Availability Guide for Problem Management

Monitoring Objects
Availability Guide for Problem Management125509
5-7
Critical Resource Utilization Monitoring
Critical Resource Utilization Monitoring
The usage level of an object or resource might indicate a gradual degradation in the
availability of the object (for example, the utilization of the communication line is
reaching its theoretical limit), or it could signal the impending loss of an object (for
example, a critical file is 80 percent full). In general, any object that is critical to the
operation of a system or application should be monitored, and a usage threshold event
should be reported when the usage level of the object exceeds the configured level.
Defining threshold limits for and monitoring the utilization of the following critical
objects can help you prevent the loss of applications and end-user services:
Disk files and volumes percent full
Memory queues
Message queues
processor utilization
Control block usage
Disk queues
Spooler cleanup
Monitoring Tools Examples
Tandem provides several tools that can help you monitor effectively the critical objects
in your system environment. This subsection lists (alphabetically) and describes these
object monitoring tools:
Tandem Service Management package (TSM)
Disk Space Analysis Program utility (DSAP)
File Utility Program (FUP)
Measure
Tandem Advanced Command Language (TACL) monitoring macros
Tandem Network Statistics Extended (NSX)
Tandem Object Monitoring Facility (OMF)
ViewSys
Tandem Service Management Package (TSM)
You can use the TSM graphical interface to monitor the status of
Processors (Summary menu CPU Status... command)
The system (Display menu System View... command)
Customer-replaceable units (Display menu Physical View... command)
Logical connections between components (Display menu Logical View... command)
Disk Space Analysis Program (DSAP)
Use the Disk Space Analysis Program (DSAP) utility to analyze how the space on a disk
volume is being used. You can use DSAP to determine how many free-space pages,
allocated pages, deallocatable extent pages, and unused pages are on a disk. This disk-
space information can be critical to user applications that require a certain amount of
free space to execute properly.