Siemens U3585-J-Z125-8-76 1 Nonprivileged SM2 monitoring programs, Monitored data on file access

Models: SM2 monitoring system U3585-J-Z125-8-76 1

1 500
Download 500 pages 4.26 Kb
Page 55
Image 55

SM2 monitoring programs

FILE

3.3 Nonprivileged SM2 monitoring programs

The following instructions must be heeded when using nonprivileged monitoring programs. You should also refer to the descriptions of the corresponding privileged monitoring programs for a better understanding of monitoring-program-specific features and variants.

FILE

Monitored data on file access

With this monitoring program, a user can only include files in the monitoring process if the SM2 primary administrator has permitted the monitoring of file access values. This permission can be granted either to all users or to users with certain IDs.

In this case, the SM2 MEASUREMENT STATUS screen will have the entry FILE in the line entitled USER MEASUREMENTS ALLOWED.

Each authorized user can include and exclude files which are set up under his own ID. It is also possible to include files which do not exist. Privileged users are not treated differently from normal users.

The FILE statistics also contain the access times for files. The monitored time covers the logical duration of I/O operations between start and end of a job from the point of view of the software. For asynchronous I/O operations, this time can be considerably greater than the hardware time.

Any monitored files are excluded from the monitoring process once SM2 is terminated.

All together, up to 16 files can be monitored by this monitoring program; no values for these files are written to the SM2 output file.

ISAM

Monitored data on ISAM pools

With this monitoring program, a user can only include ISAM pools in the monitoring process if the SM2 primary administrator has permitted ISAM pool monitoring. This permission can be granted either to all users or to users with certain IDs. In this case, the SM2 MEASUREMENT STATUS screen will have the entry ISAM in the line entitled USER MEASUREMENTS ALLOWED.

Each authorized user can include or exclude global ISAM pools and all task-specific or user-specific ISAM pools which have been created or are being created under his user ID.

U3585-J-Z125-8-76

55

Page 55
Image 55
Siemens U3585-J-Z125-8-76 1, SM2 monitoring system Nonprivileged SM2 monitoring programs, Monitored data on file access