advertisement
▼
Scroll to page 2
of 700
Tivoli ITCAM for Application Diagnostics ® Version 7.1 User Guide SC27-2817-00 Tivoli ITCAM for Application Diagnostics ® Version 7.1 User Guide SC27-2817-00 Note Before using this information and the product it supports, read the information in “Notices” on page 681. Edition Notice This December 2009 edition applies to Version 7.1 of ITCAM for Application Diagnostics and all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2006, 2009. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this guide . . . . . . . . . . . ix Who should read this guide . Publications . . . . . . Accessibility . . . . . . Tivoli technical training . . Supporting information . . Conventions used in this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix ix xi xi xi xi Part 1. Part 1: Introduction to ITCAM for Application Diagnostics . . . . . 1 Chapter 1. Overview of ITCAM for Application Diagnostics . . . . . . . . 3 ITCAM for Application Diagnostics functionality . . 3 ITCAM for Application Diagnostics user interfaces . 4 Components used by the Tivoli Enterprise Portal user interface . . . . . . . . . . . . . . . . 5 The Agents . . . . . . . . . . . . . . 5 IBM Tivoli Monitoring components . . . . . . 6 Components used by the MSVE user interface . . . 8 Tivoli Enterprise Portal interoperation with MSVE 10 What's new in the 7.1 release? . . . . . . . . 11 Getting Started with ITCAM for Application Diagnostics . . . . . . . . . . . . . . 11 Chapter 2. Scenarios. . . . . . . . . 13 Scenario 1: Diagnosing a memory leak . . . . Scenario 2: Diagnosing hanging transactions . . Scenario 3: Diagnosing a WebSphere server shutdown . . . . . . . . . . . . . . Scenario 4: Determining if the WebSphere cluster needs to be load balanced . . . . . . . . Scenario 5: Determining the cause of high response times . . . . . . . . . . . . . . . Scenario 6: Determining the cause of connection problems . . . . . . . . . . . . . . Scenario 7: Determining if the Garbage Collection policy needs to be adjusted . . . . . . . . Scenario 8: Troubleshooting application response time in an XD cell . . . . . . . . . . . Scenario 9: Ensuring that jobs processed by Compute Grid don't execute for longer than one hour . . . . . . . . . . . . . . . . . 13 . 15 . 19 . 20 . 23 . 28 . 29 . 31 . 34 Part 2. Part 2: Using ITCAM for Application Diagnostics . . . . . . 37 Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine . . . . . . . . . 39 Access the Managing Server Visualization Engine from Tivoli Enterprise Portal . . . . . . . Account management . . . . . . . . . . © Copyright IBM Corp. 2006, 2009 . 39 . 43 User Scenarios . . . . . . . . . . . . 43 User profiles . . . . . . . . . . . . . 44 Role configuration . . . . . . . . . . . 46 Server management . . . . . . . . . . . 49 User Scenarios . . . . . . . . . . . . 49 Server groups . . . . . . . . . . . . 49 Data Collector Configuration . . . . . . . 52 Data Collector Profiles . . . . . . . . . . 61 Monitoring on Demand (TM) . . . . . . . . 73 User Scenarios . . . . . . . . . . . . 74 MOD Console . . . . . . . . . . . . 74 Schedule Management. . . . . . . . . . 75 Creating a schedule. . . . . . . . . . . 75 Applying a schedule . . . . . . . . . . 76 Overriding a monitoring level . . . . . . . 77 Modifying a schedule . . . . . . . . . . 77 Deleting a schedule. . . . . . . . . . . 78 Duplicating a schedule . . . . . . . . . 78 Managing server. . . . . . . . . . . . . 78 System properties . . . . . . . . . . . 79 Self-diagnosis. . . . . . . . . . . . . 82 Systems overview . . . . . . . . . . . . 84 User Scenarios . . . . . . . . . . . . 84 User Scenarios . . . . . . . . . . . . 85 Enterprise Overview . . . . . . . . . . 85 Group Overview . . . . . . . . . . . 86 Server Overview. . . . . . . . . . . . 86 Portal Overview . . . . . . . . . . . . 88 Viewing the Portal Page Summary. . . . . . 88 Viewing the Portlet Summary . . . . . . . 89 WLM associated service class summary . . . . 90 WLM associated service class period detail . . . 91 Viewing a WLM enclave . . . . . . . . . 91 Server Statistics Overview . . . . . . . . . 92 Configuring the Server Statistics Overview page 93 Viewing the Server Statistics Overview . . . . 94 Recent Activity Display . . . . . . . . . . 95 User Scenarios . . . . . . . . . . . . 95 Creating a Recent Activity report . . . . . . 95 System resources . . . . . . . . . . . . 96 User Scenarios . . . . . . . . . . . . 96 Viewing the System Resources Browser . . . . 96 Resources Performance Metrics . . . . . . . 97 SMF data . . . . . . . . . . . . . . . 104 User Scenarios . . . . . . . . . . . . 105 Viewing SMF data. . . . . . . . . . . 105 Alerts and Events . . . . . . . . . . . . 106 Escalating alerts and events to the Problem Center . . . . . . . . . . . . . . . 107 Problem Center. . . . . . . . . . . . . 107 Viewing the details of a problem . . . . . . 109 Adding a problem manually . . . . . . . 111 Closing a problem . . . . . . . . . . . 111 In-flight request search . . . . . . . . . . 112 User Scenarios . . . . . . . . . . . . 112 Searching for an Application Request . . . . 113 iii Sorting search results . . . . . . . . . Server Activity Display . . . . . . . . . User Scenarios . . . . . . . . . . . Server Activity Display - active requests . . Server Activity Display - recent requests . . Server Activity Display - lock contentions . . Viewing request detail . . . . . . . . Suspending a thread . . . . . . . . . Activating a thread . . . . . . . . . Canceling a request . . . . . . . . . Changing a thread's priority . . . . . . Viewing a Stack Trace . . . . . . . . Viewing a Method/Component Trace - flow view . . . . . . . . . . . . . . Viewing a request object and session object . Searching a Method/Component Trace . . . E-mailing a PDF file - SAD . . . . . . . Viewing a PDF file - SAD . . . . . . . Exporting to a file - SAD . . . . . . . Web Session Browser . . . . . . . . . . Viewing the Web Session Browser . . . . Memory diagnosis. . . . . . . . . . . User Scenarios . . . . . . . . . . . Heap Dump Management . . . . . . . Memory Analysis . . . . . . . . . . Heap Analysis . . . . . . . . . . . Memory Leak . . . . . . . . . . . JVM thread display . . . . . . . . . . User Scenarios . . . . . . . . . . . Changing a JVM thread's priority . . . . Viewing a stack trace . . . . . . . . . Canceling a thread . . . . . . . . . Viewing a thread dump . . . . . . . . Trap and alert management . . . . . . . User Scenario . . . . . . . . . . . Setting an Application trap . . . . . . . Setting an Application trap using the Resident Time - Misbehaving Transaction target type . Setting a Server Resource trap . . . . . . Activating a trap . . . . . . . . . . Deactivating a trap . . . . . . . . . Modifying a trap . . . . . . . . . . Duplicating a trap . . . . . . . . . . Deleting a trap . . . . . . . . . . . Viewing the trap action history . . . . . Setting alert actions and data actions . . . Software consistency check . . . . . . . . User Scenarios . . . . . . . . . . . Installed Binary Comparison . . . . . . Installed Binary Check . . . . . . . . Runtime Environment Comparison . . . . Runtime Environment Check . . . . . . Performance analysis and reporting . . . . . User Scenarios . . . . . . . . . . . Defining reports . . . . . . . . . . Report management . . . . . . . . . Method Profiling . . . . . . . . . . Daily Statistics . . . . . . . . . . . . Viewing the Daily Statistics Overview . . . Deleting Daily Statistics . . . . . . . . Custom requests . . . . . . . . . . . iv ITCAM for Application Diagnostics: User Guide . . . . . . . . . . . . 113 114 114 115 117 118 119 120 120 121 121 122 . . . . . . . . . . . . . . . . . . . . . . . 122 123 123 124 125 125 125 126 126 127 127 131 131 132 135 136 137 137 138 138 139 140 140 . . . . . . . . . . . . . . . . . . . . . . . . 143 145 147 148 148 149 149 150 150 152 152 152 154 154 155 155 155 156 169 175 176 176 177 177 Types of requests . . . . . . . . . . Creating custom requests . . . . . . . Viewing custom requests . . . . . . . Composite requests . . . . . . . . . . User Scenarios . . . . . . . . . . . The scope of composite requests . . . . . Composite requests involving CICS and IMS systems . . . . . . . . . . . . . Locate, view, and analyze composite requests Viewing composite requests . . . . . . Audit trails . . . . . . . . . . . . . User Scenarios . . . . . . . . . . . Accessing the user audit trail . . . . . . Request Mapper . . . . . . . . . . . Purpose . . . . . . . . . . . . . Data used by the Request Mapper . . . . Default request mapping behavior . . . . Configuring a Request Mapper . . . . . . . . . . . 178 178 181 181 182 182 . 184 186 . 188 . 194 . 194 . 194 . 194 . 194 . 195 . 196 . 197 Chapter 4. ITCAM Agent for WebSphere . . . . . . . . . . . . 201 About this publication . . . . . . . . . . ITCAM for Application Diagnostics - WebSphere Agent workspaces . . . . . . . . . . . . Organization of the predefined workspaces . . Summary workspaces . . . . . . . . . Summary Workspace Views . . . . . . . WebSphere Agent Summary workspace . . . WebSphere Agent Summary Status workspace Application Server Summary workspace . . . Resources and Applications workspaces . . . Situation Mapping and Summary Workspaces Summary Workspaces error messages . . . . Configuration workspaces . . . . . . . . Workspace link to Managing Server Visualization Engine . . . . . . . . . . Alarm Manager workspace . . . . . . . . Allocation Failures workspace . . . . . . . Selected Application - Application Trend at L1 workspace . . . . . . . . . . . . . Selected Application - Application Trend at L2/L3 workspace . . . . . . . . . . . Application Health workspace. . . . . . . Application Registry workspace . . . . . . Cache Analysis workspace . . . . . . . . Client Communications workspace . . . . . Container Object Pools workspace . . . . . Container Transactions workspace . . . . . Data sources workspace . . . . . . . . . DB Connection Pools workspace . . . . . . DCS Stacks workspace . . . . . . . . . Destinations workspace . . . . . . . . . Durable Subscriptions workspace. . . . . . EJB Containers workspace . . . . . . . . Enterprise Java Beans workspace . . . . . . Garbage Collections - Selected Allocation Failure workspace . . . . . . . . . . . . . Garbage Collection Analysis workspace . . . High Availability Manager workspace . . . . IMAP/POP workspace . . . . . . . . . J2C Connection Pools workspace . . . . . . 203 203 203 212 213 214 215 215 217 218 221 221 225 235 236 237 237 238 239 240 241 242 243 243 246 248 249 249 250 252 253 254 255 256 257 JMS Summary workspace . . . . . . . . JVM Stack Trend workspace . . . . . . . Log Analysis workspace . . . . . . . . . Lotus Workplace Server workspace . . . . . Messages Queues workspace . . . . . . . Messaging Engine Communications workspace Messaging Engines workspace. . . . . . . OS Stack workspace . . . . . . . . . . Pool Analysis workspace . . . . . . . . Portal Pages Summary workspace . . . . . Portal Summary workspace . . . . . . . Portlet Summary workspace . . . . . . . Request Analysis workspace . . . . . . . Request Baseline workspace . . . . . . . EJB Tier Analysis workspace . . . . . . . Application Configuration workspace . . . . Backend Tier Analysis workspace . . . . . Application Health History workspace . . . . Web Tier Analysis workspace . . . . . . . Selected Datasources - Datasource Trend workspace . . . . . . . . . . . . . Selected Request - Data sources workspace . . Selected Request - JMS Queues workspace . . Selected Request - Portal Processing workspace Selected Request - Resource Adapters workspace . . . . . . . . . . . . . Service Component Elements workspace . . . Service Components workspace . . . . . . Servlets/JSPs - Selected Enterprise Application workspace . . . . . . . . . . . . . Scheduler workspace . . . . . . . . . . Sessions workspace . . . . . . . . . . Thread Pools workspace. . . . . . . . . Thread Pool Trend workspace . . . . . . . Web Applications workspace . . . . . . . Web Services workspace. . . . . . . . . WebSphere Agent workspace . . . . . . . WebSphere Application Server workspace . . . WebSphere ESB Server workspace . . . . . WebSphere Portal Server workspace . . . . . WebSphere Process Server workspace . . . . WMQ Client Link Communications workspace WMQ Link Communications workspace . . . Workload Management workspace . . . . . Workplace Mail workspace . . . . . . . . Region workspaces in a z/OS environment . . ITCAM for Application Diagnostics- WebSphere Agent attributes . . . . . . . . . . . . Attribute groups used by the predefined workspaces . . . . . . . . . . . . . Alarm Manager attributes . . . . . . . . Allocation Failure attributes . . . . . . . Application Health Status attributes . . . . . Application Monitoring Configuration attributes Application Server Status attributes . . . . . Application Server attributes . . . . . . . Baseline attributes . . . . . . . . . . . Client Communications attributes . . . . . Container Object Pools attributes . . . . . . Container Transactions attributes . . . . . . Data sources attributes . . . . . . . . . 259 260 261 262 262 263 264 265 266 267 268 269 270 272 273 274 274 275 276 277 278 278 279 279 280 281 282 283 284 285 286 287 288 290 291 292 293 293 294 295 296 297 298 301 301 303 305 307 309 311 314 316 318 325 327 330 DB Connection Pools attributes . . . . . . DC Messages attributes . . . . . . . . . DCS Stack attributes . . . . . . . . . . Durable Subscriptions attributes . . . . . . Dynamic Cache attributes . . . . . . . . Dynamic Cache Templates attributes . . . . EJB Containers attributes . . . . . . . . Enterprise Java Beans attributes . . . . . . Garbage Collection Analysis attributes . . . . Garbage Collection Cycle attributes . . . . . High Availability Manager attributes . . . . J2C Connection Pools attributes . . . . . . JMS Summary attributes. . . . . . . . . Log Analysis attributes . . . . . . . . . Messaging Engine Communications attributes Messaging Engines attributes . . . . . . . Portal Page Summary attributes . . . . . . Portal Summary attributes . . . . . . . . Portlet Summary attributes . . . . . . . . Queue attributes . . . . . . . . . . . Remote Configuration Requests attributes . . . Request Analysis attributes . . . . . . . . Requests Monitoring Configuration attributes Request Times and Rates attributes . . . . . Selected Request attributes . . . . . . . . Servlet Sessions attributes . . . . . . . . Servlets JSPs attributes . . . . . . . . . Scheduler attributes . . . . . . . . . . Service Component Elements attributes. . . . Service Components attributes. . . . . . . Thread Pools attributes . . . . . . . . . Topic Spaces attributes . . . . . . . . . Web Applications attributes. . . . . . . . Web Services attributes . . . . . . . . . Web Services Gate Way attributes . . . . . WebSphere Agent Events attributes . . . . . WMQ Client Link Communications attributes WMQ Link Communications attributes . . . . Workload Management Client attributes . . . Workload Management Server attributes . . . Workplace Mail IMAP/POP attributes . . . . Workplace Mail Queues attributes . . . . . Workplace Mail Service attributes . . . . . ITCAM for Application Diagnostics - WebSphere Agent situations . . . . . . . . . . . . Predefined situations-descriptions and formulas (that run automatically) . . . . . . . . . Predefined situations descriptions and formulas (that run manually) . . . . . . . . . . ITCAM for Application Diagnostics - WebSphere Agent Take Action commands . . . . . . . . Add_XD_Cell: Add an XD Cell to a WebSphere agent . . . . . . . . . . . . . . . Enable_Auto_Threshold: set threshold parameters . . . . . . . . . . . . . Override_Auto_Threshold: override threshold values . . . . . . . . . . . . . . . Remove_WebSphere_SubNode: Remove an inactive WebSphere application server . . . . Set_Application_Monitoring: Set monitoring . . Contents 333 336 338 340 343 344 348 352 356 358 360 362 366 369 370 373 374 376 378 379 382 383 388 391 392 395 399 401 403 405 406 409 411 414 416 417 418 420 423 425 428 429 431 433 434 438 445 445 445 448 448 449 v Set_Completion_Thresholds: Set completion thresholds . . . . . . . . . . . . . Set_Request_Sampling_Rate: Set the sampling rate for request data . . . . . . . . . . Start_Baselining: start the baselining process . . Start_GC_Monitoring: Begin reporting garbage-collection data . . . . . . . . . Start_Request_Monitoring : Begin reporting request data . . . . . . . . . . . . . Start_Resource_Monitoring: Begin reporting PMI data . . . . . . . . . . . . . . . Start_WebSphere_Server: Start a WebSphere application server . . . . . . . . . . . Stop_Baselining: stop the baselining process . . Stop_GC_Monitoring: Stop reporting garbage-collection data . . . . . . . . . Stop_Request_Monitoring: Stop reporting request data . . . . . . . . . . . . . Stop_Resource_Monitoring: Stop reporting PMI data . . . . . . . . . . . . . . . Stop_WebSphere_Server: Stop a WebSphere application server . . . . . . . . . . . Update_Baseline: trigger a baseline update . . Threshold calculation detail . . . . . . . ITCAM for Application Diagnostics - WebSphere XD Overview . . . . . . . . . . . . . WebSphere XD Cell Monitoring Prerequisites Configure WebSphere XD Cell monitoring. . . ITCAM for Application Diagnostics WebSphere XD Cell workspaces . . . . . . ITCAM for Application Diagnostice WebSphere XD Cell Attributes. . . . . . . Compute Grid Attributes . . . . . . . . ITCAM for Application Diagnostics WebSphere XD Take Actions . . . . . . . ITCAM for Application Diagnostics - XD Agent situations . . . . . . . . . . . . . . 450 450 450 451 451 452 452 452 453 453 453 453 454 454 456 457 457 460 475 475 486 487 Chapter 5. ITCAM Agent for J2EE. . . 493 ITCAM for Application Diagnostics - Agent for J2EE workspaces . . . . . . . . . . . . Organization of the predefined workspaces . . Allocation Failures workspace . . . . . . . Application Health Summary workspace . . . Application Registry workspace . . . . . . BEA WebLogic Application Server workspace Data sources workspace . . . . . . . . . DB Connection Pools workspace . . . . . . DC Message Events workspace . . . . . . EJB Components workspace . . . . . . . Enterprise Java Beans workspace . . . . . . EJB Modules workspace . . . . . . . . . EJBs - Selected Enterprise Application workspace . . . . . . . . . . . . . Garbage Collection Analysis workspace . . . Garbage Collections - Selected Allocation Failure workspace . . . . . . . . . . . . . J2EE Agent workspace . . . . . . . . . J2SE Application workspace . . . . . . . JBoss App Server workspace . . . . . . . JCA Connection Pools workspace. . . . . . vi ITCAM for Application Diagnostics: User Guide 495 495 500 501 502 503 503 504 505 506 507 508 509 509 510 510 511 512 513 JDBC Connection Pools workspace . . . . . JMS Sessions workspace . . . . . . . . . JMS Summary workspace . . . . . . . . JTA Resources workspace . . . . . . . . JTA Summary workspace . . . . . . . . JVM Statistics workspace . . . . . . . . Log Analysis workspace . . . . . . . . . Oracle App Server workspace . . . . . . . Request Analysis workspace . . . . . . . Selected Request - Baseline workspace . . . . Selected Application - Application Tier Analysis workspace . . . . . . . . . . . . . Selected Application - Configuration workspace Selected Application - Backend Tier Analysis workspace . . . . . . . . . . . . . Selected Application - Health History workspace Selected Application - Client Tier Analysis workspace . . . . . . . . . . . . . Selected Request - Data sources workspace . . Selected Request - JMS Queues workspace . . Selected Request - Resource Adapters workspace . . . . . . . . . . . . . SAP NetWeaver Server workspace . . . . . Servlets/JSPs - Selected Enterprise Application workspace . . . . . . . . . . . . . Servlets/JSPs - Selected Web Application workspace . . . . . . . . . . . . . Tomcat Server workspace . . . . . . . . Web Applications workspace . . . . . . . Web Container workspace . . . . . . . . WebSphere App Server CE workspace . . . . ITCAM for Application Diagnostics - Agent for J2EE attributes . . . . . . . . . . . . . Attribute groups used by the predefined workspaces . . . . . . . . . . . . . Allocation Failure - J2EE attributes . . . . . Application Health Status attributes . . . . . Application Monitoring Configuration attributes Application Server Status - J2EE attributes. . . Application Server - J2EE attributes . . . . . Baseline attributes . . . . . . . . . . . Data sources - J2EE attributes . . . . . . . DB Connection Pools - NetWeaver attributes DC Messages - J2EE attributes. . . . . . . Enterprise Java Bean Components - WebLogic attributes . . . . . . . . . . . . . . Enterprise Java Bean Modules - J2EE attributes Enterprise Java Bean Service - NetWeaver attributes . . . . . . . . . . . . . . Enterprise Java Beans - WebLogic attributes . . Garbage Collection Analysis - J2EE attributes Garbage Collection Cycle - J2EE attributes. . . J2EE Agent Events attributes . . . . . . . J2EE Connector Connection Pools - WebLogic attributes . . . . . . . . . . . . . . JCA Connection Pools - J2EE attributes . . . . JDBC Connection Pools - WebLogic attributes JDK - Operation System attributes . . . . . JDK - Memory attributes . . . . . . . . JDK - JVM attributes . . . . . . . . . . JDK - Threading attributes . . . . . . . . 514 515 515 516 517 517 518 519 519 520 521 522 522 523 524 525 525 526 526 527 528 528 529 530 531 531 532 533 535 537 540 541 543 545 547 548 550 551 553 555 557 559 562 563 565 566 568 570 571 573 JMS Sessions - WebLogic attributes . . . . . JMS Summary - J2EE attributes . . . . . . Java Transaction Service - WebLogic attributes JTA Resources - J2EE attributes . . . . . . JTA Summary - NetWeaver attributes . . . . Log Analysis - J2EE attributes . . . . . . . Request Analysis - J2EE attributes . . . . . Requests Monitoring Configuration attributes Request Times and Rates - J2EE attributes . . . Selected Request - J2EE attributes . . . . . Servlets JSPs - J2EE attributes . . . . . . . Servlets and JSPs - WebLogic attributes. . . . Web Container - NetWeaver attributes . . . . Web Applications - J2EE attributes . . . . . Web Applications - WebLogic attributes . . . ITCAM for Application Diagnostics - Agent for J2EE situations . . . . . . . . . . . . . ITCAM for Application Diagnostics - Agent for J2EE Take Action commands . . . . . . . . Enable_Auto_Threshold: set threshold parameters . . . . . . . . . . . . . Override_Auto_Threshold: override threshold values . . . . . . . . . . . . . . . Recycle_Application_Server: Recycle a J2EE application . . . . . . . . . . . . . Remove_J2EE_Application: Remove a J2EE Application . . . . . . . . . . . . . Remove_J2EE_SubNode: Remove an inactive J2EE application server . . . . . . . . . Set_Application_Monitoring: Set monitoring . . Set_Completion_Thresholds: Set completion thresholds . . . . . . . . . . . . . Set_Request_Sampling_Rate: Set the sampling rate for request data . . . . . . . . . . Start_Application_Server: Start a J2EE application server . . . . . . . . . . . Start_Baselining: start the baselining process . . Start_GC_Monitoring: Begin reporting garbage-collection data . . . . . . . . . Start_Request_Monitoring : Begin reporting request data . . . . . . . . . . . . . Start_Resource_Monitoring: Begin reporting PMI data . . . . . . . . . . . . . . . Stop_Application_Server: Stop a J2EE application server . . . . . . . . . . . Stop_Baselining: stop the baselining process . . Stop_GC_Monitoring: Stop reporting garbage-collection data . . . . . . . . . Stop_Request_Monitoring: Stop reporting request data . . . . . . . . . . . . . 574 576 578 581 582 583 585 590 592 594 596 598 599 601 602 603 607 607 609 610 610 611 611 612 612 612 613 614 614 614 614 615 615 Stop_Resource_Monitoring: Stop reporting PMI data . . . . . . . . . . . . . . . 615 Update_Baseline: trigger a baseline update . . 615 Threshold calculation detail . . . . . . . 616 Chapter 6. ITCAM Agent for HTTP Servers . . . . . . . . . . . . . . 619 ITCAM for Application Diagnostics - Web Servers Agent workspaces . . . . . . . . . . . Organization of the predefined workspaces . Apache Web Server workspace . . . . . Apache Web Sites workspace . . . . . . ASP Overview workspace . . . . . . . IIS Web Sites workspace . . . . . . . . Microsoft IIS Web Server workspace . . . . Sun Java System Web Server workspace . . Sun Web Sites workspace . . . . . . . Web Server Agent workspace . . . . . . ITCAM for Application Diagnostics - Agent for HTTP Servers attributes . . . . . . . . . Attribute groups used by the predefined workspaces . . . . . . . . . . . . Apache Web Server attributes . . . . . . Apache Web Sites attributes . . . . . . IIS Web Server attributes . . . . . . . IIS Web Sites attributes . . . . . . . . Sun Web Server attributes . . . . . . . Sun Web Sites attributes . . . . . . . . HTTP Servers Agent Events attributes . . . Web Servers Status attributes . . . . . . ITCAM for Application Diagnostics - Agent for HTTP Servers situations . . . . . . . . . ITCAM for Application Diagnostics - Agent for HTTP Servers Take Action commands . . . . . . . . . . . . . . 619 620 620 621 622 622 623 624 625 625 . 626 . . . . . . . . . 626 627 628 630 633 636 639 642 643 . 644 . 651 Part 3. Appendixes . . . . . . . . 657 Appendix. Appendix A. WebSphere PMI Attribute Mapping . . . . . . . 659 Index . . . . . . . . . . . . . . . 675 Trademarks . . . . . . . . . . . . 679 Notices . . . . . . . . . . . . . . 681 615 Contents vii viii ITCAM for Application Diagnostics: User Guide About this guide This book provides a user guide for ITCAM for Application Diagnostics 7.1. Who should read this guide This user guide is intended for end users of ITCAM for Application Diagnostics. Publications This section lists publications in the ITCAM for Application Diagnostics library and related documents. ITCAM for Application Diagnostics library The following publications are included in the ITCAM for Application Diagnostics library, available at ITCAM for Application Diagnostics Information Center: v IBM Tivoli Composite Application Manager for Application Diagnostics: Prerequisites Provides the hardware and software requirements for installing ITCAM for Application Diagnostics components. v IBM Tivoli Composite Application Manager for Application Diagnostics: User's Guide Provides the user overview, user scenarios, and Helps for every ITCAM for Application Diagnostics component. v IBM Tivoli Composite Application Manager for Application Diagnostics: Planning an Installation Provides the user with a first reference point for a new ITCAM for Application Diagnostics installation or upgrade. v ITCAM Agent for WebSphere® Applications Installation and Configuration Guides: – IBM Tivoli Composite Application Manager: Agent for WebSphere Applications Installation and Configuration Guide – IBM Tivoli Composite Application Manager: Agent for WebSphere Applications Installation and Configuration Guide for z/OS – IBM Tivoli Composite Application Manager: Agent for WebSphere Applications Data Collector Installation and Configuration Guide for IBM i Provide installation instructions for setting up and configuring ITCAM Agent for WebSphere Applications on distributed, z/OS®, and IBM® i systems. v ITCAM Agent for J2EE Applications Installation and Configuration Guides: – IBM Tivoli Composite Application Manager: Agent for J2EE Data Collector Installation and Configuration Guide – IBM Tivoli Composite Application Manager: Agent for J2EE Monitoring Agent Installation and Configuration Guide Provide installation instructions for setting up and configuring ITCAM Agent for J2EE. v IBM Tivoli Composite Application Manager: Agent for HTTP Servers Installation and Configuration Guide Provides installation instructions for setting up and configuring ITCAM Agent for HTTP Servers. © Copyright IBM Corp. 2006, 2009 ix v IBM Tivoli Composite Application Manager for Application Diagnostics Managing Server Installation Guide Provides installation instructions for setting up and configuring ITCAM for Application Diagnostics Managing Server. v IBM Tivoli® Composite Application Manager for Application Diagnostics: Troubleshooting Guide Provides instructions on problem determination and troubleshooting for ITCAM for Application Diagnostics. v IBM Tivoli Composite Application Manager for Application Diagnostics: Messaging Guide Provides information about system messages received when installing and using ITCAM for Application Diagnostics. Accessing publications online The documentation CD contains the publications that are in the product library. The format of the publications is PDF, HTML, or both. IBM posts publications for this and all other Tivoli products, as they become available and whenever they are updated, to the Tivoli software information center Web site. Access the Tivoli software information center by viewing the Tivoli software library at the following Web address: http://www.ibm.com/software/tivoli/library/ Note: If you print PDF documents on other than letter-sized paper, set the option in the File > Print window that enables Adobe® Reader to print letter-sized pages on your local paper. The IBM Software Support Web site provides the latest information about known product limitations and workarounds in the form of technotes for your product. You can view this information at the following Web site: http://www.ibm.com/software/support Ordering publications You can order many Tivoli publications online at the following Web site: http://www.elink.ibmlink.ibm.com/public/applications/ publications/cgibin/ pbi.cgi You can also order by telephone by calling one of these numbers: v In the United States: 800-879-2755 v In Canada: 800-426-4968 In other countries, contact your software account representative to order Tivoli publications. To locate the telephone number of your local representative, perform the following steps: 1. Go to the following Web site: http://www.elink.ibmlink.ibm.com/public/applications/publications/cgibin/ pbi.cgi 2. Select your country from the list and click Go. x ITCAM for Application Diagnostics: User Guide 3. Click About this site in the main panel to see an information page that includes the telephone number of your local representative. Accessibility Accessibility features help users with a physical disability, such as restricted mobility or limited vision, to use software products successfully. With this product, you can use assistive technologies to hear and navigate the interface. You can also use the keyboard instead of the mouse to operate most features of the graphical user interface. Tivoli technical training For Tivoli technical training information, refer to the following IBM Tivoli Education Web site: http://www.ibm.com/software/tivoli/education/ Supporting information If you have a problem with your IBM software, you want to resolve it quickly. IBM provides the following ways for you to obtain the support you need: v Searching knowledge bases: You can search across a large collection of known problems and workarounds, Technotes, and other information. v Obtaining fixes: You can locate the latest fixes that are already available for your product. v Contacting IBM Software Support: If you still cannot solve your problem, and you need to work with someone from IBM, you can use a variety of ways to contact IBM Software Support. Conventions used in this guide This guide uses several conventions for special terms and actions, and operating-system-dependent commands and paths. Typeface conventions This guide uses the following typeface conventions: Bold v Lowercase commands and mixed case commands that are otherwise difficult to distinguish from surrounding text v Interface controls (check boxes, push buttons, radio buttons, spin buttons, fields, folders, icons, list boxes, items inside list boxes, multicolumn lists, containers, menu choices, menu names, tabs, property sheets), labels (such as Tip, and Operating system considerations) v Keywords and parameters in text Italic v Words defined in text v Emphasis of words (for example, "Use the word that to introduce a restrictive clause.") v New terms in text (except in a definition list) v Variables and values you must provide About this guide xi Monospace v Code and other examples v File names, programming keywords, and other elements that are difficult to distinguish from surrounding text v Message text and prompts addressed to the user v Text that the user must type v Values for arguments or command options Operating-system-dependent variables and paths The publications in this library use the UNIX® convention for specifying environment variables and for directory notation. When using the Windows® command line, replace $variable with %variable% for environment variables and replace each forward slash (/) with a backslash (\) in directory paths. The names of environment variables are not always the same in Windows and UNIX. For example, %TEMP% in Windows is equivalent to $tmp in UNIX. Note: If you are using the bash shell on a Windows system, you can use the UNIX conventions. Tivoli command syntax The following special characters define Tivoli command syntax: [] Identifies elements that are optional. Required elements do not have brackets around them. ... Indicates that you can specify multiple values for the previous element. Separate multiple values by a space, unless otherwise directed by command information. If the ellipsis for an element follows a closing bracket, use the syntax within the brackets to specify multiple values. For example, to specify two administrators for the option [–a admin]..., use –a admin1 –a admin2. If the ellipsis for an element is within the brackets, use the syntax of the last element to specify multiple values. For example, to specify two hosts for the option [–h host...], use –h host1 host2. | Indicates mutually exclusive information. You can use the element on either the left or right of the vertical bar. {} Delimits a set of mutually exclusive elements when a command requires one of them. Brackets ([ ]) are around elements that are optional. In addition to the special characters, Tivoli command syntax uses the typeface conventions described in “Typeface conventions” on page xi. The following examples illustrate the typeface conventions used in Tivoli command syntax: v wcrtpr [–a admin]... [–s region] [–m resource]... name The name argument is the only required element for the wcrtpr command. The brackets around the options indicate they are optional. The ellipses after the –a admin resource option means that you can specify multiple administrators multiple times. The ellipses after the –m resource option means that you can specify multiple resources multiple times. v wchkdb [–o outfile] [–u] [–x] {–f infile | –i | object...} xii ITCAM for Application Diagnostics: User Guide The –f, –i, and object elements are mutually exclusive. Braces that surround elements indicate that you are including a required element. If you specify the object argument, you can specify more than one object. About this guide xiii xiv ITCAM for Application Diagnostics: User Guide Part 1. Part 1: Introduction to ITCAM for Application Diagnostics © Copyright IBM Corp. 2006, 2009 1 2 ITCAM for Application Diagnostics: User Guide Chapter 1. Overview of ITCAM for Application Diagnostics IBM Tivoli Composite Application Manager (ITCAM) for Application Diagnostics is a monitoring, diagnostics, and management technology for WebSphere, J2EE, and HTTP servers in a distributed environment. ITCAM for Application Diagnostics also provides enhanced support for monitoring Virtual Enterprise and Compute Grid products from the WebSphere XD (Extended Deployment) suite. ITCAM for Application Diagnostics helps to maintain and improve the availability and performance of on-demand applications in your environment. It helps you to quickly locate in real time, the source of bottlenecks in application code, server resources, and external system dependencies. ITCAM for Application Diagnostics can monitor application servers and HTTP servers at different levels. Monitoring applications incurs an unavoidable cost in terms of processing time. To minimize this cost, there are multiple monitoring levels available. A minimum amount of information is collected during standard operations. As problems are encountered, the level of information that is collected can be gradually increased until the problem is located and solved. ITCAM for Application Diagnostics functionality ITCAM for Application Diagnostics can perform monitoring, diagnostics, and management functions for WebSphere, J2EE, and HTTP servers. Monitoring ITCAM for Application Diagnostics can monitor the following WebSphere, J2EE, and HTTP servers: v WebSphere servers – WebSphere Application Server (Network Deployment) – WebSphere Application Server (Extended Deployment) – WebSphere Process Server – WebSphere Portal Server – WebSphere ESB Server v J2EE servers – – – – – – – SAP Net Weaver Oracle Application Server JBoss Application Server Apache Tomcat BEA WebLogic Server WebSphere Application Server CE J2SE – WebLogic Portal Server – Sun Java™ System Application Server Enterprise Edition v HTTP servers – Apache Web Server – IIS Web Server – IBM HTTP Server © Copyright IBM Corp. 2006, 2009 3 – Sun Java System Web Server Diagnosing Use ITCAM for Application Diagnostics to diagnose the following problems in your On-Demand application environment: v Hanging requests v Lock contention problems v Malfunctioning applications in a server farm v Memory problems relating to garbage collection and JVM heap size Managing Use ITCAM for Application Diagnostics to perform the following management functions in your On-Demand application environment: v Start and stop monitored servers v Manage servers using groups v Configure Data Collectors v Use roles to restrict access to features v Use server groups to grant access to servers v Adjust the monitoring level at specific times based on the current work load of the server ITCAM for Application Diagnostics user interfaces ITCAM for Application Diagnostics functions can broadly be divided into two areas: monitoring and diagnostics. Each of these functions uses different combinations of components. Each function also uses a different user interface. The two user interfaces are the Tivoli Enterprise Portal and the Managing Server Visualization Engine (MSVE). The Tivoli Enterprise Portal user interface The Tivoli Enterprise Portal is part of the IBM Tivoli Monitoring architecture. The Tivoli Enterprise Portal is the user interface into your ITCAM for Application Diagnostics environment site and possibly other IBM Tivoli enterprise applications if they are installed in your environment. For further information about the Tivoli Monitoring architecture, see “Components used by the Tivoli Enterprise Portal user interface” on page 5. Using the Tivoli Enterprise Portal interface, you can easily monitor the health and availability of production applications and application servers, and you can quickly identify and isolate availability and response time problems. The Tivoli Enterprise Portal provides monitoring information, such as memory usage, response time, pool analysis, and data source analysis. The Tivoli Enterprise Portal enables you to drill down from server level metrics to specific application and resource level metrics. MSVE user interface The MSVE user interface provides users with management and monitoring functions for application servers. In addition, the MSVE also provides a diagnostic function. Here are some of the diagnostic activities you can perform in MSVE: 4 ITCAM for Application Diagnostics: User Guide v v v v Detect transactions failing Detect memory leaks Examine detailed method traces, which help to detect application code hotspots Generate reports to analyze historical information, such as application performance and OS performance Components used by the Tivoli Enterprise Portal user interface A number of components work together to collect, analyze, and display monitoring data in the Tivoli Enterprise Portal. These components are: 1. The Agents 2. IBM Tivoli Monitoring components The Agents There are separate agents for WebSphere, J2EE, and HTTP Servers. The agents consist of the following components: v Tivoli Enterprise Monitoring Agent (referred to as the Monitoring agent) v Data Collector Note: The exception is the HTTP Servers agent. The HTTP Servers agent does not contain a Data Collector. Only the WebSphere and J2EE Agents contain Data Collectors. The Monitoring Agent: The Monitoring Agent is a component of the IBM Tivoli Monitoring architecture. The purpose of the Monitoring Agent is to route information to the Tivoli Enterprise Monitoring Server (monitoring server) where the information is processed and presented in the Tivoli Enterprise Portal. The Data Collector: The purpose of the Data Collector is to collect and route data to the Monitoring Agent. It is not intended to analyze or interpret data. On each WebSphere and J2EE server you are monitoring, an agent is installed, so there is a Monitoring Agent and a Data Collector running on each server you are monitoring. For example, if you are monitoring a Tomcat server, a J2EE Agent is installed on this server. If you are monitoring a WebSphere Portal server, a WebSphere Agent is installed. The WebSphere Agent The WebSphere Agent consists of a Monitoring Agent and a Data Collector. The WebSphere Monitoring Agent works with the WebSphere Data Collector. The WebSphere Data Collector collects monitoring data from WebSphere servers and communicates the data to the Monitoring Agent. The WebSphere Agent collect data from four primary sources: v Response time data for application service requests from the Data Collector v Resource data from the WebSphere Performance Monitoring Infrastructure (PMI) v WebSphere Application Server log messages v Garbage-collector activity that is recorded in the JVM verbose GC trace v Process data from the operating system Chapter 1. Overview of ITCAM for Application Diagnostics 5 The J2EE Agent The J2EE Agent is composed of a Monitoring Agent and a Data Collector. The J2EE Agent works with the J2EE Data Collector to collect performance data from J2EE application servers. The J2EE Data Collector collects monitoring data from J2EE servers and communicates the data to the Monitoring Agent. The J2EE Agent collects data from three primary sources: v Response time data for application service requests from the data collector v J2EE application server log messages v Garbage collection activity that is recorded in the JVM verbose GC trace The HTTP Agent The HTTP Agent is composed of a Monitoring Agent only. The Monitoring Agent can monitor the following HTTP servers: v IIS Web Servers v Apache Web Servers v IBM HTTP Web Servers v Sun Web Servers The HTTP Monitoring Agent has three components that are used to collect monitoring data from Web servers. There is an Apache, an IIS, and a Sun Web servers component. The HTTP Agent collects performance data about the Web servers and Web sites in the following ways: Apache Server and HTTP Server: The agent modifies the Apache server and IBM HTTP server configuration files to include the monitoring module. The monitoring module is loaded dynamically during Web server start up. The module receives all HTTP requests and report data to the HTTP Agent. In addition, the HTTP Agent parses static information from the configuration file. IIS Web Server: The HTTP Agent collects monitoring data from IIS Servers in the following two ways: v For static information about server configuration, the agent issues queries to the Admin Base Object (ABO) interface which provides access to the IIS metabase. v For dynamic information about server availability and performance metrics, the agent issues queries to the Microsoft Windows Management Instrumentation (WMI) interface. Sun Web Server: The HTTP Agent collects monitoring data from Sun Web Servers by polling the SNMP service for Web server-related statistics. It also parses Web server configuration files to get information that is not provided by the SNMP service. IBM Tivoli Monitoring components IBM Tivoli Monitoring monitors the performance and availability of distributed operating systems and applications. IBM Tivoli Monitoring products are based on a set of common service components. These service components provide security, data transfer and storage, notification mechanisms, user interface presentation, and communication services in an agent-server-client architecture. Some of these service 6 ITCAM for Application Diagnostics: User Guide components are shared by other products, including IBM Tivoli OMEGAMON® XE mainframe monitoring products, ITCAM for Application Diagnostics, and ITCAM for Applications. The service components ITCAM for Application Diagnostics and IBM Tivoli Monitoring share are: v v v v Tivoli Tivoli Tivoli Tivoli Enterprise Enterprise Enterprise Enterprise Monitoring Server (referred to as the Monitoring Server) Portal Server (referred to as the Portal Server) Portal Monitoring Agent (referred to as the Monitoring Agent) ITCAM for Application Diagnostics uses the service components of IBM Tivoli Monitoring. The ITCAM for Application Diagnostic Monitoring Agents integrate with components in the IBM Tivoli Monitoring environment by retrieving data from the Monitoring Agents and forwarding it to the Portal Server where it is displayed in the Tivoli Enterprise Portal. Here is some further information regarding the shared service components and how they integrate with ITCAM for Application Diagnostics: Tivoli Enterprise Monitoring Server: The Monitoring Server performs the following functions: v Acts as a collection and control point for alerts that are received from the Monitoring Agents. v Tracks the heartbeat request interval for all Monitoring Agents connected to it. v Stores, initiates, and tracks all situations and policies, and is the central repository for storing all active conditions on every Monitoring Agent. v Initiates and tracks all generated actions that invoke a script or program on the Monitoring Agent. Tivoli Enterprise Portal Server: The Portal Server performs the following functions: v Acts as a repository for all graphical presentations of monitoring data. v Provides the core presentation layer, which allows for the retrieval, manipulation, analysis, and reformatting of data. v Manages data access through user workspace consoles. Tivoli Enterprise Portal: The Tivoli Enterprise Portal is a Java-based user interface that connects to the Monitoring Server and displays monitoring data. The Tivoli Enterprise Portal can be launched from an Internet Explorer browser, or can be installed as a client application on a workstation. The Tivoli Enterprise Portal is one of the user interfaces for ITCAM for Application Diagnostics, the other user interface is the MSVE. Tivoli Enterprise Monitoring Agent: The Monitoring Agents are responsible for data gathering. The Monitoring Agents communicate monitoring data to the Monitoring Server and the managing server. In ITCAM for Application Diagnostics, the WebSphere, J2EE, and HTTP agents contain Monitoring Agents. The following diagram displays the component used by the Tivoli Enterprise Monitor: Chapter 1. Overview of ITCAM for Application Diagnostics 7 For more information about the ITCAM for Application Diagnostics agents, see “The Agents” on page 5. For more information about the IBM Tivoli Monitoring, see ITM Information Center Components used by the MSVE user interface A number of components work together to collect, analyze, and present the monitoring data in the MSVE. These components are: v Managing Server v Data Collector The Managing Server is the central component of ITCAM for Application Diagnostics. For every implementation of ITCAM for Application Diagnostics, there is one Managing Server. The Managing Server is a powerful technology that provides deep dive functions. The user interface for the Managing Server is the MSVE. The Managing Server works with Data Collectors, for each server being monitored there is one Data Collector installed. The Data Collector collects performance data from the application servers and HTTP servers and forwards this information to the Managing Server. ITCAM for Application Diagnostics Managing Server provides deep dive diagnosis capabilities. The Managing Server provides the following functions: 8 ITCAM for Application Diagnostics: User Guide Table 1. Managing Server Functionality Area What you can do Server and Account management v Manage servers using groups v Configure Data Collectors v MOD management v Use roles to restrict access to features Systems Overview v Display the availability of application servers v Provide comparisons between current response times and baseline response times v Provide application server-level statistics for quick assessment of server activity and related platform data v Provide system resources Server Activity v Use In-Flight Request Search and Server Activity Display – Active Requests to locate malfunctioning applications v View transactions in progress v Evaluate the current performance of your applications v Spot hanging transactions v Troubleshoot and fix hanging transactions v Solve lock contention problems v Access JVM thread data v Use memory diagnostic tools to allocate memory problems inside applications Recent Activity v Investigate and fix potential memory problems relating to garbage collection and the JVM heap size v Tune the JVM parameters v Find evidence of memory leaks Performance Analysis and Reporting v Generate reports Problem Center v View high priority trap alerts and Tivoli Enterprise Portal events v Analyze historical data v Use historic data to analyze performance problems found in traps and Tivoli Enterprise Portal situation events Composite Transactions v Monitor transactions and analyze the method flow using method trace, stack trace, and request information Monitoring on Demand v Create a schedule that alters the monitoring level based on a date and time when a server needs more detailed monitoring v Adjust the monitoring level at specific times based on the current work load of the server v Override the monitoring level or change the schedule for a selected server Managing Server components The Managing Server is J2EE application that is configured within WebSphere Application Server. The Managing Server works with a DB2® or Oracle database. It is designed for scalability and load balancing, and there are many ways to implement an installation across one or more servers. The Managing Server consists of the following components: Chapter 1. Overview of ITCAM for Application Diagnostics 9 Kernel: The kernel controls the Managing Server. The kernel registers components as they join the Managing Server, it periodically renews connections and registrations with components and Data Collectors and collects server and component availability information. Publish Server: The publish server receives data from the Data Collector and aggregates it based on different needs. Archive Agent: The archive agent collects data from the publish server and archives it into the database for reporting. Message Dispatcher: The message dispatcher sends out e-mails of performance reports and trap actions from the Performance Analysis and Reporting and the Trap and Alert Management features. Global Publish Server (GPS): The global publish server tracks composite requests, as they move from one server to another. The following diagram displays the component used by the MSVE: Tivoli Enterprise Portal interoperation with MSVE The Tivoli Enterprise Portal and MSVE interoperate in a number of ways. When monitoring and troubleshooting your application environment, you can move easily between the Tivoli Enterprise Portal and MSVE as you can use links in the Tivoli Enterprise Portal workspaces to launch in context into MSVE. In the MSVE more detailed information is provided about individual transactions as they occur this assists you in diagnosing problems. The Tivoli Enterprise Portal provides monitoring information, so in the Tivoli Enterprise Portal you are alerted that a problem occurred with a server, an application, or a resource. If you need to analyze problems in greater detail, you can link in context to MSVE. 10 ITCAM for Application Diagnostics: User Guide Another way in which the Tivoli Enterprise Portal and the MSVE interoperate is through situations in the Tivoli Enterprise Portal and alerts in the MSVE. When a situation is triggered in the Tivoli Enterprise Portal, this is displayed as an alert in the MSVE. Alerts and Events page. All situations can be escalated to problems and then can be evaluated in the Problem Center. For further information about configuring Single Sign on between Tivoli Enterprise Portal and MSVE, see the ITCAM for Application Diagnostics: Installation and Configuration Guide. What's new in the 7.1 release? A number of components work together to collect, analyze, and present monitoring data in the Tivoli Enterprise Portal. These components are: 1. Ability to monitor WebSphere XD environment 2. Ability to launch in context from Tivoli Enterprise Portal workspaces into MSVE, this enables users to examine individual transactions in more detail 3. Rephrased data table names in Server Activity Display in MSVE makes them more clear to users 4. Improved MSVE menus to indicate if data is real-time data or historic data 5. In MSVE, ability to link from active requests to the Stack Trace page 6. New predefined situations in the Tivoli Enterprise Portal 7. Improved Summary Workspaces functionality in the Tivoli Enterprise Portal to guide Getting Started with ITCAM for Application Diagnostics Depending on your requirements, when you use ITCAM for Application Diagnostics, you use either the MSVE or the Tivoli Enterprise Portal user interfaces or a combination of both. For further information about using and navigating the Tivoli Enterprise Portal and the MSVE, see the ITCAM for Application Diagnostics: User Guide. For further information about installing ITCAM for Application Diagnostics, see the following publications: ITCAM for Application Diagnostics: WebSphere Monitoring Agent Installation and Configuration Guide ITCAM for Application Diagnostics: J2EE Monitoring Agent Installation and Configuration Guide ITCAM for Application Diagnostics: J2EE Data Collector Installation and Configuration Guide ITCAM for Application Diagnostics: HTTP Monitoring Agent Installation and Configuration Guide ITCAM for Application Diagnostics: Managing Server Installation and Configuration Guide Chapter 1. Overview of ITCAM for Application Diagnostics 11 12 ITCAM for Application Diagnostics: User Guide Chapter 2. Scenarios This following scenarios describe some usage scenarios using the Tivoli Enterprise Portal and the Managing Server Visualization Engine in ITCAM for Application Diagnostics to monitor and diagnose problems in your application environment. These usage scenarios refer to the following fictitious personas that might reflect typical positions in your organization: Table 2. Personas Persona Description Annette – Level 2 Operator Her primary focus is to find which component is down, which components are impacted, and the location of the problem. In addition, she follows procedures to correct the problem. If she cannot fix the problem within a specified time limit that her service level agreement (SLA) stipulates, she produces a trouble ticket and escalates the problem. Jim – Middleware/Application Support Subject Matter Expert (SME) His primary focus is to ensure that the middleware applications he is responsible for is up and running at all times. If an application should go down, then a line of business is affected and has a direct impact on how his team is rated against their SLA. He also works with the systems monitoring and automation group to define the appropriate monitors and thresholds for his domain area of responsibility. Dave – Application Developer His primary focus is to develop in-house applications. When a problem comes up in a production application he is sent trace files so he can analyze the problem, which he then tries to simulate in his environment. Simon - Operating System Specialist His primary focus is to work with the systems management team to define what are the base OS services/daemons, ports, file systems, and logs that must be monitored on every computer. Simon is also a recognized expert in cluster configurations. Scenario 1: Diagnosing a memory leak Users are reporting slow response times for an application. A user contacts the help desk and raises a ticket for slow response time in relation to an application. Annette, the level 2 operator, picks up the ticket. 1. Annette navigates to the Tivoli Enterprise Portal and notices that the Resources icon is displaying a Critical symbol. On the Resources icon flyover, the GC Active Time (ms) metric is displaying a high value and also the WASHighGCTimePercent situation has triggered. This indicates that the JVM garbage collection is taking too long. © Copyright IBM Corp. 2006, 2009 13 2. In the Garbage Collection Analysis workspace, Annette observes, the Percentage of Time Garbage Collector Running - History view displays an increasing trend, which suggests that the heap is insufficient for the demand that applications are putting on it. The Running - History graph, which displays the percentage of real time that the garbage collector was running during the current interval for each server region, is showing an increasing trend. This suggests that either the heap size is insufficient for the demand that applications are putting on it or else there is a memory leak. 3. Annette uses an external ticketing tool to route the ticket to Jim, the Middleware/Application SME, for further observance and investigation. 4. Jim notices a problem ticket from Annette involving excessive garbage collection times. Jim navigates to the Garbage Collection Analysis workspace and confirms the problem. He requires more detailed information to diagnose the cause of the problem. He clicks the Diagnostic Memory Leak link in the Garbage Collection Analysis workspace. This opens the Memory Leak Confirmation report page in Managing Server Visualization Engine (MSVE). 