.com/tividd/glossary/tivoliglossarymst.htm
The IBM Terminology Web site consolidates the terminology from IBM product
libraries in one convenient location. You can access the Terminology Web site at the
following Web address:
http://www.ibm.com/ibm/terminology
http://www.ibm.com/software/tivoli/library
Scroll down and click the Product manuals link. In the Tivoli Technical Product
Documents Alphabetical Listing window, click M to access all of the IBM Tivoli
Monitoring product manuals.
Note: If you print PDF documents on other than letter-sized paper, set the option
in the File → Print window that allows Adobe Reader to print letter-sized
pages on your local paper.
Ordering publications
You can order many Tivoli publications online at the following Web site:
http://www.elink.ibmlink.ibm.com/public/applications/
publications/cgibin/pbi.cgi
Accessibility
Accessibility features help users with a physical disability, such as restricted
mobility or limited vision, to use software products successfully. With this product,
you can use assistive technologies to hear and navigate the interface. You can also
use the keyboard instead of the mouse to operate most features of the graphical
user interface.
http://www.ibm.com/software/tivoli/education/
Support information
“Support information” on page 141 describes the following options for obtaining
support for IBM products:
v “Searching knowledge bases” on page 141
v “Obtaining fixes” on page 142
v “Contacting IBM Software Support” on page 143
Typeface conventions
This guide uses the following typeface conventions:
Bold
v Lowercase commands and mixed case commands that are otherwise
difficult to distinguish from surrounding text
v Interface controls (check boxes, push buttons, radio buttons, spin
buttons, fields, folders, icons, list boxes, items inside list boxes,
multicolumn lists, containers, menu choices, menu names, tabs, property
sheets), labels (such as Tip:, and Operating system considerations:)
v Keywords and parameters in text
Italic
v Words defined in text
v Emphasis of words
v New terms in text (except in a definition list)
v Variables and values you must provide
Monospace
v Examples and code examples
v File names, programming keywords, and other views that are difficult to
distinguish from surrounding text
v Message text and prompts addressed to the user
v Text that the user must type
v Values for arguments or command options
x IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
The names of environment variables are not always the same in Windows and
UNIX. For example, %TEMP% in Windows is equivalent to $TMPDIR in UNIX.
Note: If you are using the bash shell on a Windows system, you can use the UNIX
conventions.
The Tivoli Enterprise Portal is the interface for IBM Tivoli Monitoring products.
Providing a consolidated view of your environment, the Tivoli Enterprise Portal
permits you to monitor and resolve performance issues throughout the enterprise.
The Monitoring Agent for Sybase Server is an intelligent, remote monitoring agent
that resides on managed systems. It helps you anticipate trouble and warns system
administrators when critical events occur on their systems. With the Monitoring
Agent for Sybase Server, database and system administrators can set required
threshold levels and flags to alert administrators when the system reaches these
thresholds.
Each Monitoring Agent for Sybase Server instance collects information about one
Sybase Server domain. The monitoring agent performs the following types of
monitoring functions:
Monitoring for exceptions requires you to create the Monitoring Agent for Sybase
Server situations that are meaningful to the Sybase Server transactions that you are
monitoring. Example situations and expert advice are provided on the IBM Tivoli
Monitoring workstation to make this task as easy as possible.
For both of the IBM Tivoli Monitoring environments (IBM Tivoli Monitoring 5.x
and IBM Tivoli Monitoring 6.1), IBM Tivoli Enterprise Console is an optional
component, which acts as a central collection point for events from a variety of
sources, including those from other Tivoli software applications, Tivoli partner
applications, custom applications, network management platforms, and relational
database systems. You can view these events through the Tivoli Enterprise Portal
(using the event viewer), and you can forward events from IBM Tivoli Monitoring
situations to the IBM Tivoli Enterprise Console component.
2 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Manage Tivoli Enterprise Monitoring Services window
The window for the Manage Tivoli Enterprise Monitoring Services utility is
used for configuring the agent and starting Tivoli services that are not
already designated to start automatically.
After completing the steps to install the Monitoring Agent for Sybase Server as
described in the IBM Tivoli Monitoring Installation and Setup Guide, ″Installing
monitoring agents,″ you configure the Monitoring Agent for Sybase Server.
To start the Monitoring Agent for Sybase Server use the itmcmd dbagent
command. This command is documented in the IBM Tivoli Monitoring Installation
and Setup Guide.
To configure the Monitoring Agent for Sybase Server, use the following settings:
Server Name
Name of the Sybase Database Server that is to be monitored
Login Sybase user id to be used to connect to the Sybase Database Server in the
Server Name field
Password
Password for the Sybase user id in the Login field
Database Version
Sybase version of the Database Server
Home Directory
Install directory for the Sybase Database Server to be monitored
Error Log File
Location and name of the Sybase Error Log
6 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Configuring on your local system using the tacmd command line
See the IBM Tivoli Monitoring Installation and Setup Guide for the complete tacmd
addSystem command.
Use the following parameters for the -p | --properties parameter to configure the
Monitoring Agent for Sybase Server:
DBSETTINGS.db_sid
Name of the Sybase Server instance that is to be monitored
INSTANCE
Name of the Sybase Server instance that is to be monitored
DBSETTINGS.db_hostname
Hostname that this monitor will be run on
DBSETTINGS.db_dir
UNIX only property. Database server instance’s directory path
DBSETTINGS.db_home
(Windows) Directory path of the database server instance. (UNIX)
Directory path of the ASE directory.
DBSETTINGS.SYBASE_OCS
Install directory for the Sybase database Open Client. For UNIX, an
example is /opt/sybase/OCS-12_5. For Windows, and example is
c:\sybase\ocs-12_5.
Use following settings for the Agent tab ″Run as″ information:
Use local system account
(Windows only) Select this setting.
Allow service to interact with desktop
(Windows only) Leave this check box clear.
User Name
(UNIX only and optional) If the default User ID and password are not to
be used (the ones selected when configuring the OS agent), they can be
overridden using this field.
Group Name
(UNIX only and optional) If the default User ID and password are not to
be used (the ones selected when configuring the OS agent), they can be
overridden using this field.
Use the -t |--type TYPE parameter to specify the Monitoring Agent for Sybase
Server that you are configuring: OY
Use the following parameters for the -p | --properties parameter to configure the
Monitoring Agent for Sybase Server:
DBSETTINGS.db_sid
Name of the Sybase Server instance that is to be monitored
INSTANCE
Name of the Sybase Server instance that is to be monitored
DBSETTINGS.db_hostname
Hostname that this monitor will be run on
8 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
DBSETTINGS.db_dir
UNIX only property. Database server instance’s directory path
DBSETTINGS.db_home
(Windows) Directory path of the database server instance. (UNIX)
Directory path of the ASE directory.
DBSETTINGS.SYBASE_OCS
Install directory for the Sybase database Open Client. For UNIX, an
example is /opt/sybase/OCS-12_5. For Windows, and example is
c:\sybase\ocs-12_5.
For example:
tacmd addSystem -t OY -n myhostname:KUX -p INSTANCE=dbServer
DBSETTINGS.db_sid=dbServer DBSETTINGS.db_ver=12.5.3
DBSETTINGS.db_home="/opt/sybase/ASE-12_5" DBSETTINGS.db_dir="/opt/sybase"
DBSETTINGS.SYBASE_OCS="/opt/sybase/OCS-12_5"
DBSETTINGS.db_errorlog="/opt/sybase/ASE-12_5/install/dbServer.log"
DBSETTINGS.db_hostname=myhostname DBSETTINGS.db_login=sa
DBSETTINGS.db_password=sapassword
Background information
This procedure includes creating a user ID and granting permission to the new
user ID.
If the Tivoli user is not ″tivoli″, edit the koygrant.sql file and change ″tivoli″ to
the Tivoli user ID.
5. Enter the following case-sensitive command, which runs the koygrant.sql script
to change the grant permission tables in the master database:
isql -U sa -P password -S servername -i koygrant.sql
Where:
password
Password for user ″sa″
servername
Database server name
Background Information
During this procedure, you either use the itmcmd dbconfig command or the
itmcmd config command to locate the agent servers on the system that you want
to monitor. The search process is reliable when the servers are running when
itmcmd dbconfig or itmcmd config searches for them, but these commands cannot
10 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
always find non-running servers. Additionally, these commands can verify that the
installation and configuration are complete.
The pertinent parameters that the itmcmd dbconfig command accepts are as
follows:
itmcmd dbconfig [-h install_dir] [-s server |-i ID| -ppassword] [product_code]
-h install_dir
The name of the top-level directory in which you installed the monitoring
agent.
-s server
The name of the server.
-i ID The user-defined ID for the server.
-p password
The user-defined password for the server.
product_code
The product code, which is oy.
Procedure
1. If you know the name of your server instance use the itmcmd config -A
command. This command is fully documented in the IBM Tivoli Monitoring
Installation and Setup Guide.
2. If you do not know the name of your server instance use the itmcmd dbconfig
command with the following steps.
a. At the first menu, select the following option: Confine automatic search to
running databases to search for your databases.
b. When the search is complete and the Database Options menu is displayed,
do the following as needed:
v If the initial search found all of your servers, configuration is complete,
go to Step 4.
v If you need to search for a database that the itmcmd dbconfig command
did not find because the database is not running, or because it is running
on another system, use itmcmd dbconfig as follows to search disk files:
1) Exit itmcmd dbconfig.
2) Open itmcmd dbconfig.
3) Select the following option: Also search for non-running databases.
4) Press Enter to display the Database Options menu.
5) Select the following option: Optional disk searches, manually add
servers....
Additional information: The menu that is displayed represents a
hierarchy of alternate search techniques listed in the order of the
amount of manual input they require. Use only the techniques that
you need to search for the files, because the process is slower and less
reliable than searching running servers. Searches through NFS file
systems can take some time.
Note: The Verify Database OMA Installation option does not inform you if
you enter the wrong user ID or password.
d. Exit itmcmd dbconfig.
Additional information: A message that names a file containing a log of your
itmcmd dbconfig activity is displayed. This log can help IBM Customer
Support diagnose configuration problems.
Background Information
Monitoring Agent for Sybase Server must have the UTF-8 charset configured for
translation purposes.
12 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Procedure
1. Bring up a command window.
2. Go to the Sybase/charsets/utf8 directory.
3. Run the following command:
charset -Usa -Ppassword -Sservername binary.srt utf8
4. Restart the Monitoring Agent for Sybase Server so that it can use the UTF-8
charset.
Additional information: If the UTF-8 charset is not available, you receive the
following error message: Open Client Server Message Number: 2409 Character
set conversion is not available between client character set ’utf8’ and
server character set ’charset’.
Note: If your server uses the cp850 character set you receive the following
message that you can safely ignore: Message String: Character set
conversion is not available between client character set ’utf8’
and server character set ’cp850’.
Background Information
Monitoring Agent for Sybase Server must have the UTF-8 charset configured for
translation purposes.
If the Config Value and Run Value displayed are not 0, then no further steps are
required. If the values are 0, you need to perform the steps below.
Procedure
At the isql prompt, run the following command to enable the unicode conversions:
1> sp_configure "enable unicode conversions", 2
2> go
This chapter provides information about how to use the Monitoring Agent for
Sybase Server to perform the following tasks:
v “View real-time data about Sybase Server”
v “Investigate an event” on page 16
v “Recover the operation of a resource” on page 16
v “Customize your monitoring environment” on page 17
v “Monitor with custom situations that meet your requirements” on page 18
v “Collect and view historical data” on page 19
For each of these tasks, there is a list of procedures that you perform to complete
the task. For the procedures, there is a cross-reference to where you can find
information about performing that procedure. Information about the procedures is
located in subsequent chapters and appendixes of this user’s guide and in the IBM
Tivoli Monitoring documentation.
Table 2 contains a list of the procedures for viewing the real-time data about
Sybase Server that the monitoring agent collects. The table also contains a
cross-reference to where you can find information about each procedure.
Table 2. Viewing real-time data about Sybase Server
Procedure Where to find information
View the hierarchy of your monitored IBM Tivoli Monitoring User’s Guide:
resources from a system point of view ″Navigating through workspaces″ (in
(Navigator view organized by operating ″Monitoring: real-time and event-based″
platform, system type, monitoring agents, chapter)
and attribute groups).
View the indicators of real or potential
problems with the monitored resources
(Navigator view).
View changes in the status of the resources IBM Tivoli Monitoring User’s Guide: ″Using
that are being monitored (Enterprise workspaces″ (in ″Monitoring: real-time and
Message Log view). event-based″ chapter)
View the status of the agents in the Chapter 4, “Workspaces reference,” on page
managed enterprise that you are monitoring 21 in this guide
(Monitoring Agent Status view).
Investigate an event
When the conditions of a situation have been met, an event indicator is displayed
in the Navigator. When an event occurs, you want to obtain information about that
event so you can correct the conditions and keep your enterprise running
smoothly. The situation must be associated with a Navigator Item in order to
appear.
Table 4 on page 17 contains a list of the procedures for recovering the operation of
a resource and a cross-reference to where you can find information about each
procedure.
16 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 4. Recovering the operation of a resource
Procedure Where to find information
Take an action on a resource manually. IBM Tivoli Monitoring User’s Guide:
v ″Other views″ (in ″Custom workspaces″
chapter, ″Workspace views″ section)
v ″Take action – Reflex automation″ (in
Situations for event-based monitoring″
chapter, ″Event-based monitoring
overview″ section)
Note: When you create and run a situation, an IBM Tivoli Enterprise Console
event is created. For information on how to define event severities from
forwarded IBM Tivoli Monitoring situations and other event information,
see the IBM Tivoli Monitoring Administrator’s Guide.
18 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
v Expert Advice
v When a true situation closes
v Available Managed Systems
Table 6 contains a list of the procedures for monitoring your resources with custom
situations that meet your requirements and a cross-reference to where you can find
information about each procedure.
Table 6. Monitoring with custom situations
Procedure Where to find information
Create an entirely new situation. IBM Tivoli Monitoring User’s Guide: ″Creating
a new situation″ (in ″Situations for
event-based monitoring″ chapter, ″Creating a
situation″ section)
Table 7 on page 20 contains a list of the procedures for collecting and viewing
historical data and a cross-reference to where you can find information about each
procedure.
20 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Chapter 4. Workspaces reference
This chapter contains an overview of workspaces, references for detailed
information about workspaces, and descriptions of the predefined workspaces
included in this monitoring agent.
About workspaces
A workspace is the working area of the Tivoli Enterprise Portal application
window. At the left of the workspace is a Navigator that you use to select the
workspace you want to see. As part of the application window, the right side of
the status bar shows the Tivoli Enterprise Portal server name and port number to
which the displayed information applies, and the ID of the current user.
As you select items in the Navigator, the workspace presents views pertinent to
your selection. Each workspace has at least one view. Some views have links to
workspaces. Every workspace has a set of properties associated with it.
This monitoring agent provides predefined workspaces. You cannot modify the
predefined workspaces, but you can create new workspaces by editing them and
saving the changes with a different name.
For a list of the predefined workspaces for this monitoring agent and a description
of each workspace, refer to the Predefined workspaces section below and the
information in that section for each individual workspace.
For additional information about workspaces for this monitoring agent, see
Appendix A, “Workspaces workgroups mapped to tasks,” on page 95.
Predefined workspaces
The Monitoring Agent for Sybase Server provides the following predefined
workspaces, which are organized alphabetically:
v Cache Usage
v Databases
v Device Usage
v Engine Summary
v Enterprise Database Summary
v Enterprise Errorlog Alerts
v Enterprise Locking Summary
v Enterprise Processes Summary
v Enterprise Server Statistics
v Enterprise Server Summary
v Enterprise Sybase Summary
v Errorlog Alerts
© Copyright IBM Corp. 2005 21
v Lock Information
v Lock Usage
v Log and Space Information
v Log Usage
v Process Holding Lock
v Process SQL Text
v Processes
v Server Configuration
v Server Statistics
v Servers
v SQL Text
v Sybase Server_ID
Databases workspace
The Monitoring Agent for Sybase Server provides detailed and summary
information about databases, which also includes information about the number of
databases, the number of devices and log usage.
22 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
The predefined Databases workspace contains the following views:
v Percent Freespace bar chart
v Databases Summary bar chart
v Databases Summary table view
v Databases Detail table view
24 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Enterprise Errorlog Alerts workspace
The predefined Enterprise Errorlog Alerts workspace contains the following views:
v Total Errors bar chart
v Errorlog Size bar chart
v Alert Summary table view
This table view displays data provided by the Problem Summary attributes.
This table view displays data provided by the Server Summary attributes.
26 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
and the percentage of CPU time the server is using on the host. This table view
displays data provided by the Server Summary attributes.
This table view displays data provided by the (Problem Summary) attributes.
This table view displays data provided by the Problem Detail attributes.
28 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Locking Summary bar chart
The Locking Summary bar chart displays the totals for deadlocks, lock contentions,
lock promotes, exclusive lock promotes, shared lock promotes, and lock requests.
This bar chart displays data provided by the Lock Summary attributes.
This table view displays data provided by the Lock Detail attributes.
This bar chart displays data provided by the Database Detail attributes.
30 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Processes workspace table view
The Monitoring Agent for Sybase Server provides detailed and summary
information about processes:
v Number of blocked processes
v Percentage of CPU time used by processes
v Percentage of CPU time used by application processes
Task Switches
For each server, the Task Switches table view displays information about task
context switches. This report applies only to Sybase Server System 11. This table
view shows the cause of a task context switch and frequency of task context
switch. This table view displays data provided by the Task Detail attributes.
The predefined Server Statistics Summary workspace contains the following views:
v Statistics Summary bar charts (2)
v Statistics Summary table view
v Statistics Detail table view
Servers workspace
The Monitoring Agent for Sybase Server provides information about server status,
activity, configuration, engine usage, and task usage.
32 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
v Cache Utilization bar chart
v Server Summary table view
34 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Chapter 5. Attributes reference
This chapter contains information about the following topics:
v Overview of attributes
v References for detailed information about attributes
v Descriptions of the attributes for each attribute group included in this
monitoring agent
v Disk space requirements for historical data
About attributes
Attributes are the application properties being measured and reported by the
Monitoring Agent for Sybase Server, such as the amount of memory usage or the
message ID.
Attributes are organized into groups according to their purpose. The attributes in a
group can be used in the following two ways:
v Chart or table views
Attributes are displayed in chart and table views. The chart and table views use
queries to specify which attribute values to request from a monitoring agent.
You use the Query editor to create a new query, modify an existing query, or
apply filters and set styles to define the content and appearance of a view based
on an existing query.
v Situations
You use attributes to create situations that monitor the state of your operating
system, database, or application. A situation describes a condition you want to
test. When you start a situation, the Tivoli Enterprise Portal compares the values
you have assigned to the situation attributes with the values collected by the
Monitoring Agent for Sybase Server and registers an event if the condition is
met. You are alerted to events by indicator icons that appear in the Navigator.
Some of the attributes in this chapter are listed twice, with the second attribute
having a ″(Unicode)″ designation after the attribute name. These Unicode attributes
were created to provide access to globalized data. Use the globalized attribute
names because this is where the monitoring agent is putting the data. If you were
using a previous Candle OMEGAMON® release of this monitoring agent, you
must run the Application Migration Tool to create globalized attributes for your
customized queries, situations, and policies. See the IBM Tivoli Monitoring
Installation and Setup Guide for more information.
For a list of the attributes groups, a list of the attributes in each attribute group,
and descriptions of the attributes for this monitoring agent, refer to the Attribute
groups and attributes section in this chapter.
The following sections contain descriptions of these attribute groups. Each group
contains an alphabetical list of attributes.
Cache Hit Count. The number of hits during data cache searches for the current
interval. The value format is an integer, for example, 15000. This value represents a
count of logical reads from the named cache. If cache searches always result in
data being found in cache, this value is 100% of the number of cache searches
performed. Consider increasing the amount of memory allocated to the named
cache if this value is low.
