Siemens SM2 monitoring system manual Monitored data on file access for selected disks, Disk-File

Models: SM2 monitoring system U3585-J-Z125-8-76 1

1 500
Download 500 pages 4.26 Kb
Page 40
Image 40

DISK-FILE

SM2 monitoring programs

Due to the large amount of data generated and the resulting high load on the CPU, this monitoring program should be used for short monitoring operations only (between half an hour and one hour), and only on a small number of disk devices.

Note

The only access values recorded are ones where an I/O chain begins with a search command (SEEK). This is usually the case for most access attempts, with the exception of the following instances:

1.When formatting disks (VOLIN)

2.When accessing the VOL1 label

DISK-FILE

Monitored data on file access for selected disks

This monitoring program provides information on physical access to files on a selected disk, provided that access was by way of the I/O output system of privileged PAM (PPAM). This includes file access using the methods EAM (Evanescent Access Method), ISAM (Indexed Sequential Access Method), SAM (Sequential Access Method) and UPAM (User Primary Access Method).

In the case of multiprocessor systems, monitoring is restricted to I/O operations originating in the local system running SM2.

Note

Due to the extension of the I/O path, the monitoring program should only be used for short periods of time.

DLM

Monitored data on lock requests

The DLM (Distributed Lock Manager) monitoring program provides information on lock requests from TU, TPR and NSM.

40

U3585-J-Z125-8-76

Page 40
Image 40
Siemens SM2 monitoring system Monitored data on file access for selected disks, Monitored data on lock requests, Disk-File