14 ITCAM for Application Diagnostics: User Guide 5. From examining the Memory Leak Confirmation report page in MSVE, Jim suspects that there is a memory leak. 6. To fully determine if there is a memory leak, he sets the monitoring level to L3 and enables memory leak BCI by doing the following steps: v Edits the file: $DC_HOME/runtime//custom/toolkit_custom.properties file and sets the property com.ibm.tivoli.itcam.toolkit.ai.enablememoryleakdiagnosis=true. v Uncomments this line to enable Memory Leak Diagnosis: am.camtoolkit.gpe.customxml.leak=/opt/IBM/itcam/WebSphere/DC/itcamdc/ etc/memory_leak_diagnosis.xml v Restarts the Data Collector. Jim forwards the problem to Dave, the Application Developer. Dave works to resolve the problem. This action is outside the scope of ITCAM for Application Diagnostics. Scenario 2: Diagnosing hanging transactions Annette, the level 2 operator, receives an e-mail indicating that a situation triggered in the Tivoli Enterprise Portal. The situation is indicating that response time is slow for an application. 1. In the Tivoli Enterprise Portal, Annette points to the application icon and sees in the flyover that the WASHighResponseTime situation triggered. Chapter 2. Scenarios 15 2. Annette double-clicks the application icon and the Application Trend is displayed. In this workspace, the Application Summary report displays information about response time, error rate, and request rate. Annette double-clicks the Request Analysis workspace, which displays information about worst average request response time and worst average request completion rate. Annette observes that the average request response time is high and that the average request completion rate is low (for some of the requests). 3. For a more detailed analysis of requests, Annette navigates to the Request Analysis workspace. The response times for some requests are displaying as high. 16 ITCAM for Application Diagnostics: User Guide 4. Annette uses an external ticketing tool to route the ticket to Jim, the Middleware/Application Support SME, for further observance and investigation. 5. Jim notices a problem ticket from Annette indicating slow response times. Jim navigates to the Request Analysis workspace in the Tivoli Enterprise Portal and confirms the slow request response time for the application. 6. To see individual hanging transactions, Jim needs to open MSVE. He clicks the Diagnostic In-Flight Request Search link, which displays the In-flight Request Search page in the MSVE. 7. From here, Jim can diagnose hanging requests and see the stack trace for that request by clicking the server activity display. Chapter 2. Scenarios 17 8. Jim then forwards details to Dave, the Application Developer. Dave works to resolve the problem. This action is outside the scope of ITCAM for Application Diagnostics. 18 ITCAM for Application Diagnostics: User Guide Scenario 3: Diagnosing a WebSphere server shutdown Annette, the level 2 operator, receives a severity 1 ticket indicating that users cannot access an application. 1. Annette navigates to the Tivoli Enterprise Portal where (in the WebSphere Agent Summary Status workspace) the Applications icon is displaying a critical symbol. The flyover on the Application icon shows that a WasNotConnected situation triggered. The application server summary also shows the server status as “Disconnected”. 2. Annette navigates to the Log Analysis workspace. This workspace reports application server errors and exception conditions that are recorded in the SystemOut.log WebSphere Application Server log file. The information in this workspace includes the exception severity of errors, and the ID and text of the associated message. 3. Annette observes that in the Log Analysis report, the Process ID value is displayed as -1. This value indicates that the Data Collector is disconnected. If a WebSphere server shutdown occurs, the connection between the data collector and Tivoli Enterprise Monitoring Agent is closed. However, the data collector continues to write to log files and Tivoli Enterprise Monitoring Agent processes these records but sets the PID value to -1. Chapter 2. Scenarios 19 4. Annette uses an external ticketing team to forward the ticket to Jim the Middleware/Application Support SME. Jim investigates the cause of the WebSphere server shutdown and initiates a restart of the WebSphere Application Server. Scenario 4: Determining if the WebSphere cluster needs to be load balanced Annette, the level 2 operator, is getting a number of tickets relating to slow response time for an application. Annette receives an e-mail indicating that the WASHighCPUPercentUsed situation triggered on the WebSphere Application Server where the application is hosted. 1. Annette navigates to the Tivoli Enterprise Portal and observes that on the WebSphere Agent Summary workspace the Application icon is displaying a warning symbol. The Resources icon is displaying the critical symbol. The Resource icon flyover is displaying high JVM CPU%. 20 ITCAM for Application Diagnostics: User Guide 2. Annette double-clicks the Resources icon and sees that the OS icon and JVM icon are both displaying the critical symbol. The OS icon flyover is displaying System CPU (ms) as high. It also has the JVM icon displaying JVM CPU% as high. 3. Annette double-clicks the Application icon. The Application Trend at L2/L3 workspace is displayed. The Selected Application Summary report displays the application name, average request response time, average request completion rate, and error rate. The average request response time is high. The Request Rate Trend chart displays the number of requests that are completed per second for the application. Again, this value is displaying as high. Chapter 2. Scenarios 21 4. Before Annette escalates this problem, she needs to determine if this problem is recent or if it has been occurring for some time. Annette checks the trend by taking the following steps in the Request Rate Trend chart: a. In the Application Trend at L2/L3 workspace, she selects the Specify time span for query icon. The Select the Time Span window is displayed. b. In the Custom Parameters section, she enters the required values in the Start Time and End Time fields. and she clicks OK. 5. Annette observes that there was an increase in client requests a few days ago and that this value has remained high throughout the week. Further investigation reveals that a surge of new customers caused a large increase in new users on the system. As a result, the load on the system is high. 6. Annette uses an external ticketing tool to forward the ticket with all details to Jim, the Middleware/Application Support SME. 22 ITCAM for Application Diagnostics: User Guide 7. Jim immediately sees from what Annette has reported that the system is over-burdened as a result of a significant increase in new users, and that the number of servers that are available in the cluster needs to be increased. Jim forwards the ticket to Simon, the OS SME. 8. Simon needs to determine if the Application is running on a static or a dynamic WebSphere cluster. If the application is running on a static cluster, he adds additional application servers. If the application is running on a dynamic cluster; he increases the number of servers allowed. These actions are outside the scope of ITCAM for Application Diagnostics. Scenario 5: Determining the cause of high response times Annette, the level 2 operator, receives an e-mail to indicate that the WASHighResponseTime situation has triggered for an application. 1. Annette navigates to the Tivoli Enterprise Portal and notices in the Application Server Summary workspace, the icon for the application is displaying a critical icon. The flyover for the application indicates that the Average Response time (ms) is high. Annette needs to determine how long the response time has been high. 2. Annette double clicks the Application icon, the Application Trend at L1 workspace is displayed. Annette requests historical data by taking the following steps: a. In the Requests - Current Interval View, she clicks the Specify time span for query icon. The Select the Time Span window is displayed. b. In the Custom Parameters section, she enters the required values in the Start Time and End Time fields and she clicks OK. c. She sorts by the Average Response Time column. Chapter 2. Scenarios 23 3. Annette uses an external ticketing tool to forward the trend details to Jim, the Middleware/Application Support SME. 4. Jim, receives this problem ticket about high response times for a particular application. Jim navigates to the Request Analysis workspace and confirms the problem Annette described. 5. To further investigate the problem Jim needs to open MSVE. Jim clicks the Diagnostic Recent Completed Requests link to open the MSVE Server Activity – Recent Requests page. Only requests that contain the URI information from the 24 ITCAM for Application Diagnostics: User Guide Request Analysis workspace are displayed. Jim notices that there are a number of client requests with high response times. 6. Jim decides to further analyze the transactions by setting a Resident Time – In-Flight trap. This trap activates the moment an in-flight request takes longer than a specified amount of time (minimum 15 seconds). To set up this trap, Jim must do the following steps: a. Select the trap type. b. Set the trap alerts. Chapter 2. Scenarios 25 c. Activate the trap. d. Jim then sets an action type of Stack Trace and waits for a problem request to trigger the trap. 7. After a little while, the problem request triggers the trap. 26 ITCAM for Application Diagnostics: User Guide 8. This trap also produces a stack trace. Jim forwards the trouble ticket to Dave, the application developer. Dave works to resolve the problem. This action is outside the scope of ITCAM for Application Diagnostics. Chapter 2. Scenarios 27 Scenario 6: Determining the cause of connection problems Annette, the level 2 operator, receives notification that the WASJ2CCPAvgWaitTimeHigh situation triggered. This error is critical. This situation indicates that the average wait time until a connection is granted is longer than 2 seconds. 1. Annette navigates to the J2C Connections Pools workspace. This workspace reports information about resource adapters and connectors that adhere to J2EE Connector Architecture (J2C). J2C is the WebSphere Application Server implementation of the Java EE Connector Architecture (JCA). Data counters for this category contain usage information about the J2C connection pools that enable enterprise beans to connect to, and interact with, Enterprise Information Systems. 2. In this workspace Annette observes in the Worst Wait Times view that some wait times for connections are above 2 seconds. The Highest Average Pool Sizes bar chart shows the largest average number of managed connections for each J2C connection pool. Typically, a connection takes no longer than 2 seconds. 28 ITCAM for Application Diagnostics: User Guide 3. Annette uses an external ticketing tool to forward the ticket with details to Jim, the Middleware/Application Support SME. 4. Jim navigates to the J2C Connections Pools workspace and compares the average pools size with the maximum pool size to establish the ideal maximum value. Jim establishes that the connection pool size needs to be adjusted, which is outside the scope of ITCAM for Application Diagnostics. Scenario 7: Determining if the Garbage Collection policy needs to be adjusted Annette, the level 2 operator is monitoring the Tivoli Enterprise Portal. Annette notices a critical symbol on the JVM icon in the Application Server Summary workspace. The flyover for JVM icons shows a high metric for JVM CPU% and GC Active Time (ms). Chapter 2. Scenarios 29 1. Annette double-clicks the JVM icon. The JVM Stack Trend workspace is displayed. The Percent GC Time Used view displays a high value. The heap usage trend is also high. 2. Annette uses an external ticketing tool to forward the ticket with details to Jim, the Middleware/Application Support SME. 30 ITCAM for Application Diagnostics: User Guide 3. Jim reviews the information and determines that the heap size parameters in the JVM are not set correctly. This incorrect setting affects application performance. Jim sets the appropriate GC policy. Scenario 8: Troubleshooting application response time in an XD cell Due to external resource the response time for one of applications in the XD cell degrades below the service policy goal. Annette the level 2 operator, receives an e-mail to indicate that the Application Requests Above Goal situation triggered. This situation triggers when the rate of requests above goal is greater than 0.5%. 1. In the Tivoli Enterprise Portal navigation tree, Annette follows the workspace link for the triggered situation. The XDVEAppReqAboveGoalPercentHigh Event workspace is displayed. 2. Annette navigates by a link from the XDVEAppReqAboveGoalPercentHigh Event workspace to the Application workspace. 3. The Application workspace displays On Demand Router Statistics (ODR) for the selected application module, transaction, class, and protocol summarized over all ODRs in the cell. 4. From the Application workspace, Annette observes that the average overall response time is 20 seconds and the average server service time is also 20 seconds. This indicates, that some problem is occurring with the handling requests by this application. 5. To see the deployment targets hosting the application and ascertain which of the deployment targets is contributing to the slow response time, Annette drills down to the Deployment Targets workspace using the Per Deployment Targets link. Chapter 2. Scenarios 31 6. The Deployment Targets workspace displays a single deployment target for this application: DynCluster. Annette drills down to this dynamic cluster using the link and then to servers belong to the dynamic cluster. 7. The servers for the dynamic cluster performance are displayed. From this view, Annette observes that both servers in the dynamic cluster have similar loading. Annette drills down to each server and observes that both have requests higher than the set goal of 10 seconds. 8. Annette drill downs to Server Diagnostic for one of servers using the link, which opens the Data Collector workspace for that server. Annette observes in the workspace that the “sleeperEAR” application is displaying a critical red symbol. 32 ITCAM for Application Diagnostics: User Guide 9. Annette double-clicks the application, this opens the Request Analysis workspace. 10. From the Request Analysis workspace, Annette navigates to the MSVE using the Diagnostic In-Flight Request Search link. From the MSVE, Annette can navigate to the thread for the selected request and view the request call stack. Chapter 2. Scenarios 33 11. Annette uses an external ticketing tool to forward the ticket with details to Jim, the Middleware/Application Support SME. 12. Jim reviews the information and determines that the application waits for response from an external system. Jim researches and resolves the external system issue and restores the application response time before it impacted the majority of the users. Scenario 9: Ensuring that jobs processed by Compute Grid don't execute for longer than one hour Annette, the level 2 operator, needs to ensure that jobs processed by Compute Grid do not execute for longer than one hour. If a job executes for longer, then Annette needs to capture the job information and forward to the Middleware/Application Support SME. 1. Middleware/Application Support SME configure jobs as custom requests via Data Collector configuration files. 2. Annette edits the predefined XDCGJobExcessiveTotalTime situation to trigger if the total job time is greater than 60 minutes. 34 ITCAM for Application Diagnostics: User Guide 3. At some point in time, Annette observes that the situation has triggered. 4. Annette clicks the event link and the event workspace is displayed. Chapter 2. Scenarios 35 5. Annette opens the Job workspace by using the link from event workspace. 6. The Job workspace shows all the details about the job. From the job notifications, Annette observes that the job is executing for a long time, she clicks the Diagnostic in-Flight Request Search link, this opens the MSVE in-flight workspace, from here she clicks the link to see the request call stack. 7. Annette captures the call stack and provides to Jim, the Middleware/ Application Support SME. 8. Jim determines that job is waiting for database lock and resolves it appropriately. 36 ITCAM for Application Diagnostics: User Guide Part 2. Part 2: Using ITCAM for Application Diagnostics © Copyright IBM Corp. 2006, 2009 37 38 ITCAM for Application Diagnostics: User Guide Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine The Managing Server Visualization Engine (MSVE) user interface provides users with management and monitoring functions for application servers. In addition, the MSVE also provides a diagnostic function. Here are some of the diagnostic activities you can perform in MSVE: v Detect transactions failing v Detect memory leaks v Examine detailed method traces, which help to detect application code hotspots v Generate reports to analyze historical information, such as application performance and OS performance Access the Managing Server Visualization Engine from Tivoli Enterprise Portal You can access the Managing Server Visualization Engine from links in ITCAM Agent for WebSphere Applications workspaces. When you access the Managing Server Visualization Engine in this way, the Managing Server Visualization Engine displays in a browser view inside a workspace. The Tivoli Enterprise Portal navigation tree is automatically hidden in the workspace. To show or hide the Tivoli Enterprise Portal navigation tree, click the small black arrow on the left side of the window. The following table displays a list of Tivoli Enterprise Portal workspaces that have links to the Managing Server Visualization Engine. Table 3. Tivoli Enterprise Portal workspaces that have links to Managing Server Visualization Engine Workspace: Table View Name Number of links to Managing Server Visualization Engine Link Name WebSphere Agent 2 Summary Status > Application Servers v Diagnostic Server Activity Display WebSphere Agent Summary Status > Application Servers v Diagnostic In-Flight Request Search Link Target Pages Managing Server Visualization Engine v Server Activity Display – Active Requests v In-Flight Request Search Pre-populated information in the link page to Managing Server Visualization Engine The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. WebSphere Agent Configuration> Application Servers © Copyright IBM Corp. 2006, 2009 39 Table 3. Tivoli Enterprise Portal workspaces that have links to Managing Server Visualization Engine (continued) Workspace: Table View Name OS Stack > Current OS Stack Summary Number of links to Managing Server Visualization Engine Link Name 3 v Diagnostic Server Activity Display v Diagnostic In-Flight Request Search JVM Stack Trend 1 >JVM Stack Trend 40 ITCAM for Application Diagnostics: User Guide Link Target Pages Managing Server Visualization Engine v Server Activity Display – Active Requests v In-Flight Request Search v <platform OS> <platform> is one of the following operating systems: Linux, UNIX, Windows or z/OS v Using the dynamic workspace link to link to the corresponding OS agent workspace. For z/OS, the link is to OMEGAMON XE for z/OS. Diagnostic Memory Leak Memory Leak Analysis Pre-populated information in the link page to Managing Server Visualization Engine The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. Table 3. Tivoli Enterprise Portal workspaces that have links to Managing Server Visualization Engine (continued) Workspace: Table View Name Request Analysis > Requests – Current Interval Number of links to Managing Server Visualization Engine Link Name 3 v Diagnostic Recent Completed Requests v Diagnostic In-Flight Request Search v Diagnostic SMF Data (z/OS only) Link Target Pages Managing Server Visualization Engine Pre-populated information in the link page to Managing Server Visualization Engine v The Group Server dropdown menu is pre-populated based on data v In-Flight collector Requests information v SMF Data (for from Tivoli z/OS data Enterprise collectors workspace. only) v Content in Request Detail column of Requests table view in Tivoli Enterprise Portal is pre-populated in the following fields: v Server Activity Display – Recent Requests – Recent Requests: Client Request – In-Flight Request Search: Search Request/ Transaction field 1 Garbage Collection Analysis >Garbage Collection Analysis Thread Pools >Thread Pools 1 Diagnostic Memory Leak Memory Leak Analysis The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. Diagnostic JVM Thread Display JVM Thread Display The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 41 Table 3. Tivoli Enterprise Portal workspaces that have links to Managing Server Visualization Engine (continued) Workspace: Table View Name Datasources > Datasources – Current Interval Number of links to Managing Server Visualization Engine Link Name 1 Web Applications >Web Applications EJB Containers >EJB Containers Diagnostic Server Activity Display Link Target Pages Managing Server Visualization Engine Pre-populated information in the link page to Managing Server Visualization Engine Server Activity The Group Server Display – Active dropdown menu Requests is pre-populated based on data collector information from Tivoli Enterprise workspace. JMS Summary >JMS Summary – Current Interval DB Connection Pools > DB Connection Pools J2C Connection Pools > J2C Connection Pools The Server Group feature that displays at the top of these pages applies to the Managing Server Visualization Engine. When you access any Managing Server Visualization Engine page from the Tivoli Enterprise Portal, the information in the Groups and Servers fields is automatically populated with the data collector associated with the link and workspace you selected in the Tivoli Enterprise Portal. Groups are a set of application servers which have similar functionality. All configured data collectors are automatically assigned to the Unassigned Servers Group. The relationship between Server Group and data collector is many to many. A data collector can belong to one or more server groups. A server group can have one or more data collectors. You can add data collectors to groups using the Server Management functionality in the Managing Server Visualization Engine. For more information about adding data collectors to Server Groups, refer to the Composite Application Manager Help in the Managing Server Visualization Engine interface. The Server Activity Display section has three tabs. v Active Requests: provides real-time request or transaction data for an application server at the time the page displays. v Recent Requests: displays the last 100 or less completed request or transaction data for an application server. v Lock Contentions: displays requests that are hanging because they are waiting on a lock. The data shows data that is currently locked and the item that is waiting to be locked. 42 ITCAM for Application Diagnostics: User Guide The Active Requests tab and the Recent Requests tab have a toolbox icon You can click this toolbox icon to access direct links to the following features: v JVM Thread Display v System Resources v Monitoring On Demand® v Data Collector Profiles v Trap and Alert Management . You can use this information to analyze the details and identify the areas where the issues occur. To return to the Tivoli Enterprise Portal interface at any time click back on your web browser. For more detailed information see: v “Server Activity Display - recent requests” on page 117 v “Server Activity Display - active requests” on page 115 v “Server Activity Display - lock contentions” on page 118 v “JVM thread display” on page 135 v “System resources” on page 96 v “Monitoring on Demand (TM)” on page 73 v “Data Collector Profiles” on page 61 v “Trap and alert management” on page 139 Account management Control access to features and servers. Account management enables you to control users' access to features and servers. Use roles to restrict access to features, and use server groups to grant access to servers. User Scenarios Scenario 1: Granting members of Team XYZ access to ITCAM for Application Diagnostics Team XYZ has asked for access to ITCAM for Application Diagnostics for, but only needs access to features that use historical data. Since the existing roles provide access to features that use both real time and historical data, create a role for them called team XYZ. When you define this role, provide access to features that use only historical data, for example PAR. Assign role team_XYZ to each user account belonging to members of team XYZ. Scenario 2: Creating an account for a new employee Employee John Smith is an operator that just joined your company. John needs to use ITCAM for Application Diagnostics for to monitor QA systems. As the ITCAM for Application Diagnostics for administrator, you create John's account with access granted to QA server groups but not Production server groups. Furthermore, you restrict John's access to features by assigning the Operator role to his account. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 43 User profiles The User Profiles page shows a table of all user accounts in the Visualization Engine. From this page, you can create, modify, and delete user accounts. To view the User Profiles page, from the top navigation, click Administration > Account Management > User Profiles. For every account, the table shows the account name, first name, last name, and a Delete button. To sort by any column, click its heading. To modify the information for an account (including access rights), click the account name. See “Modifying a user account” on page 45. To delete a user account, click the Delete button in its row. See “Deleting a user account” on page 46. To create a user account, in the left navigation pane, click Create User Account. See “Creating a user account.” Creating a user account About this task Add new user accounts to the application monitor on the Create User Account page. Limit the rights of your user accounts to the groups of servers you select. A valid WebSphere Global Security user name is required to create an account. The user name can be different from the operating system user ID, but it must be at least three alpha characters and no more than 255. To enable single sign-on, configure the Managing Server and the WebSphere application server that the Managing Server Visualization Engine runs on. Then, add every user who needs to access single sign-on. For more information about single sign-on, refer to Appendix N Setting Up Single Sign on for Tivoli Enterprise Portal Users in the ITCAM for Application Diagnostics 7.1 Managing Server Installation and Customization Guide To create a user account: 1. From the top navigation, click Administration > Account Management > User Profiles. The User Profiles page opens. 2. In the left navigation pane, click Create User Account. The Create User Account page opens. 3. Enter the first name (required). 4. Enter the last name (required). 5. Enter the user name (required). 6. Enter the OS/LDAP user name (required). ITCAM uses WebSphere Global Security system for user authentication, therefore a valid WebSphere Global Security user name is required to create an account. 7. Select the role you want to assign to the user account from the list box. 8. Select Active or Suspended for the account status. A user account is not ready for use if its status is not marked Active. 9. Enter the user's e-mail address (optional). 10. Enter remarks in the available fields (optional). 11. To save the user account setup, click Save. 44 ITCAM for Application Diagnostics: User Guide Results To grant group access rights: 1. Click to select the group name in the All Groups box. 2. Click Add to grant the user account rights to the selected groups. The group name appears in the Granted box. To select multiple groups, hold down the Ctrl key during your selection. To remove group access rights: 1. Click to select the group name in the Granted box. 2. Click Remove to remove the user account rights from the selected groups. The group name disappears from the Granted box. 3. To select multiple groups, hold down the Ctrl key during your selection. Related topics Assigning a role Creating a role Modifying a user account About this task Modify existing user accounts in the application monitor on the Modify User Account page. Limit the rights of your user accounts to the groups you select. To modify a user account: 1. From the top navigation, click Administration > Account Management > User Profiles. The User Profiles page opens. 2. Click the user name to select the user account you want to modify. The Modify User Account page opens. 3. Select the field you want to edit, and enter the new information. 4. After entering your changes, click Save. You might want to suspend the user accounts when the operators are on leave. When they return, select Active to turn their user accounts back on. Results To grant group access rights: 1. 2. Click to select the group name in the All Groups box. Click Add to grant the user account rights to the selected groups. The group name appears in the Granted box. To remove group access rights: 1. Click to select the group name in the Granted box. 2. Click Remove to remove the user account rights from the selected groups. The group name disappears from the Granted box. Related topics Assigning a role Creating a group Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 45 Deleting a user account About this task Manage your accounts by keeping them up-to-date. Delete existing user accounts from the application monitor on the User Profiles page. To delete a user account: 1. From the top navigation, click Administration > Account Management > User Profiles. The User Profiles page opens. 2. Click X or Delete on the last column of the user account that you want to delete from the application monitor. A confirmation box displays. 3. Click OK in the confirmation box to delete the user account, or click Cancel to return to the User Profiles page. 4. If you select OK, the system deletes the user account and the User Profiles page no longer displays the deleted account. 5. To sort by heading, click the heading you want to sort. Only underlined headings can be sorted. The page displays the results sorted by the selected heading. Related topics Creating a role Creating a user account Deleting a role Role configuration The Role configuration page shows a table of permissions for security roles defined in the Visualization Engine. From this page, you can create, modify, and delete security roles. To view the Role Configuration page, from the top navigation, click Administration > Account Management > Role Configuration. To control user account access to the product functions, each user account is assigned a security role. The role grants access to specific product functions. A user account can have only one role; the same role can be assigned to many accounts. The rows in the table represent product functions; columns represent security roles. Every cell of the table shows whether function (row) is allowed for the role (column). The Administrator, Operator, and User roles are predefined and cannot be changed; you can change, add, and delete other roles. To change permissions for a role, check or clear the boxes in its column. To save changes, click the Save button; to undo changes before they are saved, click the Reset button. (You might need to scroll the page down to reach these buttons). See “Modifying a role” on page 47. To delete a role, click the X button next to its name. See “Deleting a role” on page 48. To create a role with blank permissions, in the left navigation pane, click Create Role. See “Creating a role” on page 47. 46 ITCAM for Application Diagnostics: User Guide To create a role with permissions copied from another role, in the left navigation pane, click Duplicate Role. See “Duplicating a role” on page 48. Creating a role About this task The Create Role page provides the functionality to create a custom role for your environment. Design the custom role to restrict and grant privileges specific to the needs for your environment. To open the Create Role page: 1. From the top navigation, click Administration > Account Management > Role Configuration. The Role Configuration page opens. 2. On the left navigation pane, click Create Role. The Create Role page opens. 3. Type in the name of the new role. 4. Click OK. The new role displays on the Role Configuration page. 5. Click to select the privileges user accounts can access in the application monitor. 6. Click Save. 7. Click Reset to revert to the pre-modified settings. Related topics Assigning a role Creating a user account Assigning a role About this task After creating a role on the Role Configuration page, assign the role to user accounts on the Modify User Account page. Modify user accounts to assign appropriate privileges to them. To assign a role: 1. From the top navigation, click Administration > Account Management > User Profiles. The User Profiles page opens. 2. Click the user name that you want to assign a role. The Modify User Account page opens. 3. On the Modify User Account page, from the Role list box, select the role to assign to the user account. 4. Click Save. Related topics Creating a role Deleting a role Modifying a role Modifying a role About this task The Role Configuration page provides the functionality to modify your custom roles. Update and delete custom roles based on the needs of your environment. To modify a role: Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 47 1. From the top navigation, click Administration > Account Management > Role Configuration. The Role Configuration page opens. 2. Click to check and clear the permissions you want to assign this role. Changing the custom role privileges in the user accounts grants access in the application monitor. 3. Click Save. 4. Click Reset to revert to the pre-modified settings. Related topics Assigning a role Creating a role Duplicating a role About this task To easily customize a new role, you can duplicate a role that uses a similar set of permissions rather than checking or clearing the boxes one by one repeatedly. To duplicate a role: 1. From the top navigation, click Administration > Account Management > Role Configuration. The Role Configuration page opens. 2. On the left navigation pane, click Duplicate Role. The Duplicate Role page opens. 3. Select a role name for the duplicated role from the Role Name list box. 4. Enter a new name for the duplicated role. 5. Click Save. The new duplicated role displays on the Role Configuration page. 6. Click to select the privileges user accounts can access in the Application Monitor. 7. Click Save. 8. Click Reset to revert to the pre-modified settings. The duplicated role does not have any users since its user-to-role relationship is not duplicated. Related topics Assigning a role Creating a user account Modifying a role Deleting a role About this task The Role Configuration page provides the functionality to delete your custom roles. Manage your custom roles based on the needs of your environment. You cannot delete a role while the system associates a user account with it. To delete a role not assigned to a user account: 1. From the top navigation, click Administration > Account Management > Role Configuration. The Role Configuration page opens. 2. Click the X next to the role you want to delete. 3. At the confirmation box, click OK. Results To delete a role still assigned to a user account: 48 ITCAM for Application Diagnostics: User Guide From the top navigation, click Administration > Account Management > Role Configuration. The Role Configuration page opens. 2. Click X next to the role you want to delete. A confirmation box displays. 3. Click OK at the confirmation box. A list of the user accounts assigned to the role appears. Since the system assigned the role to a user account, you have to change the role of the user account on the Update Role page. 1. 4. Click the link to select the user account. The Modify User Account page opens. 5. Click to select a role for the user account from the Role list box. 6. Click Save. The system displays the Role Configuration page without the deleted role. Related topics Creating a role Creating a user account Deleting a user account Server management Manage your servers with the server group management page. Add and delete server groups, while associating groups with individual account. You can restrict user access to data and operations on a specific group of servers. User Scenarios Scenario 1: Separating server groups according to applications As the ITCAM for Application Diagnostics administrator, you want to distinguish the group of servers that process trading requests from the group of servers that process quote requests. You create two server groups: Trading and Quotes. In the Trading server group, you include only those servers that deal with trading, and in the Quotes server group you include only those servers that deal with quotes. Grant users access to the appropriate server group(s). Scenario 2: Grouping servers by authority structure As the ITCAM for Application Diagnostics administrator, you want to separate the servers in your environment by the authority structure present in the company. The current Support team is separated into smaller groups that control individual groups of servers. You create server groups that contain these servers such as Support A controls servers 1 through 29, Support B controls servers 30 through 59 and Support C controls servers 60 through 90. Server groups The Server Groups page shows a table of all server groups. From this page, you can create, modify, and delete server groups. Groups are a set of application servers which have similar functionality. All configured data collectors are in the Unassigned Servers Group. The relationship between Server Group and data collector is many to many. A data collector can belong to one or more server groups. A server group can have one or more data collectors. You can add data collectors to groups using the Server Management functionality in the Managing Server Visualization Engine. For more information about adding data collectors to Server Groups, refer to the Composite Application Manager Help in the Managing Server Visualization Engine interface. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 49 To view the Server Groups page, from the top navigation, click Administration > Server Management > Server Groups. Server groups are used for convenient grouping of information in the Managing Server Visualization Engine. Every group includes one or several servers. In a number of Managing Server Visualization Engine pages, you can view information by server group. Each user can be granted access to information for some server groups but not others. A server can be a member of several groups. When you access pages from the Tivoli Enterprise Portal, the information in the Groups and Servers fields is automatically populated with the group and data collector associated with the link and workspace you selected in the Tivoli Enterprise Portal. For every server group, the table shows the group name, description, and a Delete button. To modify a server group (including list of member servers and access rights for users), click the group name. See “Modifying a group” on page 51. To delete a server group, click the Delete button in its row. See “Deleting a group” on page 51. To create a server group with default settings, no member servers and no user access rights, in the left navigation pane, click Create Group. See “Creating a group.” To create a server group with settings, member servers and user access rights copied from another server group, in the left navigation pane, click Duplicate Group. See “Duplicating a group” on page 52. Creating a group About this task Combine servers into groups to streamline daily server maintenance. The Create Group page provides the functionality to create groups of servers and grant users access to those groups. To create a group: 1. From the top navigation, click Administration > Server Management > Server Groups. The Server Group Management page opens. 2. On the left navigation pane, click Create Group. The Create Group page opens. 3. Enter a unique group name in the text box. 4. Enter a description in the text box. 5. Enter the Server Group Response Time Thresholds. 6. Enter the Portal Response Time Thresholds. (If you have a portal server, configure the thresholds for portal.) Optional. 7. Click to select a baseline definition and fill out the information. Steps 5 through 7 are all default settings based on the settings on the System Properties page under Configuring the Enterprise Overview Display section. 8. Click to select the server name in the All Servers box. 50 ITCAM for Application Diagnostics: User Guide 9. Click Add to select the server for the group. The server name appears in the Servers in Group box. To select multiple servers, hold down the shift key during your selection. To add multiple servers non-continuously, Ctrl + click the servers for selection. 10. In the Servers In Group box, select the server you want to remove and click Remove to delete the server from the group. The server name disappears from the Servers in Group box. 11. Select the user and click Add to grant users access to the group. The user name appears in the Granted Access box. 12. Click Remove to remove the user's access to the group. The user name disappears from the Granted Access box. 13. Click Save to save the group's settings. Related topics Configuring a data collector Configuring the Enterprise Overview display Creating a configuration Modifying a group About this task Maintain your groups with the most updated information. The Modify Group page provides the functionality to modify your groups and grant users access to those groups. To modify a group: 1. From the top navigation, click Administration > Server Management > Server Groups. The Server Group Management page opens. 2. Click the group name of the group you want to modify. The Modify Group page opens populated with the selected group's information. 3. Select the field you want to edit and enter the new information. 4. Click Save to save the group's settings. Changes made to the server-to-group assignments and user-to-group grants occur immediately. Also, if an administrator removes a server from a group anyone logged in will notice the change. Related topics Configuring the Enterprise Overview display Creating a group Deleting a group About this task Delete outdated groups from the system. You can delete existing groups on the Server Group Management page. To delete a group: 1. From the top navigation, click Administration > Server Management > Server Groups. The Server Group Management page opens. 2. Click X or Delete next to the group name you want to delete from the application monitor. 3. Click OK in the confirmation box to delete the group, or click Cancel to return to the Server Group Management page. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 51 4. If you select OK, the application monitor deletes the group and the Server Group Management page no longer displays the deleted group. Before deleting a group from the application monitor database, delete all reports attached to that group in order to maintain data integrity. To delete each report, click the report's link. The group will be deleted after all reports are deleted. Once a group is deleted, the records in the application monitor database that belong to the group via the server relationship will no longer be accessible through the group. However, the records can still be accessed either via the server name or another group which contains the servers. You can also re-assign the servers to other groups on the Modify Group page. Related topics Deleting a configuration Modifying a group Duplicating a group About this task Save time by duplicating groups. Duplicating a group allows you to quickly create a new group based on the settings of an existing group. To duplicate a group: 1. From the top navigation, click Administration > Server Management > Server Groups. The Server Group Management page opens. 2. On the left navigation pane, click Duplicate Group. The Duplicate Group page opens. 3. From the Group Name list box, select the group name you want to duplicate. 4. Enter a new name for the duplicated group. 5. Click Save to duplicate the group. The Duplicate Group link does not display when there is no group in the system. Related topics Creating a group Deleting a group Modifying a group Data Collector Configuration In the Data Collector Configuration pages, you can configure Data Collectors, disable, enable, and unconfigure them, and also enable/disable TTAPI support. To view the Data Collector Configuration page, from the top navigation, click Administration > Server Management > Data Collector Configuration. A Data Collector is software that runs within the same JVM as the application server and captures information regarding the applications running inside the application server. The Data Collector communicates this information to the Managing Server and/or to the Tivoli Enterprise Monitoring Agent. To work with the Managing Server, a Data Collector must first be configured using its own configuration utility. After this, you also need to configure the Data Collector through the Visualization Engine. To do this, you need to apply one of the defined configurations to this Data Collector. 52 ITCAM for Application Diagnostics: User Guide You might also need to unconfigure a Data Collector. When you have unconfigured a Data Collector, you can apply a different configuration, or if you want to remove the Data Collector, you can unconfigure it and then uninstall it. To view the configured Data Collectors, enable, disable, and unconfigure them, select Configured Data Collectors in the left navigation pane. See “Configured Data Collectors.” To view the unconfigured Data Collectors and configure them, select Unconfigured Data Collectors in the left navigation pane. See “Unconfigured Data Collectors” on page 54. To view the existing Data Collector configurations, modify, duplicate and delete them, select Configuration Library in the left navigation pane. See “Configuration Library” on page 54. To create a new Data Collector configuration, select Create a Configuration in the left navigation pane. See “Creating a configuration” on page 58. Configured Data Collectors The Configured Data Collectors page shows a table of all Data Collectors that are configured in the Visualization Engine. You can view their configuration, enable, disable, and unconfigure them. For every configured Data Collector, the table shows: v Admin Server name v Application Server name v Cluster name v Configuration name v Platform that is monitored (type of application server) v Status change button (Disable if the Data Collector is enabled, or Enable if it is disabled) v Unconfigure check box. v Join Time - if a Data Collector is not available because the Data Collector connection to the Managing Server was unconfigured, then the value for Join Time is displayed as N/A. To disable an enabled Data Collector, click the Disable button. See “Disabling a data collector” on page 57. To enable a disabled Data Collector, click the Enable button. See “Enabling a data collector” on page 56. To unconfigure a Data Collector, check the Unconfigure box and click the Apply button at the bottom of the table. See “Unconfiguring a data collector” on page 56. To view the details of a Data Collector configuration, click the configuration name. The “Configuration Library” on page 54 page will open, showing this configuration. You can use the left navigation pane to view unconfigured Data Collectors, view existing Data Collector configurations, create a configuration, and enable TTAPI. See “Data Collector Configuration” on page 52. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 53 Unconfigured Data Collectors The Unconfigured Data Collectors page shows a table of all Data Collectors that communicate with the Managing Server but are not configured in the Visualization Engine. You can configure them. For every unconfigured Data Collector, the table shows: v Admin Server name v Application Server name v Cluster Name v Platform that is monitored (type of application server) v Apply a configuration check box To configure a Data Collector, check the Apply a configuration box, select the configuration name in the pull down control at the top of the table, and click the Apply button at the bottom of the table. See “Configuring a data collector” on page 55. You can use the left navigation pane to view configured Data Collectors, view existing Data Collector configurations, create a configuration, and enable TTAPI. See “Data Collector Configuration” on page 52. Configuration Library The Configuration library page shows a table of all Data Collector configurations. You can apply configurations to Data Collectors, modify them, delete them, and create new configurations as copies of existing ones. For every Data Collector configuration, the table shows: v Configuration name. v Class names that are to be excluded from monitoring. v Class names that are to be included in monitoring, even if they would fit the exclude list. v Associated Server names, that is, names of servers to which the configuration is presently applied v Modify, Duplicate, Apply, and Delete buttons. To modify a configuration, click the Modify button. See “Modifying a configuration” on page 59. To create a new configuration as a copy of an existing one, click the Duplicate button. See “Duplicating a configuration” on page 59. To apply a configuration to Data Collectors, click the Apply button. Note that you can configure a previously unconfigured Data Collector or change the configuration of an already configured Data Collector in this way. See “Applying a configuration” on page 58. To delete a configuration, click the Delete button. See “Deleting a configuration” on page 60. You can use the left navigation pane to view configured and unconfigured Data Collectors, create a configuration, and enable TTAPI. See “Data Collector Configuration” on page 52. 54 ITCAM for Application Diagnostics: User Guide Enable TTAPI for JDBC The Enable TTAPI for JDBC page shows tables of Data Collectors that support TTAPI for JDBC and do not currently have it enabled, and those that have TTAPI for JDBC enabled. You can enable and disable TTAPI for JDBC for these Data Collectors. The TTAPI JDBC disabled Data Collectors table shows the Data Collectors that support TTAPI for JDBC and do not currently have it enabled. For every Data Collector, the server name and the Enable check box are shown. To enable TTAPI for JDBC for a Data Collector, check the Enable box and click the Apply button at the bottom of the table. See “Enabling TTAPI for JDBC for a Data Collector” on page 60. The TTAPI JDBC enabled Data Collectors table shows the Data Collectors that support TTAPI for JDBC and do not currently have it enabled. For every Data Collector, the server name and the Enable check box are shown. To enable TTAPI for JDBC for a Data Collector, check the Enable box and click the Apply button at the bottom of the table. See “Disabling TTAPI for JDBC for a Data Collector” on page 60. Configuring a data collector About this task When a new data collector connects to a managing server for the first time, it is automatically configured. If there are data collectors that you want to manually configure, you need to ensure that for those data collectors, the dc.autoconfigure property in the dc.properties file is set to false. For Data Collectors that you wish to manually configure, you can assign an initial configuration using the Data Collector Configuration page in MSVE. When the data collector acknowledges the new configuration, the managing server then lists it as a "configured" data collector. You can also return a currently configured data collector to an unconfigured state. If this is done, all data and reports concerning the data collector are lost. After a data collector has been configured, you can enable or disable it at any time. For WebSphere v6, the data collector name is formed from the admin server name (node name) and the application server instance name, the data collector application server name also includes the profile name. Here is an example of a WebSphere v6 profile name: jupiterCell01.jupiterNode01.server1(default). In many places, an additional field is appended to the end of the data collector name that indicates whether the data collector is associated with a currently running application server instance or not. When the application server instance and data collector are running, this field is the process or address space identifier: jupiterCell01.jupiterNode01.server1.12345. When the data collector is not running and there is no process or address space identifier, two dashes (--) are used, for example: jupiterNode01.server1.-To configure a data collector: Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 55 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Unconfigured Data Collectors on the left navigation pane. 3. Select a configuration from the Apply a Configuration list box. 4. Click Select All or click in the check box of the unconfigured data collector you want to configure. 5. Click Apply. The apply procedure can take a minute or two for the data collector to receive, successfully apply, and acknowledge its success back to the managing server. You will need to refresh your page every 10-20 seconds until the data collector disappears from the Unconfigured Data Collector's table. Related topics Applying a configuration Modifying a configuration Unconfiguring a data collector Unconfiguring a data collector About this task Use the Data Collector Overview page to unconfigure the data collectors. When you unconfigure a data collector, the system removes it from the configured data collectors list and displays it with the unconfigured data collectors. The name of the Data Collector is a combination of the admin server name and the application server name i.e., admin_server.application_server. The name cannot be changed. To unconfigure a data collector: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Place a check in the Unconfigure check box next to the data collector you want to unconfigure. 3. Click Apply. The Unconfigured Data Collector Overview page displays. Related topics Applying a configuration Configuring a data collector Enabling a data collector Enabling a data collector About this task Enable your data collectors on the Configured Data Collector Overview page. Manage monitoring on your system by enabling and disabling data collectors as needed. To enable a data collector: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Enable next to the data collector you want to enable. 3. The system enables the data collector and the button face changes to Disable. If you stopped the data collector from sending and receiving data by disabling it, 56 ITCAM for Application Diagnostics: User Guide you can enable the data collector again when you are ready. Since a disabled data collector doesn't lose settings, you can simply turn it back on without any reconfiguration. Related topics Configuring a data collector Disabling a data collector Modifying a configuration Disabling a data collector About this task Disable your data collectors on the Configured Data Collector Overview page. Manage monitoring on your system by enabling and disabling data collectors as needed. To disable a data collector: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Disable next to the data collector you want to disable. 3. The system disables the data collector and the button face changes to Enable. Results Disabling a Data Collector in the Visualization Engine only disables monitoring with the Managing Server; IBM Tivoli Monitoring is not affected. You can also use the Data Collector configuration to disable communication between the Data Collector and the Managing Server. The following table provides a comparison between these two ways of disabling Data Collector communication to the Managing Server: Table 4. Comparison of ways to disable Data Collector communication to the Managing Server. Disable Data Collector communication to the Managing Server using Data Collector configuration Disable Data Collector communication to the Managing Server using the Visualization Engine The application server instance is not listed in the Visualization Engine. The application server instance remains listed in the Visualization Engine. The Visualization Engine shows no information on the application server instance. The Visualization Engine shows whether the application server instance is up or down; monitoring information is not available. No system or network resources are used for Some system and network resources are Managing Server communication. used to maintain Managing Server communication. You do not need to apply maintenance fixes for the Agent that only impact Managing Server communication. You need to apply maintenance fixes for the Agent that only impact Managing Server communication. In order to re-enable communication, you need to perform Data Collector configuration again, and restart the application server. In order to re-enable communication using the Visualization Engine, you do not need to restart the application server. Related topics Configuring a data collector Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 57 Enabling a data collector Modifying a configuration Creating a configuration About this task Use this page to create a configuration and name it for your data collectors. Create multiple configurations that monitor different classes. The system assigns a name to the data collector. The name of the Data Collector is a combination of the Admin Server name and the Application Server name. The name cannot be changed. To create a configuration: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Create a Configuration on the left navigation pane. The Create page opens. 3. Enter the names of classes you want to ignore into the Exclude (Classname) list. You can use an asterisk (*) as a wildcard. In this case it means exclude all. 4. Enter the names of classes you want to monitor into the Exclude Override (Classname) list. 5. Select the check box if you want to enable MQ. This will provide you with an Exclude and Exclude Override box specifically for configuring MQ. 6. Enter a name for the configuration. (Required field) 7. Click Save to create the configuration or Save & Apply to create the configuration and apply it to a data collector. You can configure or change these options at any time. Related topics Applying a configuration Configuring a data collector Applying a configuration About this task Use the Apply page to apply the configuration to a data collector. After you create a configuration, you must apply it to a data collector in order to start monitoring. To apply a configuration: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Configuration Library on the left navigation. The Data Collector Configuration List page opens. 