36 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Cache Hit per Transaction. The average number of hits during data cache searches
per transaction for the current interval. The value format is a decimal with two
decimal places allowed, for example, 10.00. This value represents the number of
logical reads per transaction from the named cache. Consider increasing the
amount of memory allocated to the named cache if this value is low.
Cache Hit Percent. The percentage of data cache searches that resulted in hits
during the current interval. The value format is a percentage with two decimal
places allowed, for example, 90.00. This value represents the ratio of logical reads
to the total number of reads for the named cache. If cache searches always result in
data being found in cache, this value is 100%. Consider increasing the amount of
memory allocated to the named cache if this value is low.
Cache Hit Rate. The average number of hits during data cache searches per second
for the current interval. The value format is a decimal with two decimal places
allowed, for example, 75.00. This value represents the number of logical reads per
second from the named cache. Consider increasing the amount of memory
allocated to the named cache if this value is low.
Cache Miss Count. The number of times in the interval that a page was not found
in cache. The value format is an integer, for example, 530.
Cache Miss per Transaction. The average number of misses during data cache
searches for the current interval. The value format is a decimal with two decimal
places allowed, for example, 2.00. This value represents the number of physical
reads per transaction from a database device. The server must perform a physical
read if the data is not found in the named cache. Consider increasing the amount
of memory allocated to the named cache if this value is high.
Cache Miss Percent. The percentage of data cache searches that resulted in misses
where the page was not found during the current interval. The value format is a
percentage with two decimal places allowed, for example, 10.00. This value
represents the ratio of physical reads to the total number of reads for the named
cache. If cache searches never result in data being found in cache, this value is
100%. Consider increasing the amount of memory allocated to the named cache if
this value is high.
Cache Miss Rate. The average number of misses during data cache searches for
the current interval. The value format is a decimal with two decimal places
allowed, for example, 8.00. This value represents the number of physical reads per
second from a database device. If cache searches always result in data being found
in cache, this value is zero. Consider increasing the amount of memory allocated to
the named cache if this value is high.
Cache Name. The server-assigned name for the data cache. The value format is
alphanumeric with a maximum 30 characters, for example, tempdb_cache. The
name is unique. Sybase Server System 11 allows you to use named caches to
improve cache performance.
Cache Name (Unicode). The server-assigned name for the data cache. This
attribute is globalized. The value format is alphanumeric with a maximum 90
bytes, for example, tempdb_cache. The name is unique. You can use Sybase Server
System 11 named caches to improve cache performance.
Cache Search Count. The number of cache searches during the current interval.
The value includes hits and misses. The value format is an integer, for example,
Cache Search per Transaction. The average number of data cache searches per
transaction during the current interval. The value format is a decimal with two
decimal places allowed, for example, 30.00. If cache searches result in hits, the
server finds the data in memory and avoids reading data from database devices.
Consider allocating more memory to the named cache to increase the number of
hits.
Cache Search Rate. The average number of data cache searches per second during
the current interval. The value format is a decimal with two decimal places
allowed, for example, 25.00. If cache searches result in hits, the server finds the
data in memory and avoids reading data from database devices. Consider
allocating more memory to the named cache to increase the number of hits.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Large IO Denied Count. The number of large I/O requests not performed by the
server during the current interval. The value format is an integer, for example,
10000. The server may deny large I/O requests when any page in a buffer is in
another pool, no buffers are available in the requested pool, and the first extent of
an allocation unit contains the allocation page in the 2K pool. If this value is high,
evaluate individual caches to determine the cause.
Large IO Denied per Transaction. The average number of large I/O requests per
transaction not performed by the server during the current interval. The value
format is a decimal with two decimal places allowed, for example, 2.00. The server
may deny large I/O requests when any page in a buffer is in another pool, no
buffers are available in the requested pool, and the first extent of an allocation unit
contains the allocation page in the 2K pool. If this value is high, evaluate
individual caches to determine the cause.
Large IO Denied Percent. The percentage of large I/O requests not performed by
the server during the current interval. The value format is a percentage with two
decimal places allowed, for example, 20.00. The server may deny large I/O
requests when any page in a buffer is in another pool, no buffers are available in
the requested pool, and the first extent of an allocation unit contains the allocation
page in the 2K pool. If this value is high, evaluate individual caches to determine
the cause.
Large IO Denied Rate. The average number of large I/O requests per second not
performed by the server during the current interval. The value format is a decimal
with two decimal places allowed, for example, 5.00. The server may deny large
I/O requests when any page in a buffer is in another pool, no buffers are available
in the requested pool, and the first extent of an allocation unit contains the
allocation page in the 2K pool. If this value is high, evaluate individual caches to
determine the cause.
Large IO Pages Cached Count. The number of large I/O pages cached during the
current interval. The value format is an integer, for example, 15000.
Large IO Pages Cached per Transaction. The average number of large I/O pages
per transaction cached during the current interval. The value format is a decimal
38 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
with two decimal places allowed, for example, 5.00. This data can be useful for
validating percentage values or in environments where the number of transactions
is well-defined.
Large IO Pages Cached Rate. The average number of large I/O pages per second
cached during the current interval. The value format is a decimal with two decimal
places allowed, for example, 30.00.
Large IO Pages Used Count. The number of large I/O pages used during the
current interval. The value format is an integer, for example, 50000.
Large IO Pages Used per Transaction. The average number of large I/O pages per
transaction used during the current interval. The value format is a decimal with
two decimal places allowed, for example, 100.00.
Large IO Pages Used Percent. The percentage of large I/O requests used by the
server during the current interval. The value format is a percentage with two
decimal places allowed, for example, 30.00. This data can be useful for monitoring
trends.
Large IO Pages Used Rate. The average number of large I/O pages per second
used during the current interval. The value format is a decimal with two decimal
places allowed, for example, 200.00.
Large IO Performed Count. The number of large I/O operations performed during
the current interval. The value format is an integer, for example, 15000. The server
may perform large I/O requests unless any page in a buffer is in another pool, no
buffers are available in the requested pool, and the first extent of an allocation unit
contains the allocation page in the 2K pool. If this value is low, evaluate individual
caches to determine the cause.
Large IO Performed per Transaction. The average number of large I/O requests
per transaction performed during the current interval. The value format is a
decimal with two decimal places allowed, for example, 10.00. The server may
perform large I/O requests unless any page in a buffer is in another pool, no
buffers are available in the requested pool, and the first extent of an allocation unit
contains the allocation page in the 2K pool. If this value is low, evaluate individual
caches to determine the cause.
Large IO Performed Rate. The average number of large I/O requests per second
performed during the current interval. The value format is a decimal with two
decimal places allowed, for example, 20.00. The server may perform large I/O
requests unless any page in a buffer is in another pool, no buffers are available in
the requested pool, and the first extent of an allocation unit contains the allocation
page in the 2K pool. If this value is low, evaluate individual caches to determine
the cause.
LRU Buffer Use per Transaction. The average number of LRU buffers used per
transaction during the current interval. The value format is a decimal with two
decimal places allowed, for example, 300.00.
LRU Buffer Use Percent. The percentage of all buffers used during the current
interval that were LRU buffers. The value format is a percentage with two decimal
places allowed, for example, 45.00.
LRU Buffer Use Rate. The average number of LRU buffers used per second during
the current interval. The value format is a decimal with two decimal places
allowed, for example, 15.00.
MRU Buffer Use Count. The number of MRU buffers used during the current
interval. The value format is an integer, for example, 20000.
MRU Buffer Use per Transaction. The average number of MRU buffers per
transaction used during the current interval. The value format is a decimal with
two decimal places allowed, for example, 15.00.
MRU Buffer Use Percent. The percentage of all buffers used during the current
interval that were MRU buffers. The value format is a percentage with two decimal
places allowed, for example, 80.00.
MRU Buffer Use Rate. The average number of MRU buffers per second used
during the current interval. The value format is a decimal with two decimal places
allowed, for example, 15.00.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Cache Hit Count. The number of hits during data cache searches for the current
interval. The value format is an integer, for example, 15000. This value represents a
count of logical reads from the named cache. If cache searches always result in
data being found in cache, this value is 100% of the total cache searches. Consider
increasing the amount of memory allocated to the named cache if this value is low.
Cache Hit per Transaction. The average number of hits during data cache searches
per transaction for the current interval. The value format is a decimal with two
decimal places allowed, for example, 10.00 This value represents the number of
logical reads per transaction from the named cache. Consider increasing the
amount of memory allocated to the named cache if this value is low.
Cache Hit Percent. The percentage of data cache searches that resulted in hits
during the current interval. The value format is a percentage with two decimal
40 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
places allowed, for example, 90.00. This value represents the ratio of logical reads
to the total number of reads for the named cache. If cache searches always result in
data being found in cache, this value is 100%. Consider increasing the amount of
memory allocated to the named cache if this value is low.
Cache Hit Rate. The average number of hits during data cache searches per second
for the current interval. The value format is a decimal with two decimal places
allowed, for example, 75.00. This value represents the number of logical reads per
second from the named cache. Consider increasing the amount of memory
allocated to the named cache if this value is low.
Cache Miss Count. Number of times in the interval that a page was not found in
the cache.
Cache Miss per Transaction. The average number of misses during data cache
searches for the current interval. The value format is a decimal with two decimal
places allowed, for example, 2.00. This value represents the number of physical
reads per transaction from a database device. The server must perform a physical
read if the data is not found in the named cache. Consider increasing the amount
of memory allocated to the named cache if this value is high.
Cache Miss Percent. The percentage of data cache searches that resulted in misses
during the current interval. The value format is a percentage with two decimal
places allowed, for example, 10.00. This value represents the ratio of physical reads
to the total number of reads for the named cache. If cache searches never result in
data being found in cache, this value is 100%. Consider increasing the amount of
memory allocated to the named cache if this value is high.
Cache Miss Rate. The average number of misses during data cache searches for
the current interval. The value format is a decimal with two decimal places
allowed, for example, 8.00. This value represents the number of physical reads per
second from a database device. Consider increasing the amount of memory
allocated to the named cache if this value is high.
Cache Search Count. The number of cache searches during the current interval.
The value includes hits and misses. The value format is an integer, for example,
240. If cache searches result in hits, the server finds the data in memory and avoids
reading data from database devices. Consider allocating more memory to the
named cache to increase the number of hits.
Cache Search per Transaction. The average number of data cache searches per
transaction during the current interval. The value format is a decimal with two
decimal places allowed, for example, 30.00. If cache searches result in hits, the
server finds the data in memory and avoids reading data from database devices.
Consider allocating more memory to the named cache to increase the number of
hits.
Cache Search Rate. The average number of data cache searches per second during
the current interval. The value format is a decimal with two decimal places
allowed, for example, 25.00. If cache searches result in hits, the server finds the
data in memory and avoids reading data from database devices. Consider
allocating more memory to the named cache to increase the number of hits.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Large IO Denied per Transaction. The average number of large I/O requests per
transaction not performed by the server during the current interval. The value
format is a decimal with two decimal places allowed, for example, 2.00. The server
may deny large I/O request when any page in a buffer is in another pool, no
buffers are available in the requested pool, and the first extent of an allocation unit
contains the allocation page in the 2K pool. If this value is high, evaluate
individual caches to determine the cause.
Large IO Denied Percent. The percentage of large I/O requests not performed by
the server during the current interval. The value format is a percentage with two
decimal places allowed, for example, 20.00. The server may deny large I/O request
when any page in a buffer is in another pool, no buffers are available in the
requested pool, and the first extent of an allocation unit contains the allocation
page in the 2K pool. If this value is high, evaluate individual caches to determine
the cause.
Large IO Denied Rate. The average number of large I/O requests per second not
performed by the server during the current interval. The value format is a decimal
with two decimal places allowed. The server may deny large I/O request when
any page in a buffer is in another pool, no buffers are available in the requested
pool, and the first extent of an allocation unit contains the allocation page in the
2K pool. If this value is high, evaluate individual caches to determine the cause.
Large IO Pages Cached Count. The number of large I/O pages cached during the
current interval. The value format is an integer, for example, 15000.
Large IO Pages Cached per Transaction. The average number of large I/O pages
per transaction cached during the current interval. The value format is a decimal
with two decimal places allowed, for example, 5.00. This data can be useful for
validating percentage values or in environments where the number of transactions
is well-defined.
Large IO Pages Cached Rate. The average number of large I/O pages per second
cached during the current interval. The value format is a decimal with two decimal
places allowed, for example, 30.00.
Large IO Pages Used Count. The number of large I/O pages used during the
current interval. The value format is an integer, for example, 50000.
Large IO Pages Used per Transaction. The average number of large I/O pages per
transaction used during the current interval. The value format is a decimal with
two decimal places allowed, for example, 100.00.
Large IO Pages Used Percent. The percentage of large I/O requests used by the
server during the current interval. The value format is a percentage with two
decimal places allowed, for example, 30.00. This data can be useful for monitoring
trends.
42 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Large IO Pages Used Rate. The average number of large I/O pages per second
used during the current interval. The value format is a decimal with two decimal
places allowed, for example, 200.00.
Large IO Performed Count. The number of large I/O requests performed during
the current interval. The value format is an integer, for example, 15000. The server
may perform large I/O requests unless any page in a buffer is in another pool, no
buffers are available in the requested pool, and the first extent of an allocation unit
the allocation page in the 2K pool. If this value is low, evaluate individual caches
to determine the cause.
Large IO Performed per Transaction. The average number of large I/O requests
per transaction performed during the current interval. The value format is a
decimal with two decimal places allowed, for example, 10.00. The server may
perform large I/O requests unless any page in a buffer is in another pool, no
buffers are available in the requested pool, and the first extent of an allocation unit
contains the allocation page in the 2K pool. If this value is low, evaluate individual
caches to determine the cause.
Large IO Performed Rate. The average number of large I/O requests per second
performed during the current interval. The value format is a decimal with two
decimal places allowed, for example, 20.00. The server may perform large I/O
requests unless any page in a buffer is in another pool, no buffers are available in
the requested pool, and the first extent of an allocation unit contains the allocation
page in the 2K pool. If this value is low, evaluate individual caches to determine
the cause.
LRU Buffer Use Count. The number of least recently used (LRU) buffers used
during the current interval. The value format is an integer, for example, 15000.
LRU Buffer Use per Transaction. The average number of LRU buffers used per
transaction during the current interval. The value format is a decimal with two
decimal places allowed, for example, 300.00.
LRU Buffer Use Percent. The percentage of all buffers used during the current
interval that were LRU buffers. The value format is a percentage with two decimal
places allowed, for example, 45.00.
LRU Buffer Use Rate. The average number of LRU buffers used per second during
the current interval. The value format is a decimal with two decimal places
allowed, for example, 15.00.
MRU Buffer Use Count. The number of most recently used (MRU) buffers used
during the current interval. The value format is an integer, for example, 20000.
MRU Buffer Use per Transaction. The average number of MRU buffers per
transaction used during the current interval. The value format is a decimal with
two decimal places allowed, for example, 15.00.
MRU Buffer Use Rate. The average number of MRU buffers per second used
during the current interval. The value format is a decimal with two decimal places
allowed, for example, 15.00.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Configuration attributes
Use the Configuration attributes to create situations that monitor the configuration
of a server.
Config Parameter. The name of the configuration parameter. The value format is
alphanumeric with a maximum 30 characters.
Example: Partition groups.
Config Value. The value for the configuration parameter. The value format is
alphanumeric with a maximum 12 characters.
Example: 1000
The value was initially specified in the sysconfigures system table. Monitor this
value to track its effect on performance, and to compare the initial setting to the
maximum, minimum, and run values.
Config Value (Unicode). The value for the configuration parameter. This attribute
is globalized. The value format is alphanumeric with a maximum 36 bytes.
Example: 1000
The value was initially specified in the sysconfigures system table. Monitor this
value to track its effect on performance, and to compare the initial setting to the
maximum, minimum, and run values.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
44 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Maximum Value. The maximum value that can be specified for the configuration
parameter. The value format is alphanumeric with a maximum 12 characters, for
example, 2147483647.
Minimum Value. The minimum value that can be specified for the configuration
parameter. The value format is alphanumeric with a maximum 12 characters, for
example, 1.
Parm Type. The type of configuration parameter. The following values are valid:
Dynamic
Configuration parameter is dynamic. Server restart is not required.
Static Configuration parameter is static. Server restart is required.
Run Value. The value the server is using for the configuration parameter. The
value format is alphanumeric with a maximum 12 characters, for example, 1000.
Run Value (Unicode). The value the server is using for the configuration
parameter. This attribute is globalized. The value format is alphanumeric with a
maximum 36 bytes, for example, 1000.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Abort Tran On Log Full. Indicates whether the Abort Tran On Log Full option is
enabled for the database. The following values are valid:
Dynamic
Abort Tran On Log Full option is disabled.
Static Abort Tran On Log Full option is enabled.
Data Freespace. The number of megabytes (MB) of free space in the database. The
value includes the megabytes of free data only and data and log space. The value
format is a decimal with two decimal places allowed, for example, 10.00. When the
transaction log is stored on a separate segment, the database uses a last-chance
threshold to manage free space. Set alerts for abnormal conditions if you are not
using a last-chance threshold to manage free space in the database.
Data Freespace Percent. The percentage of free space in the databases. The value
format is a percentage with two decimal places allowed, for example, 20.00. The
product calculates this percentage from the number of free blocks in the database
and the number of data blocks that are allocated for the database. Consider using
the alter database command to expand the database size.
Database Name. The name of the database. The value format is alphanumeric with
a maximum 30 characters. Each database name is unique. The server also assigns
each database its own identification number.
Database Name (Unicode). The name of the database. This attribute is globalized.
The value format is alphanumeric with a maximum 90 bytes. Each database name
is unique. The server also assigns each database its own identification number.
DB ID. The ID for the database. The value format is alphanumeric with a
maximum 12 characters, for example, 2156. This value is stored in the sysdatabases
table.
DB ID (Unicode). The ID for the database. This attribute is globalized. The value
format is alphanumeric with a maximum 36 bytes, for example, 2156. This value is
stored in the sysdatabases table.
DB Owner. The server-assigned user ID for the owner of the database. The value
format is alphanumeric with a maximum 8 characters, for example, DBO. Use the
create database command to establish this identifier.
DB Owner (Unicode). The server-assigned user ID for the owner of the database.
This attribute is globalized. The value format is alphanumeric with a maximum 64
bytes, for example, DBO. Use the create database command to establish this
identifier.
DBO Only Access. Indicates whether the database is set for owner access only.
The following values are valid:
No Database can be accessed by authorized users.
Yes Database can be accessed by owner only.
Dump Tran Date. The time stamp that indicates the date and time the dump
transaction command was last executed for the database. The format is
YY.MM.DD. The following values are valid:
YY Year
MM Month
DD Day
Error Status. Indicates whether the database has an error status. A database with
an error status has a status of suspect, crashed, or recovery. The following values
are valid:
No Database does not have an error status.
Yes Database has an error status.
Check the status bits in the sysdatabases table to determine the cause of the error.
Use the database consistency checker dbcc to verify the database integrity.
46 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Free Space Accounting Suppressed. Indicates whether the free space accounting
option is enabled for the database. The following values are valid:
No Free space accounting is enabled.
Yes Free space accounting is disabled.
The no-free-space-actg option turns off free space accounting on non-log segments
only. Information about free space is inaccurate when free space accounting is
turned off. Use the no-free-space-actg option and the checkpoint command to
speed recovery. No time is needed to count free space for non-log segments.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Log Freespace. The number of megabytes (MB) of free space in the transaction log
for the database. The value includes the number of megabytes of free space on the
log only and data and log partitions. The value format is a decimal with two
decimal places allowed, for example, 2.00. Various types of transactions, such as
mass updates and bulk copying, can involve extensive logging.
Log Freespace Percent. The percentage of free space in the transaction log for the
database. The value format is a percentage with two decimal places allowed, for
example, 20.00. Various types of transactions, such as mass updates and bulk
copying in can involve extensive logging.
Log Size. The number of megabytes (MB) allocated for the transaction log for the
database. The value includes the number of megabytes allocated for the transaction
log on the log only and data and log partitions. The value format is a decimal with
two decimal places allowed, for example, 5.00. The appropriate size for a
transaction log depends on how the database is used. Several factors, such as the
number of transactions, type of transactions, and number of users, effect sizing.
Evaluate the need to truncate the transaction log to prevent it from filling up.
No CKPT After Recovery. Indicates whether a record for the checkpoint is added
to the transaction log when the database is recovered. The following values are
valid:
No No CKPT After Recovery option is disabled.
Yes No CKPT After Recovery option is enabled.
Read Only Access. Indicates whether the database has a status of read-only. The
following values are valid:
No Database is a read and write database.
Yes Database has a status of read only.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Select Into Bulkcopy Enabled. Indicates whether the select into/bulkcopy option
is enabled for the database. The following values are valid:
No Select Into/Bulkcopy option is disabled.
Yes Select Into/Bulkcopy option is enabled.
Single User Access. Indicates whether the database has a status of single-user. A
database with a status of single-user can only be accessed by one user at a time.
The following values are valid:
No Database can be accessed by multiple users.
Yes Database has a status of single user.
Total Devices. The number of devices allocated for the database. The value format
is an integer in the range 1-128, for example, 4.
Truncate Log on CKPT. Indicates whether the trunc log on CHKPT option is
enabled for the database. The following values are valid:
No Trunc Log On CHKPT option is disabled.
Yes Trunc Log On CHKPT option is enabled.
Current Interval. The number of seconds that have elapsed between the previous
sample and the current sample. The value format is an integer, for example, 90. A
sample contains the data that the Monitoring Agent for Sybase Server collects
about each server. New data becomes available if a new interval has occurred and
data has been refreshed.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Minimum Pct Data Freespace. The lowest percentage of free space in data only
and data and log segments on a device allocated to a database. The value format is
a percentage with two decimal places allowed, for example, 5.00. The amount of
space needed by the database depends on its anticipated activity. Set alerts for
abnormal conditions. Evaluate the possibility of adding more space to the
database.
Minimum Pct Log Freespace. The lowest percentage of free space in log only and
data and log segments on a device allocated for the database transaction log. The
value format is a percentage with two decimal places allowed, for example, 5.00.
The amount of space needed by the transaction log depends on the type and
quantity of the transactions and the frequency of backups. Set alerts for abnormal
conditions. Evaluate the possibility of expanding the log.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Total Databases. The number of databases for the server. The value format is an
integer, for example, 10.
48 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Total DBs DBO Only. The number of databases with a status of DBO only. A
database with a status of database owner can be accessed only by users with DBO
authority. The value format is an integer, for example, 5.
Total DBs in Error. The number of databases with an error status. A database with
an error status is a database with a status of suspect, crashed, or recovery. The
value format is an integer, for example, 2.
Total DBs No Free Space Accounting. The number of databases that have the free
space accounting option disabled. The value format is an integer, for example, 5.
Total DBs Read Only. The number of databases with a status of read only. The
value format is an integer, for example, 5.
Total DBs Single User. The number of databases with a status of single user. A
database with a status of single user can be accessed by only one user at a time.
The value format is an integer, for example, 2.
Database Name. The name of the database. The value format is alphanumeric with
a maximum 30 characters. Each database name is unique. The server also assigns
each database its own identification number.
Database Name (Unicode). The name of the database. This attribute is globalized.
The value format is alphanumeric with a maximum 90 bytes. Each database name
is unique. The server also assigns each database its own identification number.
Device Free Space. The number of megabytes (MB) of free space on a device. The
value format is a decimal with two decimal places allowed, for example, 10.00.
Adequate space is required to support database and system administration
activities. Set alerts for abnormal conditions. Refer to this value when estimating
space needed for tables, indexes, logs, and system administration.
Device Free Space Percent. The percentage of free space on the device. The value
format is a percentage with two decimal places allowed, for example, 15.00.
Adequate space is required to support database and system administration
activities. Set alerts for abnormal conditions. Refer to this value when estimating
space needed for tables, indexes, logs, and system administration.
Device Name. The name of the device allocated for the database. The value format
is alphanumeric with a maximum 30 characters, for example, DATA_1. The logical
name of the device is stored in the name column of the sysdevices table. Use the
device name in storage-management commands.
Device Name (Unicode). The name of the device allocated for the database. This
attribute is globalized. The value format is alphanumeric with a maximum 90
bytes, for example, DATA_1. The logical name of the device is stored in the name
column of the sysdevices table. Use the device name in storage-management
commands.
Device Type. Indicates the type of device allocated for the database. The following
values are valid:
Data only
Device stores data for the database.
Log only
Device stores the transaction log for the database.
Data and log
Device stores data and the transaction log for the database.
The value indicates the type of data that is stored on the device. Databases are
frequently spread across several devices due to size, performance, and
recoverability issues.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Mirror Device Name. The name of the mirror device for the database. The value
format is alphanumeric with a maximum 64 characters, for example, dev/rsd2g.
The mirror device duplicates the contents of a primary device. Refer to the logical
and physical names of the device that is being mirrored.
Mirror Device Name (Unicode). The name of the mirror device for the database.
This attribute is globalized. The value format is alphanumeric with a maximum
192 bytes, for example, dev/rsd2g. The mirror device duplicates the contents of a
primary device. Refer to the logical and physical names of the device that is being
mirrored.
Physical Device Name. The name of the physical device allocated for the database.
The value format is alphanumeric with a maximum 64 characters, for example,
DATA_1. The physical name of the device is stored in the sysdevices table. Use the
physical name only with the Sybase Server disk init command.
Physical Device Name (Unicode). The name of the physical device allocated for
the database. This attribute is globalized. The value format is alphanumeric with a
maximum 192 bytes, for example, DATA_1. The physical name of the device is
stored in the sysdevices table. Use the physical name only with the Sybase Server
disk init command.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Server Version. The version of the server. The value format is the version in the
format version.release, for example, 11.9.
50 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Engine Detail Attributes
Use the Engine Detail attributes to create situations that monitor detail information
about server engines.
Completed Disk Io Count. The number of accesses to disk completed during the
sampling period. The value format is an integer, for example, 120.
CPU Available Percent. The percentage of time the server was not busy executing
tasks during the sampling period. The value format is a percentage with two
decimal places allowed, for example, 20.00. This data can be useful for monitoring
trends.
CPU Busy Percent. The percentage of time the server was busy executing tasks
during the sampling period. The value format is a percentage with two decimal
places allowed, for example, 80.00. This data can be useful for monitoring trends.
CPU Yields Count. The number of yields by the server engine to the operating
system. The value format is an integer, for example, 10.
CPU Yields Per Second. The average number of yields by the server engine to the
operating system per second during the sampling period. The value format is a
decimal with two decimal places allowed, for example, 10.00.
CPU Yields Per Transaction. The average number of yields by the server engine to
the operating system per transaction during the sampling period. The value format
is a decimal with two decimal places allowed, for example, 10.00. This data can be
useful for validating percentage values or in environments where the number of
transactions is well-defined.
CPU Yields Percent. The percentage of server engine yields represented by the
specified engine. The value format is a percentage with two decimal places
allowed, for example, 25.00. This data can be useful for monitoring trends.
Current Interval. The number of seconds in the sampling period. the value format
is an integer, for example, 120.
Engine Name. The name of the operating system process running on a CPU for a
server. The value format is alphanumeric with a maximum 10 characters, as in this
example: engine 0.
Engine Name (Unicode). The name of the operating system process running on a
CPU for a server. This attribute is globalized. The value format is alphanumeric
with a maximum 90 bytes, as in this example: engine 0.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, voyager.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. a sample is the data the product collects about
the server.
Task Switch Count. The number of changes by the server from one user task to
another during the sampling period. The value format is an integer, for example,
50.
Task Switch Per Transaction. The average number of task context switches per
transaction performed by the server during the sampling period. The value format
is a decimal with two decimal places allowed, for example, 30.00.
Task Switch Percent. The percentage of total CPU switches that this engine did
between threads (user tasks). The value format is a percentage with two decimal
places allowed, for example, 15.00.
Task Switch Per Second. The average number of task switches performed by the
server per second during the sampling period. The value format is a decimal with
two decimal places allowed, for example, 25.00.
TDS Bytes Received Count. The number of bytes the engine received during the
sampling period. The value format is an integer, for example, 1500.
Tds Bytes Received Per Second. The average number of bytes the engine received
per second during the sampling period. The value format is a decimal with two
decimal places allowed, for example, 750.00.
TDS Bytes Received Per Transaction. The average number of bytes the engine
received per transaction during the sampling period. The value format is a decimal
with two decimal places allowed, for example, 350.00. This data can be useful for
validating percentage values or in environments where the number of transactions
is well-defined.
TDS Bytes Received Percent. The percentage of tds bytes that were received by
the engine. The value format is a percentage with two decimal places allowed, for
example, 75.00. This data can be useful for monitoring trends.
TDS Bytes Sent Count. The number of bytes sent by the engine during the
sampling period. The value format is an integer, for example, 6000.
TDS Bytes Sent Per Second. The average number of bytes the engine sent per
second during the sampling period. The Value format is a decimal with two
decimal places allowed, for example, 150.00.
TDS Bytes Sent Per Transaction. The average number of bytes the engine sent per
transaction during the sampling period. The value format is a decimal with two
decimal places allowed, for example, 250.00. this data can be useful for monitoring
trends.
TDS Bytes Sent Percent. The percentage of tds bytes that were sent by the engine.
The value format is a percentage with two decimal places allowed, for example,
40.00. This data can be useful for monitoring trends.
TDS Packets Received Count. The number of packets the engine received during
the sampling period. The value format is an integer, for example, 90.
52 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
TDS Packets Received Per Second. The average number of packets the engine
received per second during the sampling period. The value format is a decimal
with two decimal places allowed, for example, 45.00.
TDS Packets Received Per Transaction. The average number of packets the engine
received per transaction during the sampling period. The value format is a decimal
with two decimal places allowed, for example, 50.00. This data can be useful for
validating percentage values in environments where the number of transactions is
well-defined.
TDS Packets Received Percent. The percentage of tds packets that were received
by the engine. The value format is a percentage with two decimal places allowed,
for example, 30.00. This data can be useful for monitoring trends.
TDS Packets Sent Count. The number of packets sent by the engine during the
sampling period. The value format is an integer, for example, 60.
TDS Packets Sent Per Second. The average number of packets the engine sent per
second during the sampling period. The value format is a decimal with two
decimal places allowed, for example, 40.00.
TDS Packets Sent Per Transaction. The average number of packets the engine sent
per transaction during the sampling period. The value format is a decimal with
two decimal places allowed, for example, 25.00. This data can be useful for
validating percentage values or in environments where the number of transactions
is well-defined.
TDS Packets Sent Percent. The percentage of tds packets that were sent by the
engine. The value format is a decimal with two decimal places allowed, for
example, 40.00. This data can be useful for monitoring trends.
Total Transactions. The number of transactions the server completed during the
sampling period. The value format is an integer, for example, 50.
Completed Disk IO Count. The number of accesses to disk completed during the
sampling period. The value format is an integer, for example, 120.
CPU Available Percent. The percentage of time the server was not busy executing
tasks during the sampling period. The value format is a percentage with two
decimal places allowed, for example, 20.00. This data can be useful for monitoring
trends.
CPU Busy Percent. The percentage of time the server was busy executing tasks
during the sampling period. The value format is a percentage with two decimal
places allowed, for example, 80.00. This data can be useful for monitoring trends.
CPU Yields Count. The number of yields by the server engine to the operating
system. The value format is an integer, for example, 10.
Current Interval. The number of seconds in the sampling period. The value format
is an integer, for example, 120.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Task Switch Count. The number of changes by the server from one user task to
another during the sampling period. The value format is an integer, for example,
50.
TDS Bytes Received Count. The number of bytes the engine received during the
sampling period. The value format is an integer, for example, 1500.
TDS Bytes Sent Count. The number of bytes sent by the engine during the
sampling period. The value format is an integer, for example, 6000.
TDS Packets Received Count. The number of packets the engine received during
the sampling period. The value format is an integer, for example, 90.
TDS Packets Sent Count. The number of packets sent by the engine during the
sampling period. The value format is an integer, for example, 60.
Total Transactions. The number of transactions the server completed during the
sampling period. The value format is an integer, for example, 50.
Blocking Process ID. The identifier for the process that is blocking a request for a
lock. The value format is alphanumeric with a maximum 4 characters, for example,
12. Some blocking processes can become stranded. Investigate situations in which a
process is being blocked for an extended period of time. For more information on a
blocking process, query the sysprocesses and use the sp-lock system procedure.
Database Name. The name of the database. The value format is alphanumeric with
a maximum 30 characters, for example, KOY3. Each database name is unique. The
server also assigns each database its own identification number.
Database Name (Unicode). Name of the database. This attribute is globalized. The
value format is alphanumeric with a maximum of 90 bytes.
54 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Requestor Process ID. The ID of the blocked process that is requesting the lock.
The value format is alphanumeric with a maximum 16 characters, for example, 21.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 32 characters, for example, CFS_SVR5.
Server User ID (Unicode). Identification for the user of the server. This attribute is
globalized. The value format is alphanumeric with a maximum of 24 bytes.
Time Blocked. If the process is being blocked, the number of seconds that the
process has been blocked. The value format is an integer, for example, 30.
Avg Time Blocked. Average time blocked in seconds. The value format is an
integer, for example, 30.
Database Max Blocks. Name of database that is blocking the largest number of
processes. The value format is alphanumeric with a maximum 32 characters, for
example, DB0999.
Database Max Locks. Name of database with the largest number of locks. The
value format is alphanumeric with a maximum 32 characters, for example, DB3365.
Max Time Blocked. Maximum time blocked in seconds. The value format is an
integer, for example, 70.
Percent Process Block. Percentage of the total processes in conflict. The value
format is an integer, for example, 10.
Table Max Locks. Name of table with the largest number of locks. The value
format is alphanumeric with a maximum 32 characters, for example, TB89375.
Total Locks. Number of locks in this server. The value format is an integer, for
example, 5.
Total Lock Conflicts. Number of processes involved in lock conflicts. The value
format is an integer, for example, 2.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Lock Contention per Second. The average number of lock requests per second
waiting for locks on resources to be released during the sampling period. The
value format is a decimal with two decimal places allowed, for example, 10.00.
Lock Contention per Transaction. The average number of requests per transaction
waiting for locks on resources to be released during the sampling period. The
value format is a decimal with two decimal places allowed, for example, 2.00.
Lock Deadlocked Count. The number of deadlocks during the current interval.
The value format is an integer, for example, 25.
Lock Deadlocked per Second. The average number of deadlocks per second
during the current interval. The value format is a decimal with two decimal places
allowed, for example, 1.00.
Lock Granted Count. The number of processes that acquired locks on resources
during the sampling period. The value format is an integer, for example, 200.
Lock Granted per Second. The average number of processes per second that
acquired locks on resources during the sampling period. The value format is a
decimal with two decimal places allowed, for example, 25.00.
Lock Granted per Transaction. The average number of processes per transaction
that acquired locks on resources during the sampling period. The value format is a
decimal with two decimal places allowed, for example, 5.00. This data can be
useful for validating percentage values or in environments where the number of
transactions is well-defined.
Lock Granted Percent. The percentage of lock requests granted during the current
interval. The value format is a percentage with two decimal places allowed, for
example, 15.00.
Lock Total Count. The number of requests for the specified lock type during the
sampling period. The value format is an integer, for example, 150.
56 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Lock Total per Second. The average number of lock requests of the specified type
per second during the sampling period. The value format is a decimal with two
decimal places allowed, for example, 25.00.
Lock Total per Transaction. The average number of lock requests of the specified
type per transaction during the sampling period. The value format is a decimal
with two decimal places allowed, for example, 3.00. This data can be useful for
validating percentage values or in environments where the number of transactions
is well-defined.
Lock Total Percent. The percentage of lock requests represented by the specified
lock type. The value format is a percentage with two decimal places allowed, for
example, 15.00. This data can be useful for monitoring trends.
Lock Type. If the process is being blocked, indicates the type of lock on the
resource that is being requested. The following values are valid:
Excl intent lock
Exclusive intent lock
Excl page lock
Exclusive page lock
Excl tbl lock
Exclusive table lock
Shr -- intent lock
Shared intent lock
Shr -- page lock
Shared page lock
Shr -- tbl lock
Shared table lock
Unknown
Unknown type
Update -- page lock
Update page lock
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Deadlocks Count. The number of deadlocks for the server during the current
interval. The value format is an integer, for example, 5.
Deadlocks per Second. The average number of deadlocks per second during the
current interval. The value format is a decimal with two decimal places allowed,
for example, 10.00.
Deadlocks Percent. The percentage of lock requests that resulted in deadlocks for
the server during the sampling period. The value format is a percentage with two
decimal places allowed. This data can be useful for monitoring trends.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Lock Contention Count. The number of requests waiting for locks on resources to
be released during the sampling period. The value format is an integer, for
example, 40.
Lock Contention per Second. The average number of lock requests per second
waiting for locks on resources to be released during the sampling period. The
value format is a decimal with two decimal places allowed, for example, 10.00.
Lock Contention per Transaction. The average number of requests per transaction
waiting for locks on resources to be released during the sampling period. The
value format is a decimal with two decimal places allowed, for example, 2.00.
Lock Promotes Count. The number of lock promotions during the sampling
period. The value includes the number of exclusive lock promotions and shared
lock promotions. The value format is an integer, for example, 20.
Lock Promotes Exclusive Count. The number of locks promoted from exclusive
page locks to exclusive table locks for the server during the sampling period. The
value format is an integer, for example, 5.
Lock Promotes Exclusive per Second. The average number of exclusive lock
promotions per second for the server during the sampling period. The value
format is a decimal with two decimal places allowed, for example, 2.00.
Lock Promotes Exclusive per Transaction. The average number of exclusive lock
promotions per transaction for the server during the sampling period. The value
format is a decimal with two decimal places allowed, for example, 5.00. This data
can be useful for validating percentage values or in environments where the
number of transactions is well-defined.
Lock Promotes per Second. The average number of lock promotions per second
during the sampling period. The value includes the number of exclusive lock
promotions and shared lock promotions. The value format is a decimal with two
decimal places allowed, for example, 2.00.
58 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Lock Promotes per Transaction. The average number of lock promotions per
transaction during the sampling period. The value includes the number of
exclusive lock promotions and shared lock promotions. The value format is a
decimal with two decimal places allowed, for example, 3.00.
Lock Promotes Shared Count. The number of locks promoted from shared page
locks to shared table locks for the server during the sampling period. The value
format is an integer, for example, 40. This data can be useful for monitoring trends.
Lock Promotes Shared per Second. The average number of shared lock
promotions per second for the server during the sampling period. The value
format is a decimal with two decimal places allowed, for example, 20.00.
Lock Promotes Shared per Transaction. The average number of shared lock
promotions per transaction for the server during the sampling period. The value
format is a decimal with two decimal places allowed, for example, 15.00. This data
can be useful for validating percentage values or in environments where the
number of transactions is well-defined.
Lock Promotes Shared Percent. The percentage of shared page locks promoted to
shared table locks by the server during the sampling period. The value format is a
percentage with two decimal places allowed, for example, 25.00. This data can be
useful for monitoring trends.
Lock Request Count. The number of request for locks on resources during the
sampling period. The value format is an integer, for example, 20.
Lock Request per Second. The average number of requests for locks on resources
per second during the sampling period. The value format is a decimal with two
decimal places allowed, for example, 10.00.