3. Click the Apply icon next to the configuration you want to apply. The Apply page opens. 4. Click to select the data collectors' name from the All Data Collectors box. To select a range of contiguous data collectors, hold the shift key down during your selection. To add multiple servers non-contiguously, Ctrl + click the servers for selection. 5. Click Add to apply the configuration to the data collector. The Data Collector's names displays in the Applied box. 6. Select Enable from the Status list box to set the status of the configuration. 58 ITCAM for Application Diagnostics: User Guide 7. Click Apply. Related topics Disabling a data collector Enabling a data collector Unconfiguring a data collector Modifying a configuration About this task You can modify an existing configuration for your data collectors by updating the list of classes you monitor. Remove and add classes to the Exclude (Classname) list and Exclude Override (Classname) list to change what you monitor. To modify a configuration: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Configuration Library on the left navigation pane. The Data Collector Configuration List page opens. 3. Click the Modify icon next to the configuration you want to modify. The Modify page opens. 4. Enter the names of classes you want to ignore into the Exclude (Classname) list. 5. Enter the names of classes you want to monitor into the Exclude Override (Classname) list. 6. Select the check box to enable MQ list. 7. Click Save to save your modifications to the configuration. The Configured Data Collector Configuration List displays with the updated information. Related topics Applying a configuration Configuring a data collector Enabling a data collector Duplicating a configuration About this task Create a new configuration using an existing configuration from your data collectors. To duplicate a configuration: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Configuration Library on the left navigation pane. The Configured Data Collector Configuration List page opens. 3. Click the Duplicate icon next to the configuration you want to duplicate. The Duplicate Configuration page opens. 4. Select an existing configuration from the list box. 5. Enter a new name for the configuration. 6. Click Save. The new configuration displays in the Configuration List. Related topics Applying a configuration Configuring a data collector Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 59 Enabling a data collector Deleting a configuration About this task You can delete outdated configurations from the list to keep your list current. To delete a configuration: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Configuration Library on the left navigation pane. The Data Collector Configuration List page opens. 3. Click the Delete icon next to the configuration you want to delete. A confirmation box appears to warn you that deleting this configuration will unconfigure all the associated servers. 4. Click OK to delete the configuration. The Configuration List displays without the deleted configuration. Remember to apply a new configuration to the servers you unconfigured while deleting the configuration. Related topics Applying a configuration Configuring a data collector Enabling a data collector Modifying a configuration Enabling TTAPI for JDBC for a Data Collector About this task For Data Collectors that support TTAPI for JDBC, enable it on the Enable TTAPI for JDBC page. To enable TTAPI for JDBC for a Data Collector: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Enable TTAPI for JDBC on the left navigation menu. 3. Click in the Enable check box next to the data collector for which you want to enable TTAPI for JDBC. 4. Click the Apply button at the bottom of the table. Related tasks “Disabling TTAPI for JDBC for a Data Collector” Related topics Disabling TTAPI for JDBC for a Data Collector About this task For Data Collectors that have TTAPI for JDBC enabled, disable it on the Enable TTAPI for JDBC page. To disable TTAPI for JDBC for a Data Collector: 1. From the top navigation, click Administration > Server Management > Data Collector Configuration. The Configured Data Collector Overview page opens. 2. Click Enable TTAPI for JDBC on the left navigation menu. 60 ITCAM for Application Diagnostics: User Guide Click in the Disable check box next to the data collector for which you want to enable TTAPI for JDBC. 4. Click the Apply button at the bottom of the table. Related tasks “Enabling TTAPI for JDBC for a Data Collector” on page 60 Related topics 3. Data Collector Profiles A data collector profile is a collection of multiple configuration changes that can be stored together and applied to a data collector. You can use the Data Collector profiles feature to modify the data collector properties file and toolkit files on a data collector, from the Managing Server Visualization Engine. It is still possible to modify these files when configuring a data collector. Data Collector profiles can be installed on monitored application servers running ITCAM for WebSphere/J2EE Data Collector 6.1 FP4 or higher. For more information, refer to the ITCAM for Application Diagnostics - Agent for WebSphere Installation and Configuration Guide. From the Managing Server Visualization Engine, you can check which data collector profiles are installed on which data collector. You can add and remove profiles to and from data collectors. You can also import and export data collector profiles from other managing servers. If you change a data collector profile it must be reinstalled on the data collector and the data collector needs to be restarted for the changes to take effect. You can access the Data Collector Profiles using one of the following methods: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. Click the toolbox icon tab. on the Active Requests tab or the Recent Requests The Data Collector profiles page displays a list of existing profiles if profiles have been created already. Click a profile name to view which data collectors are using that profile. The DC Profiles Menu contains a list of configurable items that you can modify on each profile. For more information see: v “Viewing and editing data collector profiles” v “Exporting a data collector profile” on page 64 v “Importing a data collector profile” on page 63 v v v v “Adding and removing data collector profiles” on page 62 “Configuring a data collector profile” on page 64 “Installing a profile on a data collector” on page 71 “Uninstalling a data collector profile” on page 72 Viewing and editing data collector profiles You can view and edit profiles at any stage. You can also edit data collector profiles while they are assigned to a data collector. Access the Data Collector Profiles using one of the following methods: Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 61 v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. on the Active Requests tab or the Recent Requests Click the toolbox icon tab. 1. The Data Collector profiles page displays a list of existing profiles if profiles have been created already. 2. Click a profile name to view which data collectors are using that profile. 3. In the DC Profiles Menu, click the individual configuration items to view the details of each item. 4. For more information about the configuration items and how to edit them see “Configuring a data collector profile” on page 64. 5. In the DC Profiles Menu, you can click Data Collectors to view a list of data collectors available. 6. When you click on a data collector name you can also click Profiles Installed to view the profiles assigned to the data collector. 7. If you are editing a profile, select a configuration item from the Profiles list in DC Profiles Menu, click Apply then click Save to add the changes to the profile. When you edit a profile that is assigned to a data collector, the status of the profile changes to Outdated in the Profiles Installed list. To implement the updated profile changes on the data collector you need to reinstall the profile on the data collector. For more information see “Installing a profile on a data collector” on page 71. Then the Data Collector needs to be restarted for the changes to take effect. See also: v “Data Collector Profiles” on page 61 v “Exporting a data collector profile” on page 64 v “Importing a data collector profile” on page 63 v “Adding and removing data collector profiles” v “Uninstalling a data collector profile” on page 72 Note: If you click refresh or F5 on your browser from any page in Data Collector Profiles, you will return to the main Data Collector Profiles page. Adding and removing data collector profiles You can add or remove data collector profiles at any stage. Access the Data Collector Profiles using one of the following methods: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. Click the toolbox icon tab. on the Active Requests tab or the Recent Requests The page has two main areas; the DC Profiles Menu and the Profiles area of the page. You can use the DC Profiles Menu to edit, add, and remove configurable items from profiles. You can use the Profiles area of the page to add, edit, and remove data collector profiles. 62 ITCAM for Application Diagnostics: User Guide v Click Profiles to view a list of existing profiles. v Click DC Profiles Menu to view a list of available data collectors. 1. To add a profile, click New. 2. In the Name field, type the name you want to give the profile. 3. Click Apply. 4. In the DC Profiles Menu, click the items you want to configure to add to this profile. 5. For more information see “Configuring a data collector profile” on page 64. 6. Then click Save to add the profile to the list of Data collector profiles. 7. To delete a profile select the check box then click Delete. When you delete a profile that is assigned to a data collector the status of the profile changes to Outdated in the Profiles Installed list. The Data Collector needs to be restarted for the changes to take effect. See also: v “Data Collector Profiles” on page 61 v “Viewing and editing data collector profiles” on page 61 v “Exporting a data collector profile” on page 64 v “Importing a data collector profile” v “Configuring a data collector profile” on page 64 v “Installing a profile on a data collector” on page 71 v “Uninstalling a data collector profile” on page 72 Importing a data collector profile You can import a data collector profile from other locations for use on other managing servers. Access the Data Collector Profiles using one of the following methods: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. on the Active Requests tab or the Recent Requests Click the toolbox icon tab. 1. The Data Collector profiles page displays a list of existing profiles if profiles have been created already. 2. Click Browse to locate the .xml file you want to import. 3. Select the .xml file and click Open. 4. Select the profile you want to overwrite by selecting the check box in the Select column. 5. Click Import. 6. If you are importing a file with the same profile name a message displays. Click OK to overwrite the existing profile. 7. If you are importing a new file, then a new profile is created. See also: v “Installing a profile on a data collector” on page 71 v “Uninstalling a data collector profile” on page 72 v “Data Collector Profiles” on page 61 Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 63 v v v v “Viewing and editing data collector profiles” on page 61 “Exporting a data collector profile” “Adding and removing data collector profiles” on page 62 “Configuring a data collector profile” Exporting a data collector profile You can export data collector profiles to other locations for use on other managing servers. Access the Data Collector Profiles using one of the following methods: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. on the Active Requests tab or the Recent Requests Click the toolbox icon tab. 1. The Data Collector profiles page displays a list of existing profiles if profiles have been created already. 2. Select the profile by selecting the check box in the Select column. 3. Click Export to launch an .xml version of the profile in your browser. 4. From the browser menu, click File> Save as and select the location you want to export the file to. 5. Then close the browser. See also: v “Data Collector Profiles” on page 61 v “Viewing and editing data collector profiles” on page 61 v “Importing a data collector profile” on page 63 v v v v “Adding and removing data collector profiles” on page 62 “Configuring a data collector profile” “Installing a profile on a data collector” on page 71 “Uninstalling a data collector profile” on page 72 Configuring a data collector profile When you are creating a profile there are a number of items you can configure. You can select the items you want to configure, not all items are required to be configured. You can also modify existing items. When you have configured a profile you can install it on one or more data collectors. Access the Data Collector Profiles using one of the following methods: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. Click the toolbox icon tab. on the Active Requests tab or the Recent Requests The Data Collector profiles page displays a list of existing profiles if profiles have been created already. Click on the Profile, a list of configurable items displays in the DC Profiles Menu. 64 ITCAM for Application Diagnostics: User Guide Click on the following links for more details on configuring each item in a data collector profile. v “PMI” (WebSphere products only) v “Custom Request” on page 66 v “Custom L2” on page 67 v “Method Entry and Exit” on page 68 v “Lock Analysis” on page 69 v “Memory Diagnosis” on page 69 v “Custom MBeans” on page 70 v “Tuning Parameters” on page 71 See also: v “Data Collector Profiles” on page 61 v “Viewing and editing data collector profiles” on page 61 v v v v v “Adding and removing data collector profiles” on page 62 “Importing a data collector profile” on page 63 “Exporting a data collector profile” on page 64 “Installing a profile on a data collector” on page 71 “Uninstalling a data collector profile” on page 72 PMI: This feature is available for WebSphere products only. Standard WebSphere Application Server PMI modules are automatically included in monitored JVM and are rendered on the Managing Server Visualization Engine. If your environment is using WebSphere Process Server or WebSphere Commerce, the PMI modules associated with these products are not rendered to the Managing Server Visualization Engine. You can use this feature to add the PMI module names for these products to data collector profiles. For information about the PMI module names for these products, refer to the following documentation links: v WebSphere Commerce http://publib.boulder.ibm.com/infocenter/wchelp/ v6r0m0/index.jsp v WebSphere Process Server http://publib.boulder.ibm.com/infocenter/ dmndhelp/v6r2mx/topic/com.ibm.websphere.wps.620.doc/welcome_wps.html To add a PMI module to a data collector profile, choose one of the following options to access the PMI feature: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. Click the toolbox icon tab. on the Active Requests tab or the Recent Requests The Data Collector profiles page displays a list of existing profiles if profiles have been created already. 1. Click the profile Name. 2. In the DC Profiles Menu, click PMI. 3. In the PMI Module Name field, type the module name add a custom PMI module. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 65 Note: This information applies to WebSphere products only. 4. Click Apply or Save to implement the changes to the profile. When the PMI module name is added to the profile, the next step is to install the profile on a data collector. When the Managing Server is restarted, the PMI module displays on the Managing Server Visualization Engine System Resource page, when the corresponding data collector is selected. See also: v “Custom Request” v “Configuring a data collector profile” on page 64 v “Data Collector Profiles” on page 61 v “Viewing and editing data collector profiles” on page 61 v “Adding and removing data collector profiles” on page 62 v “Installing a profile on a data collector” on page 71 v “Uninstalling a data collector profile” on page 72 Custom Request: A custom request is an application class and method that you designate as an edge or nested request. This feature defines custom request methods and classes that are included in L2 Method Trace. Access the Data Collector Profiles using one of the following methods: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. Click the toolbox icon tab. on the Active Requests tab or the Recent Requests The Data Collector profiles page displays a list of existing profiles if profiles have been created already. 1. Click the profile Name. 2. In the DC Profiles Menu, click Custom Request. 3. Click New. 4. Complete the following fields: v Request Name: Identifies the unique name for this request. The request name is displayed in the L1 or L2 trace entry that is produced when one of the methods identified by this custom request runs. v Class Name: Identifies the name of the class. v Method Name: Identifies the names of the methods within one of the classes that are to be Byte-Code-Instrumented for custom request processing. 5. Select the Type by clicking one of the following options: a. Class b. Superclass c. Interface 6. Click OK to save the Custom Request. 7. To edit a custom request, click Custom Request and edit the fields on display, click Save to implement the changes to the profile. 66 ITCAM for Application Diagnostics: User Guide 8. To delete a custom request from a data collector profile, on the Profile Custom Requests page select the check box in the select column, then click Delete. See also: v “Custom L2” v “Configuring a data collector profile” on page 64 v “Data Collector Profiles” on page 61 v “Viewing and editing data collector profiles” on page 61 v “Adding and removing data collector profiles” on page 62 v “Installing a profile on a data collector” on page 71 v “Uninstalling a data collector profile” on page 72 Custom L2: The data collector uses a technique called Byte Code Instrumentation (BCI) to collect data from various types of J2EE APIs that typically operate as nested requests. BCI is automatically enabled for these types of APIs. You can use Custom L2 to enable and disable L2 instrumentation components if you want to lower the monitoring workload on the data collector. You can also define new L2 events using the Custom L2 events option. 1. Click the profile Name. 2. In the DC Profiles Menu, click Custom L2. You can enable or disable the following events: v SERVLET v v v v v v v v v v v 3. 4. 5. 6. JDBC (Java Database Connectivity) JMS (Java Message Service) HTTP Session Count CTG (CICS® Transaction Gateway) JDO ( Java Data Objects) MQI (Message Queue Interface) EJB (Enterprise Java Beans) JNDI (Java Naming and Directory Interface) JCA (Java Connector Architecture) Axis Web Service (JBoss and Weblogic) IMS v RMI (Resource Manager Interface) Select the check box to enable an event. Clear the check box to disable an event. To add Custom L2 events In the Custom L2 event area of the page click New. In the Event Type drop down menu, select one of the following options to enable or disable the instrumentation: v SERVLET v EntityBean v SessionBean v Message Driven Bean 7. Type the Class Name. 8. Select the Enabled check box to save the event. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 67 9. On the main page select the check box to assign the custom event to the profile. 10. Click Apply, click Save. v To edit an L2 custom event, click the Event Type, add the changes click Apply, click Save. v To delete an L2 custom event, select the check box for the Event Type, click Delete. See also: v “Method Entry and Exit” v “Configuring a data collector profile” on page 64 v “Data Collector Profiles” on page 61 v “Viewing and editing data collector profiles” on page 61 v “Adding and removing data collector profiles” on page 62 v “Installing a profile on a data collector” on page 71 v “Uninstalling a data collector profile” on page 72 Method Entry and Exit: You can use this item to select classes to include or exclude on the monitored JVM used for classes and methods in L3 methods traces. 1. 2. 3. 4. In the DC Profiles Menu, click Method Entry/Exit. A list of existing classes assigned to the profile display. Click New to add a new class to the profile. From the Lookup Sever drop-down menu, select the server. 5. 6. 7. 8. A list of available classes display. Click a file to expand the view and see the classes. Select the check boxes associated with the classes you want to add click Add. Click Save to add the classes to Method Trace Entry and Exit. 9. To remove a class, select the check box for the class you want to remove then click Apply and Save. To create a class to add to Method Entry/Exit. Type Class Name. Type the New Method Name. Click Add to display the class. Select the check box then click Apply to add the class to the list of existing classes for Method Exit Entry. 5. From the list select the check boxes for the classes that you want to add. 6. Click Save. v To edit a class, in the Method Entry/Exit page, click the Class Name, add the changes then click Apply. v To remove a class, select the check box for the class then click Delete then click Save. 1. 2. 3. 4. See also: v “Lock Analysis” on page 69 v “Configuring a data collector profile” on page 64 v “Data Collector Profiles” on page 61 68 ITCAM for Application Diagnostics: User Guide v v v v “Viewing and editing data collector profiles” on page 61 “Adding and removing data collector profiles” on page 62 “Installing a profile on a data collector” on page 71 “Uninstalling a data collector profile” on page 72 Lock Analysis: You can use this feature to probe classes for lock analysis. All application classes are included by default. You can access these classes from the Lookup Server. Use the add option to add new entries containing classes or methods to be included or excluded for lock analysis. 1. In the DC Profiles Menu, click Lock Analysis. 2. From the Lookup Sever drop-down menu, select the server. 3. A list of available classes display. 4. Click a file to expand the view and see the classes. 5. Select the check boxes associated with the classes you want to add click Add. 6. Click Save to add the classes to Lock Analysis. Use the following steps to add a class: 1. To add a class, in the DC Profiles menu, click Lock Analysis. 2. Type New Class Name. 3. Click Add. 4. In theClasses to Monitor list, select the check box then click Apply and then Save to add the class to Lock Analysis. 5. To remove a class, select the check box for the class you want to remove then click Delete then click Apply and Save. See also: v “Memory Diagnosis” v “Configuring a data collector profile” on page 64 v v v v v “Data Collector Profiles” on page 61 “Viewing and editing data collector profiles” on page 61 “Adding and removing data collector profiles” on page 62 “Installing a profile on a data collector” on page 71 “Uninstalling a data collector profile” on page 72 Memory Diagnosis: You can use this feature to select classes to use in Memory diagnosis. All memory classes are included for memory leak diagnosis in L3 mode by default. Memory diagnosis can be restricted to a selected combination of allocating and allocated classes. 1. In the DC Profiles Menu, click Memory Diagnostic. 2. To add heap allocation classes click New. 3. In the New Allocating Class Name field, type the name of the class that allocates objects to Memory Diagnosis. New Allocating Class Name identifies the name of a class or classes to be modified. 4. In the New Allocated Class Name field, type the name of the class allocated to include in the Memory Diagnosis. The New Allocated Class Name identifies the specific heap allocation requests within the class or classes. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 69 5. Click Add to add the class to the Allocated Classes to monitor list. 6. In the Allocated classes to monitor list, select the check box for the class name you want to add to the Allocating classes. 7. Click Apply and Save to save the class to the Heap Allocations list. 8. To remove a class from theAllocated Classes to monitor list, select the check box then click Delete then click Apply and Save to implement the changes. v To edit a class, from the Heap Allocations list, click the class name, make the necessary changes then click Apply and Save. v To delete a class from the Heap Allocations list, select the check box then click Delete then click Apply and Save to implement the changes. See also: v “Custom MBeans” v “Configuring a data collector profile” on page 64 v “Data Collector Profiles” on page 61 v “Viewing and editing data collector profiles” on page 61 v “Adding and removing data collector profiles” on page 62 v “Installing a profile on a data collector” on page 71 v “Uninstalling a data collector profile” on page 72 Custom MBeans: You can include MBeans to be rendered on the System resource page on the Managing Server Visualization Engine. You can add new entries or use the lookup server drop down menu to query existing beans and select attributes. 1. In the DC Profiles Menu, click Custom MBeans to display the Profile Custom MBean page. 2. Use the following steps to manually add Custom MBeans to the Managing Server. 3. Domain: Type the Domain name. 4. Object Name; Type the MBean Object Name. 5. Category: Type the unique Category Name (used by ITCAM). 6. Select the Retrieve all Attributes check box if you want to add all attributes associated with the MBean. 7. Attribute Name: Type the name of the attribute. 8. Mapped Key Name: Type the unique key string to map the attribute (used by ITCAM). 9. Object Name Pattern: Type the MBean pattern to search in the form. 10. Click Add to add the MBean to the list. To add MBeans from the Look up Server drop-down menu use the following steps: 1. From the Look up Server drop-down menu, select the application server. 2. From the Select MBean drop-down menu, select the MBean you want to add. 3. From the Select Attributes drop-down menu, select the attribute you want to add. 4. Click Apply to add the Custom MBeans to the list. 5. From the Custom MBeans list, select the check boxes for the Custom MBeans you want to add to the data collector profile. 70 ITCAM for Application Diagnostics: User Guide 6. Click Apply then click Save. v To edit a Custom MBeans from the Custom MBeans list, click the MBean Object name, make the necessary changes then click Apply and Save. v To delete a Custom MBeans from the Custom MBeans list, select the check box then click Delete then click Apply and Save to implement the changes. See also: v “Tuning Parameters” v “Configuring a data collector profile” on page 64 v “Data Collector Profiles” on page 61 v v v v “Viewing and editing data collector profiles” on page 61 “Adding and removing data collector profiles” on page 62 “Installing a profile on a data collector” “Uninstalling a data collector profile” on page 72 Tuning Parameters: You can configure tuning parameters and apply then to the data collector profiles on the data collectors. Note: Data Collector Tuning parameters cannot be reversed by uninstalling the profile, However, they can be modified back to the original value. 1. In the DC Profiles Menu, click Tuning Parameters. 2. From the Tuning Parameters drop-down menu, select the parameter you want to add. 3. Repeat this process for each parameter you want to add. 4. Detailed information relating to each parameter you select displays in the Selected Tuning Parameters page. 5. When a selected parameter displays in the list, type a value in the Value column for each parameter. 6. Click Apply and then click Save to add the parameters to the data collector profile. 7. Select the check box to add a parameter to the data collector profile. Click Apply then Save. 8. To remove a parameter, select the check box then click delete and then Save to remove a parameter from the profile. See also: v “Configuring a data collector profile” on page 64 v v v v v “Data Collector Profiles” on page 61 “Viewing and editing data collector profiles” on page 61 “Adding and removing data collector profiles” on page 62 “Installing a profile on a data collector” “Uninstalling a data collector profile” on page 72 Installing a profile on a data collector When you create a data collector profile, the next step is to add it to a data collector. You then need to restart the managing server for the changes to take effect. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 71 Access the Data Collector Profiles using one of the following methods: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. Click the toolbox icon tab. on the Active Requests tab or the Recent Requests The Data Collector profiles page displays a list of existing profiles if profiles have been created already. 1. Click the profile name to view the list of data collectors assigned to that profile. 2. If you want to view details of the profile, from the DC Profiles Menu, click the configurable items. 3. To assign a profile to a Data Collector, from the DC Profiles Menu, click Data Collectors to view all the available data collectors. 4. Select the check box in the Select column of each data collector you want to add a new profile to. 5. Click Install to display the list of data collector profiles available. 6. Select the check box in the Select column of the profile you want to add. 7. Click Merge if you want to retain any manual entries made by manually editing the xml and the properties file as well as the changes made to the profile. 8. Click Overwrite to remove all manual changes and to replace them with the changes in the data collector profile. 9. If you are reinstalling an updated version of an existing profile, click Overwrite to update the profile on the data collector. You will need to restart the managing server for all changes to take effect. See also: v “Uninstalling a data collector profile” v “Configuring a data collector profile” on page 64 v “Data Collector Profiles” on page 61 v v v v v “Viewing and editing data collector profiles” on page 61 “Adding and removing data collector profiles” on page 62 “Importing a data collector profile” on page 63 “Exporting a data collector profile” on page 64 “Uninstalling a data collector profile” Uninstalling a data collector profile You can uninstall a data collector profile from a data collector at any stage. You then need to restart the managing server for the changes to take effect. Access the Data Collector Profiles using one of the following methods: v From the main menu, click Administration > Server Management > Data Collector Profiles. v From the main menu, click Problem Determination > Server Activity Display. Click the toolbox icon tab. on the Active Requests tab or the Recent Requests The Data Collector profiles page displays a list of existing profiles if profiles have been created already. 72 ITCAM for Application Diagnostics: User Guide 1. From the DC Profiles Menu, click Data Collectors to view all the available data collectors. Click Refresh list update the current list of available data collectors 2. Click a data collector name to view the list of profiles assigned to the data collector. 3. Select the check box in the Select column of the profile you want to remove. 4. Click Uninstall to remove the profile from the data collector. 5. You then need to restart the managing server for the changes to take effect. See also: v “Configuring a data collector profile” on page 64 v “Data Collector Profiles” on page 61 v “Viewing and editing data collector profiles” on page 61 v v v v “Adding and removing data collector profiles” on page 62 “Importing a data collector profile” on page 63 “Exporting a data collector profile” on page 64 “Installing a profile on a data collector” on page 71 Monitoring on Demand (TM) In the Monitoring on Demand (MOD) pages, you can view and adjust the monitoring level for all servers, and schedule adjustment of this level at fixed times. To view the Monitoring on Demand page, from the top navigation, click Administration > Monitoring on Demand. You can also access this page from the toolbox icon on the Server Activity Display page. The Modify Server Settings page is displayed. You can use this page to change the selected Data Collector's monitoring level, select a different schedule, or change the current sampling rate. Overriding a monitoring level lasts until the next monitoring level begins, as determined by the schedule. Selected Group/Server displays the server the changes are applied to. 1. Select the Schedule Selection from the drop-down menu. 2. Select the Override Monitoring Level from the drop-down menu. v System Default v L1 Production Mode v L2 Problem Determination Mode v L3 Tracing Mode 3. Select the Enable Method Profiling check box and type the number of minutes that you want to use. 4. Select the Sampling Rate for the monitoring level you select. 5. Override Transaction CPUMON Level (CICS only) Select the level from the drop-down menu. The monitoring level for a server defines the amount of data collected for it. The higher the monitoring level, the more details are collected and the larger Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 73 performance overhead is introduced by the Data Collector. The available Monitoring Levels are L1 (Production mode), L2 (Problem Determination mode), and L3 (Tracing mode). You can create schedules that defines preset times at which the monitoring level is to be changed, then apply different schedules to different servers. You can also set (override) the monitoring level manually for any server at any time. To view the monitoring level for all servers, adjust it manually and assign schedules for its adjustment, select MOD Console in the left navigation pane. See “MOD Console.” To view the schedules and modify them, select Schedule Management in the left navigation pane. See “Schedule Management” on page 75. To create a new blank schedule, select Create Schedule in the left navigation pane. See “Creating a schedule” on page 75. To create a schedule as a copy of an existing schedule, select Duplicate Schedule in the left navigation pane. See “Duplicating a schedule” on page 78. Tip: To change the default monitoring level, used when no schedule or override is applied, see “Configuring the Data Collection settings” on page 79. Related topics “Configuring the Data Collection settings” on page 79 User Scenarios Scenario 1: Setting a schedule for detailed monitoring at night Your manager wants you to monitor your servers at Level 3 during off hours because that's when the load is the lightest. As the ITCAM for Application Diagnostics administrator, you set a schedule to monitor the servers during business hours at Level 1 and at night at Level 3. Scenario 2: Overriding the monitoring level during an emergency An emergency arises that requires Level 3 monitoring to locate a problem. As the ITCAM for Application Diagnostics administrator, you override the current schedule and set the monitoring level to Level 3. After fixing the problem, you can reset the monitoring level or wait until the next schedule change. MOD Console The MOD Console page shows a table of all servers and the monitoring level set for them. You can manually set (override) this level and assign a schedule for automatically changing it as preset times. If you want to only see servers in a particular server group, use the All Groups pull down control at the top of the table to select the group. For every server, the table shows: v Group and Server name. v Platform (operating system) the server uses. v The name of the Schedule currently applied to it. If a Schedule is applied, it determines automatic adjustment of server monitoring level at preset times. 74 ITCAM for Application Diagnostics: User Guide v v v v Current monitoring level. Current sampling rate. Current CPU load. Schedule Change/Override button. To set (override) the monitoring level for a server or to assign a schedule for automatically changing it as preset times, click the Schedule Change/Override button. See “Overriding a monitoring level” on page 77 and “Applying a schedule” on page 76. To view or modify a schedule, click the schedule name. See “Modifying a schedule” on page 77. You can use the left navigation pane to view the existing schedules and create a new schedule. See “Monitoring on Demand (TM)” on page 73. Schedule Management The Schedule Management page shows a table of all schedules. A schedule defines preset times at which the monitoring level for a server should be changed. You can modify and delete the schedules, and set the monitoring level or change the schedule for servers. For every schedule, the table shows the schedule name, the server name, and a Delete button. To modify a schedule, click the schedule name. See “Modifying a schedule” on page 77. To set (override) the monitoring level or change the schedule for a server, click the server name. See “Overriding a monitoring level” on page 77 and “Applying a schedule” on page 76. To delete a schedule, click the Delete button. See “Deleting a schedule” on page 78. You can use the left navigation pane to view the monitoring levels for all servers and create a new schedule. See “Monitoring on Demand (TM)” on page 73. Creating a schedule About this task At times a server might need more detailed monitoring, you can create a schedule that changes the monitoring level based on a specified date and time. Using the schedule, modulate the monitoring level at different times based on the anticipated load on the server. To create a schedule: 1. From the top navigation, click Administration > Monitoring on Demand TM. The Monitoring on Demand TM (MOD) Console page opens. 2. Click Create Schedule on the left navigation pane. The Schedule Detail page opens where you can create a new schedule. 3. Enter a Schedule Name for the new schedule. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 75 4. Select the Day of the Month or the Day of the Week when you want your schedule to take effect; for example, you might want the schedule to start on the 5th of every month or on every Monday. 5. Select the Hour and Minute when the schedule starts. 6. Select the Monitoring Level that best suits your needs: L1, L2, or L3. 7. Click Add to insert the settings into the schedule. Each schedule can include multiple monitoring level changes; to save each change, click Add. 8. To save the schedule, click Save. The Schedule Management page opens with the new schedule displayed. In the event of a schedule conflict, the most recently entered item will take precedence. Do not create an overly complicated schedule or else you will never know at what level of monitoring your servers are running. Keep the rules simple. L1 has the smallest overhead, while L3 is heavier. When L2 applies, it has optimum overhead and allows you to switch to L3 without the need to restart. You might want minimum one or maximum 5% of your servers running at L3, either as dedicated servers, or only during non-peak hours. This arrangement will give you good quality data for workload tracing and application sizing. In the case of the z/OS environment, you might want to create a server instance that runs at L3. Related topics Applying a schedule Overriding a monitoring level “Overriding a monitoring level” on page 77 Applying a schedule About this task After creating a schedule, you can apply it to a server that needs monitoring. You may also apply other existing schedules to a server. To apply a schedule: 1. From the top navigation, click Administration > Monitoring on Demand. The Monitoring on Demand (MOD) Console page opens. 2. Click Schedule Change/Override for the server where you want to apply a schedule. The Modify Server Settings page opens. 3. Click to select a schedule from the schedule selection list box for the server. 4. Enter a percentage in the boxes for sampling setting or choose the default setting by checking the system default box. 5. Click OK. The MOD Console page displays the server with the schedule applied in the table. Note: A schedule can be applied at the group level and the all servers level as well. Related topics Creating a schedule Deleting a schedule Modifying a schedule 76 ITCAM for Application Diagnostics: User Guide Overriding a monitoring level About this task In case you need to collect more or less detailed data in a particular period of time, you can override the current monitoring level until the next scheduled monitoring level occurs. To override a monitoring level: 1. From the top navigation, click Administration > Monitoring on Demand. The Monitoring on Demand (MOD) Console page opens. 2. Click Schedule Change/Override for the server or group that you want to override its current monitoring level. The Modify Server settings page opens. 3. Click to select a monitoring level from the override monitoring level drop down box. If you select L2, you will be given the option to check MP for Method Profiling. The time interval setting in Enable Method Profiling is for how often the Data Collector should aggregate method data and push the data to the Managing Server. For example, if the interval setting is 60 minutes, then it means, every 60 minutes, the Data Collector aggregates the method data and push the data to the Managing Server. To disable the Method Profiling feature, clear "Enable Method Profiling". You can view the method profile reports on the Method Profiling Management page. If you override the system default monitoring level, the request sampling setting will also be changed according to the default monitoring level that the server is running on. 4. Click OK. Due to overhead when collecting transaction CPU in CICS, Application Diagnostics 7.1 offers the option to specify the level for collecting CICS CPU. Called the Transaction CPUMON Level, this option is available on the Monitoring on Demand Override page (accessed via Administration > Monitoring on Demand, click Schedule Change/Override) and on the System Properties page (accessed via Administration > Managing Server > System Properties). In both cases, the options include: v Do Not Collect v Collect at Monitoring Level L1, L2, and L3 v Collect at Monitoring Level L2 and L3 v Collect at Monitoring Level L3 only With these alternatives, you can plan to collect transaction CPU when the load on your system is not overwhelming. Collect at Monitoring Level L3 only is the default. Modifying a schedule About this task If you find that an existing schedule is not providing the correct level of monitoring, modify the schedule to reflect your needs. Keep your schedules current based on the ever fluctuating needs of your data center. To modify a schedule: 1. From the top navigation, click Administration > Monitoring on Demand. The Monitoring on Demand (MOD) Console page opens. 2. Click the schedule name for the schedule you want to modify on the console page or the Schedule Management page. The View MOD Schedule page opens. 3. Click Modify Schedule. The Schedule Detail page opens. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 77 4. Enter the information to modify the schedule setting. 5. Click Add to insert the settings into the schedule. Each schedule can include multiple monitoring level changes; to save each change, click Add. 6. To save the schedule, click Save. Note: Changes take effect immediately. Related topics Applying a schedule Configuring the Data Collection settings Deleting a schedule About this task Keep your schedules updated by deleting schedules from the system that are no longer in use. To delete a schedule: 1. From the top navigation, click Administration > Monitoring on Demand TM. The Monitoring on Demand TM (MOD) Console page opens. 2. Click Schedule Management on the left navigation pane. The Schedule Management page opens. 3. Click X or Delete next to the schedule you want to remove. 4. At the confirmation box, click OK to delete the schedule. The Schedule Management page displays without the deleted schedule. If a schedule is currently being used by a server, you have to apply another schedule to that server or it will automatically apply the system default after you delete the schedule. Duplicating a schedule About this task Save time by duplicating schedules. Duplicating a schedule allows you to quickly create a new schedule based on the settings of an existing schedule. To duplicate a schedule: 1. From the top navigation, click Administration > Monitoring on Demand TM. The Monitoring on Demand TM (MOD) Console page opens. 2. Click Duplicate Schedule on the left navigation pane. The Duplicate Schedule page opens. 3. From the Schedule list box, select the schedule you want to duplicate. 4. Enter a new name for the duplicated schedule. 5. Click Save. The Schedule Management page opens displaying the duplicated schedule. Related topics Applying a schedule Modifying a schedule Managing server Tune and debug the managing server. 78 ITCAM for Application Diagnostics: User Guide The managing server section is separated into two categories: system properties and self-diagnosis. System properties enable you to tune ITCAM, while self-diagnosis provides you with a method for debugging the managing server when problems arise. System properties In the System Properties pages, you can set defaults for server data collection, baseline settings for the Enterprise Overview display in the Visualization Engine, and SNMP settings. To view the System Properties pages, from the top navigation, click Administration > Monitoring Server > System Properties. To set default values for server data collection, select Data Collection Settings in the left navigation pane. See “Configuring the Data Collection settings.” To set the values for baseline indication in the Enterprise Overview display, select Enterprise Overview Display in the left navigation pane. See “Configuring the Enterprise Overview display” on page 80. To configure the SNMP network, select SNMP in the left navigation pane. See “Configuring the SNMP network” on page 81. Configuring the Data Collection settings About this task Use the Data Collection settings to set and modify the system settings for the managing server to regulate the frequency of data collection, the percentage of data stored and the level of monitoring. The default data collection settings can be established at the managing server level, then overridden by configuration settings specific to each configured data collector. To configure the Data Collection settings: 1. From the top navigation, click Administration > Managing Server > System Properties. The System Properties page opens. 2. Enter the appropriate value for the following properties: v System Resources Polling Frequency - Set how often the system resources requests information from your application server. The default setting is 60 seconds. v Request Sampling Rate - The percentage of requests stored in the database for reporting and analysis. The default request sampling rate is 2%. v Default Monitoring Level - The currently set default monitoring level for all servers connected to the application monitor. This is the case when configuring a server for the first time and bringing up the server under the management of the application monitor. The default monitoring level for the non z/OS platform is L2 (Problem Determination). As for the z/OS platform, the default monitoring level is L1 (Production Mode). The monitoring levels are as follows: – L1 (Production mode) – this monitoring level provides availability management, system resources and basic request-level data. This monitoring level least affects the CPU overhead per transaction and is appropriate for servers that are not malfunctioning. – L2 (Problem determination mode) – this monitoring level provides production level monitoring plus advanced request data, including Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 79 external component and CPU information, as well as additional monitoring fields and functions. Under problem determination mode you can view component traces. These are traces that show J2EE request-related events that are made to external services. Use this level when you suspect a problem or need to capture data about external events but do not need all the method-level data. When you select L2, you will be given the option to check MP for Method Profiling. This feature allows you to determine how often the data collector will aggregate method data and send the data to the managing server: 1-999 minutes. You can view the method profile reports on the Method Profiling Management page. – L3 (Tracing Mode) – this is the most powerful monitoring level, therefore only this level utilizes all reporting elements available. For example, in L3 the server activity display shows additional data for the following columns: Accumulated CPU, Last Known Class Name, Last Known Method, and Last Known action. In addition, on the Request Detail page, the method trace with SQL statements are also available. L3 has inherently higher overhead than the other monitoring levels. Use this level for servers that have been selected for diagnostics and detailed workload characterization. v Transaction CPU Time (CICS only) - This field indicates whether the CPU times for a CICS transaction will be collected or not. The CPU times for CICS tasks are reported, but if you want to avoid overhead from the data capture, adjust these settings as necessary. Select one of the following four options for collecting transaction CPU: – Do Not Collect – Collect at Monitoring Level L1, L2, and L3 – Collect at Monitoring Level L2 and L3 – Collect at Monitoring Level L3 only v Maximum Method Records - The maximum number of method trace records. The records will be cycled through, showing the 10,000 (or Maximum Method Records value) most recent methods in the system. The default value is 10,000. v Maximum IMS™ Message Data Length - The maximum length of the IMS message data. The default is 256. 3. Click Save. Related topics Configuring the Enterprise Overview display Configuring the SNMP network Configuring the Enterprise Overview display About this task Use the Enterprise Overview Display settings to set the response time Baseline Indicators and Baseline Definitions. The Baseline Indicator is the percentage above the baseline that you determine to indicate slow or very slow response. The Baseline Definition determines how the baseline is calculated. These thresholds apply to the average of average response times for all servers in the group. To configure the Enterprise Overview display: 1. From the top navigation, click Administration > Managing Server > System Properties. The System Properties page opens. 2. On the left navigation pane, click Enterprise Overview Display. The Enterprise Overview Display page opens. 80 ITCAM for Application Diagnostics: User Guide 3. Enter the appropriate value for the following properties: v Baseline Indicator Settings - The percentage above the baseline that indicates slow or very slow response time. Slow response means the present response time is between 26% and 50% of the baseline; very slow response means the present response time exceeds 50% of the baseline. All averages are over 5 minute intervals. For example: if Indicator 1 is set to 25%, and Indicator 2 is set to 50%, average response times between 125% and 150% of the baseline are considered slow response. Average response times above 150% of the baseline are considered very slow response. v Baseline Definition Settings - The method to be used for determining the response time baseline. – Rolling Date - Historical response time data for this number of days is averaged to determine the baseline. – Fixed Date - Baseline is the average response time over the time interval midnight on the start date to 11:59PM on the end date. – Fixed Response Time - The response time entered in this field will become the response time against which your current response times on the enterprise overview page will be compared. 4. Click Save. These properties are actually defined at the group level for the servers once they are added to a group. The group properties take precedence over the system properties. When the response time reaches Indicator 1, an orange indicator will display on the Enterprise Overview page; a red indicator means the response time has exceeded Indicator 2. Related topics Configuring the Data Collection settings Configuring the SNMP network “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. Configuring the SNMP network About this task Use the SNMP network settings to indicate the configuration for the SNMP server. A test message will be sent to the SNMP network manager to test for an open connection. Note: Consult the Installation and Customization Guide for further instructions on the setup required to configure the SNMP network. To configure the SNMP network: 1. From the top navigation, click Administration > Managing Server > System Properties. The System Properties page opens. 2. On the left navigation pane, click SNMP. The SNMP Network Configuration page opens. 3. Click the Add SNMP Configuration button. Enter the appropriate value for the following properties: v Device Host Name or IP Address - The name or address of your SNMP Network Manager, to which SNMP messages will be sent. v Port Number - The port number of your SNMP Network Managers. v Community - A string that is part of the SNMP protocol. 4. Click Test and Save to send a test message to the SNMP Network Manager. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 81 5. Click Save to save your settings. Related topics Configuring the Data Collection settings Configuring the Enterprise Overview display Self-diagnosis In the Self-diagnosis pages, you can view details of ITCAM operation. This information can be useful for debugging. To view the Self-diagnosis page, from the top navigation, click Administration > Managing Server > Self-Diagnosis. These pages are designed for the Support staff to service ITCAM. The self-diagnosis provides a view of all the components currently running, their states and attributes. Since ITCAM is designed to run in a loosely-coupled, dynamic environment, individual components can be up or down without affecting the integrity of the whole system. Use the left navigation pane to select the Managing Server components for which debugging information will be shown. Viewing the Self-diagnosis for the kernel About this task The Self-diagnosis provides a view of all the components on the kernel currently running and their attributes. Since the application monitor is a dynamic environment, the components can be up or down without affecting the integrity of the whole system. To view the Self-diagnosis for the kernel: 1. From the top navigation, click Administration > Managing Server > Self-diagnosis. The Self-diagnosis page opens displaying the kernel's data. 2. In the left navigation pane, click the + Kernel Instances. 3. Click to select the kernel link you want to view. The kernel runtime environment detail displays. Related topics Viewing the Self-diagnosis for the archive agent Viewing the Self-diagnosis for the publish server Viewing the Self-diagnosis for the global publish server Viewing the Self-diagnosis for the data collector controller Viewing the Self-diagnosis for the message dispatcher Viewing the Self-diagnosis for the archive agent About this task The archive agent aggregates the data from the publish server and archives it into the database for reporting. The Self-diagnosis provides a view of all the components on the archive agent currently running and their attributes. To view the Self-diagnosis for the archive agent: 1. From the top navigation, click Administration > Managing Server > Self-diagnosis. The Self-diagnosis page opens. 82 ITCAM for Application Diagnostics: User Guide 2. In the left navigation pane, click + Archive Agents. 3. Click to select the archive agent you want to view. The data for the selected archive agent displays. Related topics Viewing the Self-diagnosis for the kernel Viewing the Self-diagnosis for the publish server Viewing the Self-diagnosis for the global publish server Viewing the Self-diagnosis for the data collector controller Viewing the Self-diagnosis for the message dispatcher Viewing the Self-diagnosis for the publish server About this task The publish server retrieves data from the data collector and aggregates it based on different needs. The Self-diagnosis provides a view of all the components on the publish server currently running and their attributes. To view the Self-diagnosis for the publish server: 1. From the top navigation, click Administration > Managing Server > Self-diagnosis. The Self-diagnosis page opens. 2. In the left navigation pane, click + Publish Servers. 3. Click to select the publish server you want to view. The data for the selected publish server displays. Related topics Viewing the Self-diagnosis Viewing the Self-diagnosis Viewing the Self-diagnosis Viewing the Self-diagnosis Viewing the Self-diagnosis for for for for for the the the the the kernel archive agent global publish server data collector controller message dispatcher Viewing the Self-diagnosis for the global publish server About this task The global publish server keeps track of composite requests, as they move from one server to another. The Self-diagnosis provides a view of the global publish server's attributes, as well as all the components with which the global publish server has relationships. To view the Self-diagnosis for the global publish server: 1. From the top navigation, click Administration > Managing Server > Self-diagnosis. The Self-diagnosis page opens. 2. In the left navigation pane, click + Global Publish Servers. 