Lock Request per Transaction. The average number of requests for locks on
resources per transaction during the sampling period. The value format is a
decimal with two decimal places allowed, for example, 2.00. This data can be
useful for validating percentage values or in environments where the number of
transactions is well-defined.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Locks attributes
Use Locks attributes to create situations that monitor summary information about
locks and lock conflicts.
CClass. The name of the cursor associated with a lock. The value format is
alphanumeric with a maximum 30 characters, for example, fetch.
CClass (Unicode). The name of the cursor associated with a lock. This attribute is
globalized. The value format is alphanumeric with a maximum 90 bytes, for
example, fetch.
Database Name. The name of the database that is locked. The value format is
alphanumeric with a maximum 30 characters, for example, KOY3. Each database
name is unique. The server also assigns each database its own identification
number.
Database Name (Unicode). The name of the database that is locked. This attribute
is globalized. The value format is alphanumeric with a maximum 36 bytes, for
example, KOY3. Each database name is unique. The server also assigns each
database its own identification number.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Page Number. If the type of lock on the resource is a page lock, the number of the
page that is locked. The value format is alphanumeric with a maximum 12
characters, for example, 761. The server applies different types of page locks. The
types are shared, exclusive, and update. Investigate situations in which a process is
being blocked for an extended period of time.
Process Holding Lock. The numeric identifier of the process holding a lock. The
value format is an integer, for example, 0056.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 32 characters, for example, CFS_SVR5.
Table Name. If the type of lock on the resource is a table lock, the name of the
table that is locked. The value format is alphanumeric with a maximum 16
characters, for example, Employee.
Table Name (Unicode). If the type of lock on the resource is a table lock, the name
of the table that is locked. This attribute is globalized. The value format is
alphanumeric with a maximum 48 bytes, for example, Employee.
Type. If the process is being blocked, indicates the type of lock on the resource that
is being requested. The following values are valid:
Blocking exclusive table
Blocking exclusive table lock
Blocking update extent
Blocking update extent lock
Exclusive extent
Exclusive extent lock
Excl intent lock
Exclusive intent lock
Excl page lock
Exclusive page lock
60 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Excl tbl lock
Exclusive table lock
Next extent
Next extent lock
Previous extent
Previous extent lock
Shr intent lock
Shared intent lock
Shr page lock
Shared page lock
Shr tbl lock
Shared table lock
Unknown
Unknown type
Update extent
Update extent lock
Update page lock
Update page lock
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Log Activity Count. The number of times the log cache activity occurred during
the sampling period. The value format is an integer, for example, 15.
Log Activity Name. The name of the log cache activity, such as cache flushes, locks
granted, locks waited, and so on. The value format is alphanumeric with a
maximum 32 characters, as in this example: locks waited.
Log Activity per Second. The average number of occurrences of the log cache
activity per second during the sampling period. The value format is a decimal with
two decimal places allowed, for example, 1.00.
Log Activity per Transaction. The average number of occurrences of the log cache
activity per transaction during the sampling period. The value format is a decimal
with two decimal places allowed, for example, 1.00. This data can be useful for
validating percentage values or in environments where the number of transactions
is well-defined.
Log Activity Percent. The percentage of log cache activity represented by the
specified activity. The value format is a percentage with two decimal places
allowed, for example, 15.00. This data can be useful for monitoring trends.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Log Semaphore Requests Count. The number of requests waiting for locks on
resources to be released during the sampling period. The value format is an
integer, for example, 40.
Maximum Private Log Cache Size. The maximum size in kilobytes (KB) of any
private log cache. The value format is an integer, for example, 500.
PLC Semaphore Requests Count. The number of Private Log Cache (PLC
)semaphore requests during the sampling period. The value includes requests
granted and waited. The value format is an integer, for example, 100. This value
measures contention for the log semaphore of the current page in cache. Use this
value to monitor transaction log semaphore activity.
Private Log Cache Flushes Count. The number of private log cache flushes during
the sampling period. The value includes private log cache flushes for any reason.
The value format is an integer, for example, 15. The server reduces transaction log
contention by accumulating log entries in private areas of memory until the private
log cache is full. If necessary, increase the user log cache size to decrease the
number of private log cache flushes.
Private Log Cache Log Records Count. The number of pages for private log
caches during the sampling period. The value format is an integer, for example,
500.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format alphanumeric with a maximum
30 characters, for example, CFS_SVR5.
Transaction Log Writes Count. The number of transaction log writes to disk
during the sampling period. The value format is an integer, for example, 150. The
server writes a transaction log page to disk after the current page is full or the
transaction commits. Use this value to evaluate transaction log activity.
62 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Device Lock Contention Count. The number of requests waiting for locks on
resources to be released during the sampling period. The value format is an
integer, for example, 40.
Device Lock Contention per Second. The average number of lock requests per
second waiting for locks on resources to be released during the sampling period.
The value format is a decimal with two decimal places allowed, for example, 10.00.
If contention exists on a device, consider redistributing data on physical devices.
Device Lock Contention per Transaction. The average number of requests per
transaction waiting for locks on resources to be released during the sampling
period. The value format is a decimal with two decimal places allowed, for
example, 2.00. This data can be useful for validating percentage values or in
environments where the number of transactions is well-defined. If contention exists
on a device, consider redistributing data on physical devices.
Device Lock Contention Percent. The percentage of requests waiting for locks on
resources to be released during the sampling period. The value format is a
percentage with two decimal places allowed, for example, 20.00. This data can be
useful for monitoring trends. If contention exists on a device, consider
redistributing data on physical devices.
Device Lock Granted Count. The number of requests for locks on the device
granted during the sampling period. The value format is an integer, for example,
50.
Device Lock Granted per Second. The average number of requests for locks on
the device granted per second during the sampling period. The value format is a
decimal with two decimal places allowed, for example, 15.00.
Device Lock Granted per Transaction. The average number of requests for locks
on the device granted per transaction during the sampling period. The value
format is a decimal with two decimal places allowed, for example, 1.00. This data
can be useful for validating percentage values or in environments where the
number of transactions is well-defined. If contention exists on a device, consider
redistributing data on physical devices.
Device Lock Granted Percent. The percentage of requests for locks on the device
the server granted during the sampling period. The value format is a percentage
with two decimal places allowed, for example, 25.00. This data can be useful for
monitoring trends.
Device Name. The name of the device allocated for the database. The value format
is alphanumeric with a maximum 30 characters, for example, DATA_1. The logical
name of the device is stored in the name column of the sysdevices table. Use the
device name in storage-management commands.
Device Reads Count. The number of physical reads from the device during the
sampling period. The value format is an integer, for example, 25. This data
provides information about disk I/O distribution patterns over devices. Use this
information to evaluate disk I/O usage.
Device Reads per Second. The average number of physical reads from the device
per second during the sampling period. The value format is a decimal with two
Device Reads per Transaction. The average number of physical reads from the
device per transaction during the sampling period. The value format is a decimal
with two decimal places allowed, for example, 10.00. This data provides
information about disk I/O distribution patterns over devices. Use this information
to evaluate disk I/O usage.
Device Reads Percent. The percentage of reads that occurred on the specified
device during the sampling period. The value format is a percentage with two
decimal places allowed, for example, 10.00. This data provides information about
disk I/O distribution patterns over devices. This information can be useful for
monitoring trends. Use this information to evaluate disk I/O usage.
Device Total Count. The number of devices. The value format is an integer, for
example, 4. This data provides information about disk I/O distribution patterns
over devices. Use this information to evaluate disk I/O usage.
Device Total per Second. The average amount of reads and writes on the device
per second during the sampling period. The value format is a decimal with two
decimal places allowed, for example, 30.00. This data provides information about
disk I/O distribution patterns over devices. Use this information to evaluate disk
I/O usage.
Device Total per Transaction. The average amount of reads and writes on the
device per transaction during the sampling period. The value format is a decimal
with two decimal places allowed, for example, 5.00. This data provides information
about disk I/O distribution patterns over devices. Use this information to evaluate
disk I/O usage.
Device Total Percent. The percentage of reads and writes that occurred on the
specified device during the sampling period. The value format is a percentage with
two decimal places allowed, for example, 30.00. This data provides information
about disk I/O distribution patterns over devices. This information can be useful
for monitoring trends. Use this information to evaluate disk I/O usage.
Device Writes Count. The number of physical writes to the device during the
sampling period. The value format is an integer, for example, 40. This data
provides information about disk I/O distribution patterns over devices. Use this
information to evaluate disk I/O usage.
Device Writes per Second. The average number of physical writes to the device
per second during the sampling period. The value format is a decimal with two
decimal places allowed, for example, 5.00. This data provides information about
disk I/O distribution patterns over devices. Use this information to evaluate disk
I/O usage.
Device Writes per Transaction. The average number of physical writes to the
device per transaction during the sampling period. The value format is a decimal
with two decimal places allowed, for example, 10.00. This data provides
information about disk I/O distribution patterns over devices. Use this information
to evaluate disk I/O usage.
64 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Device Writes Percent. The percentage of writes that occurred on the specified
device during the sampling period. The value format is a percentage with two
decimal places allowed, for example, 15.00. This data provides information about
disk I/O distribution patterns over devices. This information can be useful for
monitoring trends. Use this information to evaluate disk I/O usage.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Physical Name. The path name of the database physical device. The value format
is alphanumeric with a maximum 80 characters, for example, /dev/CORPDB_DEV.
The physical name of the device is stored in the sysdevices table. Use the physical
name only with the disk init command.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Error ID (Unicode). The ID of the error message. This attribute is globalized. The
value format is alphanumeric with a maximum of 36 bytes, for example, MES2520.
The unnumbered errors with text explanations are written to the server message
logs.
Use the Problem Detail attributes to create situations that monitor detail
information about a selected error.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Hub Timestamp. The time stamp that indicates the time when this data was
inserted at the hub.
Maximum Severity. The level of highest severity encountered since the server
started. The value format is an integer in the range 10-24, for example, 22. Errors
with a severity level of 17 or greater are fatal errors. Monitor this value to track
current messages.
Message Age. The number of minutes that have elapsed since the error occurred.
The value format is an integer, for example, 2. Monitor this value to track current
messages.
Message Issuer. The source of the error message. The value format is
alphanumeric with a maximum 8 characters, for example, JSMITH.
Message Issuer (Unicode). The source of the error message. This attribute is
globalized. The value format is alphanumeric with a maximum 24 bytes, for
example, JSMITH.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Severity Level. Indicates the severity level of the error. The following values are
valid:
10-16 User error
17-18 Software error or hardware error
19-24 System error
SQL State Code. The state value for the error message. The value format is an
integer, for example, 37.
Age of Last Error. The number of minutes that have elapsed since the last error
message occurred. The value format is an integer, for example, 2.
Current Interval. The number of seconds that have elapsed between the previous
sample and the current sample. The value format is an integer, for example, 90. A
sample contains the data that the Monitoring Agent for Sybase Server collects
about each server. New data becomes available if a new interval has occurred and
data has been refreshed.
Error Log Size. The number of bytes in the error log file. The value format is an
integer, for example, 50000.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Maximum Sev Current Interval. The error message of the highest severity level
encountered during the current interval. The value format is an integer in the
range 10-24, for example, 19.
Maximum Sev Level. The level of highest severity encountered since the server
started. The value format is an integer in the range 10-24, for example, 22.
Maximum Sev Timestamp. The time stamp that indicates the highest severity.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
66 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Total Error Messages. The number of error messages that have occurred since the
server was started. The value format is an integer, for example, 3.
Total Errors Current Interval. The number of error messages that occurred during
the current interval. The value format is an integer, for example, 1.
Total Errors High Sev. The number of error messages with a severity level of 17 or
higher that have occurred since the server was started. The value format is an
integer, for example, 2.
Total Errors Other. The number of error messages with a severity level of less than
17 that have occurred since the server was started. The value format is an integer,
for example, 3.
Blocking Process ID. The identifier for the process that is blocking a request for a
lock. The value format is alphanumeric with a maximum 8 characters, for example,
12. Some blocking processes can become stranded. Investigate situations in which a
process is being blocked for an extended period of time. For more information on a
blocking process, query the sysprocesses and use the sp-lock procedure.
Blocking Process ID (Unicode). The identifier for the process that is blocking a
request for a lock. This attribute is globalized. The value format is alphanumeric
with a maximum 24 bytes. Some blocking processes can become stranded.
Investigate situations in which a process is being blocked for an extended period of
time. For more information on a blocking process, query the sysprocesses and use
the sp-lock procedure.
Client Group ID. The group ID of the user executing the process. The value
format is alphanumeric with a maximum 8 characters, for example, ACCT_1.
Client Group ID (Unicode). The group ID of the user executing the process. This
attribute is globalized. The value format is alphanumeric with a maximum 24
bytes, for example, ACCT_1.
Client Host Name. The name of the host for the client. The value format is
alphanumeric with a maximum 16 characters, for example, Rocket.
Client Process ID. The ID the client assigned to the process. The value format is
alphanumeric with a maximum 16 characters, for example, amc_2236.
Client Process ID (Unicode). The ID the client assigned to the process. This
attribute is globalized. The value format is alphanumeric with a maximum 48
bytes, for example, amc_2236.
Client User ID. The ID of the user executing the process. The value format is
alphanumeric with a maximum 8 characters, for example, J_Kelly.
Client User ID (Unicode). The ID of the user executing the process. This attribute
is globalized. The value format is alphanumeric with a maximum 48 bytes, for
example, J_Kelly.
Command (Unicode). The name of the command being executed by the process.
This attribute is globalized. The value format is alphanumeric with a maximum 48
bytes, for example, CREATE VIEW.
Current CPU Percent Used. The percentage of CPU time the process is using on
the operating system. The value format is a percentage with two decimal places
allowed, for example, 80.00. This dynamic information is from the sysprocesses
table. Set alerts for processes using an abnormal amount of CPU.
Database Name. The name of the database. The value format is alphanumeric with
a maximum 30 characters, for example, KOY3. Each database name is unique. The
server also assigns each database its own identification number.
Database Name (Unicode). The name of the database. This attribute is globalized.
The value format is alphanumeric with a maximum 90 bytes, for example, KOY3.
Each database name is unique. The server also assigns each database its own
identification number.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Login Name. The name of the process. The value format is alphanumeric with a
maximum 30 characters, for example, PROC.
Login Name (Unicode). The process name. This attribute is globalized. The value
format is alphanumeric with a maximum 90 bytes.
Network Packet Size. The number of bytes allocated for the network packet for
the process. The value format is an integer in the range 512-424288, for example,
1024. The default size is 512 bytes. The memory required for each connection is the
equivalent of three times the network packet size. If you increase the network
packet size, confirm that configuration settings for memory and user connections
provide sufficient memory for the server.
OS Process ID. The ID the operating system assigned to the process. The value
format is alphanumeric with a maximum 10 characters, for example, 35427. This
value is from the sysengines table.
Process ID. The ID of the process that is requesting or holding the lock on the
resource. The value format is alphanumeric with a maximum 4 characters, for
example, 42168.
Process Status. Indicates the status of the process. The following values are valid:
Alarm sleep
Process is waiting for an alarm.
Background
Process is a Sybase Server process.
Bad status
Process has errors.
Infected
Process is infected.
68 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Lock sleep
Process is waiting for a lock to be released.
Log suspend
Process is suspended by the log transaction.
Recv sleep
Process is waiting for a network read.
Runnable
Process is in the queue.
Running
Process is running.
Sleeping
Process is sleeping.
Stopped
Process is stopped.
Send sleep
Process is waiting on a network send.
Program Name. The name of the program (front-end module) for the process. The
value format is alphanumeric with a maximum 8 characters, for example, ISQL.
Program Name (Unicode). The name of the program (front-end module) for the
process. This attribute is globalized. The value format is alphanumeric with a
maximum 48 bytes, for example, ISQL.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 32 characters, for example, CFS_SVR5.
Server User Name. The server-assigned ID for the user executing the process. The
value format is alphanumeric with a maximum 8 characters, for example, S.
Server User Name (Unicode). The server-assigned ID for the user executing the
process. This attribute is globalized. The value format is alphanumeric with a
maximum 64 bytes, for example, S.
Time Blocked. If the process is being blocked, the number of seconds that the
process has been blocked. The value format is an integer, for example, 30.
Total CPU Time. The amount of CPU time, in seconds, the process has used on the
host since the process started. The value format is an integer, for example, 60. This
value is based on the statistics collected by the server. Use this value to check for
processes that use abnormal amounts of CPU time.
Total Disk IO. The number of accesses to hard drive since the process started. The
value includes accesses to hard drive for physical reads and physical writes. The
value format is an integer, for example, 10.
Total Memory Alloc. The number of kilobytes (KB) of memory allocated for the
process. The value format is an integer, for example, 500.
Transaction Name (Unicode). The name of the transaction for the process. This
attribute is globalized. The value format is alphanumeric with a maximum 48
bytes, as in this example: Data_Base_Reorg.
Current Interval. The number of seconds that have elapsed between the previous
sample and the current sample. The value format is an integer, for example, 90. A
sample the data that the Monitoring Agent for Sybase Server collects about each
server. New data becomes available if a new interval has occurred and data has
been refreshed.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Percent Processes Bad. The percentage of processes with a status of bad. The value
format is a percentage with two decimal places allowed, for example, 2.00. This
value is based on information from the sysprocesses table. Bad processes are often
associated with a process ID problem.
Percent Processes Blocked. The percentage of processes that are being blocked.
The value format is a percentage with two decimal places allowed, for example,
4.00. This value is based on information from the sysprocesses table. The value
includes all processes currently in a waiting state.
Percent Processes Other Sleep. The percentage of processes with a status of alarm
sleep, recv sleep, or send sleep. The value format is a percentage with two decimal
places allowed, for example, 10.00.
70 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 32 characters, for example, CFS_SVR5.
Server CPU Percent Application. The percentage of CPU time the server
application processes are using on the host. The value format is a percentage with
two decimal places allowed, for example, 20.00. The value counts only the
processes that still exist, and can be misleading if a process burned a lot of CPU
but ended before the sample was taken. Furthermore, this number includes only
Sybase Server internal processes, excluding the portion of OS CPU reported.
Server CPU Percent System. The percentage of CPU time the server processes are
using on the host. It might be over-reported because APPCPUPCT is
under-reported. The value format is a percentage with two decimal places allowed,
for example, 25.00.
Total Log Suspend. The number of processes with a status of log suspend. A
process with a status of log suspend is a process that cannot complete until there is
free space in the transaction log. The value format is an integer, for example, 1.
Total Processes Other Sleep. The number of processes that are in a sleep state
other than locked. The value format is an integer, for example, 2.
Total Processes Bad. The number of processes with a status of bad. The value
format is an integer, for example, 1.
Total Processes Blocked. The number of processes that are being blocked. The
value format is an integer, for example, 2.
Total Processes Stopped. The number of processes with a status of stopped. The
value format is an integer, for example, 1.
Connection Level. The connection level for the remote server. The value format is
an integer, for example, 3.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Network Name. The name of the network for the remote server. The value format
is alphanumeric with a maximum 16 characters, for example, REM_NET.
Remote Server ID. The ID of the remote server. The value format is alphanumeric
with a maximum 12 characters, for example, SERV_ID.
Remote Server Name. The name of the remote server. The value format is
alphanumeric with a maximum 12 characters, for example, REM_SVR5.
Remote Server Status. The value depends on the version of the server you are
using. For version 10.0, 10.2 and 11.0, the value is the status of the remote server.
For version 11.5 and 11.9, the value is the security option for the remote server.
Valid The following values are valid for Versions 10.0, 10.2, and 11.0:
Inactive
The remote server is inactive.
Active The remote server is active.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 32 characters, for example, CFS_SVR5.
Current Locks. The number of current locks for the server. The value format is an
integer, for example, 73. This value is a configuration parameter.
Data CacheSize. The number of kilobytes (KB) allocated for the data cache
memory. The server uses the data cache to store data and index pages. The value
format is an integer, for example, 1000. The cache is sometimes referred to as the
buffer cache.
Error Log Size. The number of bytes in the error log file. The value format is an
integer, for example, 50000. The error log contains the fatal error and kernel error
messages issued by the server.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Max Locks Allowed. The greatest value for the statistic since the server was
started. The value format is an integer, for example, 2000. This value is a
configuration parameter.
72 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
OS Type. The operating system for the server. The value format is alphanumeric,
for example, AIX.
OS Version. The version of the operating system for the server. The value format
is the version in the format version.release, for example, 2.5.
Percent Max Locks. The percentage of locks on resources of the maximum number
of locks allowed by the server. The value format is a percentage with two decimal
places allowed, for example, 10.00. Setting a higher limit for the maximum number
of locks does not impair performance. If your operations exceed the number of
available locks, you can increase this limit.
Procedure Cache Percent. The percentage of cache memory the server uses for the
procedure cache. The valid format is a percentage with two decimal places
allowed, for example, 20.00.
Procedure Cache Size. The number of kilobytes (KB) allocated for the procedure
cache. The server uses the procedure cache to compile queries and store
procedures that are compiled. The value format is an integer, for example, 1000.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Server Status. Indicates the status of the server. The following values are valid:
Active The server is active.
Blank Server status is unknown.
Server Type. The type of server. The value format is alphanumeric, for example,
Server.
Server Version. The version of the server. The value format is the version in the
format version.release, for example, 10.0.
Startup Timestamp. The time stamp that indicates the date and time the server
was started.
Time Since Startup. The number of minutes that have elapsed since the server was
started. The value format is an integer, for example, 360.
Host Name. The name of the host host computer for Sybase. The value format is
alphanumeric with a maximum of 32 characters.
Server. The name of the Sybase server. The value format is alphanumeric (for
example, TEST1) with a maximum of 64 characters.
Collection Status. Indicates the status of the data collector on the remote node.
The data collector is the part of the product that collects information about the
server. The following values are valid:
Active Data collector is active.
Inactive
Data collector is inactive.
Current Interval. The number of seconds that have elapsed between the previous
sample and the current sample. The value format is an integer, for example, 90. A
sample contains the data that the Monitoring Agent for Sybase Server collects
about each server. New data becomes available if a new interval has occurred and
data has been refreshed.
Data Cache Size. The number of kilobytes (KB) allocated for the data cache
memory. The server uses the data cache to store data and index pages. The value
format is an integer, for example, 1000.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Percent Max Locks. The percentage of locks on resources of the maximum number
of locks allowed by the server. The value format is a percentage with two decimal
places allowed, for example, 10.00.
Procedure Cache Size. The number of kilobytes (KB) allocated for the procedure
cache. The server uses the procedure cache to compile queries and store
procedures that are compiled. The value format is an integer, for example, 1000.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Server CPU Percent. The percentage of CPU time the server process is using on
the host. The value format is a percentage with two decimal places allowed, for
example, 20.00.
Server Status. Indicates the status of the server. The following values are valid:
Active Server is active.
Inactive
Server is not active.
Blank Server status is unknown.
Server Type. The type of server. The value format is alphanumeric, for example,
Server.
74 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Server Version. The version of the server. The value format is the version in the
format version.release, for example, 10.0.
Time Since Startup. The number of minutes that have elapsed since the server was
started. The value format is an integer, for example, 360.
Total OS CPU Percent. The percentage of CPU time being used by the operating
system as well as all the user processes (for example, the percentage of CPU time
used by the UNIX operating system and the percentage of CPU time used by all
the user processes). The value format is a percentage with two decimal places
allowed, for example, 40.00.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
SQL Activity Count. The number of times the activity occurred during the
sampling period. The value format is an integer, for example, 25.
SQL Activity Name. The name of the activity. The value format is alphanumeric
with a maximum 32 characters, for example, Insert Total.
SQL Activity per Second. The average number of times per second the activity
occurred for the server. The value format is a decimal with two decimal places
allowed, for example, 15.00.
SQL Activity per Transaction. The average number of times per transaction the
activity occurred for the server. The value format is a decimal with two decimal
places allowed, for example, 10.00.
Average Value per Second. The average value per second for the statistic since the
server was started. The value format is a decimal with two decimal places allowed,
for example, 5.00.
Current Value. The value for the statistic during the current interval. The value
format is an integer, for example, 40. This is a cumulative value for the statistic.
Maximum Seen. The greatest value per second for the statistic since the server was
started. The value format is an integer, for example, 2000. This is a benchmark
value.
Minimum Seen. The smallest value per second for the statistic since the server
was started. The value format is an integer, for example, 10. This is a benchmark
value.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Statistic Name. The name of the statistic. The value format is alphanumeric with a
maximum 32 characters, for example, CPU_busy.
Statistic Name (Unicode). The name of the statistic. This attribute is globalized.
The value format is alphanumeric with a maximum 32 bytes, for example,
CPU_busy.
Total Since Startup. The total of all the values for the statistic since the server was
started. The value format is an integer, for example, 9000.
Collection Status. Indicates the status of the data collector on the remote node.
The data collector is the part of the product that collects information about the
server. The following values are valid:
Active Data collector is active.
Inactive
Data collector is inactive.
Current Interval. The number of seconds that have elapsed between the previous
sample and the current sample. The value format is an integer, for example, 90.
A sample contains the data that the Monitoring Agent for Sybase Server collects
about each server. New data becomes available if a new interval has occurred and
data has been refreshed.
Current Logons. The number of active connections (logons). The value format is an
integer, for example, 50.
Database Max Blocks (Unicode). Name of the database that is blocking the largest
number of processes. This attribute is globalized. The value format is alphanumeric
with a maximum 96 bytes.
76 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Database Max Locks (Unicode). Name of the database with the largest number of
locks. This attribute is globalized. The value format is alphanumeric with a
maximum 96 bytes.
Disk IO Current Interval. The number of times the server accessed hard drive
during the current interval. The value includes access to hard drive for physical
reads and physical writes. The value format is an integer, for example, 50.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters; for example, Voyager.
IO Errors Current Interval. The number of errors that occurred when the server
accessed hard drive during the current interval. The value format is an integer, for
example, 5.
IO Errors Since Startup. The number of errors that have occurred when the server
accessed hard drive since startup. The value format is an integer, for example, 2.
Percent IO Errors Current Interval. The percentage of the accesses to hard drive
that had errors occur during the current interval. The value format is a percentage
with two decimal places allowed, for example, 1.00.
Percent Max Logons Active. The percentage of active connections (logons) of the
maximum number of active connections allowed for the server. The value format is
a percentage with two decimal places allowed, for example, 50.00.
Physical Reads per Second. The average number of physical reads per second
during the current interval. The value format is a decimal with two decimal places
allowed, for example, 5.00.
Physical Writes per Second. The average number of physical writes per second
during the current interval. The value format is a decimal with two decimal places
allowed, for example, 5.00.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters, for example, CFS_SVR5.
Table Max Locks (Unicode). Name of the table with the largest number of locks.
This attribute is globalized. The value format is alphanumeric with a maximum 96
bytes.
Total Logons per Second. The average number of active connections (logons) per
second during the current interval. The value format is a decimal with two decimal
places allowed, for example, 15.00.
Total OS IO Percent Busy. The percentage of I/O the server used during the
current interval of all the I/O used since the server was started. The value format
is a percentage with two decimal places allowed, for example, 25.00.
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 30 characters,for example, CFS_SVR5.
Task Switch Cause. The type of task context switch. The value format is
alphanumeric with a maximum 32 characters, for example, Cache Search Miss.
Task Switch Count. The number of times the specified task context switch
occurred during the sampling period. The value format is an integer, for example,
50.
Task Switch per Second. The average number of times the specified task context
switch occurred per second during the sampling period. The value format is a
decimal with two decimal places allowed.
Task Switch per Transaction. The average number of times the specified task
context switch occurred per transaction during the sampling period. The value
format is a decimal with two decimal places allowed, for example, 30.00.
Task Switch Percent. The percentage of task context switches represented by the
specified task context switch. The value format is a percentage with two decimal
places allowed, for example, 15.00.
Text attributes
Use the Text attributes to create situations that monitor information about text
strings associated with a selected process.
Database Name. The name of the database. The value format is alphanumeric with
a maximum 30 characters, for example, KOY3.
Database Name (Unicode). The name of the database. This attribute is globalized.
The value format is alphanumeric with a maximum 90 bytes, for example, KOY3.
Each database name is unique. The server also assigns each database its own
identification number.
78 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Host Name. The name of the host computer running the server. The value format
is alphanumeric with a maximum 64 characters, for example, Voyager.
Process ID. The ID of the process that is requesting or holding the lock on the
resource. The value format is alphanumeric with a maximum 10 characters, for
example, 42168.
Sample Timestamp. The time stamp that indicates the date and time the product
collected the sample for the server. A sample is the data the product collects about
the server.
Server. The name of the server. The value format is alphanumeric with a
maximum 32 characters, for example, CFS_SVR5.
Sequence Num. SQL sequence number. The value format is an integer, for
example, 3.
Text. A complete or partial SQL statement. The value format is alphanumeric with
a maximum 60 characters.
80 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 8. Capacity planning for historical data (continued)
Bytes per
Bytes per summarized
Attribute Bytes per instance instance Expected number of
Group DB table name instance (agent) (warehouse) (warehouse) instances
Task Detail KOYTSKD 282 306 535 multiple rows
Text KOYSQL 568 593 630 multiple rows
For more information about historical data collection, see the IBM Tivoli Monitoring
Administrator’s Guide.
About situations
A situation is a logical expression involving one or more system conditions.
Situations are used to monitor the condition of systems in your network. You can
manage situations from the Tivoli Enterprise Portal by using the Situation editor.
The IBM Tivoli Monitoring agents that you use to monitor your system
environment are shipped with a set of predefined situations that you can use as-is
or you can create new situations to meet your requirements. Predefined situations
contain attributes that check for system conditions common to many enterprises.
Using predefined situations can improve the speed with which you can begin
using the Monitoring Agent for Sybase Server. You can examine and, if necessary,
change the conditions or values being monitored by a predefined situation to those
best suited to your enterprise.
Note: The predefined situations provided with this monitoring agent are not
read-only. Do not edit these situations and save over them. Software updates
will write over any of the changes that you make to these situations.
Instead, clone the situations that you want to change to suit your enterprise.
You can display predefined situations and create your own situations using the
Situation editor. The left frame of the Situation editor initially lists the situations
associated with the Navigator item that you selected. When you click a situation
name or create a new situation, the right frame opens with the following tabs:
Formula
Condition being tested
Distribution
List of managed systems (operating systems, subsystems, or applications)
to which the situation can be distributed.
Expert Advice
Comments and instructions to be read in the event workspace
Action
Command to be sent to the system
Until Duration of the situation
For a list of the predefined situations for this monitoring agent and a description
of each situation, refer to the Predefined situations section below and the
information in that section for each individual situation.
Sybase_Collection_Stat_Warning situation
Declares a warning condition when the collector is not active. This situation has
the following formula:
84 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Sybase_Server_Summary.Collection_Status NE Active
Sybase_DB_Error_Status situation
Declares a critical condition if the database has a serious error status. This situation
has the following formula:
Sybase_Database_Detail.Error_Status EQ ’Yes’
Sybase_DB_Freespace_Critical situation
Declares a critical condition if the remaining free space in the database is 10% or
less. This situation has the following formula:
Sybase_Database_Summary.Minimum_Pct_Data_Freespace LE 10
Sybase_DB_Freespace_Warning situation
Declares a warning condition if the remaining free space in the database is
between 10 to 20%. This situation has the following formula:
Sybase_Database_Summary.Minimum_Pct_Data_Freespace GT 10
AND
Sybase_Database_Summary.Minimum_Pct_Data_Freespace LE 20
Sybase_DB_Num_Errors_Warning situation
Declares a warning condition if a database has an error status. This situation has
the following formula:
Sybase_Database_Summary.Total_DBs_in_Error GT 0
Sybase_Device_Free_Pct_Warning situation
Declares a warning condition if the remaining free space in a device is 10% or less.
This situation has the following formula:
Sybase_Device_Detail.Device_Free_Space_Percent LE 10
Sybase_ErrorLog_Size_Warning situation
Declares a warning condition if the error log contains 1,000,000 or more bytes. This
situation has the following formula:
Sybase_Problem_Summary.Error_Log_Size GE 1000000
Sybase_IOERR_Startup_Warning situation
Declares a warning condition if ten or more I/O errors occurred since startup and
the percentage of I/O errors is 5% or more. This situation has the following
formula:
Sybase_Statistics_Summary.IO_Errors_Since_Startup GE 10
AND
Sybase_Statistics_Summary.Percent_IO_Errors_Current_Interval GE 5
Sybase_IOError_Curintvl_Warning situation
Declares a warning condition if the percentage of I/O errors during the current
interval is 80% or more. This situation has the following formula:
Sybase_Statistics_Summary.IO_Errors_Current_Interval GE 8000
Sybase_Log_Freespace_Critical situation
Declares a critical condition if log free space is 10% or less. This situation has the
following formula:
Sybase_Database_Summary.Minimum_Pct_Log_Freespace LE 10
Sybase_Log_Suspend_Warning situation
Declares a warning condition if one or more processes is in log suspend. This
situation has the following formula:
Sybase_Process_Summary.Total_Log_Suspend GE 1
Sybase_LogonPct_Warning situation
Declares a warning condition if the maximum number of logons is 90% or more.
This situation has the following formula:
Sybase_Statistics_Summary.Percent_Max_Logons_Active GE 90
Sybase_Pct_CPU_Yields_Warning situation
Declares a warning condition if CPU yields are more than 75%. This situation has
the following formula:
Sybase_Process_Detail.Current_CPU_Percent_Used GT 75
Sybase_Pct_Device_Lock_Warning situation
Declares a warning condition if more than 20% of lock requests were waiting. This
situation has the following formula:
Sybase_Physical_Device_Detail.Device_Lock_Contention_Percent GE 20
Sybase_Pct_Engine_CPU_Critical situation
Declares a critical condition if the percentage of busy engine CPUs is greater than
90%. This situation has the following formula:
Sybase_Engine_Summary.CPU_Busy_Percent GT 90
Sybase_Pct_Engine_CPU_Warning situation
Declares a warning condition if the percentage of busy engine CPUs is between 75
to 90%. This situation has the following formula:
Sybase_Engine_Detail.CPU_Busy_Percent GT 75
AND
Sybase_Engine_Detail.CPU_Busy_Percent LT 90
Sybase_Pct_IO_Warning situation
Declares a warning condition if 80% or more of the time is spent on I/O
operations. This situation has the following formula:
Sybase_Statistics_Summary.Total_OS_IO_Percent_Busy GE 80
Sybase_Pct_MAX_Locks_Critical situation
Declares a critical condition if the percentage of allowable locks reaches 80% or
more. This situation has the following formula:
Sybase_Server_Summary.Percent_Max_Locks GE 80
86 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Sybase_Pct_MAX_Locks_Warning situation
Declares a warning condition if the percentage of allowable locks is between 60 to
80%. This situation has the following formula:
Sybase_Server_Summary.Percent_Max_Locks GE 60
AND
Sybase_Server_Summary.Percent_Max_Locks LT 80
Sybase_Pct_Task_Yields_Warning situation
Declares a warning condition if the percentage of task yields is greater than 75%.
This situation has the following formula:
Sybase_Task_Detail.Task_Switch_Percent GT 75
Sybase_Pct_Total_CPU_Critical situation
Declares a critical condition if more than 90% of the total CPU is busy. This
situation has the following formula:
Sybase_Engine_Summary.CPU_Busy_Percent GT 90
Sybase_Pct_Total_CPU_Warning situation
Declares a warning condition if the percentage of CPU busy falls between 75 to
90%. This situation has the following formula:
Sybase_Engine_Summary.CPU_Busy_Percent GT 75
AND
Sybase_Engine_Summary.CPU_Busy_Percent LE 90
Sybase_ProbAge_GT_17_Warning situation
Declares a warning condition if an error is 30 or more minutes old and has a
severity level of 17 or more. This situation has the following formula:
Sybase_Problem_Summary.Age_of_Last_Error GE 30
AND
Sybase_Problem_Summary.Maximum_Sev_Current_Interval GE 17
Sybase_ProbAge_LT_17_Warning situation
Declares a warning condition if an error is 30 or more minutes old and has a
severity level of less than 17. This situation has the following formula:
Sybase_Problem_Summary.Age_of_Last_Error GE 30
AND
Sybase_Problem_Summary.Maximum_Sev_Current_Interval LT 17
Sybase_Process_Blocked_Warning situation
Declares a warning condition if five or more processes are blocked, causing 25% or
more processes to be blocked. This situation has the following formula:
Sybase_Process_Summary.Percent_Processes_Blocked GE 25
AND
Sybase_Process_Summary.Total_Processes_Blocked GE 5
Sybase_Process_Infected_Warning situation
Declares a warning condition if one or more processes are infected. This situation
has the following formula:
Sybase_Process_Summary.Total_Processes_Infected GE 1
Sybase_Processes_Stop_Warning situation
Declares a warning condition if one to five processes are stopped, causing 10 % of
processes to be stopped. This situation has the following formula:
Sybase_Process_Summary.Total_Processes_Stopped GE 5
AND
Sybase_Process_Summary.Percent_Processes_Stopped GE 10
Sybase_ProcessLockSleep_Warning situation
Declares a warning condition if five or more processes are in lock sleep, which
causes 10% or more processes to be in lock sleep. This situation has the following
formula:
Sybase_Process_Summary.Percent_Processes_Lock_Sleep GE 10
AND
Sybase_Process_Summary.Total_Processes_Lock_Sleep GE 5
Sybase_ProcessOthSleep_Warning situation
Declares a warning condition if two or more processes are in other sleep, causing
50% or more processes to be in other sleep. This situation has the following
formula:
Sybase_Process_Summary.Total_Processes_Other_Sleep GE 2
AND
Sybase_Process_Summary.Percent_Processes_Other_Sleep GE 50
Sybase_Server_CPU_Critical situation
Declares a critical condition if the server has been active for ten minutes or longer
and the CPU usage on the server is 80% or more. This situation has the following
formula:
Sybase_Server_Summary.Total_OS_CPU_Percent GE 80
AND
Sybase_Server_Summary.Time_Since_Startup GE 10
Sybase_Server_CPU_Warning situation
Declares a warning condition if the CPU usage on the server is between 60 to 80%.
This situation has the following formula:
Sybase_Server_Summary.Total_OS_CPU_Percent GE 60
AND
Sybase_Server_Summary.Total_OS_CPU_Percent LT 80
AND
Sybase_Server_Summary.Time_Since_Startup GE 10
Sybase_Server_Error_Warning situation
Declares a warning condition if server errors have occurred during the current
interval. This situation has the following formula:
Sybase_Problem_Summary.Total_Errors_High_Sev GT 0
Sybase_Server_Status_Critical situation
Declares a critical condition if the server status is not active. This situation has the
following formula:
88 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Sybase_Server_Summary.Server_Status NE Active
Sybase_Server_Status_Inactive situation
Declares a critical condition if the server status is inactive. This situation has the
following formula:
Sybase_Server_Summary.Server_Status EQ Inactive
When included in a situation, the command executes when the situation becomes
true. A Take Action command in a situation is also referred to as reflex automation.
When you enable a Take Action command in a situation, you automate a response
to system conditions. For example, you can use a Take Action command to send a
command to restart a process on the managed system or to send a text message to
a cell phone.
About policies
Policies are an advanced automation technique for implementing more complex
workflow strategies than you can create through simple automation.