3. Click to select the global publish server you want to view. The data for the selected global publish server displays. Related topics Viewing the Self-diagnosis for the kernel Viewing the Self-diagnosis for the archive agent Viewing the Self-diagnosis for the publish server Viewing the Self-diagnosis for the data collector controller Viewing the Self-diagnosis for the message dispatcher Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 83 Viewing the Self-diagnosis for the data collector controller About this task The data collector controller regulates the behavior of a data collector, including the monitoring level, filter list, and enable or disable status. The Self-diagnosis provides a view of all the components on the data collector controller currently running and their attributes. To view the Self-diagnosis for the data collector controller: 1. From the top navigation, click Administration > Managing Server > Self-diagnosis. The Self-diagnosis page opens. 2. In the left navigation pane, click the Data Collector Controllers' link. 3. Click to select the data collectors you want to view. The data for the selected data collector controller displays. Related topics Viewing the Self-diagnosis for the kernel Viewing the Self-diagnosis for the archive agent Viewing the Self-diagnosis for the publish server Viewing the Self-diagnosis for the global publish server Viewing the Self-Diagnosis for the message dispatcher Viewing the Self-diagnosis for the message dispatcher About this task The message dispatcher sends out e-mails of performance reports and trap results from the Performance Analysis and Reporting and the Trap and Alert Management applications. The Self-diagnosis shows all the attributes of the message dispatcher currently running such as total number of e-mails sent. To view the Self-diagnosis for the message dispatcher: 1. From the top navigation, click Administration > Managing Server > Self-diagnosis. The Self-diagnosis page opens. 2. In the left navigation pane, click + Message Dispatchers. 3. Click to select the message dispatcher link you want to view. The message dispatcher runtime environment detail displays. Related topics Viewing the Self-diagnosis for the kernel Viewing the Self-diagnosis for the archive agent Viewing the Self-diagnosis for the publish server Viewing the Self-diagnosis for the global publish server Viewing the Self-diagnosis for the data collector controller Systems overview Assess your entire system. Systems overview allows you to evaluate the availability of your entire system by looking at recent performance trends. User Scenarios Scenario 1: Investigating an unresponsive system 84 ITCAM for Application Diagnostics: User Guide Your first line of support receives calls that some parts of the system are not responding. The support team goes to the Server Statistics Overview page and immediately sees that one server displays the red icon representing the “unavailable” status. The support team determines the unavailable server needs to be restarted, which will return the system to full functionality. Scenario 2: Monitoring proactively As the administrator of production systems, you have set appropriate thresholds for the fields displayed on the Server Statistics Overview page. During your regular monitoring you see that the Paging Rate threshold is being crossed. You know that the increase in paging rate probably means an increase in overhead. You can now increase memory, add servers, or take some similar course of action to keep production running smoothly. User Scenarios Scenario 1: Verifying customer response time complaints Customer service has been receiving complaints that your company's Web sites have been responding slowly. As one of the administrators of the servers, the inquiry has come to your attention. Upon opening the Enterprise Overview page, you immediately see that three of your production servers are no longer available. You also verify that the response time has degraded. Scenario 2: Diagnosing an application problem Customers have been complaining that they cannot place orders. As one of your company's administrators, you go to the Enterprise Overview page and see that all the servers are up. You find the group that appears to have the highest response time and drill down to the Server Overview page where you see that a database connection pool is saturated. Enterprise Overview The Enterprise Overview page shows a table of summary availability information for each server group. To view the Enterprise Overview page, from the top navigation, click Availability > Systems Overview > Enterprise. For every server group ("ALL" is a group consisting of all servers communicating to the Managing Server) the table shows: v A "traffic-light" indicator. Green means good availability, orange means problematic availability, and red means an alert. The indicator is set based on comparing the current response time with a baseline time determined from the average for a certain time. v Number of available servers, total number of servers in the group, and the percentage of servers that are available. v A Maintenance Mode column displays if a server group has one or more WebSphere Dynamic Cluster members. It shows the number of clusters in maintenance mode compared to the total number of servers in the group. v A graph showing throughput (requests per 5 minutes) for the last hour. v A graph showing the average response times, in milliseconds, over every 5 minutes for the last hour. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 85 v A tool button. To see availability information for individual servers in a group, click the name of the group. The “Group Overview” page will open. To see the activity for a group, click the tool button and select Server Activity Display. See “Server Activity Display” on page 114. To find a specific request for this group, click the tool button to select In-flight Request Search. The “In-flight request search” on page 112 page will open. To set the Enterprise Overview as the default page when you open the Visualization Engine, click Set as My Default page at the top right of the page. To switch to the “Group Overview,” “Server Overview,” “Alerts and Events” on page 106, “Problem Center” on page 107, and “Portal Overview” on page 88 use the tabs at the top of the page. Group Overview The Group Overview page shows a table of availability information for each server in a server group. To view the Group Overview page, from the top navigation, click Availability > Systems Overview > Group. To change the group, select the new group in the Servers In pull down control. ("ALL" is a group consisting of all servers communicating to the Managing Server). For every server in the group the table shows: v A "traffic-light" indicator. Green means good availability, orange means problematic availability, and red means an alert. The indicator is set based on comparing the current response time with a baseline time determined from the average for a certain time. v Server name v Status of the server v Total volume of requests processed by this server in the last hour v A graph showing throughput (requests per 5 minutes) for the last hour. v A graph showing the average response times, in milliseconds, over every 5 minutes for the last hour. To see detailed information for a server, click the server name. The “Server Overview” page will open. To set the Group Overview as the default page when you open the Visualization Engine, click Set as My Default page at the top right of the page. To switch to the “Enterprise Overview” on page 85, “Server Overview,” “Alerts and Events” on page 106, “Problem Center” on page 107, and “Portal Overview” on page 88 use the tabs at the top of the page. Server Overview The Server Overview page displays information and activity graphs for a server. 86 ITCAM for Application Diagnostics: User Guide To view the Server Overview page, from the top navigation, click Availability > Systems Overview > Server. To select a server for displaying information, select the group and server names from the pull down controls at the top of the page. The following information is displayed for the server under Server Information: v Server name. v Group name. v v v v v Platform (operating system). IP Address. Start time. Current monitoring level for this server. Number of problems detected on this server. The following information is displayed for the server under Server Statistics: v A graph showing JVM CPU utilization for the last hour. v v v v v A graph showing JVM memory utilization for the last hour. The throughput (total volume of requests) for the last hour. The uptime of the server, that is, the time since it was last rebooted. The names of the applications currently running on the server. Platform (operating system). v IP Address. v Start time. v Current monitoring level for this server. v Number of problems detected on this server. The following information is displayed for the server under Activity (Last Hour): v A graph showing average response time, in milliseconds, for every minute in the last hour. v A graph showing the throughput, or number of requests, for every minute in the last hour. v A graph showing the number of open sessions, or logged on users, for every minute in the last hour. To switch to the “Runtime Environment Check” on page 155, “Runtime Environment Comparison” on page 154, and “Server Statistics Overview” on page 92 for this server, mouse over the tool button at Server Information and select the needed link. To switch to following items for this server, mouse over the tool button at Activity and select the needed link v “Server Statistics Overview” on page 92 v v v v “Server Activity Display” on page 114 “Memory Analysis” on page 131 “Heap Analysis” on page 131 “Memory Leak” on page 132 v “System resources” on page 96 Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 87 To view WLM Associated Service Classes for a z/OS server, mouse over the tool button at Server Information and select Workload Management. The “WLM associated service class summary” on page 90 page opens. To switch to the “Enterprise Overview” on page 85,“Group Overview” on page 86, “Alerts and Events” on page 106, “Problem Center” on page 107, and “Portal Overview” use the tabs at the top of the page. Portal Overview The Portal Overview page shows availability information specific for IBM WebSphere Portal Server. You can access detailed portal statistics from this page. To view the Portal Overview page, from the top navigation, click Availability > Systems Overview > Portal. To select a server for displaying information, select the group and server names from the pull down controls at the top of the page. Only servers running IBM WebSphere Portal Server are listed. The page shows graphs of average response time, in milliseconds, for every minute in the last hour for the following portal components: v v v v v v Portal Pages and Gateway servlets Portlets Model Building Page Loading Authentication Authorization To view detailed statistics (response time and access count) for portal pages, click the Portal Pages/Gateway Servlet link. You will see statistics for the pages that were slowest and most popular in the last hour; to view statistics for all pages, click View All Portal Pages at the bottom of the table. See “Viewing the Portal Page Summary.” To view detailed statistics (response time and access count) for portlets, click the Portlets link. You will see statistics for the portlets that were slowest and most popular in the last hour; to view statistics for all pages, click View All Portlets at the bottom of the table. See “Viewing the Portlet Summary” on page 89. To switch to the “Enterprise Overview” on page 85, “Group Overview” on page 86, “Server Overview” on page 86, “Alerts and Events” on page 106, and “Problem Center” on page 107 use the tabs at the top of the page. Viewing the Portal Page Summary About this task The Portal Page Summary offers a view of the portals in your system and how they are operating. You can monitor the status of your portals from the slowest portals to the most popular portals for the last hour. In addition, view the metrics for the portals including Average Response Time and Count for authentication and authorization, and credential and content access metrics as well. To open the Portal Page Summary for the slowest and most popular portals: 88 ITCAM for Application Diagnostics: User Guide 1. From the top navigation, click Availability > Systems Overview > Portal. 2. Select a group and a server from the list boxes. The Portal Overview page displays the portal trends for the last hour. 3. Click the Portal Pages link. The portal page summary data for the slowest and the most popular portals displays. Results To open the Portal Page Summary for all portals from the last hour: 1. From the top navigation, click Availability > Systems Overview > Portal. 2. Select a group and a server from the list boxes. The Portal Overview page displays the portal trends for the last hour. 3. Click the Portal Pages link. The portal page summary data for the slowest and the most popular portals displays. 4. The portal page summary data for all the portals from the last hour displays. 5. Click the View all Portal Pages link. Related topics Configuring the Enterprise Overview “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. “Group Overview” on page 86 The Group Overview page shows a table of availability information for each server in a server group. “Server Overview” on page 86 The Server Overview page displays information and activity graphs for a server. “Portal Overview” on page 88 The Portal Overview page shows availability information specific for IBM WebSphere Portal Server. You can access detailed portal statistics from this page. Viewing the Portlet Summary About this task The Portlet Summary offers a view of the portlets in your system and how they are operating. You can monitor the status of your portlets from the slowest portlets to the most popular portlets for the last hour. In addition, view the metrics for the portlets including Average Response Time and Count for authentication and authorization, and credential and content access metrics as well. To open the Portlet Summary page for the slowest and most popular portlets: 1. From the top navigation, click Availability > Systems Overview > Portal. 2. Select a group and a server from the list boxes. The Portal Overview page displays the response times for the portals. 3. Click the Portlets link. The Portlet Summary page displays the slowest and the most popular portlets. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 89 Results To open the Portlet Summary page for all the portlets for the last hour: 1. From the top navigation, click Availability > Systems Overview > Portal. 2. Select a group and a server from the list boxes. The Portal Overview page displays the portal trends for the last hour. 3. Click the Portlets link. The Portlet Summary page displays the slowest and the most popular portlets. 4. Click the View All Portlets link. The Portlet Summary page displays all the portlets for the last hour. Related topics Configuring the Enterprise Overview “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. “Group Overview” on page 86 The Group Overview page shows a table of availability information for each server in a server group. “Server Overview” on page 86 The Server Overview page displays information and activity graphs for a server. “Portal Overview” on page 88 The Portal Overview page shows availability information specific for IBM WebSphere Portal Server. You can access detailed portal statistics from this page. WLM associated service class summary About this task The WLM Associated Service Class Summary page offers a way to view selected data from the Workload Manager (WLM) for z/OS and OS/390®, for the address space associated with a particular server, as well as its associated service class data and service class period data. This feature is only available for z/OS servers. To open the WLM Associated Service Class Summary: 1. From the top navigation, click Availability > Systems Overview > Server. The Server Overview selection page opens. 2. Select a group and a server from the list boxes. The Server Overview page opens displaying data for the selected server. 3. Click Workload Management from the tools button at Server Information. The WLM Associated Service Class Summary page opens. Related topics Configuring the Enterprise Overview “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. “Group Overview” on page 86 The Group Overview page shows a table of availability information for each server in a server group. 90 ITCAM for Application Diagnostics: User Guide “Server Overview” on page 86 The Server Overview page displays information and activity graphs for a server. WLM associated service class period detail About this task The WLM Associated Service Class Period Detail page offers a way to view selected data from the Workload Manager (WLM) for z/OS and OS/390, for a selected service class period. This includes the response time distribution detail and delay detail information about each subsystem work manager. To open the WLM Associated Service Class Period Details page: 1. From the top navigation, click Availability > Systems Overview > Server. The Server Overview selection page opens. 2. Select a group and a server from the list boxes. The Server Overview page opens displaying data for the selected server. 3. Click Workload Management from the tools button. The WLM Associated Service Class Summary page opens. 4. Click the name of one of the associated service class periods. The WLM Associated Service Class Period Detail page opens. Results To view the details for one of the associated service class periods, click its name. The “WLM associated service class period detail” page opens. To view the WLM Enclave, click the Enclave tab. The WLM Enclave page opens. See “Viewing a WLM enclave.” Related topics Configuring the Enterprise Overview “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. “Group Overview” on page 86 The Group Overview page shows a table of availability information for each server in a server group. “Server Overview” on page 86 The Server Overview page displays information and activity graphs for a server. Viewing a WLM enclave About this task The WLM Enclave page offers a way to view selected data from the Workload Manager (WLM) for z/OS and OS/390, for an enclave. For z/OS 1.2, all tokens in the Enclave are shown. There is no filtering on the basis of server instance; for z/OS 1.3 and above, only the tokens in the Enclave initiated by the server instance are shown. To open the WLM Enclave page: Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 91 1. From the top navigation, click Availability > Systems Overview > Server. The Server Overview selection page opens. 2. Select a group and a server from the list boxes. The Server Overview page opens displaying data for the selected server. 3. Click Workload Management from the tools button. The WLM Associated Service Class Summary page opens. 4. Click the Enclave tab. The WLM Enclave page opens. Related topics Configuring the Enterprise Overview “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. “Group Overview” on page 86 The Group Overview page shows a table of availability information for each server in a server group. “Server Overview” on page 86 The Server Overview page displays information and activity graphs for a server. Server Statistics Overview The Server Statistics Overview page shows a configurable set of application server level statistics. You can show the statistics for several servers on one page, and access other pages to view additional details for any server. To view the Server Statistics Overview page, from the top navigation, click Availability > Server Statistics Overview. To view statistics for an application server, select the server group and server name from the Server Selection pull down controls, and click the Add Server(s) button. You can add more than one server; every server will be represented by a line in the table. You can also select All Servers in the server name control to view information for all servers in a server group. To remove a server from the page, click the X icon next to the server name. Note: For servers running the z/OS platform, when you remove a server instance from the Server Statistics Overview page, the system removes all the server regions belonging to that server instance from the display since the system treats them as a group of clones. To remove all servers from the page, click Clear All at the bottom of the list. For every server, the table shows the configured statistics. The statistics are refreshed periodically. To pause refreshing, click the Pause button. To resume refreshing (if it was paused) and force an immediate refresh, click the Refresh button. To configure the statistics in the table, click Customize.... See “Configuring the Server Statistics Overview page” on page 93. 92 ITCAM for Application Diagnostics: User Guide Configuring the Server Statistics Overview page About this task Configure the Server Statistics Overview page by selecting the resources to display on the detail page. In addition, set the warning threshold for certain resources by selecting the desired function from the list box. To configure the Server Statistics Overview page: 1. From the top navigation, click Availability > Server Statistics Overview. The Server Statistics Overview page opens. 2. Click Customize. The Server Statistics Configuration window opens. 3. Click Select All or click the individual check boxes to select the resource you want to display. 4. If you want to show a warning (color the table cell yellow) when a statistic is above or below a certain threshold, select an operator from the list box, and enter the threshold limit in the field next to it. 5. Click Save. For each data element on the Server Statistics Configuration page, set the range between 0-99999. Results You can select the following statistics: v Volume Delta. v Total Volume. v Group name: the name of the group to which the server belongs v Uptime: the time since the server was last rebooted v Start Time: the time when server monitoring was started; this is usually the time the server was started v v v v v v v v v Paging Rate Total CPU%: the current CPU load on the server Platform: the operating system that the server runs Live Sessions: the number of sessions currently open on the server Platform CPU Delta: the amount of CPU time spent since the last sample Application Server Platform Volume Delta per Second (If this value is >.5, it is rounded up to 1.) JVM/Region CPU Delta JVM/Region CPU% v IP Address v Average Response Time (1 min). v Data Collector Uptime: the time since the Data Collector was started or restarted. v JVM/Region (DSA,EDSA) Memory Usage. v Delta Normal CP time: for z/OS servers, the amount of normal central processor time spent since last sample. v Delta zAAP time: for z/OS servers, the amount of zAAP (additional CPU used exclusively for Java applications including WebSphere; requires z/OS 1.6 or above) time spent since last sample. v Delta zAAP-eligible time on CP: for z/OS servers, the amount of normal central processor time since last sample that was spent on tasks eligible for a zAAP; this Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 93 happens when a zAAP is not present or busy. High values of this statistic can mean that an additional zAAP would be beneficial. v Delta zAAP-eligible time: for z/OS servers, the amount of processor time (regardless of processor type) since last sample that was spent on tasks eligible for a zAAP. This is a sum of Delta zAAP time and Delta zAAP-eligible time on CP. Related topics “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. “Group Overview” on page 86 The Group Overview page shows a table of availability information for each server in a server group. “Server Overview” on page 86 The Server Overview page displays information and activity graphs for a server. Viewing the Server Statistics Overview About this task The Server Statistics Overview page provides application server-level statistics for quick assessment of server activity and related platform data. For thread data or system data on a server, or system data across a server group, click the tools button to view the information on the Server Activity Display page, the System Resources page, or the System Resources Comparison page respectively. To open the Server Statistics Overview page: 1. From the top navigation, click Availability > Server Statistics Overview or by selecting from the Tools button on the Server Overview page. 2. The Server Statistics Overview page opens. The zAAP (zSeries® Application Assist processor) is a new hardware feature for zSeries. It is an additional CPU used exclusively for Java applications like WebSphere. zAAP requires z/OS 1.6 or above. ITCAM for WAS provides the following utilization statistics for the zAAP processors: v Delta zAAP time is the amount of CPU time spent on zAAP since the last sample. v Delta Normal CP time is the regular CP time for the address space. v Delta zAAP-eligible time on CP is the amount of time that could have been executed on zAAP but wasn't because it was already busy. High eligible time could mean that an additional zAAP processor could be needed. v Delta zAAP-eligible time is the total amount of time that could have been executed on zAAP, i.e., delta zAAP + delta zAAP on CP. Results To remove a server from the Server Statistics Overview display: 1. Click the X icon next to the server. The server disappears from the display. 2. If you want to clear all the servers from the display, click Clear All at the bottom of the list. The page refreshes clear of any servers or information. For the z/OS platform, when you remove a server instance from the detail page, the system removes all the server regions belonging to that server instance from the display since the system treats them as a group of clones. 94 ITCAM for Application Diagnostics: User Guide Related topics Configuring the Server Statistics Overview Enterprise Overview The Enterprise Overview page shows a table of summary availability information for each server group. Recent Activity Display In the Recent Activity Display page, you can create a report that can help you to discover problems related to memory or other resources. To create the report, see “Creating a Recent Activity report.” User Scenarios Scenario 1: Evaluating the impact of garbage collection You suspect that frequent garbage collection calls are affecting the performance of a server, so you go into Recent Activity and set up the first graph to display the Number of Garbage Collections metric for the last 48 hours. In the second graph, you roll through the different metrics possibly affected by frequent garbage collection. The Garbage Collection option is not supported for either CICS or IMS. Creating a Recent Activity report About this task Use Recent Activity when you need to investigate potential memory problems relating to garbage collection and the JVM heap size. At times garbage collection might not cleanup properly or the heap may have too little memory allocated. To create a Recent Activity report: 1. From the top navigation, click Availability > Recent Activity Display. The Recent Activity Display page opens. 2. Select a group and a server from the list boxes. 3. For Metric 1 and Metric 2, select the two metrics you want to compare from the list boxes. The available metrics are as follows: v # of Requests v Avg. Response Time v Live Sessions v System Paging Rate v JVM CPU v JVM Heap Size v # of GCs v Total GC Time v Avg. Heap Size after GC Note: The Garbage Collection options are not supported for either CICS or IMS. When the date range is Last 48 Hours, the Avg. Response Time value equals the result of the summary of AVG_RES_TIME in this hour divided by the Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 95 summary counts of AVG_RES_TIME in this hour. If no AVG_RES_TIME occurs within the hour then the result is 0. When the date range is Last 60 Minutes, the Avg. Response Time value equals the result of the summary of AVG_RES_TIME in this minutes divided by the summary count of AVG_RES_TIME in this minute. If no AVG_RES_TIME occurs within the minute then the result is 0. 4. For Time, select the time when you want the system to extract the data. 5. Click the OK button. A new report displays based on your selection. You can click on the bars in the graph for further details. 6. Using the Recent Activity Options, you can select a different group or server, compare two different metrics, or view a different time increment. Results Either heap size or garbage collection can cause a slow down in your server's performance. Find out if your heap size is too small for the number of users using the system or too small for the current workload on the system. At times, garbage collection can cause high JVM CPU usage, slow transaction response time, or a delay that impacts throughput. Analyze the memory in your system using the Recent Activity Display and then make the necessary adjustments. Related topics Creating a Memory Analysis report Creating a Memory Leak Candidate Finder report Setting up a Heap Analysis System resources The System Resources pages provide views of system, resource metrics available for an application server. You can use this information to tune the application server. Select the group and server names to view the System Resources Browser. See “Viewing the System Resources Browser.” This feature is not available for CICS or IMS. User Scenarios Scenario 1: Eliminating bottlenecks The response time of application A becomes unacceptable once the server is experiencing modest throughput. You see that much of the resident time is spent idle. To see if the cause is a bottleneck in the application server pools, use System Resources during these times to view the percentage of threads used in the Database Connection Pools, Thread Pools, and JCA Connection Pools. If any pool is at or near 100%, it is likely that demand for application A is saturating those resources. You might be able to fix the problem by creating more or larger pools. Viewing the System Resources Browser About this task The System Resources Browser displays summary information for all the resources on the selected application server. You can view data, such as EJBs, Database/JCA 96 ITCAM for Application Diagnostics: User Guide Connection Pools, Servlet/Session Manager, Thread Pools, JTA Transactions, Web Applications, SQL Data, JCA-CICS, ORB, and JVM/System. To open the System Resources Browser: 1. From the top navigation, click Availability > System Resources. The System Resources Overview page opens. The right side of the page is the System Resources Overview page while the left side is the navigation for the System on Resources Browser. You can also access this page from the toolbox icon the Server Activity Display page. 2. Select a group and a server from the list box on the left navigation panel. The System Resources Browser opens displaying the information for the selected group and server. If you access this page from the Tivoli Enterprise Portal and from the Server Activity Display page, the server group name and server name display automatically. 3. Mouse over the question mark icon next to each of the following items; EJB Activity, Servlet JSP Activity EJB Coverage and Servlet JSP Coverage, for additional information. Results Use the Resource Categories left navigation pane to select the category of resources that you need to view. For the available resource categories, see “Resources Performance Metrics.” To change the application server: 1. On the left navigation pane, select a group from the list box. 2. On the left navigation pane, select a server from the list box. Note: In the Current Snapshot view, if more that 50 objects are retrieved, then sorting is disabled. You can view 5, 10 or 15 rows per page. Related topics Configuring the Enterprise Overview “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. “Group Overview” on page 86 The Group Overview page shows a table of availability information for each server in a server group. “Server Overview” on page 86 The Server Overview page displays information and activity graphs for a server. Resources Performance Metrics About this task You can drill down into different pages of the resources to view detailed information. The following information provides the metrics for various metric categories and the application servers that support them. WebSphere 5.x v Servlet v EJB Module Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 97 v v v v v Entity Bean Stateful Session Bean Message Driven Bean J2EE Server J2EE Application v v v v v v v Web Module JDBC Provider Data Source RAR Module Resource Adapter Thread Pool Orb v v v v v v JVM Dynamic Cache JMS Provider JMS Server Listener Port Mail Provider v Session Manager v J2C Connection Factory v Transaction Service v v v v Trace Service URL Provider Web Services Service System Metrics v WLM Module v WSGW Module v Object Pool Module v SQL v CTG v MQI WebSphere 5.x\Lotus Mail Services v Bean Module v v v v v v v v Cache Module Connection Pool Module JVM Runtime Module Orb Module Servlet Session Module System Module Thread Pool Module Transaction Module v Web Application Module v Mail Service Module v IMAP Service Module 98 ITCAM for Application Diagnostics: User Guide v v v v v Queue Manager Module POP Service Module SQL CTG MQI WebSphere 6 v Servlet v JVM v J2EE Domain v J2EE Server v J2EE Application v EJB Module v v v v v Web Module RAR Module Entity Bean Stateful Session Bean Stateless Session Bean v Message Driven Bean v Resource Adapter v JDBC Resource v v v v JDBC Data Source JDBC Driver JCA Resource JCA Connection Factory v v v v JCA Managed Connection Factory JNDI Resource JMS Resource JTA Resource v RMIIIOP Resource v Thread Pool v Orb v Dynamic Cache v Servlet Session Manager v v v v v v v v Transaction Service HA Manager Module System Module J2C Module Web Services Module WLM Module WSGW Module Object Pool Module v Alarm Manager Module v Schedulers Module v DCS Statistics Module Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 99 v v v v SQL CTG MQI SIB (System Integration Bus) – Message Store – Mediation Framework – Message Processor – Communications WebSphere ESB (Enterprise Service Bus) 6.x v Servlet v JVM v J2EE Domain v v v v v J2EE Server J2EE Application EJB Module Web Module RAR Module v Entity Bean v Stateful Session Bean v Stateless Session Bean v v v v Message Driven Bean Resource Adapter JDBC Resource JDBC Data Source v v v v JDBC Driver JCA Resource JCA Connection Factory JCA Managed Connection Factory v JNDI Resource v JMS Resource v JTA Resource v RMIIIOP Resource v Thread Pool v v v v v v v v Orb Dynamic Cache Servlet Session Manager Transaction Service HA Manager Module System Module J2C Module Web Services Module v WLM Module v WSGW Module v Object Pool Module 100 ITCAM for Application Diagnostics: User Guide v v v v v Alarm Manager Module Schedulers Module DCS Statistics Module SIB Service SQL v CTG v MQI v SIB (System Integration Bus) – MessageStore – Mediation Framework – Message Processor – Communications WebSphere Process Server 6.x v Servlet v JVM v J2EE Domain v J2EE Server v J2EE Application v EJB Module v Web Module v v v v RAR Module Entity Bean Stateful Session Bean StatelessSession Bean v v v v Message Driven Bean Resource Adapter JDBC Resource JDBC Data Source v JDBC Driver v JCA Resource v JCA Connection Factory v JCA Managed Connection Factory v JNDI Resource v v v v v v v v JMS Resource JTA Resource RMIIIOP Resource Threadpool Orb Dynamic Cache Servlet Session Manager Transaction Service v HA Manager Module v System Module v J2C Module Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 101 v v v v v Web Services Module WLM Module WSGW Module Objectpool Module Alarm Manager Module v v v v v v v Schedulers Module DCS Statistics Module SIB Service SQL CTG MQI SIB (System Integration Bus) – – – – MessageStore Mediation Framework Message Processor Communications J2EE WebLogic 8 v Web module v v v v Servlet Entity EJB Stateless EJB Stateful EJB v Message Driven EJB v Message Driven EJB Destination v JDBC Connection Pool Resource v v v v v JCA Connection Pool JMS Session JTA Resources JVM System JVM System Server v Execute Queue v Execute Queue Runtime WebLogic 9.1 v Web module v Servlet v Entity EJB v Stateless EJB v v v v v 102 Stateful EJB Message Driven EJB Message Driven EJB Destination JDBC Connection Pool Resource JCA Connection Pool ITCAM for Application Diagnostics: User Guide v v v v v JMS Session JTA Resources JVM System Server Execute Queue Thread Pool JBOSS 3 and 4 v Web module v Servlet v EJB Module v Entity EJB v Stateless EJB v Stateful EJB v v v v v Message Driven EJB JDBC Connection Pool JCA Connection Pool JMS Session JTA Resources v JVM/System Tomcat 5.0 and 5.5 v v v v Web module Servlet Cache Thread Pool v Session Manager Oracle Application Server 9.x v Operating System Oracle Application Server 10.x v Web module v Servlet v EJB Module v Entity EJB v v v v v Stateful Session Bean Stateless Session Bean Message Driven Bean JDBC Data Source JVM Netweaver 6 v Component Performance v Request Performance v Performance Summary v Thread Pool v Web Container Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 103 v v v v v Entity EJB Stateless EJB Stateful EJB Message EJB Transaction v v v v v v Memory JVM System Web Service Performance Web Service Request HTTP WebSphere Community Edition v v v v v Web Module Servlet EJB Module Entity Bean JCA Connection v JVM J2SE - IBM and Sun v v v v OS Memory JVM Threading General The following performance metrics are supported on any application server which supports the underlying call interface. The following categories are available: v CICS transactions v Queue manager v SQL Related topics Configuring the Enterprise Overview “Enterprise Overview” on page 85 The Enterprise Overview page shows a table of summary availability information for each server group. “Group Overview” on page 86 The Group Overview page shows a table of availability information for each server in a server group. “Server Overview” on page 86 The Server Overview page displays information and activity graphs for a server. SMF data The SMF data pages show the information collected by the System Management Facilities (SMF) on z/OS servers. 104 ITCAM for Application Diagnostics: User Guide In these pages, you can view detailed information on Server, EJBs, Servlet Session Manager, Web Applications, and Server Regions. The source of the data comes primarily from the SMF records published periodically by WebSphere. As these records are published, the Application Monitor intercepts the transfer of the records and makes a copy in real time before writing it to the SMF dataset. To view SMF data, select the group name and server name. (SMF data is only provided for z/OS servers). See “Viewing SMF data.” User Scenarios Scenario 1: Pinpointing problems Application A's response time slows to unusable when the server experiences even moderate throughput, while resident time is idle. Using SMF data, view the percentage of threads used in the Database Connection Pools, Thread Pools, and JCA Connection Pools; this will tell you if there is a bottleneck in the application server pools. Any pool that is at or near 100% is most likely being overwhelmed by application A's requests for those resources. To fix the problem, you can create more or larger pools. Viewing SMF data About this task The following information provides the metrics for the SMF data type and the application servers it supports. WebSphere 5 and 6 v Overview v v v v v v Server EJBs Servlet Session Manager Web Applications SQL JCA-CICS z/WebSphere only The following information provides the metrics for the z/WAS only data type and the application servers it supports. WebSphere 5 Server Regions To view the SMF data page: 1. From the top navigation, click Availability > SMF Data. The SMF Data page opens. 2. Select a group and a server from the list box on the left navigation panel. The SMF Data page opens displaying the information for the selected group and server. If you have come to this page directly from the Tivoli Enterprise Portal, the group name and server name display automatically. Related topics Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 105 Viewing the Server Statistics Overview Alerts and Events In the Alerts and Events page, you can view the alerts and events generated by Managing Server traps and by the Tivoli Enterprise Portal, and escalate these events into the Problem Center for diagnosis and tracking. To display ITCAM situations in Alerts and Events, complete the following setup: 1. Go to the Managing Server Visualization Engine host. 2. Open the file $MS_HOME/etc/dal/dal.properties set the correct values for the following properties: dal.itmsoap.hostName= dal.itmsoap.port=1920 dal.itmsoap.useHttps=false For UNIX and Linux platforms, $MS_HOME is by default /opt/IBM/itcam/ WebSphere/MS. For Windows platforms, $MS_HOME is by default C:\Program Files\IBM\itcam\WebSphere\MS. 3. Restart the Managing Server Visualization Engine server instance. To view the Alerts and Events page, from the top navigation, click Problem Determination > Alerts and Events. The page shows a table of all high-priority trap alerts and Tivoli Enterprise Portal events for the last 24 hours for a selected server. To change the server, select the group and server names from the pull down controls, and click the OK button. To show only alerts or only events, select Alerts or Events from the Status control, and click the OK button. To filter the displayed alerts and events by date and time, click Show Advanced Filters, check the Date Range box, then select the date and time range in the From and To controls and click the OK button. For every alert or event, the table shows: v v v v v Date and Time of the alert or event. Server group name. Server name. Name of alert or event. Origin of the event (trap or Tivoli Enterprise Portal). v Escalate button. To escalate an alert or event, adding it to the Problem Center, click the Escalate button. See “Escalating alerts and events to the Problem Center” on page 107. 106 ITCAM for Application Diagnostics: User Guide Escalating alerts and events to the Problem Center About this task When you need to diagnose an alert in order to resolve it, you can escalate it as a problem in the Problem Center. This will allow you to keep track of the data related to the alert and provide further information that might help you resolve the issue. If you escalate an alert to a problem, your actions will be recorded in the audit trail. To open the Alerts and Events page: 1. From the top navigation, click Problem Determination > Alerts and Events. The Alerts and Events page opens. 2. Select a group and a server from the list box. This will limit the alerts to the server and group you specify. 3. If you want to escalate an alert to a problem for tracking, click Escalate. 4. Type in a description of the problem in the text box. (A description is not required.) 5. Select the Category from the list box. The available categories are as follows: v Unknown–The category could not be determined by the system. v Application Performance–Under capacity, hanging or waiting incomplete transaction, CPU hogging, poor load balancing, slow completed transaction, slow JDBC call, slow, LDAP look-up, slow JMS call, and slow method call. v Application Outage–exception, incorrect output, intermittent outage, binaries discrepancies within a group/cluster, and properties discrepancies across a group/cluster. v Resource Consumption–JCBC connection leak, JMS connection leak, heap usage, heap/object lead, excessive JVM CPU%, high garbage collection frequency, high garbage collection time, and fragmentation. 6. Click OK to save as a problem. The problem displays in the Problem Center. 7. Click the Problem Center tab to view your problem. Results Using the advanced filters: 1. Click the Show Advanced Filters link. 2. Click the check box to set the advanced filters. 3. Select the dates and times you want to use to limit your list of problems. 4. Click OK. The list displays based on the filtering you selected. Related topics “Problem Center” The Problem Center page shows problems that were previously escalated from actions or events or added manually. You can investigate problems, close them, and add new problems. Problem Center The Problem Center page shows problems that were previously escalated from actions or events or added manually. You can investigate problems, close them, and add new problems. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 107 To view the Problem Center, from the top navigation, click Problem Determination > Problem Center. Escalated problems are normally high-priority trap alerts and Tivoli Enterprise Portal events, escalated from the “Alerts and Events” on page 106 page. The details of each problem, including a snapshot of the problem details and the state of the application server at the time the problem occurred, are available for review. A problem has a status value: v New: the status assigned by the system to newly created problems. v Open: the status assigned by the system after a user opens a problem. v Closed: the status assigned by the user when he closes a problem. Closed problems are deleted from the system after 30 days. Initially, all problems are shown in the Problem Center table. To show only the problems for a particular server, select the group and server names from the Filter controls, and click the OK button. To show only the problems with a particular status, select the status from the status control, and click the OK button. To show only problems that occurred in a limited date/time range, click Show Advanced Filters, check the Date Range box, then select the date and time range in the From and To controls and click the OK button. For every problem, the table shows: v v v v Date and Time the problem occurred. Server group name. Server name. Problem category, set when the problem was escalated. See “Escalating alerts and events to the Problem Center” on page 107. v Origin of the problem (trap, Tivoli Enterprise Portal, or manual creation). v Name of the problem. v Description of the problem, entered when the problem was escalated. See “Escalating alerts and events to the Problem Center” on page 107. v Closing comment, entered when the problem is closed. The field is empty for new or open problems. v Problem status (New, Open, or Closed). v Delete button. To view the details of a problem, click its date/time. See “Viewing the details of a problem” on page 109. To close a problem, select Closed in the Problem status control in the table row. See “Closing a problem” on page 111. To delete a problem, click the Delete button. To add a problem manually, click the Add Problem Manually button at the bottom of the table. See “Adding a problem manually” on page 111. 108 ITCAM for Application Diagnostics: User Guide Viewing the details of a problem About this task The Problem Center displays a list of all the high-priority trap alerts and Tivoli Enterprise Portal events that were escalated to problems as well as problems entered manually. You can view further details on each problem by selecting the Date/Time link for the problem. This will enable you to access the tabs that furnish further diagnostic information. To view the details of a problem: 1. From the top navigation, click Problem Determination > Problem Center. The Problem Center opens. 2. Select the Date/Time link for the problem. The details for the problem open to the Problem tab. Several tabs provide further problem details including memory, transactions, resources, traps, logs, and configuration. The information provided by each tab is useful in diagnosing the problem. The function of each tab is described in the following section: v Problem - displays an analysis based on the user-defined category of the problem assigned when the problem was escalated from Alerts and Events. Each category contains a set of contributing factors. The system will analyze whether there was a positive result or not and suggest a solution based on the data. You can change the status of a problem, edit the problem's description, and change the problem's category. v Memory - displays information related to the event or alert, identification for the server, status of the server, filter to display previous hours of data (1, 2, 6, 12, 24, or 48 hours), actions to perform (Heap dump and Thread dump), a snapshot of the current memory usage information, a graph for the Average Heap Usage after Garbage Collection (GC), and trends for the Heap Size, Number of Requests, Number of Sessions, Response time, Number of GCs, CPU usage, GC time, and Paging rate. v Transactions - displays information related to the event or alert, identification for the server, status of the server, filter to display previous hours of data (1, 2, 6, 12, 24, or 48 hours), action to perform (Thread dump), a snapshot of the current transaction usage information, trends for the Response time, JVM CPU Usage, Number of Sessions, Number of Requests, and Heap Usage, ranks the slowest transactions in a list, and provides a Transaction Snapshot of all the transactions. v Resources - displays information related to the event or alert, identification for the server, and opens the JMX browser page. In the Current Snapshot table, the list displays based on the filtering you select. If more that 50 objects are retrieved, then sorting is disabled. You can view 5, 10 or 15 rows per page. Complete the following setup steps to see data in the TEMA data snapshot section. a. Go to the Managing Server Visualization Engine host. b. Open the file $MS_HOME/etc/dal/dal.properties set the correct values for the following properties: dal.itmsoap.hostName= dal.itmsoap.port=1920 dal.itmsoap.useHttps=false For UNIX and Linux platforms, $MS_HOME is by default /opt/IBM/itcam/WebSphere/MS. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 109 For Windows platforms, $MS_HOME is by default C:\Program Files\IBM\itcam\WebSphere\MS. c. Restart the Managing Server Visualization Engine server instance. Monitoring Console - the Monitoring Console button launches the Tivoli Enterprise Portal browser client from the Managing Server Visualization Engine. Complete the following steps to enable this feature: a. Go to the Managing Server Visualization Engine host. b. Open the file $MS_HOME/etc/ve.properties set the correct values for the following properties: tep.hostname= tep.port=1920 tep.baseurl=///cnp/kdh/lib/cnp.html tep.userid= For UNIX and Linux platforms, $MS_HOME is by default /opt/IBM/itcam/WebSphere/MS. For Windows platforms, $MS_HOME is by default C:\Program Files\IBM\itcam\WebSphere\MS. c. Restart the Managing Server Visualization Engine server instance. v Traps - displays information related to the event or alert, identification for the server, action to perform (New Trap), and Trap Action History, which provides the date the trap occurred, name of the trap, server name, severity, and the action taken. From the Action Taken, you can access the results of the action. For example, if a method trace was taken, you can click this link to go to the properties page for this method trace. In addition, you can delete the history of a trap you no longer need. v Logs - displays information related to the event or alert, identification for the server, filter to display by entry type (All, Warning, or Error), and a scrape of the log files. Viewing log data. Data under the Logs tab comes from the ITCAM TEMA agents. Complete the following setup steps to view this data: a. Go to the Managing Server Visualization Engine host. b. Open the file $MS_HOME/etc/dal/dal.properties set the correct values for the following properties: dal.itmsoap.hostName= dal.itmsoap.port=1920 dal.itmsoap.useHttps=false tep.userid= For UNIX and Linux platforms, $MS_HOME is by default /opt/IBM/itcam/WebSphere/MS. For Windows platforms, $MS_HOME is by default C:\Program Files\IBM\itcam\WebSphere\MS. c. Restart the Managing Server Visualization Engine server instance. v Configuration - displays information related to the event or alert, identification for the server, and a filter to display previous hours of data (1, 2, 6, 12, 24, or 48 hours). 3. You can add a description, change the problem's status, or change the category for a problem by clicking the Edit button in the Event box. See the Contributing Factors section for more information about the problem. Related topics 110 ITCAM for Application Diagnostics: User Guide Adding a problem manually Closing a problem Adding a problem manually About this task You might need to add a problem to the Problem Center manually, for example, if your monitoring software does not interface with ITCAM or if you discover a problem that does not have a trap associated with it. You can do this in the Problem Center using the Add Problem Manually button. As a result, you will be able to access the problem details after creating the problem. To add a problem manually: 1. From the top navigation, click Problem Determination > Problem Center. The Problem Center opens. 2. At the bottom of the page, click the Add Problem Manually button. 3. Select the group and server where the problem exists from the list boxes. 4. Select the date from the list box and enter a time in the text box. 5. Enter a name and description for the problem in the text box. 6. Select the Category from the list box. The available categories are as follows: v Unknown–The category could not be determined by the system. v Application Performance–Under capacity, hanging or waiting incomplete transaction, CPU hogging, poor load balancing, slow completed transaction, slow JDBC call, slow, LDAP look-up, slow JMS call, and slow method call. v Application Outage–Exception, incorrect output, intermittent outage, binaries discrepancies within a group/cluster, and properties discrepancies across a group/cluster. v Resource Consumption–JCBC connection leak, JMS connection leak, heap usage, heap/object lead, excessive JVM CPU%, high garbage collection frequency, high garbage collection time, and fragmentation. 7. Click OK to save as a problem. The problem displays in the list in the Problem Center with the status as new. 8. Additional details on the problem are available when you select the Date/Time link for the problem. See “Viewing the details of a problem” on page 109 for more information. Related topics “Problem Center” on page 107 The Problem Center page shows problems that were previously escalated from actions or events or added manually. You can investigate problems, close them, and add new problems. Viewing the details of a problem Closing a problem Closing a problem About this task Close a problem in the Problem Center when the issue is resolved. After you close a problem, you are given the option to delete it from the Problem Center. If you elect not to delete a problem, your closed problem will be deleted from the system after 30 days. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 111 To close a problem: 1. From the top navigation, click Problem Determination > Problem Center. The Problem Center opens. 2. View all Open problems by selecting Open from the Status list box and click OK. Find the problem you want to close. 3. To change the status of an open problem to closed, select Closed from the list box in the Status column. A Closing Comment text box opens. 4. Add your final notes to the problem in the Enter Closing Comment text box and click OK. Your notes will display in the Closing Comment column and the problem's status will change to Closed. Related topics Adding a problem manually Viewing the details of a problem In-flight request search In the In-flight request search page, you can search for requests that are currently open on an application server. As a request normally closes relatively quickly, this search is useful for locating hanging transactions, which result from an application malfunction. To search for a request in a server group, select the group name in the Group control. To search for a request in an individual server, select the group name in the Group control and the server name in the Server control. If you have come to this page directly from the Tivoli Enterprise Portal, the group name and server name display automatically. To search for a request that has a substring in the URL string (for Web requests) or class name (for EJB requests), enter the substring in the Search Request/Transaction control. Click the OK button to perform the search and view the results. See “Searching for an Application Request” on page 113. User Scenarios Scenario 1: Investigating a hanging transaction Customers call and complain they are having trouble completing transactions. You go to In-flight Request Search to locate a hanging transaction and, upon finding one, view a method trace for the transaction. You can see that the transaction is waiting for the return of a specific SQL call. You forward the method trace to a database administrator for further analysis. Scenario 2: Isolating a problem with CPU utilization After looking at the Server Statistics Overview page, you notice that CPU utilization is very high. You go to the In-flight Request Search to see if a transaction is present. It appears the system is churning on a transaction. Through a method trace, you suspect the transaction is looping. You forward the method trace to a developer for further analysis. 112 ITCAM for Application Diagnostics: User Guide Searching for an Application Request About this task The In-flight Request Search page lets you search for open, troubled requests in your server farm. From the search results you can follow any request's Thread/Task ID link to view the Request Detail for that request. Click on any column heading to sort the search results by that column. Click the column heading again to reverse the sort. In addition, click the Tools button to view the Server Activity Display page or the System Resources page for that server. The In-flight Request Search is not case sensitive. To search for a request: 1. From the top navigation, click Problem Determination > In-Flight Request Search. The In-flight Request Search page opens. 2. Select a group or server from the list box. Note: If you do not select a group or server, requests from all servers will display. 3. Enter a string in the Search Request box. Note: The system will search all active URL strings (for Web requests) and active class names (for remote EJB requests) for the string entered in step 2. If any request contains the string, (Web requests or remote EJB requests), the results page will display those requests. In addition, if you leave the search request box empty, all active requests will display. 