A policy is a set of automated system processes that can perform actions, schedule
work for users, or automate manual tasks. You use the Workflow Editor to design
policies. You control the order in which the policy executes a series of automated
steps, which are also called activities. Policies are connected to create a workflow.
After an activity is completed, Tivoli Enterprise Portal receives return code
feedback and advanced automation logic responds with subsequent activities
prescribed by the feedback.
Note: For monitoring agents that provide predefined policies, predefined policies
are not read-only. Do not edit these policies and save over them. Software
updates will write over any of the changes that you make to these policies.
Instead, clone the policies that you want to change to suit your enterprise.
For information about using the Workflow Editor, see the IBM Tivoli Monitoring
Administrator’s Guide or the Tivoli Enterprise Portal online help.
Predefined policies
This monitoring agent does not have any predefined policies.
Use Table 9 to determine which the Monitoring Agent for Sybase Server workspace
group to use in a specific situation.
Table 9. Workspace group choices mapping
Errorlog Alerts
Databases
Locking
Servers
Process
If you want to...
Analyze the performance of your U U U U
system
Identify problem areas and U U U
bottlenecks in your system
Get the information you need to tune U U U U
your system
Evaluate how your tuning decisions U U
affect the performance of your
system
Identify and anticipate times of peak U U U
usage
Monitor database activity U
Select optimum threshold values for U U U U U
situation monitoring
BAROC files are found on the Tivoli Enterprise Monitoring Server in the
installation directory in TECLIB (that is, install_dir/cms/TECLIB for Windows
systems and install_dir/tables/TEMS_hostname/TECLIB for UNIX systems). IBM
Tivoli Enterprise Console event synchronization provides a collection of
ready-to-use rule sets that you can deploy with minimal configuration. Be sure to
install IBM Tivoli Enterprise Console event synchronization to access the correct
Sentry.baroc, which is automatically included during base configuration of IBM
Tivoli Enterprise Console rules if you indicate that you want to use an existing
rulebase. See the IBM Tivoli Monitoring Installation and Setup Guide for details.
Each of the event classes is a child of KOY_Base. The KOY_Base event class can be
used for generic rules processing for any event from the Monitoring Agent for
Sybase Server.
Table 10. Overview of event slots to event classes
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Server_Summary Sybase_Server_Summary attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v server_type: STRING
v server_status: STRING
v collection_status: STRING
v data_cache_size: INTEGER
v procedure_cache_size: INTEGER
v percent_max_locks: REAL
v server_cpu_percent: REAL
v total_os_cpu_percent: REAL
v time_since_startup: INTEGER
v server_version: STRING
v current_interval: INTEGER
v sample_timestamp: STRING
98 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Database_Detail Sybase_Database_Detail attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v database_name: STRING
v db_id: STRING
v db_owner: STRING
v error_status: STRING
v dbo_only_access: STRING
v single_user_access: STRING
v read_only_access: STRING
v select_into_bulkcopy_enabled: STRING
v dump_tran_date: STRING
v free_space_accounting_suppresed:
STRING
v abort_tran_on_log_full: STRING
v truncate_log_on_ckpt: STRING
v no_ckpt_after_recovery: STRING
v data_size: REAL
v log_size: REAL
v data_freespace: REAL
v log_freespace: REAL
v data_freespace_percent: REAL
v log_freespace_percent: REAL
v total_devices: INTEGER
v sample_timestamp: STRING
v database_name_u: STRING
v db_owner_u: STRING
100 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Lock_Conflict_Detail Sybase_Lock_Conflict_Detail attribute
group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v database_name: STRING
v database_id: INTEGER
v server_user_id: STRING
v requestor_process_id: INTEGER
v blocking_process_id: INTEGER
v time_blocked: REAL
v sample_timestamp: STRING
v database_name_u: STRING
v server_user_id_u: STRING
ITM_Sybase_Text Sybase_Text attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v database_name: STRING
v process_id: INTEGER
v text: STRING
v sequence_num: INTEGER
v sample_timestamp: STRING
v database_name_u: STRING
v text_u: STRING
102 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Process_Detail Sybase_Process_Detail attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v process_id: INTEGER
v database_name: STRING
v process_status: STRING
v total_cpu_time: REAL
v current_cpu_percent_used: REAL
v total_disk_io: INTEGER
v total_memory_alloc: INTEGER
v time_blocked: REAL
v blocking_process_id: STRING
v os_process_id: STRING
v server_user_name: STRING
v command: STRING
v client_host_name: STRING
v client_process_id: STRING
v transaction_name: STRING
v program_name: STRING
v client_user_id: STRING
v client_group_id: STRING
v network_packet_size: INTEGER
v login_name: STRING
v sample_timestamp: STRING
v database_name_u: STRING
v blocking_process_id_u: STRING
v server_user_name_u: STRING
v command_u: STRING
v transaction_name_u: STRING
v program_name_u: STRING
v client_user_id_u: STRING
v client_group_id_u: STRING
v login_name_u: STRING
104 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Statistics_Summary Sybase_Statistics_Summary attribute group
v originnode: STRING
v hub_timestamp: SRING
v server: STRING
v host_name: STRING
v total_os_cpu_percent_busy: REAL
v total_os_io_percent_busy: REAL
v current_logons: INTEGER
v percent_max_logons_active: REAL
v total_logons_per_second: REAL
v max_user_connections_allowed:
INTEGER
v physical_reads_per_second: REAL
v physical_writes_per_second: REAL
v disk_io_current_interval: INTEGER
v io_errors_since_startup: INTEGER
v io_errors_current_interval: INTEGER
v percent_io_errors_current_interval: REAL
v current_interval: INTEGER
v sample_timestamp: STRING
ITM_Sybase_Statistics_Detail Sybase_Statistics_Detail attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v statistic_name: STRING
v current_value: INTEGER
v total_since_startup: INTEGER
v average_value_per_second: REAL
v maximum_seen: INTEGER
v minimum_seen: INTEGER
v sample_timestamp: STRING
ITM_Sybase_Remote_Servers Sybase_Remote_Servers attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v remote_server_id: STRING
v remote_server_status: STRING
v remote_server_name: STRING
v network_name: STRING
v connection_level: INTEGER
v current_interval: INTEGER
v sample_timestamp: STRING
106 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Engine_Detail Sybase_Engine_Detail attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v engine_name: STRING
v current_interval: INTEGER
v total_transactions: INTEGER
v cpu_available_percent: REAL
v cpu_busy_percent: REAL
v cpu_yields_per_second: REAL
v cpu_yields_per_transaction: REAL
v cpu_yields_count: INTEGER
v cpu_yields_percent: REAL
v task_switch_per_second: REAL
v task_switch_per_transaction: REAL
v task_switch_count: INTEGER
v task_switch_percent: REAL
v maximum_outstanding_io_count:
INTEGER
v completed_disk_io_count: INTEGER
v tds_packets_received_per_second: REAL
v tds_packets_received_per_transaction:
REAL
v tds_packets_received_count: INTEGER
v tds_packets_received_percent: REAL
v tds_bytes_received_per_second: REAL
v tds_bytes_received_per_transaction:
REAL
v tds_bytes_received_count: INTEGER
v tds_bytes_received_percent: REAL
v tds_packets_sent_per_second: REAL
v tds_packets_sent_per_transaction: REAL
v tds_packets_sent_count: INTEGER
v tds_packets_sent_percent: REAL
v tds_bytes_sent_per_second: REAL
v tds_bytes_sent_per_transaction: REAL
v tds_bytes_sent_count: INTEGER
v tds_bytes_sent_percent: REAL
v sample_timestamp: STRING
v engine_name_u: STRING
108 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Log_Detail Sybase_Log_Detail attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v log_activity_name: STRING
v log_activity_per_second: REAL
v log_activity_per_transaction: REAL
v log_activity_count: INTEGER
v log_activity_percent: REAL
v sample_timestamp: STRING
ITM_Sybase_Physical_Device_Detail Sybase_Physical_Device_Detail attribute
group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v device_name: STRING
v physical_name: STRING
v device_reads_per_second: REAL
v device_reads_per_transaction: REAL
v device_reads_count: INTEGER
v device_reads_percent: REAL
v device_writes_per_second: REAL
v device_writes_per_transaction: REAL
v device_writes_count: INTEGER
v device_writes_percent: REAL
v device_total_per_second: REAL
v device_total_per_transaction: REAL
v device_total_count: INTEGER
v device_total_percent: REAL
v device_lock_granted_per_second: REAL
v device_lock_granted_per_transaction:
REAL
v device_lock_granted_count: INTEGER
v device_lock_granted_percent: REAL
v device_lock_contention_per_second:
REAL
v device_lock_contention_per_transaction:
REAL
v device_lock_contention_count: INTEGER
v device_lock_contention_percent: REAL
v sample_timestamp: STRING
v device_name_u: STRING
v physical_name_u: STRING
110 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Lock_Summary Sybase_Lock_Summary attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v lock_request_per_second: REAL
v lock_request_per_transaction: REAL
v lock_request_count: INTEGER
v lock_contention_per_second: REAL
v lock_contention_per_transaction: REAL
v lock_contention_count: INTEGER
v lock_contention_percent: REAL
v deadlocks_per_second: REAL
v deadlocks_per_transaction: REAL
v deadlocks_count: INTEGER
v deadlocks_percent: REAL
v lock_promotes_per_second: REAL
v lock_promotes_per_transaction: REAL
v lock_promotes_count: INTEGER
v lock_promotes_exclusive_per_second:
REAL
v lock_promotes_exclusive_per_transaction:
REAL
v lock_promotes_exclusive_count:
INTEGER
v lock_promotes_exclusive_percent: REAL
v lock_promotes_shared_per_second:
REAL
v lock_promotes_shared_per_transaction:
REAL
v lock_promotes_shared_count: INTEGER
v lock_promotes_shared_percent: REAL
v sample_timestamp: STRING
112 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Cache_Summary Sybase_Cache_Summary attribute group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v cache_search_rate: REAL
v cache_search_per_transaction: REAL
v cache_search_count: INTEGER
v cache_hit_rate: REAL
v cache_hit_per_transaction: REAL
v cache_hit_count: INTEGER
v cache_hit_percent: REAL
v cache_miss_rate: REAL
v cache_miss_per_transaction: REAL
v cache_miss_count: INTEGER
v cache_miss_percent: REAL
v lru_buffer_use_rate: REAL
v lru_buffer_use_per_transaction: REAL
v lru_buffer_use_count: INTEGER
v lru_buffer_use_percent: REAL
v mru_buffer_use_rate: REAL
v mru_buffer_use_per_transaction: REAL
v mru_buffer_use_count: INTEGER
v mru_buffer_use_percent: REAL
v large_io_performed_rate: REAL
v large_io_performed_per_transaction:
REAL
v large_io_performed_count: INTEGER
v large_io_performed_percent: REAL
v large_io_denied_rate: REAL
v large_io_denied_per_transaction: REAL
v large_io_denied_count: INTEGER
v large_io_denied_percent: REAL
v large_io_pages_cached_rate: REAL
v large_io_pages_cached_per_transaction:
REAL
v large_io_pages_cached_count: INTEGER
v large_io_pages_used_rate: REAL
v large_io_pages_used_per_transaction:
REAL
v large_io_pages_used_count: INTEGER
v large_io_pages_used_percent: REAL
v sample_timestamp: STRING
114 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 10. Overview of event slots to event classes (continued)
IBM Tivoli Enterprise Console event class event slots
ITM_Sybase_Server_Enterprise_View Sybase_Server_Enterprise_View attribute
group
v originnode: STRING
v hub_timestamp: STRING
v server: STRING
v host_name: STRING
v percent_max_locks: REAL
v server_cpu_percent: REAL
v total_os_cpu_percent: REAL
v time_since_startup: INTEGER
v server_version: STRING
v total_databases: INTEGER
v minimum_pct_data_freespace: REAL
v minimum_pct_log_freespace: REAL
v total_locks: INTEGER
v total_lock_conflicts: INTEGER
v database_max_locks: STRING
v database_max_blocks: STRING
v table_max_locks: STRING
v percent_process_block: REAL
v max_time_blocked: REAL
v avg_time_blocked: REAL
v server_cpu_percent_system: REAL
v server_cpu_percent_application: REAL
v total_processes: INTEGER
v total_processes_blocked: INTEGER
v age_of_last_error: INTEGER
v maximum_sev_level: STRING
v maximum_sev_timestamp: STRING
v total_errors_high_sev: INTEGER
v error_log_size: INTEGER
v current_logons: INTEGER
v percent_max_logons_active: REAL
v physical_reads_per_second: REAL
v physical_writes_per_second: REAL
v io_errors_current_interval: INTEGER
v server_status: STRING
v collection_status: STRING
v sample_timestamp: STRING
v database_max_locks_u: STRING
v database_max_blocks_u: STRING
v table_max_locks_u: STRING
Note: You can resolve some problems by ensuring that your system matches the
system requirements listed in Chapter 2, “Requirements and configuration
for the monitoring agent,” on page 5.
Upload files for review to the following FTP site: ftp.emea.ibm.com. Log in as
anonymous and place your files in the directory that corresponds to the IBM Tivoli
Monitoring component that you use. See “Contacting IBM Software Support” on
page 143 for more information about working with IBM Software Support.
Trace data captures transient information about the current operating environment
when a component or application fails to operate as designed. IBM Software
Problem classification
The following types of problems might occur with the IBM Tivoli Monitoring for
Databases: Sybase Server Agent:
v Installation and configuration
v General usage and operation
v Display of monitoring data
v Take Action commands
This appendix provides symptom descriptions and detailed workarounds for these
problems, as well as describing the logging capabilities of the monitoring agent.
See the IBM Tivoli Monitoring Problem Determination Guide for general problem
determination information.
Trace logging
Trace logs capture information about the operating environment when component
software fails to operate as intended. The principal log type is the RAS (Reliability,
Availability, and Serviceability) trace log. These logs are in the English language
only. The RAS trace log mechanism is available for all components of IBM Tivoli
Monitoring. Most logs are located in a logs subdirectory on the host computer. See
the following sections to learn how to configure and use trace logging:
v “Principal trace log files” on page 119
v “Examples: using trace logs” on page 121
v “Enabling detailed tracing in the collector trace log” on page 122
v “Setting RAS trace parameters” on page 124
Note: The documentation refers to the RAS facility in IBM Tivoli Monitoring as
″RAS1″.
IBM Software Support uses the information captured by trace logging to trace a
problem to its source or to determine why an error occurred. The default
configuration for trace logging, such as whether trace logging is enabled or
disabled and trace level, depends on the source of the trace logging. Trace logging
is always enabled.
where:
v hostname is the host name of the machine on which the monitoring component is
running.
v product is the two-character product code. For Monitoring Agent for Sybase
Server, the product code is oy.
v adaptiveservername is the name of a database server instance that is being
monitored.
118 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
v program is the name of the program being run.
v timestamp is an 8-character hexadecimal timestamp representing the time at
which the program started.
v nn is a rolling log suffix. See “Examples of trace logging” for details of log
rolling.
For long-running programs, the nn suffix is used to maintain a short history of log
files for that startup of the program. For example, the koyagent program might
have a series of log files as follows:
server01_oy_dbinst02_koyagent_437fc59-01.log
server01_oy_dbinst02_koyagent_437fc59-02.log
server01_oy_dbinst02_koyagent_437fc59-03.log
As the program runs, the first log (nn=01) is preserved because it contains program
startup information. The remaining logs ″roll." In other words, when the set of
numbered logs reach a maximum size, the remaining logs are overwritten in
sequence. Each time a program is started, a new timestamp is assigned to maintain
a short program history. For example, if the Monitoring Agent for Sybase Server is
started twice, it might have log files as follows:
server01_oy_dbinst02_koyagent_437fc59-01.log
server01_oy_dbinst02_koyagent_437fc59-02.log
server01_oy_dbinst02_koyagent_437fc59-03.log
server01_oy_dbinst02_koyagent_537fc59-01.log
server01_oy_dbinst02_koyagent_537fc59-02.log
server01_oy_dbinst02_koyagent_537fc59-03.log
Each program that is started has its own log file. For example, the Monitoring
Agent for Sybase Server would have agent logs in this format:
server01_oy_dbinst02_koyagent_437fc59-01.log
Other logs, such as logs for collector processes and Take Action commands, have a
similar syntax, as in the following example:
server01_oy_dbinst02_koysql_447fc59-01.log
Note: When you communicate with IBM Software Support, you must capture and
send the RAS1 log that matches any problem occurrence that you report.
See the IBM Tivoli Monitoring Installation and Setup Guide for more information on
the complete set of trace logs that are maintained on the monitoring server.
On Windows, you can use the following alternate method to view trace logs:
1. In the Windows Start menu, choose Program Files > IBM Tivoli Monitoring >
Manage Tivoli Monitoring Service. The Manage Tivoli Enterprise Monitoring
Services window is displayed.
2. Right-click a component and select Advanced > View Trace Log in the pop-up
menu. The program displays the Select Log File window that lists the RAS1
logs for the monitoring agent.
3. Select a log file from the list and click OK. You can also use this viewer to
access remote logs.
Note: The viewer converts time stamps in the logs to a readable format.
122 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
v On Windows: install_dir\tmaitm6
v On UNIX systems: install_dir/misc
where install_dir is the location of the IBM Tivoli Monitoring component.
2. Remove the two semicolons (;;) from the beginning of the line that contains
trace_all;.
3. Save the file.
4. Restart the monitoring agent for the database server instance that you want to
trace. Logging goes to a collector trace log file that is named in Table 12 on
page 120.
The log file is stored in the following path:
v On Windows: install_dir\tmaitm6\logs
v On UNIX systems: install_dir/logs
where install_dir is the path where you installed IBM Tivoli Monitoring.
5. When you complete an analysis of detailed trace logs, turn off detailed logging
as follows, because trace logs can consume a large amount hard disk space.
a. Open the koytrac.ctl file mentioned in Step 1.
b. Type two semicolons (;;) at the beginning of the line that contains trace_all;.
c. Save the file.
d. Restart the monitoring agent for the database server instance that you have
been tracing.
Background Information
Monitoring Agent for Sybase Server uses RAS1 tracing and generates the logs
described in Table 12 on page 120. The default RAS1 trace level is ERROR.
RAS1 tracing has control parameters to manage to the size and number of RAS1
logs. Use the procedure described in this section to set the parameters.
Note: The KBB_RAS1_LOG parameter also provides for the specification of the
log file directory, log file name, and the inventory control file directory and
name. Do not modify these values or log information can be lost.
Regularly prune log files other than the RAS1 log files in the logs directory. Unlike
the RAS1 log files which are pruned automatically, other log types can grow
indefinitely, for example, the logs in Table 12 on page 120 that include a process ID
number (PID).
Note: The KDC_DEBUG setting and the Maximum error tracing setting can
generate a large amount of trace logging. Use them only temporarily, while
you are troubleshooting problems. Otherwise, the logs can occupy excessive
amounts of hard disk space.
124 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Procedure
Specify RAS1 trace options in the install_dir\tmaitm6\KOYENV file on Windows or
the install_dir/config/oy.ini file on UNIX systems.
Note: On UNIX, the trace options that you set in the oy.ini file apply to all
database server instances that you are monitoring on the computer where
oy.ini is located. An additional trace options file,
hostname_oy_adaptiveservername.cfg, exists for each database server
instance. The hostname_oy_adaptiveservername.cfg file inherits its settings
from the oy.ini file. If you want to set trace options for a specific instance
only, modify options in the hostname_oy_adaptiveservername.cfg file.
Use one of the following methods to modify trace options:
v Manually edit the configuration file to set trace logging
1. Open the trace options file:
– On Windows, open the install_dir\tmaitm6\KOYENV file.
– On UNIX systems, open the /install_dir/config/oy.ini file.