4. Click OK. All the active requests associated with your search display in the order of descending Total Resident Time. To change the order, see “Sorting search results.” Related topics Activating a thread Cancelling a request Changing a thread's priority E-mailing a PDF file - SAD Exporting to a file - SAD Searching a Method Trace Suspending a thread Viewing a Method/Component Trace - Flow View Viewing a PDF file - SAD Viewing a Stack Trace Viewing Request detail Viewing the request object and session object Sorting search results About this task You can sort your search results in alphabetical order according to the Server Names, by Client Request / Transaction, or in numeric order with Start Date / Time, Total Resident Time and User ID. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 113 To sort the search results: 1. Click a column heading to sort the results. You can only sort by columns with underlined headings. 2. When the page refreshes, the results display sorted by the selected heading. 3. Click the column heading a second time to sort the results in reverse order. Related topics Searching for an Application Request Viewing a Composite Method Trace - In-flight Request Search Viewing a Composite Request Detail - In-flight Request Search Viewing a Composite Stack Trace - In-flight Request Search Server Activity Display The Server Activity Display page shows a table of request activity on an application server. This page can help you troubleshoot and fix hanging requests and evaluate the current performance of your applications. You can access the Server Display using one of the following options: v From the top navigation, click Problem Determination > Server Activity Display to display the Server Activity Display page. v If you have logged in from the Tivoli Enterprise Portal the information about the sever group name and server name files is already complete. For more information see “Access the Managing Server Visualization Engine from Tivoli Enterprise Portal” on page 39. To set the server for which the activity is displayed, select the server group name and server name. To show requests currently being processed by the server, click the Active Requests tab. See “Server Activity Display - active requests” on page 115. To show requests recently processed by the server, click the Recent Requests tab. See “Server Activity Display - recent requests” on page 117. To show requests that are hanging because they are waiting on a lock, click the Lock Contentions tab. See “Server Activity Display - lock contentions” on page 118. User Scenarios Scenario 1: Troubleshooting an application that hangs. Several users of application Z have reported that they can't update their user preferences: Application Z times out after a minute of not responding. You look for the application Z requests that have long resident times in the Active Requests tab of the Server Activity Display. View the Request Detail for one of these requests to determine why or where it is hanging. Scenario 2: Understanding immediate workload. While performing normal monitoring of your servers, you notice that a server's average response time has recently increased, with no appreciable change in throughput. You begin by looking at the Recent Requests tab of the Server Activity 114 ITCAM for Application Diagnostics: User Guide Display to see what the most recently completed requests have been on that server. You can see whether the requests are uniformly slow, or if there is variation among requests; this can help you isolate whether it is a problem with the server (uniformly slow), or with an application (certain requests are slow). You can see whether the slow requests are CPU-heavy, or if they are spending too many moments idle. Server Activity Display - active requests About this task The Active Requests tab displays thread data for an application server at a specific point in time. Data in this section is constantly fluctuating. Active requests display a snapshot of the data at a specific point in time. As a result, requests can be completed and disappear from the display on refresh, or by the time you drill down. To open the Server Activity Display (active requests) page: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list box. If you have come to this page directly from the Tivoli Enterprise Portal, the group name and server name display automatically. Results The Active Requests tab has three main sections v Server Information v Recent Activity (Last Minute) v Active Requests (In JVM Memory Now) Server Information provides details relating to the server. It also has a toolbox icon . You can click this toolbox icon to access direct links to the following features. The feature you select displays information specific to the group sever and server name you select. v JVM Display v v v v System Resources Monitoring On Demand Data Collector Profiles Trap and Alert Management Recent Activity (Last Minute) displays the following features. You can click a link to create a Recent Activity Report for the item you want to select. v JVM CPU v JVM Heap Size (MB) v # of Requests v # of live Sessions v Average Response Time (MS) Active Requests (In JVM Memory Now) you can use this section of the page to view information about thread types and to view request details. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 115 To filter the active requests data: 1. You can filter active request by selecting the options available on the Thread Type and Thread Status drop-down menus. 2. Click Thread Type, select one of the following options from the drop-down menu: v Any v EJB v Servlet v JSP v CICS 3. Click Thread Status, select one of the following options from the drop-down menu: v Any v Active v Suspended v Waiting 4. Click Refresh. The active requests data displays based on the selected filter. To sort the active requests data: 1. Click a heading link: v Client Requests v Client Requests Start v v v v Thread ID Resident Time (ms) Accumulated CPU (ms) Idle Time (ms) v Thread Status v Last Known Class v Last Known Method v Last Known Action v User ID The data refreshes sorted by the selected heading. 2. Click the heading link a second time to invert the sorting. To view request detail, click the link in the Client Requests column. From the request detail view, you can investigate further details, suspend and reactivate the request thread, and change its priority. Related topics Activating a thread Canceling a request Server Activity Display - recent requests Viewing the request detail 116 ITCAM for Application Diagnostics: User Guide Server Activity Display - recent requests About this task The Recent Requests page displays list of the recently completed requests for the user to review the recent activity data on a per-server basis. The default maximum number of recent activity data is 100. The maximum number of recent activity data applies to each server. When the queue is full, the newest request data replaces the oldest data. To open the Server Activity Display (recent requests) page: If you have logged in from the Tivoli Enterprise Portal page, all the relevant information including the sever group name and server name display automatically. 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. If you have come to this page directly from the Tivoli Enterprise Portal, the group name and server name display automatically. The Server Activity Display (active requests) page opens. The information for the selected server group displays. 3. Click Recent Requests. The Recent Requests tab opens displaying the 100 most recently completed requests. Results The Recent Requests tab has three main sections v Server Information v Recent Activity (Last Minute) v Recent Requests (Last 100 Completed Requests) Server Information provides details relating to the server. It also has a toolbox icon . You can click this toolbox icon to access direct links to the following features. The feature you select displays information specific to the group sever and server name you select. v JVM Display v System Resources v Monitoring On Demand v Data Collector Profiles v Trap and Alert Management Recent Activity (Last Minute) displays the following features. You can click a link to create a Recent Activity Report for the selected item. v JVM CPU v JVM Heap Size (MB) v # of Requests v # of live Sessions v Average Response Time (MS) Recent Requests (Last 100 Completed Requests) displays completed requests you can filter this information by Thread Type. To filter the recent request data: Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 117 You can filter recent requests by selecting the options available on the Thread Type drop-down menu and then clicking Refresh to display the results. 2. Click Thread Type, select one of the following options from the drop-down menu: v Any v EJB v Servlet v JSP v CICS 3. Click Refresh. The active requests data displays based on the selected filter. 1. To sort the recent request data: 1. Click a heading link: v Client Requests v Client Requests Start v Response Time (ms) v Accumulated CPU (ms) v Idle Time (ms) v Thread Type v User ID 2. The data refreshes sorted by the selected heading. To view request detail, click the link in the Client Requests column. Related topics Activating a thread Server Activity Display - active requests Viewing the request detail Server Activity Display - lock contentions About this task Use the Lock Contentions tab when a request is taking too long to process and you want to know why. The Lock Contentions tab displays any requests that are hanging because they are waiting on a lock. The data shows both the object that has the lock and the one that is waiting for a lock. To open the Server Activity Display (lock contentions) page: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list box. The Server Activity Display (active requests) page opens. The information for the selected server group displays. If you have come to this page directly from the Tivoli Enterprise Portal, the group name and server name display automatically. 3. Click Lock Contentions. The Lock Contentions tab opens displaying the active locks. If no locks have occurred, the system message says, "There are no classes instrumented for lock analysis." 118 ITCAM for Application Diagnostics: User Guide Results If there are any Active Locks (For active requests) the information displays under the following column headings: v Locked Object Class v Owners Request/Transaction Name v Owners Request/Transaction Type v Owner Class v Owner Method v v v v v Waiting Time (ms) Waiting Class Waiting Method Waiting Request/Transaction Name Waiting Workload Type Related topics Activating a thread Canceling a request Server Activity Display - active requests Server Activity Display - recent requests Viewing the request detail Viewing request detail About this task The Request Detail page provides data for one request only. Typically you arrive on this page by clicking a Client Request's link on the Server Activity Display (in the Active Requests tab) page. Through the left navigation of the Request Detail page, you can obtain a Stack Trace or Method/Component Trace, or view the Request/Session Object. If necessary, you can cancel a request, and change the thread's priority or status. To open the Request Detail page: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (active requests) page opens. The information for the selected server group displays unfiltered. 3. Click the link in the Client Requests' column. 4. The Request Detail page for that request opens. This page displays data for that request only. Results If the request is not yet completed, you can perform the following additional actions on it: v To suspend the request thread, select Suspend from the Change Thread Status control. See “Suspending a thread” on page 120. v To re-activate a suspended thread, select Active from the Change Thread Status control. See “Activating a thread” on page 120. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 119 v To cancel the request, click the Cancel Request button. See “Canceling a request” on page 121. v To change the priority of the request thread, select a priority from the Change Priority control. See “Changing a thread's priority” on page 121. v To view a Stack Trace, showing which methods were called to reach the current state of the request thread, click Stack Trace on the left navigation pane. See “Viewing a Stack Trace” on page 122. v To view a request object and session object, click Request/Session Object on the left navigation pane. See “Viewing a request object and session object” on page 123. v To view a Method/Component Trace, click Method/Component Trace on the left navigation pane. From this view, you can search the trace and export it to a file. See “Viewing a Method/Component Trace - flow view” on page 122. Related topics Canceling a request Changing a thread's priority Suspending a thread About this task An executing thread is active, and a paused thread is suspended. Suspend a thread if there is a problem with it and you want to uncover the cause. To suspend a thread: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. 3. Click the link in the Client Request column. The Request Detail page for that request opens. 4. From the Change Thread Status list box, select Suspend. 5. Click OK. Results When suspending a thread, there is a danger that the request might hold database locks or system resources. After you suspend the request, any other requests that require the removal of those locks or monitors will also be suspended. Any locks in the application server and database server will not be released after the system suspends a thread. This can cause other applications to fail or hang. Related topics Activating a thread Canceling a request Changing a thread's priority Activating a thread About this task A thread is executing if it is active, and the thread is paused when it is suspended. Select Active status to re-activate a suspended thread. 120 ITCAM for Application Diagnostics: User Guide To activate a thread: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. 3. Click the link in the Client Request column. The Request Detail page for that request opens. 4. From the Change Thread Status list box, select Active. 5. Click OK. Related topics Canceling a request Changing a thread priority Suspending a thread Canceling a request About this task If an application request from the system is looping or abusing resources, it might be necessary to cancel the request. This will terminate the request by throwing a run-time exception. To cancel a request: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. 3. Click on the link in the Client Requests' column of the request that is hanging. A Request Detail page opens, where you can click the Cancel Request button. 4. Click Cancel Request. A confirmation box displays. 5. At the confirmation box, click OK. Canceling a thread can cause JVM and application server instability. Use the Cancel Thread function only when absolutely necessary, and with careful consideration of the consequences. Related topics Activating a thread Changing a thread's priority Suspending a thread Changing a thread's priority About this task If a thread is executing too slowly, you can increase the thread's priority. This will move the thread up in the stack so it will execute more quickly. (Alternatively, you can decrease a thread's priority to allow other threads to execute more quickly.) To change a thread's priority: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 121 3. Click the link in the Client Request column. The Request Detail page for that request opens. 4. From the Change Priority list box, select a priority. Priority 1 is the lowest and priority 10 is the highest. 5. Click Save. Related topics Activating a thread Canceling a request Suspending a thread Viewing a request detail Viewing a Stack Trace Viewing a Stack Trace About this task The Stack Trace page displays a list of method calls, starting with the method being executed when the stack trace was requested, in last in first out order. For each method, the list includes the Class Name, Method Name and (optionally) a line number. To view a Stack Trace: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. 3. Click the link in the Client Request column. The Request Detail page for that request opens. 4. Click Stack Trace from the left navigation pane. The Stack Trace page opens. The most recently executed method displays first in the Stack Trace. Related topics Canceling a request Changing a thread's priority Viewing a Method/Component Trace - flow view About this task The Flow View lists the method flow of the current request, in terms of the method/component entry and exit events in last in first out order. To view the flow view of a Method/Component Trace: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. 3. Click the link in the Client Request column. The Request Detail page for that request opens. 4. Click Method/Component Trace on the left navigation pane. The Method/Component Trace (flow view) page opens. The last executed method displays first in the Method/Component Trace. 122 ITCAM for Application Diagnostics: User Guide 5. Enter the Delta Elapsed Time and the Delta CPU Time value under the Threshold Highlighter table to highlight the data with the features that you want to view throughout the whole trace. 6. Click Apply. The Complete Flow View table displays the method flow list with the highlighted data that you selected to view. 7. Click Reset to Default for using the default threshold highlighter value, if necessary. 8. Click to select the number of rows of data that you want to view per page from the Pagination list box. The Flow View tab refreshes displaying the number of rows of data you selected to view on each page. Results To export the method/component trace to a comma-delimited file, click the Export to File button. See “Exporting to a file - SAD” on page 125. To export the method/component trace to a PDF file and view or save this file, click the View PDF button. See “Viewing a PDF file - SAD” on page 125. To export the method/component trace to a PDF file and e-mail this file, click the E-Mail button. See “E-mailing a PDF file - SAD” on page 124. Related topics Canceling a request Changing a thread's priority Viewing a request object and session object About this task The Request Object and Session Object page lists information for the current request object and session object. To view the request object and session object trace: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display server selection page opens. 2. Select a group and a server from the list boxes. The Server Activity Display page opens. 3. Click the link in the Client Requests' column. The Request Detail page for that thread opens. 4. Click Request/Session Object from the left navigation pane. The Request Object and Session Object page opens. Related topics Canceling a request Changing a thread's priority Searching a Method/Component Trace About this task The search allows you to specify any of the columns available in the Flow View (Elapsed Time, CPU Time, Delta Elapsed Time, Delta CPU Time, Event Type or Event Data), together with a numerical threshold (or a string, ) and presents a list of events from the method trace whose metrics cross the threshold (or match the string). The Event Type and Event Data searches are case sensitive. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 123 To search a Method/Component Trace: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display page opens. 2. Select a server from the Server list box. The Server Activity Display (Active Requests) page opens. 3. Click the link in the Client Request column. The Request Detail page for that request opens. 4. Click Method/Component Trace from the left navigation pane. The Method/Component Trace (Flow View) page opens. The last executed method displays first in the Method Trace. 5. Click the Search tab. The Search tab opens. 6. Enter the search criteria and the search value. 7. Click Search. The Method Trace page refreshes displaying the method trace that suits your search criteria and value. Clicking the result in the Event Data column opens the Flow View tab to the corresponding line. For example, if the first result in the Search tab is the twentieth method on the Flow View page, then clicking the Event Data link of the first result will bring up the Flow View tab starting with the page that includes that twentieth record. Related topics Viewing a Composite Method Trace - SAD Viewing a Method/Component Trace - Flow View E-mailing a PDF file - SAD About this task You can e-mail a PDF file of the Method Trace/Component Trace to one or a group of the application monitor users. Separate multiple addresses with a comma. Recipients must have valid user accounts and proper permissions in order to view the report. To e-mail a PDF file: 1. From the top navigation, click Problem Determination >Server Activity Display. The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. 3. To view the detail, click the link in the Client Requests' column. The Request Detail page for that thread opens. 4. Click Method/Component Trace. The Method/Component Trace page opens. 5. Click the E-mail button. The E-mail page opens. 6. Enter the e-mail address of the recipient. Separate multiple addresses with a comma. 7. Click OK. Related topics Exporting to a file - SAD Viewing a PDF file - SAD 124 ITCAM for Application Diagnostics: User Guide Viewing a PDF file - SAD About this task Before e-mailing a PDF file, view the file by downloading it. To view a PDF file: 1. From the top navigation, click Problem Determination > Server Activity Display . The Server Activity Display page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. 3. Click the link in the Client Requests' column. The Request Detail page for that thread opens. 4. Click Method/Component Trace. The Method/Component Trace page opens. 5. Click the View PDF button. 6. From the File Download window, click either Open to view the file immediately or click Save to download the file. Related topics Exporting to a file - SAD E-mailing a PDF file - SAD Exporting to a file - SAD About this task You can export the trace data to a comma-delimited file format. To export to a file: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display server selection page opens. 2. Select a group and a server from the list boxes. The Server Activity Display (Active Requests) page opens. 3. Click the link in the Client Requests' column. The Request Detail page for that thread opens. 4. Click Method/Component Trace. The Method/Component Trace page opens. 5. Click the Export to File button. 6. Click either Open to view the file immediately or click Save to download the file. Related topics E-mailing a PDF file - SAD Viewing a PDF file - SAD Web Session Browser The Web Session Browser page provides information on open HTTP sessions. You can search a server, a group, or all servers and groups for all sessions or sessions with a specific username. Visualization Engine will only show sessions on servers that have the monitoring level set to L2 or L3. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 125 To search for Web Sessions on all servers, select "All Groups" in the Group control and "All Servers" in the Server control. To search for Web Sessions on all servers in a group, select the group name in the Group control and "All Servers" in the Server control. To search for Web Sessions on a specific servers, select the group name in the Group control and the server name in the Server control. If you need to search for sessions with a specific username, enter it in the Username control. To launch the search, click the OK button. The search results will be displayed. See “Viewing the Web Session Browser.” Viewing the Web Session Browser About this task Use the Web Session Browser to find information on HTTP sessions. Search a server, a group, or all servers and groups for a specific session. After activating the search, the system will take a snapshot of the server(s) and return a list of sessions. Using a wildcard (*) indicates that all data will be searched. Blank fields are disallowed in the search. The Data Collector must be at L2 or higher monitoring level to provide the data for this display page. To view the Web Session Browser: 1. From the top navigation, click Problem Determination > Web Session Browser. The Web Session Browser page opens. 2. Select a group and server and enter the user name that you want to search for. The Web Session Browser page opens showing the sessions that match your search criteria. After the system returns your search results, you can review the attributes of a session by clicking the View link in the Attributes field. Many different kinds of Java objects, including customized objects, can be in a session; sometimes in the form of binary data. ITCAM cannot display this data on the front-end in a useful way. In order to display the data correctly, define the toString() method. ITCAM will invoke this method and display the data returned in the Web Session Browser. If the toString() method is not defined, ITCAM will publish the content of the Java objects as-is, which might not contain useful data. Related topics Memory Diagnosis View heap and memory information. Server activity The Server Activity Display page shows a table of request activity on an application server. This page can help you troubleshoot and fix hanging requests and evaluate the current performance of your applications. Memory diagnosis View heap and memory information. 126 ITCAM for Application Diagnostics: User Guide Memory Diagnosis includes the following features: Memory Analysis, Heap Analysis, Memory Leak, and Heap Dump Management. Gain insight into the JVM's heap and memory information through memory diagnosis. Use this information to tune the JVM parameters, assess your resources, and find evidence of memory leaks. The Memory Analysis (Garbage Collection) option is not supported for CICS or IMS. The Memory Analysis (Java Heap Size option) is not available for IMS. The Heap Analysis and Memory Leak features are not available for CICS or IMS. Heap Dump files can be viewed using Memory Dump Diagnostic for Java (MDD4J). User Scenarios Scenario 1: Detecting a memory leak After creating a Memory Analysis report that compares JVM Heap Size to Average Response Time, you think there is a memory leak. Access the Memory Leak feature to see if the amount of uncollected memory is increasing. You set up a candidate for the server in question. This tells the system to collect heap data now and again after a specified amount of time. Then you can compare the heap data for the two periods of time to determine if there is evidence of a memory leak. Scenario 2: Supporting your claim that the purchase of new servers is necessary The year end budget is due and you need to project whether you will need to buy more servers for your environment. You create a Memory Analysis report during peak usage and compare JVM Heap Size to the Number of Sessions. The number of servers is close to maxing out the current environment. As a capacity planner, you recommend that the company increase the number of servers currently servicing the environment. Heap Dump Management Use the Heap Dump Management pages to view and schedule heap dumps for the monitored servers. To access Heap Dump Management, from the top navigation click Problem Determination > Memory Diagnosis > Heap Dump Management. To create heap dumps, you need to install IBM Support Assistant and Memory Dump Diagnostic for Java on the monitored servers. See “Downloading Memory Dump Diagnostic for Java from IBM Support Assistant” on page 128. To view information on existing heap dumps and delete the heap dumps you no longer want to store, select Heap Dumps in the left navigation pane. See “Heap Dumps” on page 129. To view all scheduled heap dumps, modify and delete the schedules, select Heap Dump Schedule in the left navigation pane. See “Heap Dump Schedule” on page 130. To schedule a new heap dump, select Schedule a Heap Dump in the left navigation pane. See “Scheduling a heap dump” on page 130. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 127 Downloading Memory Dump Diagnostic for Java from IBM Support Assistant About this task In order to download Memory Dump Diagnostic for Java (MDD for Java), you will need to first download IBM Support Assistant (ISA). ISA provides extra help with diagnosing problems and provides extra tools and components for troubleshooting as well as providing a place to write problems (PMR). MDD for Java analyzes either a single heap dump or analyzes and compares two heap dumps and searches for evidence of a memory leak. You can either manually take a heap dump or schedule a heap dump using the Heap Dump Management tool and then download the heap dump to your PC and analyze it using MDD for Java. MDD for Java only analyzes heap dumps from IBM JDKs. For non-IBM JDKs use ITCAM Heap Analysis features. Searching capabilities are not supported for ITCAM for WebSphere in ISA. To download ISA: 1. Go to the URL https://www14.software.ibm.com/webapp/iwm/web/ preLogin.do?source=isa 2. If you do not have a universal IBM user ID, you will need to click register now and fill in the required information. Upon completion, you can return to this page and sign in to download ISA. 3. After signing in, select the radio button to download IBM Support Assistant Version 3.0.0.1. 4. Click Continue. 5. Select View license. After reading the license, click the I agree check box and then click I confirm to continue with the download. 6. Click Download now next to the correct platform. We suggest you download to the server on which the data collector is installed. Do not download to the server that has the managing server. 7. Click Save to download ISA to your hard drive. Results To install ISA: 1. Go to the directory on your hard drive where you saved the ISA zip file. 2. 3. 4. 5. Extract the files. Double-click the setupwin32.exe file. Follow the installation instructions to install ISA. Open the ISA program. To install MDD for Java: Double-click Updater to open. Select the New Products and Tools tab. Open the WebSphere directory by clicking the + sign. Click the check box to select WebSphere Application Server. (The version you select does not matter.) 5. Click Install. 6. Select the feature under Features to Install and review the license. 1. 2. 3. 4. 128 ITCAM for Application Diagnostics: User Guide 7. Click Yes to accept the license. 8. Click OK to accept the message that displays, "New product plug-ins or tool plug-ins were installed successfully. Please make sure to restart IBM Support Assistant for these changes to take effect." 9. Click the + sign next to the Common Component Tools directory. 10. Click the check box to select Memory Dump Diagnostic for Java (MDD4J) version 3 or above. 11. Click Install. 12. Click OK to accept the message that displays, "Reminder–You are installing a common component tool. After installation, you might not see the common component tool in the Tools component. Common component tools only display in the Tools component if a product is added that uses them." This is why you need to install a version of WebSphere. 13. Select Memory Dump Diagnostic for Java under the Features to Install and review the license. 14. Click Yes to accept the license. 15. Click OK at the restart IBM Support Assistant message. 16. Close ISA and restart. Related topics Scheduling a heap dump “Heap Dump Schedule” on page 130 The Heap Dump Schedule page shows a table of scheduled heap dumps on the monitored servers. From this page, you can modify and delete the schedules. Heap Dumps The Heap Dumps page shows a table of existing heap dumps on the monitored servers. From this page, you can delete the heap dumps you no longer want to store. To view the Heap Dumps page, from the top navigation click Problem Determination > Memory Diagnosis > Heap Dump Management. In the table, heap dumps are grouped by server. You can hide the heap dumps for a server by clicking - next to the server name, and show them again by clicking +. To view heap dumps for servers in a server group, select the group name in the Group list box; to view heap dumps for a single server, select the server name in the Server list box. For every heap dump, the table shows: v The fully qualified file name. (The file is located on the monitored server). v The date and time when the heap dump was created. v The origin of its creation ("Schedule" for normal scheduled heap dumps). v Whether garbage collection was forced before creation of the heap dump. This option can be set in the heap dump schedule. v A Delete button. To delete a heap dump, click the Delete button. You can use the left navigation pane to view scheduled heap dumps and schedule a new heap dump. See “Heap Dump Management” on page 127. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 129 Heap Dump Schedule The Heap Dump Schedule page shows a table of scheduled heap dumps on the monitored servers. From this page, you can modify and delete the schedules. To view the Heap Dump Schedule page, from the top navigation click Problem Determination > Memory Diagnosis > Heap Dump Management. Then from the left navigation pane, Select Heap Dump Schedule In the table, scheduled heap dumps are grouped by server. You can hide the heap dumps for a server by clicking - next to the server name, and show them again by clicking +. To view heap dump schedules for servers in a server group, select the group name in the Group list box; to view heap dumps for a single server, select the server name in the Server list box. For every heap dump schedule, the table shows: v The date and time when the heap dump is to be created. v Whether garbage collection is to be forced before creation of the heap dump. v A Modify button. v A Delete button. To modify a heap dump schedule, click the Modify button. This will open the Schedule a Heap Dump page (see “Scheduling a heap dump”); you will be able to modify the settings. To save the changes, click OK To delete a heap dump schedule, click the Delete button. You can use the left navigation pane to view existing heap dumps and schedule a new heap dump. See “Heap Dump Management” on page 127. Scheduling a heap dump About this task You have the flexibility to schedule a heap dump to take place now or in the future. To schedule a heap dump: 1. From the top navigation, click Problem Determination > Memory Diagnosis > Heap Dump Management. The Heap Dump Management page opens. 2. Click the Schedule a Heap Dump link. 3. Select a group and a server from the list boxes. 4. Under Heap Dump Schedule, select Now to schedule a heap dump to take place immediately, or select your own date and time in the future. 5. Under Garbage Collector Before Heap Dump, select yes or no based on whether you want a garbage collection performed prior to the heap dump. 6. Click OK to save the schedule for the heap dump. Related topics Downloading Memory Dump Diagnostic for Java from IBM Support Assistant “Heap Dump Schedule” The Heap Dump Schedule page shows a table of scheduled heap dumps on the monitored servers. From this page, you can modify and delete the schedules. 130 ITCAM for Application Diagnostics: User Guide Memory Analysis Use the Memory Analysis page to create a memory analysis report, to help investigate potential memory problems related to garbage collection and the JVM heap size. To access the Memory Analysis page, from the top navigation click Problem Determination > Memory Diagnosis > Memory Analysis. To create a Memory Analysis report, select the server group name in the Group list box, select the server name in the Server list box, select the analysis type (Garbage Collection or Java Heap Size), and click the Next button. In the Metric Selection, select the option that contains the two metrics you want to compare, and click the View Results button. See “Creating a Memory Analysis report.” Creating a Memory Analysis report About this task Investigate potential memory problems related to garbage collection and the JVM heap size by using the Memory Analysis. When there is over 24 hours of data, your reports will show the last 48 hours; in all other cases, the last 60 minutes of data will display. To create a Memory Analysis report: 1. From the top navigation, click Problem Determination > Memory Diagnosis > Memory Analysis. The Memory Analysis page opens. 2. Select a group and a server or all servers from the list boxes. 3. Select the Analysis Type: Garbage Collection or Java Heap Size. 4. Click Next. 5. In the Metric Selection, select the option that contains the two metrics you want to compare. 6. Click View Results. The Memory Analysis report displays. 7. Using the Memory Analysis Options, you can select a different group or server, compare two different metrics, or view a different time increment. A new report displays based on your new selections. If there is over 24 hours of data available, your report will show the last 48 hours. Otherwise your report will display the last 60 minutes. Related topics Creating a Memory Leak Candidate Finder report Creating a Memory Leak Confirmation report Setting up a Heap Analysis Heap Analysis Use the Heap Analysis page to set up a heap analysis, which captures the runtime heap of an application server, breaks it down by class names of objects in the heap, and provides the number of instances and the size they occupy. To access the Heap Analysis page, from the top navigation click Problem Determination > Memory Diagnosis > Heap Analysis. To set up a heap analysis, select the server group name in the Group list box, select the server name in the Server list box, select whether a Garbage Collection Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 131 should be forced before taking the heap snapshot, and click the OK button. See “Setting up a Heap Analysis.” Setting up a Heap Analysis About this task The Heap Analysis captures the runtime heap of an application server and breaks it down by the class names of the objects residing in the heap at the time of the snapshot, while providing the number of instances and the size they occupy. To set up a Heap Analysis: 1. From the top navigation, click Problem Determination > Memory Diagnosis > Heap Analysis. The Heap Analysis page opens. 2. Select a group and a server. 3. Select Yes or No to perform a garbage collection on the heap prior to the Heap Analysis snapshot. 4. Click OK. The Heap Analysis results display in the same window. 5. If you want to narrow the results, enter the names of the classes you want to ignore into the Exclude (Class name) list. If you specify regular expressions in the Exclude list, but want to monitor a subset of these, enter the names of classes you want to monitor into the Exclude Override (Class name) list. 6. Click Apply. The new Heap Analysis displays. 7. Click Reset to return the class name filters to their original settings. Related topics Creating a Memory Analysis report Creating a Memory Leak Candidate Finder report Creating a Memory Leak Confirmation report Viewing a Memory Leak Candidate Finder report Memory Leak Use the Memory Leak page to create a Memory Leak Confirmation report, which might help determine whether a memory leak is occurring in one of the applications on a server. You can also use this report to create Memory Leak Diagnosis and Memory Leak Candidate Finder report, which might help diagnose the source of a memory leak. To access the Memory Leak page, from the top navigation click Problem Determination > Memory Diagnosis > Memory Leak. To create a Memory Leak Confirmation report, select the server group name in the Group list box, select the server name in the Server list box, and click the OK button. See “Creating a Memory Leak Confirmation report.” Creating a Memory Leak Confirmation report About this task Uncover a memory leak trend using the Memory Leak Confirmation report. Compare heap size to several load-oriented metrics to determine that there is in fact a leak, not just a change in workload. The system highlights a leak trend by comparing the average heap size after a garbage collection with a memory increase, increase in users, or increase in volume. To create a Memory Leak Confirmation report: 132 ITCAM for Application Diagnostics: User Guide 1. From the top navigation, click Problem Determination > Memory Diagnosis > Memory Leak. The Select a server page opens. 2. Select a group and a server from the list boxes and click OK. The Memory Leak Confirmation report displays. 3. Use the list boxes in the Report Control box to select a new group, server, date range, metric 1, 2, or 3 and click OK to rerun the report. If there is over 24 hours of data available, your report will show the last 48 hours. Otherwise your report will display the last 60 minutes. Results To get further information, you can view Memory Leak Diagnosis and Memory Leak Candidate Finder reports. A Memory Leak Diagnosis report provides application diagnostic details. To create and view a Memory Leak Diagnosis report, click Memory Leak Diagnosis in the left navigation pane. See “Creating a Memory Leak Diagnosis report.” A Memory Leak Candidate Finder report creates a heap snapshot, waits a specified time, and creates another snapshot; comparison of these snapshots can help reveal memory leaks in applications. To start the creation of a Memory Leak Candidate Finder report, click Create New Candidate in the left navigation pane, see “Creating a Memory Leak Candidate Finder report” on page 134. After the specified time has elapsed, view the report by clicking View Existing Candidates in the left navigation pane, see “Viewing a Memory Leak Candidate Finder report” on page 134. Related topics Creating a Memory Analysis report Creating a Memory Leak Candidate Finder report Setting up a Heap Analysis Creating a Memory Leak Diagnosis report About this task In the Memory Leak Diagnosis report each row in the Suspected Memory Leaks table represents an allocation pattern for which memory allocation data has been collected. When a memory leak occurs objects accumulate on the heap and increase over time. The growth data informs you as to what is growing on the heap. To create a Memory Leak Diagnosis report: 1. From the top navigation, click Problem Determination > Memory Diagnosis > Memory Leak. The Select a server page opens. 2. Select a group and a server from the list boxes and click OK. The Memory Leak Confirmation report displays. 3. From the Additional Tools box, click the Memory Leak Diagnosis link. The Memory Leak Diagnosis report page displays, showing the server and group you selected, as well as essential server information and the date and time this report was generated. The list of suspected memory leaks follows. If you receive the error CYNVE0746E: This server not instrumented for detail heap data collection. This might indicate that the application server has not received any requests yet. Run Memory Leak Diagnosis again when you know requests are in the system. Check that the Level 3 monitoring mode and the heap analysis flag on the Data Collector have been enabled. If you still receive this error, contact the system administrator. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 133 4. Click the Class Name link to view references to live objects on the heap. See “Viewing References to Live Objects on the Heap” on page 135. Related topics Creating a Memory Analysis report Creating a Memory Leak Confirmation report Viewing a Memory Leak Candidate Finder report Viewing References to Live Objects on the Heap Creating a Memory Leak Candidate Finder report About this task The Memory Leak Candidate Finder report lets you create a comparison report of two heap snapshots. Taking two heap snapshots will show if, over time, the number of instances of a specific class is increasing. In cases, where the number of instances of a class continues to rise over a period of time, the report will demonstrate this leak candidate. To create a Memory Leak Candidate Finder Report: 1. From the top navigation, click Problem Determination > Memory Diagnosis > Memory Leak. The Select a server page opens. 2. Select a group and a server from the list boxes and click OK. The Memory Leak Confirmation report displays. 3. From the Additional Tools box, click Create New Candidate link. The Create New Candidate page opens. 4. Select a group and a server. 5. Enter the Wait Time and select hours or minutes from the list box. (There is a 48 hour maximum.) The Wait Time is the amount of time the system must wait before taking the second heap snapshot. 6. Click Save. The Memory Leak Candidate Finder Management page displays the report with a waiting status. Check the report for results after your wait time elapses. If you receive a failed status on your Memory Leak Candidate Finder report this indicates that either the data collector restarted, the managing server is down, or there is not enough memory to run the report. Related topics Creating a Memory Analysis report Creating a Memory Leak Confirmation report Viewing a Memory Leak Candidate Finder report Viewing a Memory Leak Candidate Finder report About this task The Memory Leak Candidate Finder report displays the data comparison between two heap snapshots. The heap results display unfiltered. You can filter the heap results by class name using the Exclude (Class name) and Exclude Override (Class name) lists. Use this data to evaluate whether a memory leak is in progress on your system. To view a Memory Leak Candidate Finder report: 1. From the top navigation, click Problem Determination > Memory Diagnosis > Memory Leak. The Select a server page opens. 2. Select a group and a server from the list boxes and click OK. The Memory Leak Confirmation report displays. 134 ITCAM for Application Diagnostics: User Guide 3. From the Additional Tools box, click View Existing Candidates link. The Memory Leak Candidate Finder Management page opens. 4. The status for your report will be completed. Click the Server Name's link to open your previously created report. The Memory Leak Candidate Finder report opens. 5. Click Comparison Data on the left navigation pane. The comparison data displays with the data for each heap snapshot. 6. To view each heap individually, click either Heap 1 or Heap 2 on the left navigation pane. This gives you another view of the heap analysis for your current data. 7. To filter your data more precisely, enter the classes you don't want to analyze into the Exclude (Class name) list. If you specify regular expressions in the Exclude list, but want to monitor a subset of these classes, enter the classes you want to monitor into the Exclude Override (Class name) list. The report will refresh and display with the current data. When the comparison for the Memory Leak Candidate Finder report displays the heap snapshot data, the data includes the class name, the change in the number of instances, and the change in total size. Watch the change in the number of instances; increasing numbers are an indicator of a memory leak in your system. Related topics Creating a Memory Leak Candidate Finder report Creating a Memory Analysis report Viewing References to Live Objects on the Heap About this task Occasionally objects on the heap do not get garbage collected because another object has a reference to the original object. After clicking the Class Name link, the data displays which object is linked to the object that is growing. To view the References to Live Objects on the Heap: 1. From the top navigation, click Problem Determination > Memory Diagnosis > Memory Leak. The Memory Leak Overview page opens. 2. From step three, select a group and a server and click View Diagnosis. The Memory Leak Diagnosis page opens. 3. Select the Class Name link. The References to Live Objects on the Heap page displays. Related topics Creating a Memory Analysis report Creating a Memory Leak Confirmation report Creating a Memory Leak Diagnosis report Viewing a Memory Leak Candidate Finder report JVM thread display Use the JVM thread display page to view all threads running within the JVM of an application server. To view the JVM thread display page, from the top navigation click Problem Determination > JVM Thread Display. You can also access this page from the toolbox icon on the Server Activity Display page. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 135 Select the server group name in the Group list box, and the server name in the Server list box. If you access this page from the Tivoli Enterprise Portal and from the Server Activity Display page, the server group name and server name display automatically. At the top of the page, the snapshot date and time and the server name and IP address are displayed. The timestamp for Snapshot Date and Snapshot Time is collected from the Data Collector and converted to the time zone of the managing server. The page initially displays a list of top-level thread groups and active threads. To view thread groups and active threads within a thread group, click the name of the thread group. A Thread Group Properties pane displays on the right of the page, showing information for the current thread group. To return to an upper level thread group, click ... To view information for a thread, click its name. A Thread properties pane displays on the right of the page, showing information for the thread. To change priority for the thread, in the Thread properties pane select the new priority in the Priority list box and click the Change Priority button. See “Changing a JVM thread's priority” on page 137. Important: The new priority remains for the life of the thread. As a result, any requests assigned to that thread after the change hold that priority. To view a stack trace for the thread, in the Thread properties pane click the View Stack Trace button. See “Viewing a stack trace” on page 137. CAUTION: Canceling a thread might cause JVM and application server instability. Use the cancel thread function only when absolutely necessary, and with careful consideration of the consequences. To cancel the thread, in the Thread properties pane click the Cancel Thread button. See “Canceling a thread” on page 138. To troubleshoot a multithreaded application, you might need to view the thread dump, which includes detailed information about memory allocation of all threads in the JVM. To view the thread dump, click the Thread Dump button, located in Server Properties at the top of the page. See “Viewing a thread dump” on page 138. User Scenarios Scenario 1: How to alleviate high server response time You are asked to investigate server A where response time and JVM CPU% are higher than expected, but throughput is normal. You don't see any active requests in the In-flight Request Search, so you suspect there might be threads running outside the application server. You access the JVM Thread Display and notice a couple of suspect threads. After taking a thread dump for the JVM, find the details of the current thread that is misbehaving and either re-prioritize or cancel the thread. 136 ITCAM for Application Diagnostics: User Guide Changing a JVM thread's priority About this task If a thread is executing too slowly, you can change its priority by moving it up in the stack, so that it can process a request quickly. To change a thread's priority: 1. From the top navigation, click Problem Determination > JVM Thread Display. The JVM Thread Display Server selection page opens. 2. Select a group and a server to view the running threads. The JVM Thread Display page opens showing all top level thread group running in the selected server. 3. Select and click to the right of the thread for detailed information. 4. From the priority list box in the Thread Properties table, select a number. Priority 1 is the lowest and priority 10 is the highest. 5. Click Change Priority. The priority list box displays the priority you selected for the thread to execute request. When changing a thread's priority, be aware that the new priority remains for the life of the thread. As a result, any requests assigned to that thread after the change will hold that priority during that request's lifetime. Related topics Canceling a thread Viewing a stack trace Viewing a stack trace About this task The Stack Trace page displays the sequence of method execution and in last in first out order. The last executed method will be displayed first in the stack trace. To view a stack trace: 1. From the top navigation, click Problem Determination > JVM Thread Display. The JVM Thread Display Server selection page opens. 2. Select a group and a server to view the running threads. The JVM Thread Display page opens showing all top level thread group running in the selected server. 3. Select and click a thread for detailed information. The Thread Properties table displays the detailed information of the thread that you selected. 4. Click View Stack Trace The Stack Trace page opens. The stack trace shows the outstanding methods waiting to execute as a result of the request. This trace reports the data unfiltered, so you will see every class. In a normal environment, a request executes quickly so it might be difficult to catch a stack trace before completion. Related topics Changing a JVM thread's priority Canceling a thread Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 137 Canceling a thread About this task If a thread is misbehaving, for example looping, sleeping or abusing resources, it might be necessary to cancel the thread and terminate the executing Java thread to let other threads to proceed. By default, only "Administrator" role will have access to the canceling a thread functionality To cancel a thread: 1. From the top navigation, click Problem Determination > JVM Thread Display. The JVM Thread Display Server selection page opens. 2. Select a group and a server to view the running threads. The JVM Thread Display page opens showing all top level thread group running in the selected server. 3. Select and click a thread that you want to view its detailed information. The Thread Properties table displays the detailed information of the thread that you selected. 4. Click Cancel Thread. 5. Click OK in the confirmation box. The JVM Thread Display page refreshed displaying without the canceled thread. Canceling a thread might cause JVM and application server instability. Use the cancel thread function only when absolutely necessary, and with careful consideration of the consequences. Related topics Changing a JVM thread priority Viewing a stack trace Viewing a thread dump About this task To troubleshoot a problematic multithreading application with a hung thread or looping thread, you might need to view the Thread Dump page for detailed information about memory allocation of threads in a JVM. When a user clicks thread dump on the JVM Thread Display page, a snapshot will be taken showing the data about all threads. You can view the Thread Dump page for detailed information about memory allocation of threads in a JVM. To view the Thread Dump page: 1. From the top navigation, click Problem Determination > JVM Thread Display. The JVM Thread Display Server selection page opens. 2. Select a group and a server to view the running threads. The JVM Thread Display page opens showing all top level thread group running in the selected server. 3. Click Thread Dump. The Thread Dump page opens. Related topics Changing a JVM thread's priority Canceling a thread 138 ITCAM for Application Diagnostics: User Guide Trap and alert management Use the Trap and alert management page to define and modify traps and alerts that monitor server health and determine problems with applications, and to view the history of triggered traps and alerts. To access trap and alert management, from the top navigation, click Problem Determination > Trap & Alert Management. You can also access this page from the toolbox icon Display page. on the Server Activity Use trap and alert management to monitor server health and determine problems with applications. Prevent disruptions in service by receiving alerts before problems arise. Gather data that helps you pinpoint the root cause of difficult-to-reproduce problems. The page shows a table of active traps and another table of defined trap profiles. (You can activate a trap based on a trap profile). For each active trap the table shows: v The name of the trap. v The name of the server that the trap applies to. If the trap applies to multiple servers, you can click + to view the list. v The number of minutes for which the trap will be suppressed before triggering, if applicable. This avoids triggering a trap on a short load spike. v The duration of the trap; the trap will be deactivated when this duration expires. Traps can also have an infinite duration. v Time left until the duration expires (N/A if the duration is infinite). v The time when this trap was activated. v The user who has activated the trap. v A Deactivate button. To deactivate a trap, click the Deactivate button. See “Deactivating a trap” on page 148. For each trap profile the table shows: v The name of the trap profile. v The description. v The user who has created the profile. v Activate, Modify, Modify, and Delete buttons. To activate a trap based on the profile, click the Activate button. See “Activating a trap” on page 147. To modify a trap profile, click the Modify button. See “Modifying a trap” on page 148. To create a trap profile as a copy of an existing profile, click the Duplicate button. See “Duplicating a trap” on page 149. To delete a trap profile, click the Delete button. See “Deleting a trap” on page 149. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 139 To create a new trap profile, click Create trap in the left navigation pane, and select the trap type and target type. See: v “Setting an Application trap” v “Setting an Application trap using the Resident Time - Misbehaving Transaction target type” on page 143 v “Setting a Server Resource trap” on page 145 To view the history of triggered traps, click Trap Action History in the left navigation pane. See “Viewing the trap action history” on page 150. User Scenario Scenario 1: Debugging complex applications You are monitoring application A, which has a J2EE component on server S and a legacy CRM back end. The Java component of application A frequently exhibits idle times of several seconds, even when there is not much load on server S. You do not wish to run at L3, but you want to see in what methods the Java application is waiting. You set an Application Trap for Wait Time with a Threshold of 2,000 ms, by Request for application A, choose the Stack Trace Data Action and apply this trap to server S. The next time a request for application A takes longer than two seconds, the system will take a stack trace of server S. Look in the Trap Action History to obtain the stack trace, to determine where application A is waiting. Setting an Application trap About this task An Application trap detects metrics in a request, method, or SQL or MQI call. The system triggers the trap after the monitored server exceeds the threshold for the metric you set. When the trap is triggered, and when the action conditions are met, then any alerts you have activated (whose conditions have been met) will be sent, and any actions you have specified (whose conditions have been met) will be performed. To set an Application trap: 1. From the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. 