2. Edit the line that begins with KBB_RAS1= to set trace logging preferences.
For example, if you want detailed trace logging, set the Maximum Tracing
option:
– On Windows,
KBB_RAS1=ERROR (UNIT:kdd ALL) (UNIT:koy ALL) (UNIT:kra ALL)
– On UNIX systems,
export KBB_RAS1=’ERROR (UNIT:kdd ALL) (UNIT:koy ALL) (UNIT:kra ALL)’
3. Edit the line that begins with KBB_RAS1_LOG= to manage the generation
of log files:
– Edit the following parameters to adjust the number of rolling log files and
their size.
- MAXFILES: the total number of files that are to be kept for all startups
of a given program. Once this value is exceeded, the oldest log files are
discarded. Default value is 9.
- LIMIT: the maximum size, in megabytes (MB) of a RAS1 log file.
Default value is 5.
– IBM Software Support might guide you to modify the following
parameters:
- COUNT: the number of log files to keep in the rolling cycle of one
program startup. Default value is 3.
- PRESERVE: the number of files that are not to be reused in the rolling
cycle of one program startup. Default value is 1.
Note: As this example shows, you can set multiple RAS tracing options in
a single statement.
5. Modify the value for ″Maximum Log Size Per File (MB)″ to change the log
file size (changes LIMIT value).
6. Modify the value for ″Maximum Number of Log Files Per Session″ to change
the number of logs files per startup of a program (changes COUNT value).
7. Modify the value for ″Maximum Number of Log Files Total″ to change the
number of logs files for all startups of a program (changes MAXFILES
value).
8. (Optional) Click Y (Yes) in the KDC_DEBUG Setting menu to log
information that can help you diagnose communications and connectivity
problems between the monitoring agent and the monitoring server.
Note: The KDC_DEBUG setting and the Maximum error tracing setting can
generate a large amount of trace logging. Use them only temporarily,
while you are troubleshooting problems. Otherwise, the logs can
occupy excessive amounts of hard disk space.
9. Click OK. You see a message reporting a restart of the monitoring agent so
that your changes take effect.
Note: You can resolve some problems by ensuring that your system matches the
system requirements listed in Chapter 2, “Requirements and configuration
for the monitoring agent,” on page 5.
This appendix provides agent-specific problem determination information. See the
IBM Tivoli Monitoring Problem Determination Guide for general problem
determination information.
126 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
v Problems with database applications
Table 13. Problems and solutions for installation and configuration for agents that run on UNIX systems
Problem Solution
When you upgrade to IBM Tivoli Fixpacks for Candle, Version 350, are delivered as each monitoring agent is
Monitoring, you might need to apply upgraded to IBM Tivoli Monitoring.
fixpacks to Candle, Version 350, agents. Note: The IBM Tivoli Monitoring download image or CD provides
application fixpacks for the monitoring agents that are installed from that
CD (for example, the agents for operating systems such as Windows,
Linux, UNIX, and i5/OS). The upgrade software for other agents is located
on the download image or CDs for that specific monitoring agent, such as
the agents for database applications.
If you do not upgrade the monitoring agent to IBM Tivoli Monitoring, the
agent continues to work. However, you must upgrade to have all the
functionality that IBM Tivoli Monitoring offers.
Presentation files and customized The upgrade from version 350 to IBM Tivoli Monitoring handles export of
Omegamon DE screens for Candle the presentation files and the customized Omegamon DE screens.
monitoring agents need to be
upgraded to a new Linux on z/Series
system.
Non-ASCII characters entered into the Enter only ASCII characters into these fields.
configuration window for the
monitoring agent do not show up or
are not the correct characters.
During the command-line installation, You must exit and restart the installation process. You cannot return to the
you choose to install a component that list where you selected components to install. When you run the installer
is already installed, and you see the again, do not attempt to install any component that is already installed.
following warning:
WARNING - you are about to install
the SAME version of "component"
Table 14. Problems and solutions for installation and configuration for agents that run on Windows systems
Problem Solution
When you upgrade to IBM Tivoli Fixpacks for Candle, Version 350, are delivered as each monitoring agent is
Monitoring, you might need to upgraded to IBM Tivoli Monitoring.
apply fixpacks to Candle, Version Note: The IBM Tivoli Monitoring download image or CD provides application
350, agents. fixpacks for the monitoring agents that are installed from that CD (for example,
the agents for operating systems such as Windows, Linux, UNIX, and i5/OS).
The upgrade software for other agents is located on the download image or CDs
for that specific monitoring agent, such as the agents for database applications.
If you do not upgrade the monitoring agent to IBM Tivoli Monitoring, the agent
continues to work. However, you must upgrade to have all the functionality that
IBM Tivoli Monitoring offers.
Presentation files and customized The upgrade from version 350 to IBM Tivoli Monitoring handles export of the
Omegamon DE screens for presentation files and the customized Omegamon DE screens.
Candle monitoring agents need to
be upgraded to a new Linux on
z/Series system.
128 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 14. Problems and solutions for installation and configuration for agents that run on Windows
systems (continued)
Problem Solution
Diagnosing problems with When you have problems with browse settings, perform the following steps:
product browse settings. 1. Click on Start > Programs > IBM Tivoli Monitoring > Manage Tivoli
Enterprise Monitoring Services. The Manage Tivoli Enterprise Monitoring
Services is displayed.
2. Right-click the Windows agent and select Browse Settings. A text window is
displayed.
3. Click Save As and save the information in the text file. If requested, you can
forward this file to IBM Software Support for analysis.
A message similar to ″Unable to If a message similar to ″Unable to find running CMS on CT_CMSLIST″ is
find running CMS on displayed in the Log file, the agent is not able to connect to the monitoring
CT_CMSLIST″ in the log file is server. Confirm the following points:
displayed. v Do multiple network interface cards (NICs) exist on the system?
v If multiple NICs exist on the system, find out which one is configured for the
monitoring server. Ensure that you specify the correct host name and port
settings for communication in the IBM Tivoli Monitoring environment.
You successfully migrate a Candle Copy the attribute files for the upgraded Candle monitoring agent to
monitoring agent to IBM Tivoli install_dir\tmaitm6\attrlib on the computer where you have installed the
Monitoring, Version 6.1.0. Warehouse Proxy. The Warehouse Proxy must be able to access the short
However, when you configure attribute names for tables and columns. That way, if the longer versions of these
historical data collection, you see names exceed the limits of the Warehouse database, the shorter names can be
an error message that includes, substituted.
Attribute name may be invalid,
or attribute file not installed
for warehouse agent.
The monitoring agent does not Check the agent configuration to ensure that all the values are correctly
start in a non-ASCII environment. represented. To view these parameters, go to the Manage Tivoli Enterprise
Monitoring Services window, select the agent template, and choose the
Configure using defaults. From the resulting window, select and edit the
database instance to view its parameters.
The following table shows problems and solutions for database agents Microsoft
SQL Server, Sybase, and Oracle. However, these points do not apply to IBM DB2.
Note: If you installed the product in a directory path other than the
default, use that directory path instead of C:\IBM\ITM.
v On UNIX systems:
export KBB_RAS1=’ERROR’
Note: If you installed the product in a directory path other than the
default, use that directory path instead.
1. Save your changes.
2. Repeat the “Setting RAS trace parameters” on page 124 procedure. Now
the Tivoli Enterprise Monitoring Server: Trace Parameters window is
displayed.
Collector trace logs are not receiving Review the information in “Trace logging” on page 118 to ensure that you
error information. are consulting the correct log file. The file is located in the following path:
install_dir\tmaitm6, where install_dir is the location of IBM Tivoli
Monitoring.
After running the agent successfully, Consult the list of supported versions in the configuration chapter of the
you reinstall the agent software, and agent user’s guide for Sybase. Confirm that you are running a valid version
collection of monitoring data stops. of the target application. If you are monitoring a supported version of the
database application, gather log files and other information and contact
IBM Software Support, as described in “Gathering product information for
IBM Software Support” on page 117.
Alert summary report of Tivoli Ensure that the COLL_ERRORLOG setting defines a valid path. Confirm
Enterprise Portal shows no that the error log file is correct. If the error log file is correct, the problem
information. can occur because the logon account that you are using does not have
sufficient permissions in the IBM Tivoli Monitoring environment.
Error counts are displayed in the Alert Check the time stamp for the reports. If you have set up historical data
summary report in the Tivoli collection for Alert summary report, it is recommended that you set up
Enterprise Portal, however, error historical data collection for the Alert detail report, too.
messages are not displayed in the
Alert detail report.
130 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 15. Problems and solutions for installation and configuration of specific database agents: Microsoft SQL Server,
Sybase, and Oracle (continued)
Problem Solution
(Sybase and Oracle only) Problems with Specifically, you might see an error like the following in the collector trace
database connectivity occur because log:
the KOYGRANT script is not run. v In Sybase: The Sybase agent displays the following message:
YEM0155E (193633) Failed to open SYBASE Server connection \
YCD0130E (193633)
Unable to connect to SYBASE server:HDCHASDSTC0041,
id:tivoli, Retcode= 0
v In Oracle: The Oracle agent displays -942 error in the collector log file as
shown in this excerpt:
RPF0340T (5/19/05) Time = 2005/05/19 15:07:40 For cursor KSS5, \
rows collected for insert = 1
RPF0300T (5/19/05) Doing prep_l_fet for cursor KSS6
RSC0200I (5/19/05) SQLCODE for PREPARE = -942
RSC0205T (5/19/05) Stmt = SELECT max(bytes) MAXLOGBYTE FROM \
v$log
RSC0220W (5/19/05) ORACLE Message ORA-00942: table or view does \
not exist for PREPARE
CGN1521E (5/19/05) Interval collection failed for cursor KORSRVR
To collect data, the agent must have the DBA select privilege on the Sybase
system tables.
After the agent starts the ’kddos When the tmp directory path is inaccessible two things happen:
isremote failed, no localization’ v The logs are stored in the install_dir/logs directory
message is displayed.
v The message kddos isremote failed, no localization is displayed as
shown in this excerpt:
$ ./CandleAgent start oy
CandleAgent : installer level 350 / 547.
CandleAgent : considering servers: name.
kddexec: kddos isremote failed, no localization
Collector and Agent started for name
1. Prepares a configuration file for each monitored server, so that the OMA
knows how to talk to the database.
CandleDBconfig finds running databases much more easily and reliably than
non-running databases. If you want to monitor databases that are not currently
running, you might wish to exit CandleDBConfig and start them.
Also, CandleDBconfig works best if you have more than 25 display lines. Both
X-Windows and NT Telnet allow you to expand the number of lines without
disconnecting from UNIX. You don’t have to issue any UNIX commands to take
advantage of the increased lines.
Your kddos root permission is not set. This will impede database self-
discovery. Please exit and have the super-user issue the following commands:
cd /ct99r1e/slee/AIX5
chown root */bin/kddos
chmod u+sx */bin/kddos
Press enter to continue, or type "exit" to exit.
Unique names for monitoring IBM Tivoli Monitoring might not be able to generate a unique name for
components: ORIGINNODE is monitoring components due to the truncation of names that the product
truncated and doesn’t show the automatically generates. IBM Tivoli Monitoring automatically creates a
product code. name for each monitoring component by concatenating the subsystem
name, host name, and product code separated by colons
(subsystem_name:hostname:OY).
Note: When you monitor a multinode systems, like databases, IBM Tivoli
Monitoring uses a database instance name as the subsystem name.
The length of the name that IBM Tivoli Monitoring generates is limited to
32 characters. Truncation can result in multiple components having the
same 32-character name. If this problem happens, shorten the
subsystem_name portion of the name as described in the steps in the
following rows:
132 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 15. Problems and solutions for installation and configuration of specific database agents: Microsoft SQL Server,
Sybase, and Oracle (continued)
Problem Solution
v On Windows:
Note: This procedure involves editing the Windows Registry. An error in editing the Registry may cause other
system errors. It is best practice to make a backup copy of the Registry prior to modifying the Registry. If you do
not feel comfortable editing the Registry, contact IBM Software Support.
1. Run the Registry editor, regedit. Select Start > Run. Type regedit in the field and click OK.
2. Locate the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Candle\KOY\610\instance_name
where instance_name is the Sybase Server instance name that is associated with the target agent.
3. Open the Environment key.
4. Select the CTIRA_SUBSYSTEM_ID string attribute. If you do not find CTIRA_SUBSYSTEM_ID, add it. step
6. Type a new name for an instance name( subsystem name) For the step 4 -6, if user can’t find
CTIRA_SUBSYSTEM_ID, add it.
5. Right-click and select Modify.
6. Type a new instance name (subsystem name). Keep in mind that the final concatenated name, including the
subsystem name, host name, and OY, cannot be longer than 32 characters.
Note: You must ensure that the resulting name is unique with respect to any existing monitoring component
that was previously registered with the Tivoli Enterprise Monitoring Server.
7. Exit from the Registry editor.
8. Restart the agent.
9. A second instance in the Tivoli Enterprise Portal navigation tree might be automatically added. If this
happens, clear the old, offline agent instance navigation item using the Managed System Status workspace of
the Enterprise navigation tree item.
v On UNIX:
1. Open the configuration file for the monitoring agent, which is located in the following path:
install_dir/config/hostname_oy_instancename.cfg
2. Find the line the begins with CTIRA_SUBSYSTEM_ID=.
3. Type a new name for instance name (subsystem_name) that is a unique, shorter name for the instance name
(subsystem_name). The final concatenated name including the subsystem name, new host name, and OY, cannot
be longer than 32 characters.
Note: You must ensure that the resulting name is unique with respect to any existing monitoring component
that was previously registered with the Tivoli Enterprise Monitoring Server.
4. Save the file.
5. Restart the agent.
If you cannot find the CTIRA_SUBSYSTEM_ID environment variable, you must add it to the configuration file
of the monitoring agent. Open hostname_oy_instancename.cfg and add CTIRA_SUBSYSTEM_ID with the new instance
name.
Table 18. Agent problems and solutions on the UNIX operating system
Problem Solution
You see an unknown instance of The verification process for Monitoring Agent for Sybase Server creates a Sybase
the monitoring agent for Sybase server instance called koyagent. The system creates this instance to validate the
called koyagent in the Tivoli connection to the Tivoli Enterprise Monitoring Server. The Tivoli Enterprise
Enterprise Portal. Portal shows an entry for this Sybase server instance, even though that instance
only exists during the verification steps. To remove this instance from Tivoli
Enterprise Portal, follow the standard process for removing an instance on the
Tivoli Enterprise Portal.
134 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 18. Agent problems and solutions on the UNIX operating system (continued)
Problem Solution
Agent unable to connect: The This error message means that the agent is not able to connect to the computer
agent is started, but no reports where the Tivoli Enterprise Monitoring Server is running. The reason might be
are displayed on Tivoli any one of the following:
Enterprise Monitoring Server. Computer where the Tivoli Enterprise Monitoring Server is running is down
The log file includes the Ping the computer where the Tivoli Enterprise Monitoring Server is running
following error: and make sure that it is up and running.
Unable to find running CMS on Tivoli Enterprise Monitoring Server is not running
CMSLIST or Endpoint If the Tivoli Enterprise Monitoring Server is not running, recycle the Tivoli
unavailable Enterprise Monitoring Server and verify whether the agent is connecting.
Multiple NIC Cards on the computer where the Tivoli Enterprise Monitoring
Server is running.
If multiple NICs are installed on the computer where the Tivoli Enterprise
Monitoring Server is running, identify the Primary NIC and use the hostname
or IP address.
Verify that the Tivoli Enterprise Monitoring Server has been configured with
the Primary NIC’s IP address or hostname.
If you are using hostname, make sure that /etc/hosts has a valid entry for the
Primary NICs host name and its IP address.
On the Tivoli Enterprise Monitoring Server set the KDCB0_HOSTNAME
variable to the primary IP address of the computer. Use the same address to
configure the agent.
To connect to the Tivoli Enterprise Monitoring Server, configure the agent
with Primary NIC’s IP address or host name of the computer where the
Tivoli Enterprise Monitoring Server is running.
While configuring the agent, make sure that the port number that you are
connecting to is correct. If you are not using the default port number, make
sure that you are using the same port number used in Tivoli Enterprise
Monitoring Server. For more information, see the IBM Tivoli Monitoring
Installation and Setup Guide.
Agent is behind the Firewall
If you use a Firewall, identify whether you have any one of the following
scenarios:
v Hub monitoring server INSIDE, and agents OUTSIDE
v Hub and remote monitoring servers INSIDE, agents OUTSIDE
v Hub monitoring server INSIDE, remote monitoring server and agents
OUTSIDE
See Creating a firewall partition file for information about the
KDC_PARTITION file that enables communication across a firewall. For
additional information, see the IBM Tivoli Monitoring Installation and Setup
Guide.
Connecting to the monitoring server through a Virtual Private Network (VPN)
In some cases, the agent or a remote monitoring server needs to connect to
the hub monitoring server through a VPN. You must configure the
communication channel (pipe) to be ephemeral, as in the following example:
KDC_FAMILIES=ip.pipe port:port_number
ephemeral:y ip use:n sna use:n
To ensure support of historical data collection, do not use the Sort By, Group By, or
First/Last functions in your queries.
See the IBM Tivoli Monitoring Administrator’s Guide the Tivoli Enterprise Portal
online Help for information on the Historical Data Collection function.
When you use a long process Truncation of process names in the portal display is the expected behavior. 64 bytes
name in the situation, the is the maximum name length.
process name is truncated.
This section describes problems and solutions for remote deployment and removal
of agent software Agent Remote Deploy:
Table 20. Remote deployment problems and solutions
Problem Solution
While you are using the remote deployment feature Do not close or modify this window. It is part of the
to install Monitoring Agent for Sybase Server, an installation process and will be dismissed automatically.
empty command window is displayed on the target
computer. This problem occurs when the target of
remote deployment is a Windows computer. (See the
IBM Tivoli Monitoring Installation and Setup Guide for
more information on the remote deployment
feature.)
The removal of a monitoring agent fails when you This problem might happen when you attempt the remote
use the remote removal process in the Tivoli removal process immediately after you have restarted the
Enterprise Portal desktop or browser. Tivoli Enterprise Monitoring Server. You must allow time for
the monitoring agent to refresh its connection with the Tivoli
Enterprise Monitoring Server before you begin the remote
removal process.
136 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Workspace problem determination
Table 21 shows problems that might occur with workspaces. This appendix
provides agent-specific problem determination information. See the IBM Tivoli
Monitoring Problem Determination Guide for general problem determination
information.
Table 21. Workspace problems and solutions
Problem Solution
You see the following message: KFWITM083W You see this message because some links do not have default
Default link is disabled for the selected workspaces. Right-click the link to access a list of workspaces to
object; please verify link and link anchor select.
definitions.
The name of the attribute does not display in a When a chart or graph view that includes the attribute is scaled
bar chart or graph view. to a small size, a blank space is displayed instead of a truncated
name. To see the name of the attribute, expand the view of the
chart until there is sufficient space to display all characters of the
attribute’s name.
You start collection of historical data but the data Managing options for historical data collection:
cannot be seen. v Basic historical data collection populates the Warehouse with
raw data. This type of data collection is turned off by default.
See Chapter 2, “Requirements and configuration for the
monitoring agent,” on page 5 for information on managing
this feature including how to set the interval at which data is
collected. By setting a more frequent interval for data
collection you reduce the load on the system incurred every
time data is uploaded.
v You use the Summarization and Pruning monitoring agent to
collect specific amounts and types of historical data. Be aware
that historical data is not displayed until the Summarization
and Pruning monitoring agent begins collecting the data. By
default, this agent begins collection at 2 AM daily. At that
point, data is visible in the workspace view. See the IBM Tivoli
Monitoring Administrator’s Guide to learn how to modify the
default collection settings.
This section provides information for problem determination for agents. Be sure to
consult the IBM Tivoli Monitoring Problem Determination Guide for more general
problem determination information.