2. On the left navigation pane, click Create Trap. The Trap Type selection page opens. 3. Select Application Trap as the trap type. 4. Select one of the Target Types from the list box. Based on the target type you select, the system will dynamically generate the trap definition options in the next step. The following is a list of the Target Types: v Occurrence - The number of times the specified unit occurred. The Occurrence trap has three available filters; By Request; By Method, and By SQL. v CPU Time - The amount of time the CPU is executing instructions. The CPU Time trap has two available filters, By Request and By Method. v Wait Time - The amount of time the CPU is idle. The Wait Time trap has two available filters, By Request and By Method. v Resident Time - In-flight - Based on the resident in-flight time of a transaction, the Publish Server keeps track of all the active (in-flight) 140 ITCAM for Application Diagnostics: User Guide requests and their resident times and triggers the trap if the resident time of the request exceeds the time configured in the trap condition. The Resident Time - In-flight trap has one available filter, the By Request filter. v Resident Time - Completed - The wall clock time for when the unit of a transaction, method, etc. ends, minus the wall clock time when it started. The Resident Time - Completed trap has three available filters; By Request; By Method, and By SQL. v Resident Time - Misbehaving Transaction - This trap has one available filter, the By Request filter. With this target type, when the complete response request time violates the threshold in the trap definition, the monitoring level for the request switches from L1/L2 to L3 and component/method trace detail is captured. As switching from L1/L2 to L3 has a performance impact on the Data Collector, there are 2 fields you can use to deactivate the trap and return to the original L1/L2 monitoring level once the required detail has been captured: – Number of occurrences of every request after which the trap will be deactivated - The purpose of this field is to prevent the Data Collector from running at L3 indefinitely. The value in this field determines the number of times you want every request to reach the threshold before the trap is deactivated. Using this field enables you to capture component/method trace detail at L3 when the threshold is exceeded, and to then automatically revert to the original monitoring level, thereby reducing the performance cost to the server. – Number of occurrences of every request that doesn't violate this trap after which mod level is reverted back and trap is deactivated - Once L3 is enabled, after the trap condition is violated the first time, it remains at L3 until the request violates for the predetermined number of times as set in the Number of occurrences of every request after which the trap will be deactivated field. As a result, the request in the Data Collector will remain at L3 if the request doesn't violate for the predetermined number of times, resulting in performance cost to the Data Collector. To prevent this, use this field - Number of occurrences of every request that doesn't violate this trap after which mod level is reverted back and trap is deactivated. Once the trap triggers and the monitoring level switches to L3, if the number of requests that does not reach the threshold is equal to the value in this field, then the trap is deactivated. For further detail on this target type, see “Setting an Application trap using the Resident Time Misbehaving Transaction target type” on page 143 v Uncaught Exception - Capture exceptions that occur in applications and data about the failure. The Uncaught Exception trap has three available filters; By Request, Exception or Error Class Name. v Lock Acquisition Time - In-flight - The in-flight transaction has not completed and might be hanging, using this type will provide data on how to fix the problem. What is being measured is the amount of time taken to obtain an acquisition. The acquisition clock starts when the class/method begins trying to acquire the lock, and ends when the lock is acquired. The Lock Acquisition Time - In-flight trap has two available filters, By Request and By Method. v Lock Acquisition Time - Completed - The amount of time taken to obtain an acquisition. The acquisition clock starts when the class/method begins trying to acquire the lock, and ends when the lock is acquired. The Lock Acquisition Time - Complete trap has two available filters, By Request and By Method. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 141 Traps are now supported in CICS. CICS has the following trap types available: Occurrence, CPU time, Resident Time - Completed, Resident Time - In-flight, and Wait Time. Note: By default, the Publish Server does not process requests which run longer than 5 minutes. Therefore, if an application trap's threshold is greater than or equal to 300 seconds, the trap will not be triggered. To change this default setting in the Publish Server, in the psX.properties file, change the TIMEOUT_LIMIT property to greater than 5 minutes as required. The properties files for the Publish Servers are located here: MS_HOME/etc/. They are named with the convention psX.properties, where X is an integer. By default, there are 2 files, ps1.properties and ps2.properties, if you add another Publish Server instance, the properties file will be called ps3.properties and for all additional instances of the Publish Server, the integer value in the properties file name will increment by 1. 5. Click Next. The Step 2 - Define Trap page opens. 6. Complete the rest of the fields in the Trap Definition section, which restrict which events will trigger the trap to fire. 7. Click Next. The Set Trap Alerts page opens. 8. For the Trap Alert settings, under Condition enter the number of times the trap will occur before the system takes an action. Specify the amount of time under Time Interval to monitor how many times the trap met its conditions. 9. Click to select the severity level from the list box. The application monitor has three severity levels. Since the application monitor provides SNMP integration with Tivoli, map the three severity levels of the application monitor to the warning levels of Tivoli listed in the following table: ITCAM severity level Tivoli warning level Low Harmless Medium Minor High Critical 10. Select an action or multiple actions, such as sending an e-mail or SNMP message, for the system to take when the condition is met. 11. Select one or all Data Actions, such as Component/Method Trace, Stack Trace, or Thread Dump (not applicable to the Windows platform), to get detailed information. We recommend that you select Component/Method Trace as the data action, since a request executes quickly and it is difficult to catch before completion. Make sure that you have selected L3 monitoring level if you choose to collect Component/Method Trace as the Data Action. When setting a trap, you can select multiple trigger conditions and alerts for each action set. Each trap is required to have at least one action but may have multiple actions set. Thread Dump is not available for CICS. 12. Click Add to add the alert to your trap. If you select Component/Method Trace as the Data Action for an In-flight-based trap, the method trace might contain a "-1" for Depth on some events in the method trace. In-flight transactions, by definition, are incomplete transactions, so the request stacks of those transactions will be incomplete. 13. Set the Default Suppression settings by entering the amount of time you want to delay alerts after the first alert is sent. 14. Click Next to proceed. The Name Trap page opens. 15. Enter a name and descriptive text for your trap. 142 ITCAM for Application Diagnostics: User Guide 16. Click either Save or Save & Activate. 17. If you click Save, the Trap and Alert Management page opens displaying your new trap. 18. If you click Save & Activate, the Activate page opens. To activate a trap, see Activating a Trap. Related topics Activating a trap Setting a Server Resource trap Setting an Application trap using the Resident Time Misbehaving Transaction target type About this task A Resident Time - Misbehaving Transaction is a target type for an Application Trap. With this target type, when the resident time of a request violates the specified level in the trap definition, the monitoring level for that specified request switches from L1/L2 to L3. For all the subsequent resident time violations for that request, method trace detail is captured. This target type provides an efficient means of collecting method trace detail at L3 as you can configure the data collector to return to L1/L2 after the threshold is reached a certain number of times within a given time period, thereby reducing the performance cost to the data collector. This target type also provides a dynamic means of collecting method trace detail as detail is collected at the time the problem is occurring. To set an Application trap with a Resident Time - Misbehaving Transaction target type: 1. From the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. 2. On the left navigation pane, click Create Trap. The Trap Type selection page opens. 3. Select Application Trap as the trap type. 4. Select Resident Time - Misbehaving Transaction as the target type. 5. Click Next. The Step 2 - Define Trap page is displayed. In the Threshold field, enter a value. This value is the complete request response time expressed in milliseconds. When a transaction reaches this value, the trap is triggered. 6. In the By Request field, choose Request Contains and then enter the value *. When the By Request field contains the value *, the Resident Time Misbehaving Transaction trap will deactivate after every request has reached the specified number of occurrences as specified in the Number of occurrences of every request after which the trap will be deactivated field. 7. Click Next. The Step 3 - Set Trap Alerts page is displayed. In the Severity field, select a severity level. The application monitor has three severity levels. Since the application monitor provides SNMP integration with Tivoli, map the three severity levels of the application monitor to the warning levels of Tivoli listed in the following table: ITCAM severity level Tivoli warning level Low Harmless Medium Minor Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 143 High Critical 8. In the Alert Action(s) section, choose how and to whom you wish to communicate details of the trap threshold being reached. You can choose e-mail, SNMP or both. 9. Select Collect Component/Method Trace. 10. Click Add to add the alert to your trap. In the Name section, enter a name and a description for the trap. Click Save & Activate. The Activate page is displayed 11. In the Server Selection section, select the servers you wish to monitor for this trap. 12. In the Alert Suppression Settings section, enter the amount of time you want to delay alerts after the first alert is sent. Click the Trap Default radio button to use the default suppression for the trap, or click the Override Default radio button to set a specific suppression duration for this particular trap activation. If you do not want to suppress any alerts, enter a value of 0, or leave the field blank. 13. In the Deactivation Settings section, there are 2 fields. Here is a description of each field: v Number of occurrences of every request after which the trap will be deactivated - The purpose of this field is to prevent the Data Collector from running at L3 indefinitely. The value in this field determines the number of times you want every request to reach the threshold before the trap is deactivated. Using this field enables you to capture component/method trace detail at L3 when the threshold is exceeded, and to then automatically revert to the original monitoring level, thereby reducing the performance cost to the server. A problem can occur if this value is not reached. If the Number of occurrences of every request after which the trap will be deactivated value is not reached, then the server will remain at L3 resulting in a continuous performance cost. To prevent this from happening use the field Number of consecutive non-violating requests after which mod level is reverted back and trap deactivated. v Number of consecutive non-violating requests after which mod level is reverted back and trap deactivated - Once L3 is enabled, after the trap condition is violated the first time, it remains at L3 until the request violates for the predetermined number of times as set in the Number of occurrences of every request after which the trap will be deactivated field. As a result, the request in the Data Collector will remain at L3 if the request doesn't violate for the predetermined number of times, resulting in performance cost to the Data Collector. To prevent this, use this field - Number of consecutive non-violating requests after which mod level is reverted back and trap deactivated. Once the trap triggers and the monitoring level switches to L3, if the number of requests that does not reach the threshold is equal to the value in this field, then the trap is deactivated. A field for this value is also displayed in the Active Traps table in the Trap and Alert Management page. The field is Non Violating Requests Left, it indicates the number of occurrences of non violating requests before the trap is deactivated. 14. Click Activate to activate the trap. 144 ITCAM for Application Diagnostics: User Guide Results Related topics Activating a trap Setting a Server Resource trap Setting an Application Trap Setting a Server Resource trap About this task A Server Resource trap measures a variety of target types. The system will trigger a trap after exceeding the threshold for the metric you set. When the system meets the definition of the trap an alert occurs. For example, set a trap to alert you when a server is unavailable 2 times, and after a server is unavailable you can select to receive an e-mail. To set a Server Resource trap: 1. From the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. 2. On the left navigation pane, click Create Trap. The Trap Type selection page opens. 3. Select Server Resource trap as the Trap Type. 4. Select one of the following target types from the list box. v CPU: Average Platform CPU % Usage - Based on the average platform CPU usage over five minutes, the Publish Server retrieves CPU usage at regular intervals (60 seconds by default) and calculates the average platform CPU over five minutes. v Average JVM CPU % Usage - Based on the average JVM CPU usage over five minutes, the Publish Server retrieves CPU usage at regular intervals (60 seconds by default) and calculates the average JVM CPU over five minutes. v Memory: v JVM Heap Size - Based on the JVM Heap Size of the data collector, the Publish Server retrieves JVM Heap Size from the data collector at regular intervals (60 seconds by default) and checks the heap size from that measure. v Garbage Collection Frequency - Garbage Collection is calculated over one minute (supported in ITCAM J2EE WebLogic). v Average JVM Heap Size after Garbage Collection - The trap triggers when the average JVM Heap size exceeds the size configured in the trap (supported in ITCAM J2EE WebLogic) v Application Capacity: Number of Sessions - Based on the number of user sessions that are currently in use by the application server. v Average Response Time - Publish Server triggers the trap if the average response time exceeds the time configured in the trap condition (supported in ITCAM J2EE WebLogic). v Server available - Publish server triggers the trap when the Server (Data Collector) becomes available (supported in ITCAM J2EE WebLogic). v Server unavailable - The Publish server triggers the trap if the Server (Data Collector) goes down or becomes unavailable (supported in ITCAM J2EE WebLogic). v Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 145 5. 6. 7. 8. v Uncaught Java Exceptions - Based on the rate of the Java exceptions that occur in applications and includes data about the failure. It is calculated over 60 seconds. Publish server triggers the trap if the Servlet error rates exceed the number configured in the trap condition. v Request Frequency - Number of requests per minute. v Resource Pool : v Thread Pool % Usage - Publish Server triggers the trap if the Thread Pool % Usage of a particular server exceeds the threshold that is specified in the trap condition (supported in ITCAM J2EE WebLogic). v JCA Pool % Usage - Publish Server triggers the trap if the JCA Pool % Usage of a particular server exceeds the threshold that is specified in the trap condition (supported in ITCAM J2EE WebLogic). v JDBC Pool % Usage - Publish Server triggers the trap if the JDBC Pool % Usage of a particular server exceeds the threshold that is specified in the trap condition (supported in ITCAM J2EE WebLogic). Click Next. The Define Trap page opens. Enter a threshold that will send out an alert when it triggers the trap after meeting the condition. Click Next. The Set Trap Alerts page opens. For the Trap Alert settings, under Condition enter the number of times the trap occurs before the system takes an action. Specify the amount of time under Time Interval to monitor how many times the trap met its conditions. Click to select the severity level from the list box. 9. Note: The application monitor has three severity levels. Since the application monitor provides SNMP integration with Tivoli, map the three severity levels of the application monitor to the warning levels of Tivoli listed in the following table: ITCAM severity level Tivoli warning level Low Harmless Medium Minor High Critical 10. Select an action or multiple actions, such as sending an e-mail or SNMP message, for the system to take when the condition is met. 11. The Data Action–Heap Dump is only available if you select JVM Heap Size or Average JVM Heap Size after Garbage Collection as your Target type. 12. Click Add to add the alert to your trap. 13. Set the Default Suppression settings by entering the amount of time you want to delay alerts after the first alert is sent. 14. Click Next to proceed. The Name Trap page opens. 15. Enter a name and descriptive text for your trap. 16. Click either Save or Save & Activate. 17. If you click Save, the Trap and Alert Management page opens displaying your new trap. 18. If you click Save & Activate, the Activate page opens. To activate a trap, see Activating a Trap . 146 ITCAM for Application Diagnostics: User Guide Results If you select the <= operator while creating or modifying the Request Frequency target type, then the following sequence of events occurs: 1. The trap action does not trigger if no transactions are received by the Publish Server after activating the trap. 2. Trap threshold checking begins after the first transaction received by the Publish Server activates the trap. Note: When setting a trap, you can select multiple trigger conditions and alerts for each action set. Each trap is required to have at least one action but can have multiple actions set. Related topics Activating a trap Activating a trap About this task You can turn traps off and on by activating and deactivating them. Traps use resources on the managing server, including database storage, and generate network traffic, so make sure the thresholds you set to trigger your traps are realistic. To activate a trap: 1. A trap is activated at the end of the trap creation dialog by clicking the Save & Activate button on the Name Trap panel; see “Setting an Application trap” on page 140 or “Setting a Server Resource trap” on page 145 to start from the beginning of the trap creation process. To activate an existing trap, from the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. 2. In the Trap Profiles list, click Activate next to the trap you want to activate. The Activate page opens. 3. Select a group and a server. Note: If you select all servers the trap will be applied to all servers assigned to the group (whether currently available or unavailable) at the time the trap is activated. Any new servers assigned to the group will not use the trap. 4. Set the Alert Suppression settings by entering the amount of time you want to delay alerts after the first alert is sent. Click the Trap Default radio button to use the default suppression for the trap, or click the Override Default radio button to set a specific suppression duration for this particular trap activation. If you do not want to suppress any alerts, enter a value of 0, or leave the field blank. 5. If you want the trap to run indefinitely, do not check either of the check boxes in the deactivation settings section. If you want the trap to deactivate, click one or both of the check boxes for deactivation, and fill in the value(s) for minutes or occurrences. If both deactivation settings are selected, the trap will deactivate when the first of the two deactivation conditions is met. 6. Click Activate. The Trap and Alert Management page displays the trap in the Active Traps table at the top of the page. Related topics Deactivating a trap Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 147 Duplicating a trap Modifying a trap Setting a Server Resource trap Setting an Application trap Deactivating a trap About this task Deactivate your traps when they are no longer required since they can add overhead to the system. The traps in the Trap Profiles table are not active. To deactivate a trap: 1. From the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. 2. In Active Traps table, click Deactivate next to the trap you want to deactivate. 3. Click OK at the confirmation box. The trap displays in the Trap Profiles table as deactivated. Results Note: A trap must be deactivated prior to modification. Related topics Activating a trap Modifying a trap Setting a Server Resource trap Setting an Application trap Modifying a trap About this task After creating a trap, you can modify any of the parameters of a trap. Change the Group, Server, Trap Type, Target Type, Alert Conditions, and the Action that occurs when the system meets the conditions. Using this method, you can reuse and modify old traps for different servers. Note: A trap must be deactivated prior to modification. (See “Deactivating a trap.”) To modify a trap: 1. From the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. 2. In the Trap Profiles, click Modify next to the trap you want to modify. The Modify page opens. 3. If you want to change the Trap Definition, enter a new threshold that will trigger the trap after meeting the condition. 4. If you want to change the Trap Alert settings, under Condition enter the number of times the trap occurs before the system takes any action, including sending an e-mail or sending an SNMP message. Specify the amount of time under Time Interval to monitor how many times the trap met its conditions. In addition, set the Alert Suppression settings by entering the amount of time you want to delay alerts after the first alert is sent. 148 ITCAM for Application Diagnostics: User Guide 5. Select one or all Data Actions to get detailed information (not applicable to the Windows platform), such as Component/Method Trace, Stack Trace, and Thread Dump. Data Action is not applicable to Server Resource trap. 6. Click Add to add a new alert to your trap. If you select Component/Method Trace as the Data Action for an In-flight-based trap, the method trace might contain a "-1" for Depth on some events in the method trace. In-flight transactions, by definition, are incomplete transactions, so the request stacks of those transactions will be incomplete. 7. If you want to change the name, enter a new name and descriptive text for your trap. This will replace the old name when saved. 8. Click Save. The Trap and Alert Management page opens displaying your modified trap. Related topics Activating a trap Setting a Server Resource trap Setting an Application trap Duplicating a trap About this task Save time by duplicating traps. Duplicating a trap allows you to quickly create a new trap based on the settings of an existing trap. To duplicate a trap: 1. From the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. 2. In the Trap Profiles table, click Duplicate next to the trap you want to duplicate. The Duplicate page opens. 3. Select the trap you want to duplicate from the list box. 4. Enter a name for the new trap. 5. Click Save. The new trap displays in the Trap and Alert Management page. Related topics Activating a trap Deactivating a trap Modifying a trap Deleting a trap About this task Manage your traps by keeping them up-to-date. Delete existing traps from the system that are no longer in use. To delete a trap: 1. From the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. Note: A trap must be deactivated prior to deletion. (See “Deactivating a trap” on page 148) 2. In the Trap Profiles table list, click Delete next to the trap you want to delete. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 149 3. Click OK at the confirmation box. The Trap and Alert Management page opens displaying without the deleted trap. Related topics Activating a trap Modifying a trap Setting a Server Resource trap Setting an Application trap Viewing the trap action history About this task The Trap Action History page provides a record of traps that met the set conditions. You can view the trap history such as the date and time that the action was taken, trap properties, server name, severity, and the type of action that was taken. To view a fired trap: 1. From the top navigation, click Problem Determination > Trap & Alert Management. The Trap and Alert Management page opens. 2. On the left navigation pane, click Trap Action History. The Trap Action History opens displaying the information for the fired traps. 3. Click Show Filters. You may either filter the information by server or by server and trap name but not by the trap name only. 4. Click to select the group name and the server name, and a trap name (if applicable), then click Filter. The Trap Action History page refreshes displaying the filtered trap information that you selected. The history of a method trace for an in-flight transaction may show -1 for the Depth. In-flight transactions, by definition, are incomplete transactions, so the request stacks of those transactions would be incomplete which makes calculating depth for partial events (a start without an end event) impossible. The Trap Action History page now displays the Data Collector process ID information. 5. To delete a fired trap history, check the Delete box next to the trap that you want to delete and click Delete. The Trap Action History page refreshes displaying without the deleted trap history. Related topics Activating a trap Setting alert actions and data actions Setting alert actions and data actions About this task Regardless of the trap type, you must specify trap actions as part of the trap definition. Trap actions include alerts and data actions. Alerts include messages sent by e-mail or SNMP, whereas data actions capture Method Traces, Stack Traces or Thread Dumps. Trap actions occur when a trap triggers. You can configure alert actions to be suppressed, to avoid getting spammed by alerts. 150 ITCAM for Application Diagnostics: User Guide To set alert actions and data actions: 1. You can set trap alerts on the Step 3 - Set Trap Alerts page, which is part of the trap creation process. To arrive at this page, see “Setting an Application trap” on page 140 or “Setting a Server Resource trap” on page 145. 2. For the Trap Alert settings, in the condition field, enter the number of times the trap will trigger before the action is taken. Note: This value will be applied to all the trap actions defined in the next two steps. If you want to define multiple actions, each with a different condition, repeat steps 2-4 once for each distinct condition. 3. Click to select the severity level from the list box. Note: The application monitor has three severity levels. Since the application monitor provides SNMP integration with Tivoli, the three severity levels of the application monitor are mapped to the warning levels of Tivoli listed in the following table: ITCAM severity level Tivoli warning level Low Harmless Medium Minor High Critical 4. Add at least one action, either an alert action (e-mail or SNMP message) or a data action (Method Trace, Stack Trace or Thread Dump.) (The Thread Dump is not available on the Windows platform.) 5. To select an action, click its check box. For the e-mail action, also enter the list of e-mail addresses to which the message will be sent. 6. Click Add to add the actions to your trap. Repeat this step until you have added all the actions you want. You can change the values of the condition and severity fields (steps 2 and 3) each time you add a new action. If you select Component/Method Trace as the Data Action for an In-flight-based trap, the method trace may contain a "-1" for Depth on some events in the method trace. In-flight transactions, by definition, are incomplete transactions, so the request stacks of those transactions will be incomplete. 7. Set the Default Suppression setting if you want to avoid getting spammed by Alert Actions that might occur close together in time. 8. Click Next to proceed. The Name Trap page opens. 9. Enter a name and descriptive text for your trap. 10. Click either Save or Save & Activate. If you click Save, the Trap and Alert Management page opens displaying your new trap. If you click Save & Activate, the Activate page opens. To activate a trap, see "Activating a Trap". Results You can configure the Time Interval in the Trap Alert Settings page to milliseconds, seconds, minutes, hours, days or weeks. The smallest available time interval unit is milliseconds, certain trap types might not be able to use milliseconds as the time unit. Use the following table as a guideline for setting the Time Interval value with default Managing Server and Data Collector settings. Trap Type Target Type Minimum Time Interval Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 151 Server Resource Trap Average Platform CPU % Usage 5 (min) Average JVM CPU % Usage 5 (min) JVM Heap Size 1 (min) Average JVM Heap Size after 1 (min) GC Application Trap Request Frequency 1 (min) Number of Sessions 1 (min) Occurrence 1 (ms) CPU Time 1 (ms) Wait Time 1 (ms) Resident Time – In-Flight 1 (ms) Resident Time – Complete 1 (ms) Resident Time – Misbehaving 1 (ms) Transaction Uncaught Exceptions 1 (ms) Lock Acquisition Time – In-Flight 1 (ms) Lock Acquisition Time – Completed 1 (ms) Related topics Activating a trap Software consistency check Identify irregular servers. Use the software consistency check to troubleshoot aberrant servers in an otherwise homogenous server group. This feature is not available for CICS or IMS. User Scenarios Scenario 1: Comparing a non-functioning server with working servers After an upgrade to Application B, which is deployed on multiple servers, requests on Server D are occasionally hanging while all the other servers are working fine. As an Operator, you check the Runtime Environment and compare the server having problems with one of the properly functioning servers. Go to the Installed Binary Check to see if the files on both servers are the same. You find that one of the files on Server D is not the same as the file on the server that is properly functioning. Install the proper file to correct the problem. Installed Binary Comparison Use the Installed Binary Comparison page to compare the installed binaries on a chosen server (the Authoritative Server) with up to 10 additional servers (the Comparison Servers). 152 ITCAM for Application Diagnostics: User Guide To set up the installed binary comparison, select the authoritative servers and the comparison servers. See “Setting up an Installed Binary Comparison.” Setting up an Installed Binary Comparison About this task Analyze the data from the Installed Binary Comparison to find out whether your servers contain the same installed binaries. The Installed Binary Comparison allows you to compare the installed binaries on a chosen server (the Authoritative Server) with up to 10 additional servers (the Comparison Servers). The comparison describes whether or not your servers contain the same installed binaries. To setup an Installed Binary Comparison: 1. From the top navigation, click Problem Determination > Software Consistency Check > Installed Binary Comparison. The Installed Binary Comparison page opens. 2. Under the Authoritative Server, select a group and a server. 3. Under the Comparison Servers, select a group and a server, or select multiple servers within that group by clicking Ctrl + the server name. 4. Click Next to continue. The File selection page opens. 5. Click to select the File Source (EAR file or class path) and the File Types (JAR, Web, class, or image files). 6. Click OK. The Installed Binary Comparison results page displays the overview data first with the results of the comparison. Results See “Viewing the results of the Installed Binary Comparison.” Related topics Viewing the results of the Installed Binary Comparison Viewing the results of the Installed Binary Comparison About this task Review the comparison to find the differences among installed binaries on your servers. Differences in the installed binaries in a server farm can cause unexplained behavior. To view the results of the Installed Binary Comparison: 1. Navigate the results of the binary comparison by clicking the expansion icon next to the server name on the left navigation pane. 2. To view further details, click the server name and select either the Matched or Unmatched folders. 3. To view the folder contents, in the Matched folders: select Full Match, File Name/Path/Size Match, or File Name Match, and in the Unmatched folders: select either Authoritative Only or Comparison Only. 4. To perform an MD5 on a file, click Perform MD5. You can only perform an MD5 on files that are a Full Match or a File Name/Path/Size Match. The results display whether the files matched or not at the MD5 level. Results The files in the Matched folders contain files that match to varying degrees: Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 153 v Full Match - indicates that everything matched, including the file name and path, size, and file system timestamp. These files are likely to be identical to each other. However, the user can opt to further perform a MD5 operation on the files. An MD5 is a unique numeric signature that is different for each file when the contents of the files are different, even if the creation date and the file names coincide. v File Name/Path/Size Match - includes the files with matched file name and path, and size, but not timestamp. These files are likely to be the same. A user can opt to perform an MD5 on the files. v File Name Match - indicates that only the file names matched. The files are unlikely to be the same. The files in the Unmatched folders contain files that exist on either the Authoritative Server or the Comparison Server but not on both: v An Authoritative Only indicates that the file only exists on the Authoritative Server. v A Comparison Only indicates that the file only exists on the Comparison Server. Related topics Setting up an Installed Binary Comparison Installed Binary Check The Installed Binary Check page provides a list of the installed binaries deployed to the selected server. To access the Installed Binary Check page, from the top navigation, click Problem Determination > Software Consistency Check > Installed Binary Check. Select the server group name in the Group list box, and the server name in the Server list box, and click the Refresh button to view the binary information for the server. The page shows a table of all application binaries installed on the server; the type, fully qualified name, modification time, and size are displayed. In the Name column, click on directory names (these files display DIR in the Type column) to view details on binaries within the directories. Click on JAR and EAR file names to view a list of the file contents. Runtime Environment Comparison Use the Runtime Environment Comparison page to compare the runtime environments on a chosen server (the Authoritative Server) with up to 10 additional servers (the Comparison Servers). To set up the runtime environment comparison, select the authoritative servers and the comparison servers. See “Setting up a Runtime Environment Comparison.” Setting up a Runtime Environment Comparison About this task Analyze the data in the Runtime Environment Comparison and find out if the runtime environments on all your clone servers are setup the same. To set up a Runtime Environment Comparison: 154 ITCAM for Application Diagnostics: User Guide 1. From the top navigation, click Problem Determination > Software Consistency Check > Runtime Environment Comparison. The Runtime Environment Comparison page opens. 2. Under the Authoritative Server, select a group and a server. 3. Under the Comparison Servers, select a group, and then select multiple servers within that group by clicking Ctrl + the server name. 4. Click Next to continue. The Runtime Environment Comparison results page displays the data. 5. For specific data on the server, click any of the options in the left navigation under System Runtime Environment, Java Runtime Environment, and the App Server Runtime Environment. 6. For a complete detail report on a particular server, click the server's name. The Runtime Environment Check page displays all the available data on the system runtime environment, Java runtime environment, and the appserver runtime environment for the selected server. 7. Click Change Comparison to set up another runtime environment comparison. Related topics Viewing the results of the Installed Binary Comparison Runtime Environment Check The Runtime Environment Check page provides runtime environment details for the selected server, including host computer, JVM and application server information. To access the Installed Binary Check page, from the top navigation, click Problem Determination > Software Consistency Check > Runtime Environment Check. Select the server group name in the Group list box, and the server name in the Server list box in the left pane. Note: If you have a WebSphere Stack Product, such as WebSphere Process Server, WebSphere Portal Server, WebSphere Enterprise Service Bus, etc., which runs on an IBM WebSphere Application Server, the name of the application server is displayed when you Run the Runtime Environment Check. Note: After configuring data source with the administration web application provided by Tomcat, the MBean from MBeanServer cannot be retrieved. As the result, the JDBC Connection Pools column will always be 0 on the page Runtime Environment Check. This is a Tomcat 5.0 bug (latest version Tomcat 5.0.28) and only occurs in the Tomcat 5.0 series. Tomcat 5.5 series does not have the problem. Performance analysis and reporting Analyze applications and servers. Use performance analysis and reporting to analyze historical data. This helps you understand the performance of your applications and the utilization of your servers. User Scenarios Scenario 1: Investigating poor response time claims Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 155 Customers have been complaining about poor performance on Application A. As a performance analyst, you go into ITCAM for Application Diagnostics and draw up a response Trend Report for Application A for the last week to verify the customers' claims. Once you are able to see that there indeed are instances of poor response time, you decompose the problematic period to see how different requests impact the response time. Drill down to a method trace of an actual instance of a slow transaction, and e-mail this Trace Report to the developers so they can determine why the transaction was slow. Scenario 2: Predicting how your servers will handle a new workload Marketing is going to launch a new campaign to bring more visitors to your site. Your manager wants to make sure that there is enough capacity to handle the projected workload without degrading response times. As a capacity planner, you need to project how well your current servers will perform under the new workload. You create a Capacity Analysis report to compare throughput versus response time. You can use the trend line to estimate at what throughput the response time will be unacceptable. Defining reports Set report requirements. Set different requirements for generating reports to analyze the performance of application servers. Defining a Request/Transaction Analysis report About this task The Request/Transaction Analysis report provides a whole picture about the behavior on the application server. After defining the request/transaction analysis, several reports become available: Trend report, Decomposition report, Request report detail, and Trace report. Each of these reports provides more specific data for understanding the application's performance at every level. To define a Request/Transaction Analysis report: 1. From the top navigation, click Performance Analysis> Create Application Reports > Request/Transaction. The Create report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting no. If you want further instructions on scheduling reports, refer to Defining a Schedule report. 3. Select the group and the server from the list box. 4. Click Next to continue creating the report. The Report Filtering options page opens. It displays the options based on the Report Type you select. 5. Set the following options to filter the records returned in the report: v Metric - Throughput per Hour, Throughput per Second, Throughput per Minute, Response Time, and CPU Time. v Request Type - All, EJB, JSP, Servlet, CICS, Web Service, OTMA, VTAM®, BTAM, APPC, Portal, and RMI-IIOP. v Request Name - Unless you know the exact request string, always leave the field blank to return all requests or type in the specific request name. 6. Click Next to continue creating the report. The Date Range settings page opens. 156 ITCAM for Application Diagnostics: User Guide 7. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. 8. Click View Report to view the report. If you want to get a second data set for comparative analysis, click Next to open the Report Comparison page. The Report Comparison page opens. 9. Select a report comparison type and view the comparison report by clicking View Report. 10. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Defining a Method/Program Analysis report About this task The Method/Program Analysis report shows you the performance of the methods in the requests that have been processed by the application servers. After defining the Method/Program Analysis report, a Trend report, Decomposition report, and detailed Method/Program report are available. To define a Method/Program Analysis report: 1. From the top navigation, click Performance Analysis> Create Application Reports > Method/Program. The Create reports page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting no. If you want further instructions on scheduling reports, refer to Defining a Schedule report. 3. Select the group and the server from the list box. 4. Click Next to continue creating the report. The Report Filtering options page opens. It displays the options based on the Report Type you select. 5. Set the following options to filter the records returned in the report: v Metric - Throughput per Second, Throughput per Minute, Throughput per Hour, Response Time (ms), and CPU Time (ms). v Method/Component Trace - Unless you know the exact string, always leave the field blank to return all traces or type in the specific method/program/component name. Note: The name of this field represents the names used in J2/WAS and z/OS. Method name is used in the J2/WAS environments, and Program and component name are used in the z/OS environments. v Request Type - ALL, EJB, JSP, Servlet, CICS, Web Service, and Portal. v Request Name - Unless you know the exact request string, always leave the field blank to return all requests or type in the specific request name. 6. Click Next to continue creating the report. The Date Range settings page opens. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 157 7. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. 8. Click View Report to view the report. If you want to get a second data set for comparative analysis, click Next to open the Report Comparison page. The Report Comparison page opens. 9. Select a report comparison type and view the comparison report by clicking View Report. 10. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Defining a SQL Analysis report About this task The SQL Analysis report provides the information for the SQL calls' performance in the requests that have been processed by the application server. You can also view the Trend report, Decomposition report, and detailed SQL report after defining the SQL Analysis report. To define a SQL Analysis report: 1. From the top navigation, click Performance Analysis> Create Application Reports > SQL. The Create report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting No. If you want further instructions on scheduling reports, refer to Defining a Schedule report. 3. Select the group and the server on which you want to report from the list box. 4. Click Next to continue creating the report. The Report Filtering options page opens. It displays the options based on the Report Type you select. 5. Set the following options to filter the records returned in the report: v Metric - Throughput per Second, Throughput per Minute, Throughput per Hour and Response Time. v SQL Call - All, Insert, Delete, Update, Execute, Select, Lock, Unlock, Open, Close and Fetch. v Table Name - Leave blank for all table names or type in the specific table name. v Request Type - All, EJB, JSP, Servlet, CICS, Web Service, and Portal. v Request Name - Unless you know exactly what the request string is, otherwise always leave the field blank to return all requests or type in the specific request name. v Method/Component Trace - Leave blank for all methods or type in the specific name. 6. Click Next to continue creating the report. The Date Range settings page opens. 158 ITCAM for Application Diagnostics: User Guide 7. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. 8. Click View Report to view the report. If you want to get a second data set for comparative analysis, click Next to open the Report Comparison page. The Report Comparison page opens. 9. Select a report comparison type and view the comparison report by clicking View Report. 10. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Defining an MQI Analysis report About this task The MQI Analysis report provides the information for the MQI calls' performance in the requests that have been processed by the application server. You can also view the Trend report, Decomposition report, and detailed MQI report after defining the MQI Analysis report. To define a MQI Analysis report: 1. From the top navigation, click Performance Analysis > Create Application Reports > MQI. The Create report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting no. If you want further instructions on scheduling reports, refer to Defining a Schedule report. 3. Select the group and the server on which you want to report from the list box. 4. Click Next to continue creating the report. The Report Filtering options page opens. It displays the options based on the Report Type you select. 5. Set the following options to filter the records returned in the report: v Metric - Throughput per Second, Throughput per Minute, Throughput per Hour, and Response Time (ms). v MQI Call- BACK, BEGIN, CLOSE, CMIT CONN, CONNX, DISC, GET, INQ, OPEN, PUT, PUT1, and SET. v Queue Manager - manager of the queue. v Queue Name - Name of the queue. v Request Type/Transaction Type - All, EJB, JSP, Servlet, CICS, Web Service, OTMA, VTAM, BTAM, APPC, Portal, and RMI-IIOP v Request/Transaction Name - Unless you know the exact request string, always leave the field blank to return all requests or type in the specific request name. v Method/Program/Component Trace - Leave the field blank to return all methods. Type in the specific method name if you know the method name you are looking for. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 159 6. Click Next to continue creating the report. The Date Range settings page opens. 7. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. 8. Click View Report to view the report. If you want to get a second data set for comparative analysis, click Next to open the Report Comparison page. The Report Comparison page opens. 9. Select a report comparison type and view the comparison report by clicking View Report. 10. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Lock Analysis report About this task If you suspect that you have lock contention issues with a specific application, you can run a lock analysis report. This will give you the history of locking in the application and show whether there is a trend. The lock reports will show you the difference between the total locks and the ones that are contentious. To define a Lock Analysis report: 1. From the top navigation, click Performance Analysis > Create Application Reports > Lock Analysis. The Create report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting no. If you want further instructions on scheduling reports, refer to Defining a Schedule report. 3. Select the group and the server from the list box. 4. Click Next to continue creating the report. The Report Filtering options page opens. It displays the options based on the Report Type you select. 5. Set the following options to filter the records returned in the report: 6. 7. 8. 9. v Metric - The item you want to measure: Number of Lock Acquisitions, Number of Lock Contentions and Total Acquisition Time. v Request Type - All, EJB, JSP, Servlet, Web Service, and Portal. v Request Name - Unless you know the exact request string, always leave the field blank to return all requests or type in the specific request name. v Method/Component Trace - Leave the field blank to return all methods or type in the specific method name. Click Next to continue creating the report. The Date Range settings page opens. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. Click View Report to view the report. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report 160 ITCAM for Application Diagnostics: User Guide E-mailing a report Exporting a file Modifying a report Viewing a PDF file Defining a Portal Page report About this task The Portal Page report provides a picture of the behavior within the Portal Page requests. Once you isolate the problem requests, the portal-specific nested requests allow you to quickly get a high-level picture of where your problem is taking place. After defining the portal page report, several reports become available: Trend report, Decomposition report and Portal Page Detail report. To define a Portal Page report: 1. From the top navigation, click Performance Analysis > Create Application Reports > Portal. The Create report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting no. If you want further instructions on scheduling reports, refer to Defining a Schedule report. 3. Select the group and the server from the list box. 4. Click Next to continue creating the report. The Report Filtering options page opens. It displays the options based on the Report Type you select. 5. Set the following options to filter the records returned in the report: v Metric - The item you want to measure: Throughput per hour, Throughput per minute, Throughput per second, Response Time and CPU Time. v Nested Request Type - Portal page and Portlet. You must set this to Portal Page for a Portal Page report. v Portal Page Name - Limits the requests that are being reported on to include only those whose name matches the string you enter. v Portlet Name - Type in a specific portlet name to show only those portal pages that contain the portlet name specified. 6. Click Next to continue creating the report. The Date Range settings page opens. 7. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. 8. Click View Report to view the report. 9. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 161 Defining a Portlet report About this task If you want to compare the response time of a portlet across multiple pages, or debug an application rather than the entire portal server, you can run a portlet report. This will show the performance of a portlet and not the whole request. Then you can see if the same portlet has different response times on different pages. Drilling down allows you to get detailed performance information on a per-portlet basis. You can see how a portlet performs across the different pages that it's used on, which can help determine whether the problem you are encountering is caused by the portlet itself or by the things surrounding it on the page. To define a Portlet report: 1. From the top navigation, click Performance Analysis > Create Application Reports > Portal. The Create report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting no. If you want further instructions on scheduling reports, refer to Defining a Schedule report. 3. Select the group and the server from the list box. 4. Click Next to continue creating the report. The Report Filtering options page opens. It displays the options based on the Report Type you select. 5. Set the following options to filter the records returned in the report: v Metric - The item you want to measure: Throughput per hour, Throughput per minute, Throughput per second, Response Time and CPU Time. v Nested Request Type - Portal page and Portlet. You must set this to Portlet for a Portlet report. v Portal Page Name - Type in a specific portal page name to show only those portlets which are contained in the portal pages whose name matches the one you specified. v Portlet Name - Type in a specific portlet name to show only those portlets that contain the portlet name specified. 6. Click Next to continue creating the report. The Date Range settings page opens. 7. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. 8. Click View Report to view the report. 9. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file 162 ITCAM for Application Diagnostics: User Guide Defining Top reports About this task Top reports are a quick and convenient way to run a report for request, method, or SQL data. Top reports provide the top 100 results records for the selected metric. To define a Top report: 1. From the top navigation, click Performance Analysis> Create Application Reports > Top Reports. The Recurrence report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting no. If you want further instructions on scheduling reports, refer to Defining a Scheduled report. 3. Select the group and the server from the list boxes. The Report and Data Range selection page opens. 4. Select the type of Top report you want to run and set the date range using the list boxes. If applicable, set the Advanced Filtering to extract the data of a specific time period. For detailed instructions, see step two of Understanding the Date Range settings. 5. Click View Report to open the report. The Top report opens. 6. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Results Note: The Top Slowest Request Report calculates the average response time by (sum of the response time)/(total # of requests) given the selected group/server and time period. This might cause the data in the Slowest Request Report to vary for the group report and server report for the same time span. Related topics Defining a Scheduled report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Defining a System Resource Analysis report About this task The System Resource Analysis report gives you the information of the utilization of the memory, and the connection pool for the application servers. You can also view a Trend report and Decomposition report after defining the System Resource Analysis report. Note: This feature does not apply to the z/OS platform. To define a System Resource Analysis report: 1. From the top navigation, click Performance Analysis > Create Server Reports > System Resource. The Create report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting no. If you want further Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 163 3. 4. 5. 6. instructions on scheduling reports, refer to Defining a Schedule report. The Server and Report Type selection page opens. Select the group and the server on which you want to report from the list box. Click Next to continue creating the report. The Report Filtering options page opens. It displays the options based on the Report Type you select. Set the following options to filter the records returned in the report: Metric Amount of memory used, JVM/Region CPU %, System CPU %, Average % of Pool in Use (supported in ITCAM J2EE WebLogic), JDBC Connection Pool Size (supported in ITCAM J2EE WebLogic), and Live Sessions. Click Next to continue creating the report. The Date Range settings page opens. 7. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. 8. Click View Report to view the report. If you want to get a second data set for comparative analysis, click Next to open the Report Comparison page. The Report Comparison page opens. 9. Select a report comparison type and view the comparison report by clicking View Report. 10. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Defining a Server Availability Analysis report About this task The Server Availability Analysis report shows the percentage of the server availability. In the group situation, availability is defined as the total amount of time when one or more servers in the group are up, divided by the total elapsed time. To define a Server Availability Analysis report: 1. From the top navigation, click Performance Analysis > Create Server Reports > Server Availability. The Create report page opens. 