Table 23. Problems with configuring situations that you solve in the Situation Editor
Problem Solution
Note: To get started with the solutions in this section, perform these steps:
1. Launch the Tivoli Enterprise Portal.
2. Click Edit > Situation Editor.
3. In the tree view, choose the agent whose situation you want to modify.
4. Choose the situation in the list. The Situation Editor view is displayed.
The situation for a specific agent is Open the Situation Editor. Access the All managed servers view. If the situation
not visible in the Tivoli Enterprise is absent, confirm that application support for Monitoring Agent for Sybase
Portal. Server has been added to the monitoring server. If not, add application support
to the server, as described in the IBM Tivoli Monitoring Installation and Setup
Guide.
138 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 23. Problems with configuring situations that you solve in the Situation Editor (continued)
Problem Solution
The monitoring interval is too Access the Situation Editor view for the situation that you want to modify.
long. Check the Sampling interval area in the Formula tab. Adjust the time interval
as needed.
The situation did not activate at Manually recycle the situation as follows:
startup. 1. Right-click the situation and choose Stop Situation.
2. Right-click the situation and choose Start Situation.
Note: You can permanently avoid this problem by placing a check mark in the
Run at Startup option of the Situation Editor view for a specific situation.
The situation is not displayed. Click the Action tab and check whether the situation has an automated
corrective action. This action can occur directly or through a policy. The
situation might be resolving so quickly that you do not see the event or the
update in the graphical user interface.
An Alert event has not occurred Check the logs, reports, and workspaces.
even though the predicate has been
properly specified.
A situation fires on an unexpected Confirm that you have distributed and started the situation on the correct
managed object. managed system.
The product did not distribute the Click the Distribution tab and check the distribution settings for the situation.
situation to a managed system.
The situation does not fire. In the Formula tab, analyze predicates as follows:
1. Click the fx icon in the upper-right corner of the Formula area. The Show
Incorrect predicates are present in
formula window is displayed.
the formula that defines the
situation. For example, the a. Confirm the following details in the Formula area at the top of the
managed object shows a state that window:
normally triggers a monitoring v The attributes that you intend to monitor are specified in the formula.
event, but the situation is not true v The situations that you intend to monitor are specified in the formula.
because the wrong attribute is v The logical operators in the formula match your monitoring goal.
specified in the formula. v The numerical values in the formula match your monitoring goal.
b. (Optional) Click the Show detailed formula check box in the lower left
of the window to see the original names of attributes in the application
or operating system that you are monitoring.
c. Click OK to dismiss the Show formula window.
2. (Optional) In the Formula area of the Formula tab, temporarily assign
numerical values that will immediately trigger a monitoring event. The
triggering of the event confirms that other predicates in the formula are
valid.
Note: After you complete this test, you must restore the numerical values
to valid levels so that you do not generate excessive monitoring data based
on your temporary settings.
Table 24. Problems with configuration of situations that you solve in the Workspace area
Problem Solution
Situation events are not displayed Associate the situation with a workspace.
in the Events Console view of the Note: The situation does not need to be displayed in the workspace. It is
workspace. sufficient that the situation be associated with any workspace.
Table 25. Problems with configuration of situations that you solve in the Manage Tivoli Enterprise Monitoring Services
window
Problem Solution
After an attempt to restart the For UNIX, NetWare, or Windows, log on to the applicable system and perform
agents in the Tivoli Enterprise the appropriate queries.
Portal, the agents are still not
running.
The Tivoli Enterprise Monitoring Check the system status and check the appropriate IBM Tivoli Monitoring logs.
Server is not running.
The managed objects you created Check the managed system distribution on both the situation and the managed
are firing on incorrect managed object settings sheets.
systems.
For agents that can have multiple sub-nodes, such as database agents:
The icon is incorrect. Check the icon assignments in the template.
The situation is not assigned to a Check the situation assignments in the template of the associated managed
state in the template. object.
You assigned the situation to an Check the State settings sheet for the template.
incorrect state in the template.
140 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Table 26. Sybase problems and solutions
Problem Solution
(AIX only) SQL text information is not The default Adaptive Server setting for max SQL text monitored is zero
available to the IBM Tivoli Monitoring. (0). Do the following to change the setting to the recommended number
of bytes, 1024:
1. Run the following isql commands:
a. sp_configure "max SQL text monitored", 1024
b. go
2. Restart Sybase.
See the following Web document for more information:
http://manuals.sybase.com/onlinebooks/group-
as/asg1250e/monbook/@ebt-
link;pt=3138?target=%25N%14_3401_START_RESTART_N%25
UTF-8 is not available. Ensure that the UTF-8 character set is present and activated on the Sybase
server. See configuration details in Chapter 2, “Requirements and
configuration for the monitoring agent,” on page 5.
Support information
If you have a problem with your IBM software, you have the following options for
obtaining support for software products:
v “Searching knowledge bases”
v “Obtaining fixes” on page 142
v “Receiving weekly support updates” on page 142
v “Contacting IBM Software Support” on page 143
The documentation CD contains the publications that are in the product library.
The format of the publications is PDF, HTML, or both.
IBM posts publications for this and all other Tivoli products, as they become
available and whenever they are updated, to the Tivoli software information center
Web site. Access the Tivoli software information center by first going to the Tivoli
software library at the following Web address:
http://www.ibm.com/software/tivoli/library
Scroll down and click the Product manuals link. In the Tivoli Technical Product
Documents Alphabetical Listing window, click M to access all of the IBM Tivoli
Monitoring product manuals.
The IBM Software Support Web site provides the latest information about known
product limitations and workarounds in the form of technotes for your product.
You can view this information at the following Web site:
http://www.ibm.com/software/support
To search for information on IBM products through the Internet (for example, on
Google), be sure to consider the following types of documentation:
v IBM technotes
v IBM downloads
v IBM Redbooks
v IBM developerWorks
v Forums and newsgroups
Obtaining fixes
A product fix might be available to resolve your problem. To determine what fixes
are available for your IBM software product, follow these steps:
1. Go to the Software support Web site at
http://www.ibm.com/software/support.
2. Click the Download tab.
3. Select the operating system in the Operating system menu.
4. Type search terms in the Enter search terms field.
5. As appropriate, use other search options to further define your search.
6. Click Search.
7. From the list of downloads returned by your search, click the name of a fix to
read the description of the fix and to optionally download the fix.
For more information about the types of fixes that are available, see the IBM
Software Support Handbook at
http://techsupport.services.ibm.com/guides/handbook.html.
142 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Contacting IBM Software Support
IBM Software Support provides assistance with product defects.
Before contacting IBM Software Support, your company must have an active IBM
software maintenance contract, and you must be authorized to submit problems to
IBM. The type of software maintenance contract that you need depends on the
type of product you have:
v For IBM distributed software products (including, but not limited to, Tivoli,
Lotus, and Rational products, as well as DB2 and WebSphere products that run
on Windows, or UNIX operating systems), enroll in Passport Advantage in one
of the following ways:
Online
Go to the Passport Advantage Web site at
http://www.lotus.com/services/passport.nsf/
WebDocs/Passport_Advantage_Home and click How to Enroll.
By phone
For the phone number to call in your country, go to the IBM Software
Support Web site at
http://techsupport.services.ibm.com/guides/contacts.html and click the
name of your geographic region.
v For customers with Subscription and Support (S & S) contracts, go to the
Software Service Request Web site at
https://techsupport.services.ibm.com/ssr/login.
v For customers with IBMLink, CATIA, Linux, OS/390, iSeries, pSeries, z/Series,
and other support agreements, go to the IBM Support Line Web site at
http://www.ibm.com/services/us/index.wss/so/its/a1000030/dt006.
v For IBM eServer software products (including, but not limited to, DB2 and
WebSphere products that run in z/Series, pSeries, and iSeries environments),
you can purchase a software maintenance agreement by working directly with
an IBM sales representative or an IBM Business Partner. For more information
about support for eServer software products, go to the IBM Technical Support
Advantage Web site http://www.ibm.com/servers/eserver/techsupport.html.
If you are not sure what type of software maintenance contract you need, call
1-800-IBMSERV (1-800-426-7378) in the United States. From other countries, go to
the contacts page of the IBM Software Support Handbook on the Web at
http://techsupport.services.ibm.com/guides/contacts.html and click the name of
your geographic region for phone numbers of people who provide support for
your location.
Submitting problems
You can submit your problem to IBM Software Support in one of two ways:
Online
Click Submit and track problems on the IBM Software Support site at
http://www.ibm.com/software/support/probsub.html. Type your
information into the appropriate problem submission form.
By phone
For the phone number to call in your country, go to the contacts page of
the IBM Software Support Handbook at
http://techsupport.services.ibm.com/guides/contacts.html and click the
name of your geographic region.
If the problem you submit is for a software defect or for missing or inaccurate
documentation, IBM Software Support creates an Authorized Program Analysis
Report (APAR). The APAR describes the problem in detail. Whenever possible,
IBM Software Support provides a workaround that you can implement until the
APAR is resolved and a fix is delivered. IBM publishes resolved APARs on the
Software Support Web site daily, so that other users who experience the same
problem can benefit from the same resolution.
144 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Appendix D. Accessibility
Accessibility features help users with physical disabilities, such as restricted
mobility or limited vision, to use software products successfully. The major
accessibility features in this product enable users to do the following:
v Use assistive technologies, such as screen-reader software and digital speech
synthesizer, to hear what is displayed on the screen. Consult the product
documentation of the assistive technology for details on using those technologies
with this product.
v Operate specific or equivalent features using only the keyboard.
v Magnify what is displayed on the screen.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM’s future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
148 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply
reliability, serviceability, or function of these programs. You may copy, modify, and
distribute these sample programs in any form without payment to IBM for the
purposes of developing, using, marketing, or distributing application programs
conforming to IBM’s application programming interfaces.
If you are viewing this information in softcopy form, the photographs and color
illustrations might not appear.
Trademarks
IBM, the IBM logo, AIX, Candle, CandleNet Portal, DB2, developerWorks, eServer,
Hummingbird®, iSeries, Lotus, MVS, OMEGAMON, Passport Advantage, pSeries,
Rational, Redbooks, S/390, Tivoli, the Tivoli logo, Tivoli Enterprise, Tivoli
Enterprise Console, WebSphere, and zSeriesare trademarks or registered
trademarks of International Business Machines Corporation in the United States,
other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
G M
manuals
gathering support information 117 feedback viii
granting permission 9 online viii
ordering viii
see publications ix
H memory requirements 5
historical data messages
calculate disk space 79 built-in features 117
disk capacity planning 79 modifying situation values to detect problems 18
historical data, collecting and viewing 19 Monitoring Agent for Sybase Server
components 2
features 1
purposes 15
I using 15
IBM Software Support workspace groups
See support determining which to use 95
IBM Tivoli Enterprise Console monitoring, viewing the real-time environment 15
event mapping 97
IBM Tivoli Monitoring for Databases: Sybase Server Agent
performance considerations 137
information centers for support 141
N
information, additional notation
attributes 35 environment variables x
policies 93 path names x
procedural 15 typeface x
situations 83
Take Action commands 91
workspaces 21 O
installation 5 online publications
log file 119 accessing ix
problems 127 for support 141
interface, user 2 operating systems 5
problem determination for Tivoli Enterprise Portal 136 operation of resource, recovering 16
Internet ordering publications ix
for product support 142 other requirements 6
investigating an event 16
P
K path names, for trace logs 118
knowledge bases for support 141 path names, notation x
performance considerations 137
permission, granting 9
Physical Device Detail attribute group 62
152 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
policies resource, recovering operation 16
list of all 93
more information 93
overview 93
predefined 93
S
Server Configuration workspace 31
Problem Detail attribute group 65
server detail attribute group 72
problem determination 117, 126
Server Enterprise attribute group 73
agents 134
Server Statistics Summary workspace 32
built-in features 117
server summary attribute group 74
describing problems 144
Servers workspace 32
determining business impact 143
situations 84
information centers for 141
general problem determination 138
installation 127
more information 83
installation logs 119
overview 83
knowledge bases for 141
predefined 84
remote deployment 136
specific problem determination 137
situations 137, 138
Sybase_Collection_Stat_Warning 84
submitting problems 144
Sybase_DB_Error_Status 85
Tivoli Enterprise Portal 136
Sybase_DB_Freespace_Critical 85
uninstallation 127
Sybase_DB_Freespace_Warning 85
uninstallation logs 119
Sybase_DB_Num_Errors_Warning 85
workspaces 137
Sybase_Device_Free_Pct_Warning 85
problem summary attribute group 66
Sybase_ErrorLog_Size_Warning 85
problems
Sybase_IOERR_Startup_Warning 85
detecting 18
Sybase_IOError_Curintvl_Warning 85
problems and workarounds 126
Sybase_Log_Freespace_Critical 85
problems with monitoring Sybase 140
Sybase_Log_Suspend_Warning 86
procedures 15
Sybase_LogonPct_Warning 86
process detail attribute group 67
Sybase_Pct_Device_Lock_Warning 86
Process Holding Lock workspace 30
Sybase_Pct_Engine_CPU_Critical 86
Process SQL Text workspace 30
Sybase_Pct_Engine_CPU_Warning 86
process summary attribute group 70
Sybase_Pct_IO_Warning 86
Processes workspace 31
Sybase_Pct_MAX_Locks_Critical 86
publications
Sybase_Pct_MAX_Locks_Warning 87
accessing online ix
Sybase_Pct_Task_Yields_Warning 87
feedback viii
Sybase_Pct_Total_CPU_Critical 87
for support 141
Sybase_Pct_Total_CPU_Warning 87
online viii
Sybase_ProbAge_GT_17_Warning 87
ordering viii, ix
Sybase_ProbAge_LT_17_Warning 87
purposes
Sybase_Process_Blocked_Warning 87
collecting data 19
Sybase_Process_Infected_Warning 87
customizing monitoring environment 17
Sybase_Processes_Bad_Warning 88
investigating events 16
Sybase_Processes_Stop_Warning 88
monitoring with custom situations 18
Sybase_ProcessLockSleep_Warning 88
problem determination 117
Sybase_ProcessOthSleep_Warning 88
recovering resource operation 16
Sybase_Server_CPU_Critical 88
viewing data 19
Sybase_Server_CPU_Warning 88
viewing real-time monitoring environment 15
Sybase_Server_Error_Warning 88
Sybase_Server_Status_Critical 88
Sybase_Server_Status_Inactive 89
Q values, modifying 18
queries, using attributes 35 situations, using attributes 35
SQL detail attribute group 75
SQL Text workspace 33
R statistics detail attribute group 75
statistics summary attribute group 76
real-time data, viewing 15
support
recovering the operation of a resource 16
about 141
remote deployment
contacting 143
problem determination 136
describing problems 144
remote servers attribute group 71
determining business impact of problems 143
requirements
gathering information for 117
application versions 5
information centers for 141
disk space 5
knowledge bases for 141
memory 5
obtaining fixes 142
operating system 5
on Internet 142
other 6
submitting problems 144
Index 153
support (continued)
weekly update option 142
U
Sybase problems 140 unicode
Sybase Server Locking workspace group 28 enabling conversions 13
Sybase Server Processes workspace group 31 uninstallation
Sybase Server_ID workspace 33 log file 119
Sybase Statistics Summary workspace group 32 problems 127
Sybase_Collection_Stat_Warning situation 84 unix
Sybase_DB_Error_Status situation 85 configuring 10
Sybase_DB_Freespace_Critical situation 85 UNIX operating systems 5
Sybase_DB_Freespace_Warning situation 85 user ID, creating 9
Sybase_DB_Num_Errors_Warning situation 85 user interfaces options 2
Sybase_Device_Free_Pct_Warning situation 85 UTF-8
Sybase_ErrorLog_Size_Warning situation 85 configuring character set 12
Sybase_IOERR_Startup_Warning situation 85
Sybase_IOError_Curintvl_Warning situation 85
Sybase_Log_Freespace_Critical situation 85 V
Sybase_Log_Suspend_Warning situation 86 values, modifying situations 18
Sybase_LogonPct_Warning situation 86 variables, notation for x
Sybase_Pct_Device_Lock_Warning situation 86 viewing data 19
Sybase_Pct_Engine_CPU_Critical situation 86 viewing real-time monitoring environment 15
Sybase_Pct_Engine_CPU_Warning situation 86 views
Sybase_Pct_IO_Warning situation 86 Cache Usage workspace 22
Sybase_Pct_MAX_Locks_Critical situation 86 Databases workspace 22
Sybase_Pct_MAX_Locks_Warning situation 87 Device Usage workspace 23
Sybase_Pct_Task_Yields_Warning situation 87 Engine Summary workspace 24
Sybase_Pct_Total_CPU_Critical situation 87 Enterprise Database Summary workspace 24
Sybase_Pct_Total_CPU_Warning situation 87 Enterprise Errorlog Alerts workspace 25
Sybase_ProbAge_GT_17_Warning situation 87 Enterprise Locking Summary workspace 25
Sybase_ProbAge_LT_17_Warning situation 87 Enterprise Processes Summary workspace 26
Sybase_Process_Blocked_Warning situation 87 Enterprise Server Statistics workspace 26
Sybase_Process_Infected_Warning situation 87 Enterprise Server Summary workspace 26
Sybase_Processes_Bad_Warning situation 88 Enterprise Sybase Summary workspace 27
Sybase_Processes_Stop_Warning situation 88 Errorlog Alerts workspace 27
Sybase_ProcessLockSleep_Warning situation 88 Lock Information workspace 28
Sybase_ProcessOthSleep_Warning situation 88 Lock Usage workspace 28
Sybase_Server_CPU_Critical situation 88 Log and Space Information workspace 29
Sybase_Server_CPU_Warning situation 88 Log Usage workspace 29
Sybase_Server_Error_Warning situation 88 Process Holding Lock workspace 30
Sybase_Server_Status_Critical situation 88 Process SQL Text workspace 30
Sybase_Server_Status_Inactive situation 89 Processes workspace 31
Server Configuration workspace 31
Server Statistics Summary workspace 32
T Servers workspace 32
Take Action commands 16 SQL Text workspace 33
list of all 91 Sybase Server_ID workspace 33
more information 91
overview 91
predefined 91 W
target application weekly update support option 142
problems 140 Windows agent installation problems 127
task detail attribute group 78 Windows operating systems 5
tasks for using 15 workarounds 126
text attribute group 78 agents 134
Tivoli Enterprise Portal remote deployment 136
accessing workspaces and table views 95 situations 137
problem determination 136 Tivoli Enterprise Portal 136
Tivoli software information center ix workspaces 137
Tivoli technical training x workspace groups
trace logs 118 overview 95
directories 118 Sybase Errorlog Alerts Workspace 27
trademarks 149 Sybase Server Databases 22
training, Tivoli technical x Sybase Server Locking Workspace 28
transport command 140 Sybase Server Process Workspace 31
troubleshooting 117 Sybase Servers 32
typeface conventions x Sybase Statistics Summary Workspace 32
154 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
workspaces
accessing in Tivoli Enterprise Portal 95
Cache Usage 22
Databases 22
Device Usage 23
Engine Summary 24
Enterprise Database Summary 24
Enterprise Errorlog Alerts 25
Enterprise Locking Summary 25
Enterprise Processes Summary 26
Enterprise Server Statistics 26
Enterprise Server Summary 26
Enterprise Sybase Summary 27
Errorlog Alerts 27
event 16
list of all 21
Lock Information 28
Lock Usage 28
Log and Space Information 29
Log Usage 29
more information 21
overview 21
predefined 21
problem determination 137
Process Holding Lock 30
Process SQL Text 30
Processes 31
Server Configuration 31
Server Statistics Summary 32
Servers 32
SQL Text 33
Sybase Server_ID 33
Index 155
156 IBM Tivoli Monitoring for Databases: Sybase Server Agent: User’s Guide
Printed in USA
SC32-9451-00