2. Select yes or no to decide if you want the report to recur and click Next. For the purpose of these instructions we are selecting No. If you want further instructions on scheduling reports, see Defining a Schedule report. 3. Select the group and the server on which you want to report from the list box. 4. Click Next to continue creating the report. The Date Range settings page opens. 5. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range settings. 6. Click View Report to view the report. If you want to get a second data set for comparative analysis, click Next to open the Report Comparison page. The Report Comparison page opens. 164 ITCAM for Application Diagnostics: User Guide 7. Select a report comparison type and view the comparison report by clicking View Report . 8. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Defining a Capacity Analysis report About this task The Capacity Analysis report provides you with the necessary information to evaluate the capacity of your system using supply and demand metrics. To define a Capacity Analysis report: 1. From the top navigation, click Performance Analysis > Create Server Reports > Capacity Analysis. The Server Selection page opens. 2. Select the group and the server on which you want to report from the list box. 3. Click Next to continue creating the report. 4. Set the following options to filter the records returned in the report: v X - Axis - Throughput per Minute and Users. v Y - Axis - System CPU (%), JVM/Process CPU (%), JVM/Process Memory (MB), and Response Time (ms). 5. Click the check box to select Set Y-axis Max and enter the value you want to be set to the maximum. 6. Click Next to continue creating the report. The Date Range settings page opens. 7. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range Settings. 8. Click View Report. 9. Click Save to save the report. 10. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172. Related topics Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 165 Defining a Schedule report About this task Scheduling reports allows you to create a time for your reports to automatically activate at a time you preselect. To define a Scheduled report: 1. From the top navigation, click Performance Analysis> Create Application Reports > Method/Program. Note: We will use the Method/Program report as an example. You can create a Scheduled report from a selection of the available reports. 2. Select Yes to have the report recur and click Next. The Server Selection page opens. 3. Select the group and the server on which you want to report from the list boxes. Select the Create a separate report for each server check box to create one report for each server without repeating the steps for each one. If you don't select the check box, the report provides all the data aggregated across all servers. 4. Click Next to continue creating the report. 5. Set the following options to filter the records returned in the report: v Metric - Throughput per Second, Throughput per Minute, Throughput per Hour, Response Time (ms), and CPU Time (ms). v Method/Component Trace - Unless you know the exact string, always leave the field blank to return all traces or type in the specific method/program/component name. Note: The name of this field represents the names used in J2/WAS and z/OS. Method name is used in the J2/WAS environments, and Program and component name are used in the z/OS environments. v Request Type - ALL, EJB, JSP, Servlet, CICS, Portal, and Web Service. v Request Name - Unless you know the exact request string, always leave the field blank to return all requests or type in the specific request name. 6. Click Next to continue creating the report. The Date Range settings page opens. 7. Set the parameters to restrict the data returned in your report. For detailed instructions on setting the parameters, see Understanding the Date Range settings. 8. To view the report, click Preview. To set a schedule for the report, click Schedule. 9. Set the schedule for the report and setup an e-mail distribution list of the people you want the report sent to when it is completed. Unlike a saved report, you can not click Run Report to view the report at anytime. For a scheduled report, you can only view the e-mailed PDF of the report. Click Next. 10. Enter the name of the report. Click Save or Save & Activate. For more information see “Viewing saved reports” on page 172. Note: You can either save the report now and activate it later or you can save and activate the report at the same time. 11. The Scheduled reports page opens displaying your report in the list. Related topics 166 ITCAM for Application Diagnostics: User Guide E-mailing a report Exporting a file Modifying a report Understanding the Date Range settings Viewing a PDF file Understanding the Date Range settings About this task The Date Range settings allow you to set the parameters that restrict the data you want to capture for a report. You will be given the option to modify these settings while creating a report. The Date Range settings contain three main sections: Date Range, Advanced Filtering (optional) and Graphing Option. This section is not applicable to defining a Top report. To set the Date Range settings: 1. From the Date Range section, click to select a preset date range or enter a custom start date and end date for extracting only the data for the time period specified. 2. To extract the data of a specific time period, define your custom data set in the Advanced Filtering section: v Uncheck the hours of the day when you do not want data to display. For example, to select only data occurring between 9:00am and 5:00pm, uncheck 00:00-08:00 hours and 18:00-23:00 hours. v Uncheck the days of the week when you do not want data to display. For example, to select only data occurring Monday through Friday, uncheck Sunday and Saturday. v Uncheck the days of the month when you do not want data to display. v Uncheck the months of the year when you do not want data to display. By default, the Advanced Filtering section automatically selects all the options. 3. Select any of the following options in the Graphing option for analyzing certain patterns in the data based on time characteristics, or compiling large amounts of data over a long period and plotting all the points: v Time series in minutes v Time series in hour v Time series in day v Time series in week v Time series in month v Aggregate minute of the hour v Aggregate hour of the day v Aggregate day of the week v Aggregate month of the year Results On the Trend report, if the date range selected is <= 60 minutes, both the graph and data table will display. If the date range selected is > 60 minutes, only the data table will display. Related topics Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 167 Defining a Schedule report E-mailing a report Exporting a file Viewing a PDF file Viewing the Detail report About this task The Detail report allows you to drill down into the data for more information about the requests. Each detail report provides detail, summary, worst performers, and locks information for your review. To 1. 2. 3. view the detail report: Create a report. View the report. Access the Trend report and click any part of the graph/chart to go to the Decomposition report. 4. From the Decomposition report, drill down into the detail report. 5. The Detail report has four tabs: detail, summary, worst performers, and locks. v The Detail tab provides information about each request that made up the data point selected from the decomposition report. v The Summary tab provides information about requests across all requests breaking it down by nested requests so you can view the data component by component. v The Worst Performers tab provides information about the requests containing the worst-performing nested requests based on the selected metrics. v The Lock tab provides detailed lock information with the ability to toggle between the lock acquisition and contention information. Lock Tab is only available for the Lock Analysis report. This data is the average for all the requests on the Detail tab of the Detail report. Note: The following reports can be viewed in PDF format: Trend report, Decomposition report, Detail report, and Flow View in Trace report. All these reports can be mailed to users in PDF format and also these reports can be exported to a file in CSV format. Note: Detail report is available for all application reports except Top reports. Related topics Defining a Schedule report Understanding the Date Range settings Defining a Schedule report E-mailing a report Exporting a file Modifying a report Viewing a PDF file Defining a Lock Analysis report Defining a Method/Program Analysis report Defining a Portlal report Defining a Request/Transaction Analysis report 168 ITCAM for Application Diagnostics: User Guide Defining a SQL Analysis report Defining an MQI Analysis report Viewing the Trace Report About this task The Trace report allows you to drill down into the method flow of a selected request from the Detail report, in terms of the method/component entry and exit events. Each trace report provides the following options, Nesting Summary, Drilldown View, Flow View, and Search tabs to view method trace data in different formats. To view the trace report: 1. Create a report. 2. View the report. 3. Access the Trend report and click any part of the graph/chart to go to the Decomposition report. 4. From the Decomposition report, drill down into the detail report. 5. The Detail report, Detail tab, click Request/Transaction Name, drill down into the trace report. 6. Inside the Trace report, there are four tabs: Nesting Summary, Drilldown View, Flow View, and Search. v The Nesting Summary tab provides information about the top 10 slowest components. It also provides the total number of calls, the average response time, and the average CPU time for each component in the selected request. v The Drilldown tab provides information about method trace at each level. v The Flow View tab provides the complete method flow of the selected request. v The Search tab allows you to specify any of the following types, together with a numerical threshold (or a string) and presents a list of events from the method trace whose metrics cross the threshold (or match the string). The Event Type and Event Data searches are case sensitive. – Elapsed Time – CPU Time – Delta Elapsed Time – – – – Delta CPU Time Event Type Event Data Total Acquisition Time Note: Trace report is available for Request/Transaction report, Lock Analysis report, and Portal report. Related topics Defining a Lock Analysis report Defining a Portal report Defining a Request/Transaction Analysis report Report management Manage saved reports. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 169 Manage the reports you save on your system: view the reports (click the Report Name) or run the reports (click Run Report). Modifying a report About this task After creating a report, you can modify the parameters of the report to suit your changing needs. Change the settings in the Server and Report Type Selection page, the Report Filtering Options page, the Date Range Settings page, and the Report Comparison page. Using this method, you can reuse, duplicate, and modify old reports for different application servers. To modify a report: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. Click Modify next to the report you want to change. The Recurrence page opens. Select Yes to have the report recur. 3. Change the group or server, and click Next. The Report Filtering options page displays different options based on the report type you select. While you are choosing a server by navigating through the groups, note that the final group name does not affect the data to be extracted for the preparation of the report. The group name is immaterial to the selection process when data is gathered. The report will compile all records that are generated by the chosen server regardless which group it belongs to. 4. Select the filtering options for your report to examine and limit the type of records to include in the report. 5. Click Next to continue creating the report. The Date Range Settings page opens. 6. Set the parameters to restrict the data returned in your report. For detailed instructions, see Understanding the Date Range Settings. 7. Click View Report to view the report. If you want to get a second data set, click Next to open the Report Comparison page. The Report Comparison page opens. 8. Select a report comparison type and view the comparison report by clicking View Report. The Trend report opens. 9. Click Save if you want to save the report. For more information see “Viewing saved reports” on page 172 Related topics Understanding the Date Range settings Defining a Schedule report Running a report Modifying a Top report About this task After creating a Top report, you can modify its parameters to suit your changing needs. Change the settings in the Server and Report Type selection page, and the Report and Date Range selection page. Using this method, you can reuse, duplicate and modify old reports for different application servers. To modify a Top report: 1. From the top navigation, click Performance Analysis > View Saved Reports . The Reports page opens. 170 ITCAM for Application Diagnostics: User Guide 2. Click Modify next to the top report you want to change. The Recurrence page opens. Select Yes to have the report recur. 3. Change the group or server, and click Next. While you are choosing a server by navigating through the groups, note that the final group name does not affect the data to be extracted for the preparation of the report. The group name is immaterial to the selection process when data is gathered. The report will compile all records that are generated by the chosen server regardless which group it belongs to. 4. Click Next to modify the report type, date range, and the filtering options. The Report and Date Range selection page opens. 5. Select a Top report type from the list box. 6. Set the Start Date, End Date, Start Time, and End Time. If applicable, set the Advanced Filtering to extract the data of a specific time period. For detailed instructions, see step 2 of Understanding the Date Range Settings. 7. Click Finish to create the report. The Top report opens. Related topics Understanding the Date Range settings E-mailing a report Exporting a file Running a report Viewing a PDF file Running a report About this task Return to the Performance Analysis and Reporting Management page to run a saved report and retrieve the current data. Additionally, you can save a report, e-mail a link or PDF of a report, or view PDF report, export a PDF report to a comma delimited file format. If you e-mail a link, remember that the recipient must be a user of the application monitor with the appropriate rights to view the servers to where the report runs. To run a report: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. All previously defined and saved reports (except Scheduled reports) display on the Reports Management page. 3. Click Run Report next to the report you want to run. Note: The report opens displaying data based on the Metric selected on the Report Filtering options page. The type of report and metric selected display in the page heading, for example, Trend report - Throughput per Second Request Analysis. Related topics E-mailing a report Exporting a file Viewing a PDF file Viewing the reports Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 171 Duplicating a report About this task Save time creating new reports by duplicating an existing report. To duplicate a report: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. Click Duplicate next to the report you want to duplicate. 3. Enter a name for the duplicated report, and click Save. The Reports page displays with the new duplicated report. Related topics E-mailing a report Exporting a file Viewing a PDF file Viewing saved reports About this task After defining a report other than a Top report, there are six different reports that display various levels of detail: Trend report, Decomposition report, Method report, Request report, SQL report, and Trace report. The reports that you have access to will vary depending on the criteria you select while creating your report. For example, on the Server and Report Type Selection page, depending on the Report Type you select, the following reports are available: v Request/Transaction - displays Trend, Decomposition, Request Detail, and Trace reports. v Method/Program - displays Trend, Decomposition, and Method Detail reports. v SQL - displays Trend, Decomposition, and SQL Detail reports. v MQI - displays Trend, Decomposition, and MQI Detail reports. v Lock Analysis - displays Trend, Decomposition, and Lock Analysis Detail reports. v Portal - displays Trend, Decomposition, and Portal Page and Portlet Detail reports. v Server Availability - displays the Trend report. v System Resources - displays Trend, and Decomposition reports. v Capacity Analysis - displays Capacity Analysis Detail report. To view the reports: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. Click Run Report next to the report you want to run. The Trend report opens first. Note: Use the left navigation to return to the Saved Reports page, Modify reports, or Save a report. 3. Select an option from the Additional Details list box to decompose the Trend report. 4. Click the bar displayed in the graph or a data point in the table to view more details. The Decomposition report opens. 172 ITCAM for Application Diagnostics: User Guide 5. Click on a section of the chart or a data point in the table to view more details. The Request/Transaction Report Detail page opens displaying the Detail data, the Summary and the Worst Performers. Results If you selected Request/Transaction Analysis as the Report Type, to access the Trace report: 1. Click the Request Name to view the Trace report. 2. The Trace report page - Nesting Summary page opens. For more information see “Viewing the Nesting Summary” on page 192. Note: These instructions apply to all the report types available. However, remember that the reports available depend on the Report Type selected. Top reports have no additional detail. Related topics Defining a Capacity Analysis report Defining a Request/Transaction Analysis report Defining Top reports Deleting a report About this task Manage your reports by keeping them up-to-date. Delete existing reports from the system that are no longer in use. To delete a report: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. Click X next to the report you want to remove. 3. At the confirmation box, click OK to delete the report. The Reports page displays without the deleted report. Related topics E-mailing a report Exporting a file Viewing a PDF file E-mailing a report About this task You can e-mail a PDF file of a report to either the application monitor users or non application monitor users. You can also e-mail a link of a report to a group of application monitor users. The recipient will be brought to a particular page by the link after logging in. You can e-mail a PDF of the following reports: Trend report, Decomposition report, Detail report, and Flow View in Trace report To e-mail a report/PDF: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. Click Run Report next to the report you want to run. The selected report opens. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 173 3. Click the E-mail PDF icon to e-mail a PDF file of a report. The E-mail page opens. 4. On the E-mail page, enter the e-mail address of the recipient. Separate multiple addresses with a comma. 5. Click OK to e-mail the report. Results To e-mail a link: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. Click Run Report next to the report you want to run. The selected report opens. 3. Click the E-mail Link to e-mail a link of a report. The E-mail page opens. 4. On the E-mail page, enter the e-mail address of the recipient. Separate multiple addresses with a comma. 5. Click OK to e-mail the link of the report. When you e-mail a link, the recipient must be a user of the application monitor with the appropriate rights to view the servers in the report. Related topics Exporting a file Viewing a PDF file Viewing a PDF file About this task You can view a PDF file of a report before you send out the file to another recipients. You can view a PDF of the following reports: Trend report, Decomposition report, Detail report, and Flow View in Trace report To view a PDF file: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. Click Run Report next to the report you want to run. The selected report opens. 3. Click View PDF to download a PDF file of a report. 4. From the File Download window, click either Open to view the file immediately or click Save to save the file. Related topics E-mailing a report Exporting a file Exporting a file About this task You can export a report to a comma delimited file format, if necessary. You can e-export a PDF of the following reports: Trend report, Decomposition report, Detail report, and Flow View in Trace report 174 ITCAM for Application Diagnostics: User Guide To export to a file: 1. From the top navigation, click Performance Analysis > View Saved Reports. The Reports page opens. 2. Click Run Report next to the report you want to run. The selected report opens. 3. Click Export to File. 4. Click either Open to view the file immediately or click Save to download the file. The exported file downloads into the location you specify. Related topics E-mailing a report Viewing a PDF file Method Profiling Use the Method profiling pages to create, view and delete method profile reports. View the method profile reports that have been run and view their details. Delete reports you no longer want to save. See “Viewing Method Profiling Management.” Viewing Method Profiling Management About this task The Method Profiling Management page provides a list of all the method profiles collected and stored in the method profile reports generated as a result. From this page, you can delete method profile reports and view data about the reports. To collect method profiles you are required to use L2 and select method profiling, see “Overriding a monitoring level” on page 77. To open Method Profiling Management: 1. From the top navigation, click Performance Analysis > Method Profiling. The Method Profiling Management page opens. 2. Select the group and the server whose method profile you want to view. If there are no method profiles on that server "Data not available." will display. 3. Click the Date/Time link to view the data for the report. The report opens and displays the method names contained in the method profile as well as the Total CPU Time, Total Elapsed Time, Total Hits, Avg. CPU Time, and Avg. Elapsed Time. 4. To delete the report, click Delete 5. Click OK to finish deleting the report. Related topics Activating Method Profiling “Monitoring on Demand (TM)” on page 73 In the Monitoring on Demand (MOD) pages, you can view and adjust the monitoring level for all servers, and schedule adjustment of this level at fixed times. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 175 Activating method profiling About this task Method profiling is a new feature that is part of L2 monitoring. You can activate L2 with method profiling by selecting the monitoring level, overriding the monitoring level, or creating a schedule that selects the monitoring level. Links to the instructions to perform these actions are available in the following related topics. 1. To activate method profiling by creating a schedule, see “Creating a schedule” on page 75 for more information. 2. To activate method profiling by overriding the monitoring level, see “Overriding a monitoring level” on page 77 for more information. 3. To activate method profiling by configuring the data collection settings, see “Configuring the Data Collection settings” on page 79 for more information. Related topics “Monitoring on Demand (TM)” on page 73 In the Monitoring on Demand (MOD) pages, you can view and adjust the monitoring level for all servers, and schedule adjustment of this level at fixed times. Viewing Method Profiling Management Daily Statistics The Daily Statistics pages provide daily SMF information snapshots for z/OS WebSphere servers. The Daily Statistics page provides a list of daily SMF statistics reports available for a date. Initially, it shows the server reports for the previous day. To view a report, click the server name. See “Viewing the Daily Statistics Overview.” To view reports for a different date, change the date in the Enter Report Date controls and click the Go button. To delete all daily statistics report created before a certain date, set this date in the Delete Reports Older Than controls and click the Delete button. See “Deleting Daily Statistics” on page 177. Viewing the Daily Statistics Overview About this task The Daily Statistics Overview pages provides daily SMF information snapshots for z/OS WebSphere servers only. This data is shown for the server selected on the Daily Statistics page. To open the Daily Statistics Overview page: 1. From the top navigation, click Performance Analysis > Daily Statistics. The Daily Statistics selection page opens with the previous day's data. 2. If the snapshots from a different date are desired, from the left navigation pane, select a month, day, and year under the Enter Report Date heading and click Go. 176 ITCAM for Application Diagnostics: User Guide 3. Click on a server name to view the Daily Statistics Overview, where the snapshot data will be presented. Results Note: The side navigation can be used to find out more information regarding: Server, EJBs, Servlet Session Manager, Server Regions, SQL, JCA-CICS, and Web Applications. To 1. 2. 3. 4. change the date of the report: On the left navigation pane, select a month from the list box. On the left navigation pane, select a date from the list box. On the left navigation pane, select a year from the list box. Click Go. Related topics System Resources Metrics Viewing the System Resources Browser Deleting Daily Statistics About this task You can permanently delete daily statistics by purging the system. To open the Daily Statistics page: 1. From the top navigation, click Performance Analysis > Daily Statistics. The Daily Statistics page opens. 2. Use the left navigation to select a month, day, and year under the Delete Reports Older Than heading. 3. Click Delete. 4. Click Yes in the confirmation box. The system deletes all reports created earlier than the date you select. Related topics System Resources Metrics Viewing the Daily Statistics Overview Custom requests Custom requests are defined for application-specific operations that do not fall under the normal pre-defined J2EE operations. Use custom requests to track specific application operations as separate requests. For example, if the application is performing some well-defined processing like parsing documents, or CPU-intensive numeric calculation, it might be useful to track this operation as a separate request. When you use custom requests, you can set the monitoring level to L2 rather than L3. L3 generally applies to a large set of methods, typically every application method, as a result L3 monitoring overhead is high. Custom requests are defined for specific application methods, and the overhead is much lower. Also, custom request definitions are not limited to application methods, you can define specific system methods as custom requests. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 177 Types of requests Request A request is a call made to a component that performs a service. For example, a call to execute a SQL statement through a JDBC driver or a data source. The following list provides some of the typical J2EE requests that are interesting to monitor, they are all standard J2EE requests that are monitored by the Data Collector, with no extra custom definitions required: v Invoking a Servlet through the doGet() or doPost() methods v EJB create() and other business methods v JDBC API invocations like getConnection() or executeQuery() v JMS operations to send and receive messages v JNDI operations like lookup() used to find objects stored in the registry v JCA resource adapter operations like getManagedConnection() Edge request The outermost request that needs to be monitored is called an edge request. This involves a request that enters the application server from an outside client, for example invoking a Servlet/JSP or a call to an EJB business method through the Object Request Brokers (ORB). However, sometimes this request might not be of interest as it might be a generic call like when Apache Struts applications are involved. In such cases, a custom request might be defined to act as an edge request. In ITCAM for Application Diagnostics, edge requests are tracked starting at L1 monitoring level. Nested request A request that is invoked within another request is called a nested request. For example, a JDBC call like getConnection() invoked from within an EJB business method is a nested request. In ITCAM for Application Diagnostics, nested requests are tracked starting at L2 monitoring level. Custom request Custom requests are defined for application-specific operations that do not fall under the normal pre-defined J2EE operations. A custom request defines a user-specified class and method as the start and end point of a request. If it is enclosed in another request like a Servlet or EJB request, then it becomes a custom nested request. Creating custom requests To create a custom request, complete the following steps: 1. Edit the DC_home/runtime/app_server_version.node_name.server_name/custom/ toolkit_custom.properties file and uncomment the following line: am.camtoolkit.gpe.customxml.custom=/opt/IBM/itcam/WebSphere/DC/itcamdc /etc/custom_requests.xml You can specify a different location and file name. 178 ITCAM for Application Diagnostics: User Guide Note: If the custom_request.xml file resides in the DC_home/runtime/ app_server_version.node_name.server_home/custom/ directory, then you can simply specify the simple file name, without having to specify the fully qualified path. 2. Create or edit the custom_requests.xml - it is typically easier to make a copy of the file and edit it to add the custom request definitions. The following example shows an XML specification for a custom request: <gpe> <bci> <customEdgeRequests> <edgeRequest> <requestName>MonteCarlo</requestName> <Matches>com.myco.investment.modeler.Simulator</Matches> <type>application</type> <methodName>executeMonteCarlo</methodName> </edgeRequest> </customEdgeRequests> </bci> </gpe> The following table explains the XML elements in the custom_requests.xml file. Table 5. XML elements in custom_requests.xml Tag Name Description edgeRequest Identifies one or more application methods that are to be monitored for custom request processing. By modifying the requestName, Matches, type, and methodName tags within the edgeRequest tag, you can customize the selection. Each edgeRequest tag must contain exactly one methodName tag, and one or more Matches tags. Multiple edgeRequest tags can be specified. requestName Defines a unique name for this request. The request name appears in the L1 or L2 trace entry that is produced when one of the methods identified by this custom request runs. Matches Identifies a class or classes that contain the methods that are to be defined as custom requests. Multiple Matches tags can be present within a single edgeRequest tag. type Indicates whether the classes specified are loaded by system or application class loader. If the classes are present within an application EAR file, then the type is “application”. However, in rare cases, the classes might be present in JAR files specified in ws.ext.dir, system classpath or even in bootstrap classpath. In such cases the type is “system”. methodName Identifies the names of the methods within one of the classes identified by the Matches tag that are to be monitored for custom request processing. One methodName tag can be specified in each edgeRequest tag. The Matches and the methodName tags can include wildcard characters. The following list is a summary of the wildcard functionality: v Asterisk (*) stands for zero or more occurrences of any character when used by itself. When embedded within a sequence of characters, for example, java.*.String, it matches zero or more occurrences of any character except the package separator (.). v Two periods (..) can be used to specify all sub-packages, for example, java..String matches java.lang.String. It matches any sequence of characters that starts and ends with the package separator (.). 3. After defining the custom requests, the application server JVM needs to be recycled for them to take effect. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 179 Making a custom request invoke an edge request If the class and method defined in a custom request definition are invoked from within another request, then the custom request becomes a nested request. It is necessary to turn on the L2 monitoring to view these requests in the ITCAM MSVE console. For example, in Model-View-Controller(MVC) architectures, the controller receives all the requests from the clients. Based on the content of the request, it then redirects to the appropriate model. A well-known implementation of the MVC architecture is the Apache Struts framework that is widely used in the J2EE applications. In Apache Struts, the controller is the ActionServlet and it receives all the requests. The ActionServlet interprets the URL and based on the Apache Struts configuration files, it gives the handling to one of the Action classes written by the user. When monitoring Apache Struts applications, the user is interested in making these Action classes the edge request instead of the ActionServlet which receives all the requests so that different types of URLs used by the application can be tracked. This can be done by defining each of the Action classes as a custom request. However, since the ActionServlet is invoked first, these action classes are inside an already created edge request and hence can only be tracked as nested requests. To make the Action classes an edge request, it in necessary to prevent the Apache Struts ActionServlet from creating the edge request. This is done by preventing the normal Struts action servlet from being considered an edge request by the Data Collector, by excluding the action servlet class from instrumentation. Excluding classes from instrumentation Complete the following steps: 1. Edit the configuration file DC_home/runtime/ app_server_version.node_name.server_name/custom/ toolkit_custom.properties to add the following new property: am.camtoolkit.gpe.customxml.exclude=excludes.xml 2. Create the file excludes.xml in the same custom directory with the following content: <gpe> <bci> <classExcludes> <exclude>org.apache.struts.action.ActionServlet</exclude> <exclude>com.company.package.*</exclude> </classExcludes> </bci> </gpe> 3. Add as many classes as needed. 4. Restart the application server. 5. To verify that the class has been excluded, look in toolkit.xml. It appears as follows: <classExcludes> <include>*</include> <include>org.eclipse.osgi.framework.adaptor.core.*</include> <exclude>com.company.class</exclude> <exclude>com.company.package.*</exclude> <exclude>com.sun.net.ssl.internal.ssl.JSA_RSAKeyFactory</exclude> <exclude>COM.rsa.jsafe*</exclude> <exclude>org.eclipse.osgi.*</exclude> </classExcludes> 180 ITCAM for Application Diagnostics: User Guide Note: The toolkit.xml file contains runtime settings and it is refreshed every time the application server is restarted Viewing custom requests Viewing recent custom edge request 1. From the top navigation, select Problem Determination - > Server Activity Display. 2. Select the Recent Requests tab. Custom edge requests are identified in the ThreadType field. Viewing Active Custom Requests and Nested Custom Requests 1. From the top navigation, select Problem Determination - > Server Activity Display. 2. Select the Active Requests tab. Custom edge requests are identified in the Last Know Action field. 3. To view nested custom requests, click the edge request link name and select Method/Component Trace. 4. In the Complete Flow View, details of the nested custom request are displayed. Viewing custom requests in reports Custom requests can be seen in the following reports: v Custom edge requests are displayed in the Decomposition report, in the Decomposition Data Table section. v Nested custom requests are displayed in the Trace report in the Nesting Summary tab, see “Viewing the Nesting Summary” on page 192 Composite requests Use the Composite Request features in MSVE to monitor transactions that use resources on more than one server. The Composite Request features help you to: v Determine if the reason a top-level request is hanging is its use of resources on a different application server. v Identify the origin (the application server and top-level request) that invoked a hanging request. v Discover the inter-application architecture of complex workflows. There are a number of areas of MSVE that enable you to locate, view, and analyze composite requests. Table 6. Composite Request functionality Area of functionality Description of functionality Server Activity Display View active requests/transactions on a specific server In-Flight Request Search Search for active requests/transactions on all servers, a group of servers, or a specific server Performance Analysis and Reporting Locate completed requests/transactions Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 181 Table 6. Composite Request functionality (continued) Area of functionality Description of functionality Composite Method Trace Display the method traces of all requests/transactions in the composite request Composite Stack Trace Display the stack traces of all servers involved in the composite request that are still actively processing the request/transaction Each of these features produces a list of requests/transactions which might participate in a composite request. The presence of the composite request icon indicates that a request/transaction participates in a composite request: User Scenarios Scenario 1: Discovering application architecture Your manager asks you to provide an example of a complete transaction of an airline reservation application. This involves a Web-based Java application, a CICS credit card processing application, a CICS ticket reservation application, and a frequent-flyer account, which is also a CICS system. You look in Performance Analysis and Reporting for examples of the airline reservation application, some of which have the composite request indicator. Clicking the indicator brings you to the composite request view of the Method Trace, which lets you navigate among these requests, so you can see which application calls which one, and by what mechanism (MQ, CTG, or DPL). You can e-mail a PDF of each request involved in the composite transaction to your manager. The scope of composite requests To understand the scope of what ITCAM for Application Diagnostics can monitor, it is important to understand two terms: managed space and composite request space. v Managed space is the entire scope of what ITCAM for Application Diagnostics can monitor. Since ITCAM for Application Diagnostics can monitor servers and application servers, along with applications and J2EE components like EJB, the managed space has many dimensions. v Composite request space is a subset of the managed space. Composite requests are requests that conform to an Enterprise Application Integration (EAI) architecture. Managed space The basic model of ITCAM for Application Diagnostics is to have a single Managing Server and many Data Collectors. The Data Collectors are dynamically controlled through the Managing Server. The Data Collectors deliver their collected data to the Managing Server. The Managing Server is the heart and brain of ITCAM for Application Diagnostics. It is the entity to which each of the many Data Collectors communicate, and provides the ITCAM for Application Diagnostics User Interface. 182 ITCAM for Application Diagnostics: User Guide The Data Collectors are the eyes and ears of ITCAM for Application Diagnostics. For each Application Server being monitored, a Data Collector is deployed on the computer hosting the Application Server. (If a server has two application servers, then you must configure two Data Collectors on the server in order to monitor both application servers.) The following table describes what is in the managed space: Table 7. Components of the managed space Component Description Servers Any server on which a Data Collector is installed is in the managed space. For z/OS systems, a server is considered to be equivalent to an LPAR. Application Servers Any application server running in a JVM in which a Data Collector is configured is in the managed space. CICS and IMS regions are considered to be application servers. The architecture of WebSphere running on z/OS consists of a single application server definition with a control region and one or more servant regions. The definition and the regions are called an application server instance. What ITCAM for Application Diagnostics considers to be the application server depends on the context. In a few cases, the application server is either the entire application server instance (as in the case of MOD schedules), but in most cases, the application server is an individual application servant region. Resources ITCAM for Application Diagnostics monitors common resources that are made available through the application server and the J2EE APIs, such as EJB, JMS, JNDI, JDBC, and JCA. If an application server is in the managed space, then the resources it provides are also in the managed space. Application ITCAM for Application Diagnostics supports monitoring of any application which is served by an application server. If the application server is in the managed space, then the applications it serves is in the managed space. As a corollary, standalone applications, which are not served through an application server, are not in the managed space. Composite request space Although the managed space includes servers, application servers, requests, and resources, the composite request space includes only a subset of the requests in the managed space. In order to define the composite request space and understand how requests interact, it is important to understand EAI architecture. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 183 EAI is the term used to describe the integration of the computer applications in an enterprise to maximize their utility throughout the enterprise. Typically, an enterprise has earlier single purpose applications and databases and wants to continue to use them while adding or migrating to a new set of applications that use the Internet, e-commerce, extranet, and other new technologies. EAI might involve developing a new total view of an the applications in an enterprise, seeing how existing applications fit into the new view, and then devising ways to efficiently reuse what exists while adding new applications and data. From the J2EE perspective, this means that an initial request, served by a J2EE application server might invoke a resource on an earlier single purpose system through the JCA API. When describing EAI transactions, the name used for the initial J2EE request is the home request, and the server on which the transaction occurs is called the home server. The transaction on the earlier single purpose system is called a participating request, and the server is called a participating server. There might be more than one participating request if the earlier single purpose application invokes resources on other single purpose applications. In ITCAM for Application Diagnostics operations, both the home request and the participating requests are displayed. However, without the composite request enhancement, these requests appear independently, and there is no explicit indication that they are part of the same transaction. Not only does the composite request enhancement make this relationship explicit, it also provides diagnostic tools, like Method Trace and Stack Trace, that you can apply across all requests in the composite request. Composite requests involving CICS and IMS systems If a participating server is a CICS server, and a CICS data collector has been installed, then this system is in the managed space. Similarly, if a participating server system is IMS, and an IMS data collector has been installed, then the system is in the managed space. The J2EE application server is in the managed space if a data collector is installed. Monitoring CICS transactions The CICS data collector monitors all program invocations on the managed CICS region, whether they come through a dumb terminal, Distributed Program Link (DPL), EXEC CICS START, or through the CICS Transaction Gateway (CTG). Furthermore, for transactions invoked through CTG, it does not matter how CTG was accessed, which can include various interfaces. However, ITCAM for Application Diagnostics does not track all such transactions as composite requests. CICS and IMS transactions in composite requests Even though all transactions on a CICS or IMS region in the managed space appear in ITCAM for Application Diagnostics, they are not necessarily treated as part of a composite request, even if they invoke programs on other regions. A transaction on a CICS or IMS region is part of a composite request if it meets the following criteria: v The CICS or IMS region is in the managed space. v The Home Server is in the managed space. v The application server that serves the Home Request is a J2EE application server, and is in the managed space. 184 ITCAM for Application Diagnostics: User Guide v For CICS: The application on the Home Server uses ECI to access CTG. (This includes applications that use CCI as their JCA resource adapter, since CCI uses ECI.) v The ECI invocation is synchronous. v The COMMAREA of the CICS program invocation has at least 11 bytes of available space. v For IMS: The application on the Home Server uses IMS Connect for Java (IC4J) to access IMS connect. If any of these criteria are not met for an EAI request, then ITCAM for Application Diagnostics does not identify the request as being part of a composite request. However, the core ITCAM for Application Diagnostics features are still available for whatever parts of the transaction are in the managed space. For example, if an application in C++ invokes a CICS program on a CICS region in the managed space through CTG, the CICS program is displayed as a request within ITCAM for Application Diagnostics, but the C++ application request is not displayed in ITCAM for Application Diagnostics. The reason is,ITCAM for Application Diagnostics does not monitor C++ applications. In this case, ITCAM for Application Diagnostics does not identify the CICS transaction as part of a composite request. Likewise, if a Java application uses EPI to access CTG, ITCAM for Application Diagnostics does not track the EAI as a composite request, even if the application is in the managed space. In this case, the requests on both the J2EE application server and in the CICS region are displayed in ITCAM for Application Diagnostics, but are displayed independently, and are not identified as a composite request. The final condition, based on the application's use of the COMMAREA, is due to the methodology of tracking composite requests, which involves use of the COMMAREA. In practice, it is rare that program invocations use so much of the COMMAREA that there is not room for this correlation information. In these exceptional cases, ITCAM for Application Diagnostics does not attempt to identify the EAI as a composite request, and the individual requests are displayed in ITCAM for Application Diagnostics as independent requests. Multiple hops Composite requests are not restricted to single-hop transactions. In particular, composite requests include cases where CICS programs make DPL calls to other CICS Regions. When such a call is made, we say that the depth of the composite request increases. ITCAM for Application Diagnostics can track requests with no limit to the depth of transaction "hops." For IMS, any events with the same message tag from any IMS region in an IMS Network appear as a single transaction. In addition, composite requests can include up to 100 participating requests made directly by each home or participating request. Although composite requests can include an unlimited depth of "hops," composite requests place a limit on the number of calls that can be tacked by any single request. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 185 Configuring data collectors that use WebSphere MQ If you are monitoring composite requests for applications that use WebSphere MQ as a mechanism to bridge J2EE and CICS or IMS, then you must configure each participating data collector to monitor WebSphere MQ. Note: These instructions assume that your data collectors have already been configured. To enable WebSphere MQ monitoring on a data collector within the Application Monitor: 1. Open the Application Monitor. 2. Click the Administration tab on the top navigation. 3. Select Server Management > Data Collector Configuration. 4. Click the Configuration Library link in the left navigation. 5. Locate the application server in the Associated Server column of the Configuration Library table and click the Modify icon for that row. Note: You cannot modify ITCAM for Application Diagnostics supplied default configurations. You can only modify configurations you have created. 6. Select Enable MQ. 7. Enter the queues you want to monitor in the Exclude (Classname) and Exclude Override (Classname). 8. Click the Save button. Locate, view, and analyze composite requests There are a number of areas of ITCAM for Application Diagnostics' functionality that enable you to locate, view, and analyze composite requests. Table 8. Composite Request functionality Area of functionality Description of functionality Server Activity Display View active requests/transactions on a specific server In-Flight Request Search Search for active requests/transactions on all servers, a group of servers, or a specific server Performance Analysis and Reporting Locate completed requests/transactions Composite Method Trace Display the method traces of all requests/transactions in the composite request Composite Stack Trace Display the stack traces of all servers involved in the composite request that are still actively processing the request/transaction Each of these features produces a list of requests/transactions which might participate in a composite request. The presence of the composite request icon indicates that a request/transaction participates in a composite request: 186 ITCAM for Application Diagnostics: User Guide In-Flight Request Search To search for in-flight requests/transactions that participate in composite requests, use the In-Flight Request Search. See “In-flight request search” on page 112 The results will display: Server Name, Client Request/Transaction, Start Date Time, Thread ID, and Total Resident Time. In addition, ITCAM for Application Diagnostics identifies requests/transactions that are part of a composite request by displaying the composite request icon. Server Activity Display To search a server for resident requests/transactions that participate in composite requests, use the Server Activity Display. See “Server Activity Display” on page 114 The results display: Client Requests, Client Requests Start, Thread ID, Resident Time, Accumulated CPU, Idle Time, Thread Status, Last Known Class, Last Known Method, Last Known Action, and User ID. In addition, ITCAM for Application Diagnostics identifies those requests/transactions that are part of a composite request by displaying the composite request icon. Performance Analysis and Reporting To search for completed requests/transactions that participated in composite requests, use Performance Analysis and Reporting. Start by creating a Trend Report, then drill down to a Decomposition Report, and then to a Detail report in order to find individual requests/transactions that are part of composite requests. Note: Performance Analysis and Reporting displays the Composite Request Indicator only for home requests, and not for the other participating requests/transactions. For details on participating requests and home requests, see “The scope of composite requests” on page 182 The following procedure describes how to locate composite requests using Performance Analysis and Reporting. To locate composite requests using the Performance Analysis and Reporting: 1. View a Request/Transaction Analysis Trend Report for servers that you believe might have served home requests of composite requests. Choose appropriate Report Filtering Options and Date Range Settings. A Trend Report is displayed. 2. Choose an appropriate Decomposition option (Additional Detail selection) and time period. A Decomposition Report is displayed. 3. View the requests/transactions that comprise the Decomposition Report by selecting an appropriate segment of the Decomposition Report. A Detail Report is displayed. The resulting Detail Report displays a list of the requests/transactions included in the segment of the Decomposition Report you selected. The results display: Request/Transaction Name, Request/Transaction Type, Response Time, CPU Time, Server Name, Timestamp, and Number of Records. In addition, ITCAM for Application Diagnostics identifies that a request was a home request of a composite request by displaying the composite request icon next to its Request/Transaction Name. Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 187 Viewing composite requests To access the composite request details of requests/transactions, click the Composite Request Indicator for that request/transaction. Composite requests have the following features: v Composite Method Trace: Displays the interrelated method traces across all requests involved in the composite request. v Composite Stack Trace: Displays a continuous stack trace of all servers involved in the composite request which are still actively processing the request/transaction. The availability of method-level data is contingent upon the configuration of the data collectors; they must be at L3 monitoring level in order to provide full method-level data. To provide Nested Request data, the Data Collector needs to at L2 monitoring level. Since the monitoring levels of data collectors are independent, it is possible that method-level data is available for some, but not all, servers participating in a composite request. The Composite Method Trace presents all data it has, which means that the level of data presented from server to server might vary. Authorization and composite requests Authorization is enforced in ITCAM for Application Diagnostics in two ways: by feature and by server. Feature-based authorization limits access to top-level features based on the role assigned to a user. Assuming that a user has access to a feature, the server-based authorization might further limit access to data about servers based on which group a server is assigned to, and which groups the user has authority to view. Since composite requests involve more than one server, the effects of server-based authorization play out in the following scenario. A composite request's home request is on server A (which is in group A) and invokes a participating request on server B (which is in group B). There are two users who need to investigate this composite request: User A has access to servers in group A but not group B, and user B has access to servers in group B but not group A. Assuming that each user uses In-Flight Request Search to locate the requests, the results for each user will differ, since the In-Flight Request Search limits results to those requests executing on servers in groups the user has access to. This means that user A will see only request A and user B will see only request B. In both cases, the Composite Request Indicator will appear next to the request, and will link to a similar Composite Request Detail page. However, the contents of the Composite Request Detail page will be different for each user. Both users will see the complete composite request, including the Home Request on server A and the Participating Request on server B. However, the users will not have access to the Request Detail pages of all requests: User A will have access to the Home Request on server A (the request name will be linked), but not to the Participating Request on server B (the request name will not be linked). User B will not have access to the Home Request on server A (the request name will not be linked) but will have access to the Participating Request on server B (the request name will be linked). 188 ITCAM for Application Diagnostics: User Guide Viewing a Composite Method Trace - SAD About this task The Composite Method Trace page displays the method flow of the composite transaction, including the method traces of each individual request participating in the composite transaction. To view a Composite Method Trace: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display selection page opens. 2. Select a group from the group list box. 3. Select a server from the server list box. The Server Activity Display page opens. The Server Activity Display page opens. 4. Click the composite transaction indicator next to the request that you want to view. The Composite Request Detail for that composite transaction opens. 5. On the left navigation pane, click Composite Method Trace. The Composite Method Trace page opens. For CICS, the line numbers and response codes have been added to the Composite Method Trace. The return code is from the method call and the line number is of the CICS method call. You will find their information in the Event Data field on the Flow View tab. Results Related topics Canceling a request Changing a thread's priority Viewing a Composite Stack Trace - SAD About this task The Composite Stack Trace page displays the stack traces of each server involved in the composite transactions that are actively processing their request/transaction. Note: The Composite Stack Trace is primarily useful for debugging composite transactions that are hanging, since there will be no stack trace data available if a composite transaction has completed by the time you access it. To view a Composite Stack Trace: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display selection page opens. 2. Select a group from the group list box. 3. Select a server from the server list box. 4. Click the composite transaction indicator next to the request that you want to view. The Composite Request Detail for that composite transaction opens. 5. On the left navigation pane, click Composite Stack Trace. The Composite Stack Trace page opens and displays the stack traces of the servers that are actively executing participating requests. Related topics Canceling a request Changing a thread's priority Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 189 Viewing a Composite Request Detail - SAD About this task The Composite Request Detail page summarizes a composite transaction, in terms of the individual requests that participate in it. To view Composite Request Detail: 1. From the top navigation, click Problem Determination > Server Activity Display. The Server Activity Display selection page opens. 2. Select a group from the group list box. 3. Select a server from the server list box. 4. Click the composite transaction indicator next to the request that you want to view. The Composite Request Detail for that composite transaction opens. 5. Click the Request Name's link to drill down and view the detailed information. Related topics Canceling a request Changing a thread's priority Viewing a Composite Request Detail - In-flight Request Search About this task The Composite Request Detail page summarizes a composite transaction, in terms of the individual requests that participate in it. To view Composite Request Detail: 1. From the top navigation, click Problem Determination > In-flight Request Search. The In-flight Request Search page opens displaying active requests participated in composite transactions that are identified by the composite transaction indicator. 2. Click the composite transaction indicator next to the request that you want to view its Composite Request Detail information. The Composite Request Detail for that composite transaction opens. 3. Click the Request Name's link to drill down and view the detailed information. Related topics Canceling a request Changing a thread's priority Viewing a Composite Stack Trace - In-flight Request Search About this task The Composite Stack Trace page displays the stack traces of each server involved in the composite transaction that are actively processing their request/transaction. Note: The Composite Stack Trace is primarily useful for debugging composite transactions that are hanging, since there will be no stack trace data available if a composite transaction has completed by the time you access it. To view a Composite Stack Trace: 190 ITCAM for Application Diagnostics: User Guide 1. From the top navigation, click Problem Determination > In-Flight Request Search. The In-Flight Request Search page opens displaying active requests/transactions. 2. To view the Composite Method Trace for a request/transaction that is participating in a composite transaction, click that request/transaction's composite transaction indicator. The Composite Method Trace page for that composite transaction opens. 3. Click Composite Stack Trace in the left navigation pane. 4. The Composite Stack Trace page opens and displays the stack traces of the servers that are actively executing participating requests/transactions. Related topics Canceling a request Changing a thread's priority Viewing a Composite Method Trace - In-flight Request Search About this task The Composite Method Trace page displays the method flow of the composite transaction, including the method traces of each individual request participating in the composite transaction. To view a Composite Method Trace: 1. From the top navigation, click Problem Determination > In-flight Request Search. The In-flight Request Search page opens displaying active requests participated in composite transactions that are identified by the composite transaction indicator. 2. Click the composite transaction indicator next to the request that you want to view its Composite Request Detail information. The Composite Request Detail for that composite transaction opens. 3. On the left navigation pane, click Composite Method Trace. The Composite Method Trace page opens. Related topics Canceling a request Changing a thread's priority Viewing a Composite Request Detail - PAR About this task The Composite Request Detail page summarizes a composite transaction, in terms of the individual requests that participate in it. To view Composite Request Detail: 1. From the top navigation, click Performance Analysis> Create Application Reports > select an application report type. For more information see “Performance analysis and reporting” on page 155. After creating the report, click View Report and the Trend report will open. 2. Click the data in the graph that you are interested in viewing more information on. The Decomposition report opens. 3. Click the data in the Decomposition report that you want more information about. The Request Report Detail opens. Related topics Viewing the Detail report Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 191 Canceling a request Changing a thread's priority Viewing a Composite Method Trace - PAR About this task The Composite Method Trace page displays the method flow of the composite transaction, including the method traces of each individual request participating in the composite transaction. To view a Composite Method Trace: 1. From the top navigation, click Performance Analysis> Create Application Reports > select an application report type. For more information see “Performance analysis and reporting” on page 155. After creating the report, click View Report and the Trend report will open. 2. Click the data in the graph that you are interested in viewing more information on. The Decomposition report opens. 3. Click the data in the Decomposition report that you want more information about. The Request Report Detail opens. 4. Click the item in the detail of the report that you need more information on. The Trace report opens. Related topics Viewing the nesting summary Viewing the method/component tract - depth drilldown detail Viewing the method/component tract - depth drilldown report Viewing a method/component trace - flow view Viewing the Nesting Summary About this task The Nesting Summary can help you to quickly identify problems with external resources used by a request. To view the Nesting Summary page: 1. From the top navigation, click Performance Analysis > Create Application Reports. Select an application report type. For more information see “Performance analysis and reporting” on page 155. 2. Click the data in the graph that you are interested in viewing more information about. The Decomposition report opens. 3. Click the data in the Decomposition report that you want more information about. The Request Report Detail opens. 4. Click the item in the detail of the report that you need more information about The Trace Report opens. 5. Click the Nesting Summary tab. The Nesting Summary page opens. You need to set the monitoring level of the data collector to at least L2 or L3 to capture data for the Nesting Summary. Related topics Defining a Capacity Analysis report Defining a Request/Transaction Analysis report Defining Top reports 192 ITCAM for Application Diagnostics: User Guide Viewing a Method/Component Trace - Depth Drilldown detail About this task Navigate through the trace one level at a time using the Depth Drilldown detail. To view the Depth Drilldown detail of a method trace: 1. From the top navigation, click Performance Analysis > Create Application Reports. Select an application report type. For more information, see “Performance analysis and reporting” on page 155. 2. Click the data in the graph that you are interested in viewing more information about. The Decomposition report opens. 3. Click the data in the Decomposition report that you want more information about. The Request Report Detail opens. 4. Click the item in the detail of the report that you need more information about The Trace Report opens. 5. Click the Drilldown View tab. The Drilldown View page opens and displays the Depth Drilldown Detail. Results To view the Depth Drilldown report, choose Depth Report from the list box. See “Viewing a Method/Component Trace - Depth Drilldown report.” Related topics Canceling a request Changing a thread's priority Viewing a Method/Component Trace - Depth Drilldown report About this task Use the Depth Drilldown report to quickly identify problems with categories of nested request components used by a method and its children, by comparing the number of calls, Average Response Time, and Average CPU Time. To view the Depth Drilldown report of a method trace: 1. From the top navigation, click Performance Analysis > Create Application Reports. Select an application report type. For more information see “Performance analysis and reporting” on page 155. 2. Click the data in the graph that you are interested in viewing more information about. The Decomposition report opens. 3. Click the data in the Decomposition report that you want more information about. The Request Report Detail opens. 4. Click the item in the detail of the report that you need more information about The Trace Report opens. 5. Click the Drilldown View tab. The Drilldown View page opens to the Depth Drilldown Detail. 6. Choose Depth Report from the list box. The Depth Drilldown Report opens. Related topics Canceling a request Changing a thread's priority Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 193 Audit trails Trace user actions. Audit trails provide a means for tracing user actions in the system. This helps with both accountability and troubleshooting. User Scenarios Scenario 1: Verifying high server response time Upon returning from vacation, you see that response time is higher than usual for one of the servers in group ABC. You notice from the Heap Dump Management page that the server is performing heap dumps regularly which is causing the slowness in the response time. You enter the audit trail to find out who scheduled the heap dump. You contact that person and learn that the heap dumps are scheduled for troubleshooting a suspected memory leak in the application. Scenario 2: Verifying MOD level change In your role as a production support engineer you observe that the MOD level of a data collector in the production environment has been set to L2 instead of the expected MOD L1. You ask the Administrator to search the audit trail and find out who changed the MOD level, and find that an application support engineer is troubleshooting a production issue in the application. Accessing the user audit trail About this task The user audit trail is a text file that contains a record of user activity, including Date, Time, User Name for Login, Failed Login, Log Out, Time Out, Authentication, and Account Status changes. To open the user audit trail: 1. Depending on your platform, navigate to the logs directory where you installed the Managing Server, for example, /var/ibm/tivoli/common/CYN/ logs. 2. In a text editor appropriate to your platform, open the audit-ms-Compound.log file. Request Mapper Purpose Use the Request Mapper to customize how requests are named within the Application Monitor. Also, use the Request Mapper to display user names associated with requests. Usage Overview This feature helps you: v Distinguish among requests that otherwise would have the same request name. v Aggregate requests which otherwise would have distinct request names. v Identify the User IDs under which requests run. 194 ITCAM for Application Diagnostics: User Guide User Scenarios Scenario 1: Aggregating Across Distinct Original Request String (ORS) The application you are monitoring uses a distinct URI to represent each specific application function, such as log in, check out, or log out. You wish to analyze all these requests as a single application. Use the Request Mapper to populate the Request Name field with a common application name. Scenario 2: Differentiating a Uniform ORS You are monitoring an application that uses session variables to represent the underlying function, while using the same request name throughout these different interactions. You want to compare the performance of different application functions, such as log in, check out, or log out, so you use the Request Mapper to assign each function a distinct request name. Note: This feature is not available for IMS. Data used by the Request Mapper Request name The Request Name enables the user to assign alternate request identifiers that are more meaningful and appropriate to the chosen programming model of the application. The Request Name is provided because the Request String is just one way of identifying requests. There is data that is within the request that is not represented by the Request String. Furthermore, requests can be rather cryptic, so mapping them to something more immediately recognizable or understandable is useful. For example, a Web request can be mapped by: v URI: /account/login v Servlet Class Name: com.cyanea.web.AccountServlet v Struts Class Name: http://www.cyanea.com/account/execute/login.do --> com.cyanea.web.account.LoginAction v Custom Naming Scheme: account.login When the installed Request Mapper is invoked, data is passed into this plug-in class to assist the custom code developer to make a decision. This includes the Request Object and the Session Object in the case of a URL based request. Application Name The Application Name enables you to assign request identifiers that classify their requests into different applications. It is a means to aggregate different ORS into an application label. The Application Name enables you to analyze their historical data from an application perspective. For example, requests can be mapped to the following names: v Account Management v Web Trading v Order Management Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 195 User IDs The Application Monitor has the ability to capture, display, and store the user ID of a request that comes into the application server. By default, the user ID is captured by calling the following method: javax.servlet.http.HttpServletRequest.getRemoteUser() If your application stores user IDs in the session, configuration will be required. User IDs are defined as Web-side identifiers of who initiated the transaction/request. To capture the user ID from the session, you need to enable the data gathering from the session, and specify the attribute in the session that contains the user ID. To enable the data gathering from the session, update the data collector properties as follows: com.cyanea.mapper.http.userid.source=session To capture the attribute called account name from the session, update the data collector properties as follows: com.cyanea.mapper.http.userid.attributename=accountname Default request mapping behavior From the application server perspective, there are two major types of requests: JSP and Servlet. These calls come either from a Web server, or from an application server other than itself. We call this request, generally expressed in the form of a string, the ORS. The ORS is composed of the URI plus the query string. While a unique ORS can be used to represent a specific application function such as log in, check out, and log out, this might not always be the case. Other styles of application design utilize different programming techniques to represent the underlying function, while still maintaining a simple, uniform ORS throughout a series of interactions. When monitoring applications that use such a design, you can use the Request Mapper to distinguish among these different interactions that use the same ORS. In addition, when performing workload characterization and understanding resource consumption, an analyst might sometimes find that it is neither possible nor effective to break down consumption simply by ORS, especially if there are too many of them. Aggregation of consumptions based on classification of ORS is more desirable. The Request Mapper functionality is designed to resolve these types of problems. When an application server receives a request (ORS), the Request Mapper will enable the ORS to be rewritten into two other strings before it is passed on to ITCAM for Application Diagnostics: v Request Name v Application Name If no request mapper is used, the Application Monitor will map the incoming ORS onto a Request Name and an Application Name using the following rule: Request Name = ORS without the host nameApplication Name = URI of ORS 196 ITCAM for Application Diagnostics: User Guide In-flight Request Search is conducted on the Request Name. Server Activity Display uses Request Name for the display. Performance Analysis and Reporting performs decomposition by Application Name. Configuring a Request Mapper Request Mapper is highly sensitive to performance since it is frequently invoked. A poor-performing Request Mapper can have an adverse effect on the overall performance of the application server in terms of Servlet response time as well as CPU costs. WebSphere 6.1 uses a different class loading mechanism than WebSphere 6.0 or WebSphere 5.1.1, therefore complete the following steps to configure the Request Mapper for WebSphere 6.1: 1. Stop the WebSphere server. 2. To configure a Request Mapper, complete the following steps: a. Assuming the requestmapper classes are packaged in requestmapper.jar, create the Request Mapper class plugins and package them into the jar file. b. In the datacollector_custom.properties file located in the DC_home/runtime/app_server_version.node_name.server_name/custom/ directory, set the am.requestmapper property as follows: am.requestmapper= <fully qualified requestmapper class name> where fully qualified requestmapper class name is the Request Mapper class that implements the ITCAM Request Mapper interface and is packaged in requestmapper.jar. c. Put the library requestmapper.jar in DC_home/itcamdc/lib/ext 3. (Optional) The following steps are optional, they provide an example of how to configure a Request Mapper and avoid mixing the Request Mapper specific properties with other JVM system properties. This is done by creating a separate Request Mapper properties file and including all the Request Mapper properties in this file. In this way, if you need to add additional Request Mapper properties, you can do so without exposing them to other code either in the data collector or in the application server. The following steps provide an example of this optional approach: a. Create a property file called requestmapper.properties and put all the Request Mapper specific properties in this file. Put the requestmapper.properties file in DC_home/runtime/DC_specific dir. b. In the datacollector_custom.properties file located in the DC_home/runtime/app_server_version.node_name.server_name/custom/ directory, set the customer.reqestmapper.file property as follows: customer.requestmapper.file= DC_home/runtime/DC_specific dir/requestmapper.properties c. In the RequestMapper code, get the location of requestmapper.properties file by doing System.getProperty("customer.requestmapper.file") 4. Restart the WebSphere server. Java docs and an example follow: Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 197 Package com.cyanea.mapper Table 9. Interface Summary Interface Summary MappedRequest Interface used for providing the ITCAM for Application Diagnostics system with a Distinguishable Request String (DRS) and a Collapsible Request String (CRS) about a particular Servlet request. RequestMapper ITCAM for Application Diagnostics recognizes JSP and Servlet requests on an application server. Interface mapped request public interface MappedRequest Interface used for providing the ITCAM for Application Diagnostics system with a DRS and a CRS about a particular servlet request. Table 10. Method Summary Method Summary java.lang.String getCRS ( ) java.lang.String getDRS( ) Interface Request Mapper public interface RequestMapper ITCAM for Application Diagnostics recognizes JSP and servlet requests on an application server. These requests are normally identified throughout the ITCAM for Application Diagnostics system using the URI of the request. In some situations, such as when a Struts design paradigm is used, a particular URI will be used to handle different types of business requests. ITCAM for Application Diagnostics provides this interface as a mechanism for modifying ITCAM for Application Diagnostics default behavior of using the URI to describe the request. An implementation of this interface can be installed by registering the classname with the Java executable as a system property. To install, specify the system property "am.requestmapper" with the implementing class as the value. For example: -Dam.requestmapper=com.cyanea.mapper.RequestMapperExample 198 ITCAM for Application Diagnostics: User Guide Table 11. Method Summary Method Summary MappedRequest mapRequest (java.lang.String servletClassName, javax.servlet.http.HttpServletRequest request) This stateless method translates a servlet classname and a URL into a MappedRequest object. Sample Request Mapper - mapRequest public MappedRequest mapRequest( java.lang.String servletClassName, javax.servlet.http.HttpServletRequest request) This stateless method translates a servlet classname and a URL into a MappedRequest object. Any RequestMapper class should attempt to execute this method as quickly as possible, due to the fact that it lies directly in the path of the application server thread execution. v Parameters: – ServletClassName - the name of the ServletClass handling this request. – request - the HttpServletRequest object for this request. v Returns: An instance of MappedRequest indicating the DRS and CRS to be used by the ITCAM for Application Diagnostics system. Request Mapper Example (1): package com.cyanea.mapper; public class MappedRequestExample implements MappedRequest { private String CRS; private String DRS; /** Creates a new instance of MappedRequestExample */ public MappedRequestExample(String myCRS,String myDRS) { CRS = myCRS; DRS = myDRS; } public String getCRS() { return CRS; } public String getDRS() { return DRS; } } Request Mapper Example (2): package com.cyanea.mapper; import javax.servlet.http.HttpServletRequest; public class RequestMapperExample implements RequestMapper { /** static MappedRequest instance for welcome page requests */ private static final MappedRequest welcomeRequest; /** static MappedRequest instance for quote page requests */ private static final MappedRequest quoteRequest; /** static MappedRequest instance for buy page requests */ private static final MappedRequest buyRequest; /** static MappedRequest instance for sell page requests */ Chapter 3. ITCAM for Application Diagnostics Managing Server Visualization Engine 199 private static final MappedRequest sellRequest; /** static MappedRequest instance for portfolio page requests */ private static final MappedRequest portfolioRequest; /** static MappedRequest instance for account page requests */ private static final MappedRequest accountRequest; /** static MappedRequest instance for update page requests */ private static final MappedRequest updateRequest; /** * Static class variables are used to avoid continuous object creation * of redundant information on a per-client-request basis. An * unsynchronized, read-only HashMap can also be used for looking up * MappedRequest instances to gain a performance increase. **/ static { welcomeRequest = new MappedRequestExample("Welcome Page","welcome"); quoteRequest = new MappedRequestExample("quote","quote"); buyRequest = new MappedRequestExample("trade","buy"); sellRequest = new MappedRequestExample("trade","sell"); portfolioRequest = new MappedRequestExample("overview","portfolio"); accountRequest = new MappedRequestExample("account","account"); updateRequest = new MappedRequestExample("account","updateAccount"); } /** Creates a new instance of RequestMapperExample */ public RequestMapperExample() { } /** * This example checks the HttpServletRequest object for the GET or POST * parameter "map". If the parameter "map" is not found, "action" is * used. This "action" string, is then used to look up the corresponding * MappedRequest object. If no MappedRequest object is found, a new * object is created and returned. This should be avoided, as it can be * an expensive operation. */ public MappedRequest mapRequest(String servletClassName, HttpServletRequest request) { String action = request.getParameter("map"); if ( action == null) { action = request.getParameter("action"); if ( action == null ) return welcomeRequest; } /* A HashMap lookup could also be performed here instead of iterating * a list of string comparisons. If a list of strings comparison are * used, it is desirable to list the most common action first. */ if ( "quote".equals(action) ) return quoteRequest; else if ( "buy".equals(action) ) return buyRequest; else if( "sell".equals(action) ) return sellRequest; else if( "portfolio".equals(action) ) return portfolioRequest; else if( "account".equals(action) ) return accountRequest; else if( "updateAccount".equals(action) ) return updateRequest; else return new MappedRequestExample(action,action); } } 200 ITCAM for Application Diagnostics: User Guide Chapter 4. ITCAM Agent for WebSphere IBM Tivoli Composite Application Manager for Application Diagnostics WebSphere Agent provides a systems-management solution for the WebSphere Application Server Versions 6, and 7 . Using the WebSphere agent, you can monitor multiple WebSphere application servers running on the same physical node. Each application server must have been configured with its own ITCAM for WebSphere Data Collector. IBM Tivoli Composite Application Manager Agent for WebSphere is a component of ITCAM for Application Diagnostics, Version 7.1. It is also a component of ITCAM for Applications Version 6.2.3. If you are using ITCAM for Applications the Managing Server (deep dive) functionality is not available; please ignore all references to this functionality in this document. The Tivoli Enterprise Monitoring Agent collects four types of data through the data collector embedded in the WebSphere Application server process: v Data for application server requests from the ITCAM for WebSphere Data Collector v Resource data from WebSphere Performance Monitoring Infrastructure (PMI) v Data from WebSphere log files v Process data from the operating system Initiating data collection and reporting of data Because of high overhead, some data items are not automatically collected and reported. The collection of some data and statistics depends upon the setting of instrumentation levels for certain attributes. If the instrumentation levels are not set appropriately, certain information will not be collected and displayed in the workspaces. Similarly, those attributes that collect request and application trace data require you to complete several configuration steps. If you need to collect these data, use one of these methods to reconfigure data collection: v Complete configuration steps (as explained in the ITCAM for Application Diagnostics - WebSphere Agent installation and customization guide). v Issue Take Action commands to take specific action against your WebSphere application server or the monitoring product using the Tivoli Enterprise Portal. v Use Manage Tivoli Enterprise Services (as explained in the various IBM Tivoli Monitoring installation manuals and the ITCAM for Application Diagnostics WebSphere Agent installation and customization guide). Automatic baselining To display application health status, ITCAM monitors request response times (averaged over a sampling interval, by default 60 seconds) for every application. Every top level request available in an application is monitored separately. For every request, two thresholds are set, known as fair and bad. When at least one average request response time for an application rises over the fair threshold, a health warning (yellow) for this application is reported. In the same way, when at least one average request response time rises over the bad threshold, an application health alarm (red) is reported. © Copyright IBM Corp. 2006, 2009 201 ITCAM also monitors the "nested" requests (for example, database calls) within every top level request. In the event of a warning or alarm, it checks which of the nested requests is taking more than its usual share of time. Depending on the type of such nested requests, ITCAM shows whether the client, application, or backend tier is the likely cause of the warning/alarm. Servlet and Portal request types are assigned to the client tier; EJB and User (Custom) request types, to the application tier; all other request types (JNDI, JDBC, JCA, JMS) to the backend tier. When ITCAM starts to monitor a new application, it automatically starts a baselining process. In this process, which normally runs for 7 days but provides updated information every hour from the beginning, ITCAM collects statistical data for all requests in this application. Once the data is collected, ITCAM sets the thresholds automatically; it also records the typical share of response time for each nested request type. In most cases, this automatic setting is adequate. When the 7 days are past, the alarms/warnings will correspond to real problems. There is no need to adjust baselining settings when things are working normally. (The automatic thresholds usually become usable earlier, after the application has been observed through its typical load patterns). If you need to acquire thresholds, based on whatever data is available, before the hourly automatic update, you can manually update baselining. However, in some situations the threshold levels can become inadequate. This results in either too many false alarms/warnings, or in real problems going undetected. Such situations can be broadly split into two categories: v If some time has passed since the baselining process for an application, its response times might have changed because of configuration alteration, database growth, changing load patterns, and so on. In this case, you may need to run the baselining process again. It is good practice to do it after any configuration or infrastructure change. v If the thresholds are incorrect immediately after the baselining process has been completed, you may need to adjust the auto threshold settings. As a last resort, you can also override the thresholds with fixed values. However, do not do this unless you know a lot about the monitored application, or unless instructed by IBM Level 3 Support. If you need to have the thresholds set before they are updated automatically for the first time, you can trigger a baseline update. This will immediately set the thresholds based on the request data collected so far. Additional information For additional usage information about this agent, see: 202 v v Workspaces Attributes v v Situations Take Action commands ITCAM for Application Diagnostics: User Guide About this publication Welcome to the online help system available from inside the IBM Tivoli Composite Application Manager for WebSphere agent product. (C) Copyright IBM® Corporation 2006, 2009. All Rights Reserved. For the latest version of this Help, see the ITCAM for Application Diagnostics User Guide, here: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml ITCAM for Application Diagnostics - WebSphere Agent workspaces As part of the IBM Tivoli Composite Application Manager for Application Diagnostics - WebSphere Agent product's integration with the Tivoli Enterprise Portal, workspaces offer views of monitoring data that provide detailed current data about the Version 6 and 7 WebSphere application servers running on your site's Linux, UNIX, and Windows and z/OS platforms. In addition to reports and graphs, a workspace can contain other views (that is, windows), such as a Notepad editor session, a browser session, a telnet session, an event console, or a Take Action view from which you can issue commands. Several views of high-level information Several workspaces provide high-level information to help you meet your site's monitoring and administrative needs. These workspaces report current status and availability for both the WebSphere administrative server and its application server instances. They let you easily monitor the availability of your enterprise, the WebSphere Application Server, and application server instances. Primary and secondary workspaces The workspaces listed in the Navigator are directly accessible and are thus termed primary workspaces. Some of these also contain secondary workspaces, which are not accessible directly from the Navigator. Instead you must select and display the primary workspace, then use either a menu option or a special link icon in the primary workspace's views to reach the secondary workspaces (sometimes called subsidiary workspaces). Workspaces with historical data links Several workspaces provide secondary workspaces that display historical data. You can specify a time span over which to collect historical data, which accumulates and summarizes the data in the primary workspaces that generate them. (The default setting is 15 minutes; you can modify this setting to suit your needs.) The descriptions of the historical workspaces follow the descriptions of the primary workspaces that generate them in the workspace helps. Available Tivoli Enterprise Portal workspaces For an overview of the organization of the available workspaces, see Organization of the predefined workspaces. Organization of the predefined workspaces The IBM Tivoli Composite Application Manager for Application Diagnostics WebSphere Agent workspaces for the Tivoli Enterprise Portal define data displays Chapter 4. ITCAM Agent for WebSphere 203 that appear in the Navigator's Physical view. In addition to the workspaces that the Navigator lists, you can reach their subsidiary (that is, secondary) workspaces from the primary workspaces (those listed in the Navigator). Accessing the subsidiary workspaces You can access a primary workspace's subsidiary workspaces by using one or more of the following methods: From the Navigator: 1. 2. 3. 4. Select the primary workspace. Right-click the name of the selected workspace in the Navigator. Select Workspaces from the context menu. Select the desired subsidiary workspace. From the View menu: 1. Select the primary workspace. 2. In the menu bar at the top of the Tivoli Enterprise Portal, select View > Workspaces. 3. Select the desired subsidiary workspace. From a report: 1. Select the primary workspace. 2. If the workspace's report (which displays by default at the bottom of the workspace) contains a link icon to the left of each row, you can either click the icon to navigate to the default subsidiary workspace pertaining to the selected row or right-click the icon and select a subsidiary workspace from the context menu. From a chart view: The data displayed in some bar charts and plot charts is linked to subsidiary workspaces. To search for a link, right-click a bar or data point in the chart. If Link to displays in the context menu, you can select a subsidiary workspace pertaining to the data in the chart. Workspace organization The hierarchy levels shown in the Navigator depend on how your enterprise customizes the Tivoli Enterprise Portal. However, ITCAM for Application Diagnostics - WebSphere Agent does provide a set of predefined workspaces, which do not require customization. The following list shows the order and hierarchy of the predefined workspaces provided by the IBM Tivoli Composite Application Manager for Application Diagnostics - WebSphere Agent Tivoli 204 ITCAM for Application Diagnostics: User Guide Enterprise Monitoring Agent. It is a representation of how the predefined workspaces are organized in the Navigator. For more detailed information about a workspace, click its name in the table. operating system [for example, Windows] v system [that is, node name] – WebSphere Agent - “WebSphere Agent Summary workspace” on page 214 - “WebSphere Agent Summary Status workspace” on page 215 - “Application Server Summary workspace” on page 215 - “Configuration workspaces” on page 221 v “WebSphere Application Server workspace” on page 291 v “Resources and Applications workspaces” on page 217 v “High Availability Manager workspace” on page 255 v “DCS Stacks workspace” on page 248 v “Configuration workspaces” on page 221 v Note: The following workspaces are only available when running a monitoring agent in a z/OS environment, Websphere App Server Servant Regions, and Selected Region - Application Server Summary. For more information, see “Region workspaces in a z/OS environment” on page 298. v Application Health – Application Registry – Application Trend at L1 – Application Trend at L2/L3 – OS Stack – JVM Stack Trend – – – – – “Web Tier Analysis workspace” on page 276 “Backend Tier Analysis workspace” on page 274 “Request Baseline workspace” on page 272 “Application Configuration workspace” on page 274 “EJB Tier Analysis workspace” on page 273 – “Application Health History workspace” on page 275 – Note: The following workspaces are only available when running a monitoring agent in a z/OS environment, Selected Application Servant Regions , and Selected Region - Application Health Status. For more information, see “Region workspaces in a z/OS environment” on page 298. v Request Analysis – Selected Request - Datasources – Selected Request JMS Queues – Selected Request Resource Adapters – Selected Request - History Chapter 4. ITCAM Agent for WebSphere 205 Note: The following workspaces are only available when running a monitoring agent in a z/OS environment, Selected Region - Request Analysis , and Selected Request - Servant Regions. For more information, see “Region workspaces in a z/OS environment” on page 298. v Garbage Collection Analysis – Allocation Failures – Garbage Collections - Selected Allocation Failure – Note: The following workspace is only available when running a monitoring agent in a z/OS environment, Selected Region - History, and Garbage Collection Analysis - Servant Regions. For more information, see “Region workspaces in a z/OS environment” on page 298. v Log Analysis Note: The following workspaces are only available when running a monitoring agent in a z/OS environment, Selected Region - Log Analysis. For more information see, “Region workspaces in a z/OS environment” on page 298. v Pool Analysis v Datasources – “Data sources workspace” on page 243 – “Selected Datasources - Datasource Trend workspace” on page 277 Note: The following workspace is only available when running a monitoring agent in a z/OS environment, Data Sources- Servant Regions, and Selected Regions - Datasources. For more information see, “Region workspaces in a z/OS environment” on page 298. v JMS Summary – Note: The following workspace is only available when running a monitoring agent in a z/OS environment, Selected JMS - Servant Regions, and Selected Region - JMS Summary. For more information see, “Region workspaces in a z/OS environment” on page 298. v Web Applications – Sessions – Servlets / JSPs - Selected Enterprise Application v EJB Containers – Container Object Pools – Container Transactions – Enterprise Java Beans v DB Connection Pools – Selected DB Connection Pool - History v J2C Connection Pools v Thread Pools – “Thread Pool Trend workspace” on page 286 – Alarm Manager 206 ITCAM for Application Diagnostics: User Guide v Cache Analysis – “Thread Pool Trend workspace” on page 286 – v Workload Management v Scheduler v Web Services – Selected Web Services - History v Messaging Engines – Client Communications – Messaging Engine Communications – WMQ Client Link Communications – WMQ Link Communications – Destinations - Durable Subscriptions - WebSphere Portal Server v “Application Server Summary workspace” on page 215 v “Configuration workspaces” on page 221 – “WebSphere Application Server workspace” on page 291 – “Resources and Applications workspaces” on page 217 – “High Availability Manager workspace” on page 255 – “DCS Stacks workspace” on page 248 – “Configuration workspaces” on page 221 – Note: The following workspaces are only available when running a monitoring agent in a z/OS environment, Websphere App Server Servant Regions, and Selected Region - Application Server Summary. For more information, see “Region workspaces in a z/OS environment” on page 298. v Portal Summary v – Portlet Summary - Selected Portlet - History – Portal Pages Summary - Selected Portal Page - History – Note: The following workspaces are only available when running a monitoring agent in a z/OS environment, Selected Region - Portal Summary, Selected Region - Portlet Summary , and Selected Region - Portal Page Summary. For more information, see “Region workspaces in a z/OS environment” on page 298. v Request Analysis – Selected Request - Datasources – Selected Request JMS Queues – Selected Request Resource Adapters – Selected Request - History Chapter 4. ITCAM Agent for WebSphere 207 Note: The following workspaces are only available when running a monitoring agent in a z/OS environment, Selected Region - Request Analysis , and Selected Request - Servant Regions. For more information, see “Region workspaces in a z/OS environment” on page 298. v Garbage Collection Analysis – Allocation Failures – Garbage Collections - Selected Allocation Failure – Note: The following workspace is only available when running a monitoring agent in a z/OS environment, Selected Region - History, and Garbage Collection Analysis - Servant Regions. For more information, see “Region workspaces in a z/OS environment” on page 298. v Log Analysis Note: The following workspaces are only available when running a monitoring agent in a z/OS environment, Selected Region - Log Analysis. For more information see, “Region workspaces in a z/OS environment” on page 298. v Pool Analysis v Datasources – “Data sources workspace” on page 243 – “Selected Datasources - Datasource Trend workspace” on page 277 – Note: The following workspace is only available when running a monitoring agent in a z/OS environment, Data Sources- Servant Regions, and Selected Regions - Datasources. For more information see, “Region workspaces in a z/OS environment” on page 298. v JMS Summary Note: The following workspace is only available when running a monitoring agent in a z/OS environment, Selected JMS - Servant Regions,and Selected Region - JMS Summary. For more information see, “Region workspaces in a z/OS environment” on page 298. v Web Applications – Sessions – Servlets / JSPs - Selected Enterprise Application v EJB Containers – Container Object Pools – Container Transactions – Enterprise Java Beans v DB Connection Pools – Selected DB Connection Pool - History v J2C Connection Pools v Thread Pools – Alarm Manager v Cache Analysis 208 ITCAM for Application Diagnostics: User Guide v Workload Management v Scheduler v Web Services – Selected Web Services - History - WebSphere ESB Server v Application Health Summary – Selected Application - Application Tier Analysis – Selected Application - Configuration – Selected Application - Backend Tier Analysis – Selected Application - Health History – Selected Application - Client Tier Analysis – Application Registry - Selected Request - Baseline v High Availability Manager v DCS Stacks v Request Analysis – Selected Request - Datasources – Selected Request JMS Queues – Selected Request Resource Adapters – Selected Request - History v Garbage Collection Analysis – Allocation Failures – Garbage Collections - Selected Allocation Failure v Log Analysis v Pool Analysis v Datasources – Selected Datasource - History v JMS Summary v Web Applications – Sessions – Servlets / JSPs - Selected Enterprise Application v EJB Containers – Container Object Pools – Container Transactions – Enterprise Java Beans v DB Connection Pools – Selected DB Connection Pool - History v J2C Connection Pools v Thread Pools – Alarm Manager v Cache Analysis v Workload Management v Scheduler v Web Services – Selected Web Services - History Chapter 4. ITCAM Agent for WebSphere 209 v Messaging Engines – Client Communications – Messaging Engine Communications – WMQ Client Link Communications – WMQ Link Communications – Destinations - Durable Subscriptions v Service Components – Service Component Elements - WebSphere Process Server v Application Health Summary – Selected Application - Application Tier Analysis – – – – – Selected Application - Configuration Selected Application - Backend Tier Analysis Selected Application - Health History Selected Application - Client Tier Analysis Application Registry - Selected Request - Baseline v High Availability Manager v DCS Stacks v Request Analysis – – – – Selected Selected Selected Selected Request Request Request Request - Datasources JMS Queues Resource Adapters - History v Garbage Collection Analysis – Allocation Failures – Garbage Collections - Selected Allocation Failure v Log Analysis v Pool Analysis v Datasources – Selected Datasource - History v JMS Summary v Web Applications – Sessions – Servlets / JSPs - Selected Enterprise Application v EJB Containers – Container Object Pools – Container Transactions – Enterprise Java Beans v DB Connection Pools – Selected DB Connection Pool - History v J2C Connection Pools v Thread Pools – Alarm Manager 210 ITCAM for Application Diagnostics: User Guide v v v v Cache Analysis Workload Management Scheduler Web Services – Selected Web Services - History v Messaging Engines – Client Communications – Messaging Engine Communications – WMQ Client Link Communications – WMQ Link Communications – Destinations - Durable Subscriptions v Service Components – Service Component Elements - Lotus® Workplace Server v Application Health Summary – – – – – Selected Application Selected Application Selected Application Selected Application Selected Application - Application Tier Analysis - Configuration - Backend Tier Analysis - Health History - Client Tier Analysis – Application Registry - Selected Request - Baseline v High Availability Manager v DCS Stacks v Workplace Mail – IMAP/POP – Messages Queues v Portal Summary – Portlet Summary - Selected Portlet - History – Portal Pages Summary - Selected Portal Page - History v Request Analysis – Selected Request - Datasources – Selected Request JMS Queues – Selected Request Resource Adapters – Selected Request - History v Garbage Collection Analysis – Allocation Failures – Garbage Collections - Selected Allocation Failure v Log Analysis v Pool Analysis v Datasources – Selected Datasource - History Chapter 4. ITCAM Agent for WebSphere 211 v JMS Summary v Web Applications – Sessions – Servlets / JSPs - Selected Enterprise Application v EJB Containers – Container Object Pools – Container Transactions – Enterprise Java Beans v DB Connection Pools – Selected DB Connection Pool - History v J2C Connection Pools v Thread Pools v v v v – Alarm Manager Cache Analysis Workload Management Scheduler Web Services – Selected Web Services - History For additional information, see: Attribute groups used by the predefined workspaces Summary workspaces You can use summary workspaces to quickly see the status of WebSphere application servers and applications in your enterprise. About Summary Workspaces Summary workspaces provide a way to quickly monitor the status of application servers and applications. ITCAM for Application Diagnosticsprovides predefined situations that you can use to monitor WebSphere application servers in your enterprise. Summary workspaces enable you to quickly determine the status of these situations. User defined and predefined situations are mapped to various colored icons in the summary workspaces. The icon color indicates status which enables you to quickly determine the overall health of applications servers and applications. The following organization chart shows the structure of the icons in the summary workspaces: 212 ITCAM for Application Diagnostics: User Guide Summary Workspace Icons In summary workspaces, the each icon displays as one of the following statuses: Critical, Warning, Normal or Unknown. The status is calculated based on the status of the underlying situations being monitored. Each icon also displays the metrics for the first two situations shown on the flyover. The following table shows the possible status of icons: Table 12. Status Icons Status Icon Status Critical Warning Normal Unknown or Application Stopped Summary Workspace Flyovers The icons indicate the status of the WebSphere application servers and applications in your enterprise. To access more detailed information from the summary workspaces, point to the icon and a flyover is displayed. The flyover provides relevant metrics pertaining to the icon. Also, it shows the top 10 situations that are linked with the icon. You can go directly to the situation event result workspace by in the flyover. clicking on the situation link icon Drill Down on Summary Workspaces You can drill down on the icons to see further information. When you double-click on an icon, further workspace views showing more detailed monitoring data are displayed. See also “ITCAM for Application Diagnostics - WebSphere Agent situations” on page 433 Summary Workspace Views You can use summary workspaces to quickly see the status of WebSphere application servers and applications in your enterprise. Each workspace can contain one or more views. There are five summary workspaces. The following table describes the summary workspaces: Chapter 4. ITCAM Agent for WebSphere 213 Table 13. Summary Workspace Table Workspace Name Level in TEP Views Available WebSphere Agent Summary Agent level v Application Servers Status Table v Application Servers Summary WebSphere Agent Summary Status Agent level v Application Servers Status v Application Servers Summary Application Server Summary Application Server Level v Application Server Resources v Application Server Applications Resources Application Server Level v Application Server Resources v Situation Event Console Applications Application Server Level v Application Server Applications v Situation Event Console WebSphere Agent Summary workspace The WebSphere Agent Summary Workspace provides summary monitoring information for WebSphere application servers in your enterprise. It contains two views, the Application Servers Status Table view and the Application Servers Summary view. Application Servers Status Table view Two icons are displayed in this view - the Application and the Resources icons. The flyover for the Applications icon displays the following metrics: v Application Server Name v Average Response Time (ms) v v v v Request Rate (Req/Sec) Error Rate (Errors/sec) Number of problem Situations List of top 10 situations The flyover for the Resources icon displays the following metrics: v Application Server Name v JVM CPU% v GC Active Time (ms) v Number of problem Situations v List of top 10 situations For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces 214 ITCAM for Application Diagnostics: User Guide WebSphere Agent Summary Status workspace The WebSphere Agent Summary Status workspace is an alternative summary workspace available at the WebSphere agent level. The WebSphere Agent Summary Status workspace provides summary monitoring information for WebSphere Application servers. To switch to the WebSphere Agent Summary Status workspace, right-click the WebSphere Agent in the Tivoli Enterprise Portal navigator and select Workspace and then select WebSphere Agent Summary Status. The WebSphere Agent Summary Status workspace contains two views, the Application Servers Status view and Applications Servers Summary view. Application Servers Status View In this view, there is one icon which indicates the status of both applications and resources - this is the Server icon. The flyover for the Server icon displays the following metrics: v Average Response Time (ms) v Request Rate (Req/Sec) v v v v v Error Rate (Errors/sec) JVM CPU% GC Active Time (ms) WAS Node Name WAS Cell Name v WAS Cluster Name v Number of Problem Situations v List of top 10 situations For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Application Server Summary workspace The Application Server Summary workspace provides summary monitoring information for applications running on WebSphere application servers in your enterprise. It contains two views - the Application Server- Resources view and the Applications Server - Applications view. Application Server - Resources View The Application Server - Resources view contains the following icons: v OS v JVM v Datasource v Threadpool v Services Chapter 4. ITCAM Agent for WebSphere 215 OS icon The OS icon provides summary metrics for machine CPU and paging metrics. The flyover for the OS icon displays the following metrics: v System CPU (ms) v System Paging Rate (Kbytes/sec) v Number of problem situations v List of top 10 situations When you double-click the OS icon, the following subsidiary views display in the OS Stack workspace: v Current OS stack summary v CPU used v System Paging For further information about the OS Stack workspace, see OS Stack JVM icon The JVM icon flyover provides summary metrics for: CPU for the JVM process, garbage collection, and heap metrics. The flyover information for the JVM icon displays the following metrics: v JVM CPU% v GC Active Time (ms) v List of top 10 situations When you double-click the JVM icon, the following subsidiary views display in the JVM Stack Trend workspace: v JVM CPU Trend v Percent GC time used v Heap Usage trend For further information about the JVM Stack Trend workspace, see JVM Stack Trend Datasources icon The Datasources icon flyover provides summary metrics for JDBC, JMS, JCA and JTA, it also indicates the number of problem situations. When you double-click the Datasource icon, the following subsidiary views display in the Datasources workspace: v Worst Datasource Query Times v Worst Datasource Update Times v Datasources - Current Interval Threadpool icon The Threadpool icon flyover provides summary metrics for threadpool information including the number of problem situations. When you double-click the Threadpool icon, the following subsidiary views display in the Threadpools workspace: v Highest Average Pool Sizes v Average thread pool usage 216 ITCAM for Application Diagnostics: User Guide v Threadpools table Services icon The Services icon flyover provides summary metrics for Web Services, Workload Management and System Integration Bus. When you double-click the Services icon: v for Portal, Services icon will take you to Web Services which has the following views: – Worst Response Times – Most Popular – Web Services – Web Service Gateway v for Lotus, Services icon will take you to Workload Management which has these views: – WLM Server Incoming Requests – WLM Client Outgoing Requests – Workload Management Server – Workload Management Client Application Server - Applications View In this view, there is an icon per application. The flyover for an Application icon displays the following metrics: v Average Response Time (ms) v Request Rate (Req/Sec) v Error Rate (Errors/sec) v Monitoring Level v Number of problem Situations v List of top 10 situations When you double click an Application icon, the following subsidiary views display in either the Application Trend at L1 or Application Trend at L2/L3 workspace: v Response Time Trend v Error Rate Trend v Request Rate Trend v Selected Application Summary: Application Name For further information about the Application Trend workspace, see “Selected Application - Application Trend at L1 workspace” on page 237, and “Selected Application - Application Trend at L2/L3 workspace” on page 237 For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Resources and Applications workspaces The Resources and Applications workspaces provides monitoring data for your application server. Chapter 4. ITCAM Agent for WebSphere 217 Resources Workspace To access the Resources workspace, right-click the Application Server node in the Tivoli Enterprise Portal navigator and select Workspace and then select Resources. The Resources workspace contains the following views: v Application Servers Resources v Situation Event Console For information about the Application Servers Resources view, see “Application Server Summary workspace” on page 215. The Situation Event Console displays additional detail for all open situations. For details on how to perform filtering on open situations, see Tivoli Monitoring help. Applications Workspaces To access the Applications workspace, right-click the Application Server node in the Tivoli Enterprise Portal navigator and select Workspace and then select Applications. The Applications workspace contains the following views: v Application Servers Applications v Situation Event Console For information about the Application Servers Applications view, see “Application Server Summary workspace” on page 215. The Situation Event Console displays additional detail for all open situations. For details on how to perform filtering on open situations, see Tivoli Monitoring help. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Situation Mapping and Summary Workspaces User defined situations are mapped to icons in summary workspaces. When you create a new situation, if the situation then triggers an alert, detail of the situation is displayed in one of the summary workspaces icon flyovers. When you create a situation, the attribute group you base the situation on determines which summary workspace icon flyover the situation will display in. The following table shows which attribute groups map to which icons and predefined situations : TEMA Attribute Group Name 218 Icons Predefined Situations Applications Monitoring Configuration N/A WASAppDiscovered Requests Monitoring Configuration N/A Baseline N/A Applications Health Status Applications Applications Server Status JVM Log Analysis JVM ITCAM for Application Diagnostics: User Guide WASApplicationBad, WASApplicationFair, WASApplicationGood WASError TEMA Attribute Group Name Icons KYN Command N/A WebSphere Agent Events N/A DC Messages WebSphere JVM Dynamic Cache Services Dynamic Cache Templates Services Predefined Situations Workload Management Services Client Workload Management Services Server DB Connection Pools Datasources WASDBConnectionPoolThrdTimeout WASDBConnectionPoolUsageMaxed WASDBConPAverageUsageTimeHigh WASDBConPAvgWaitTimeHigh Container Object Pools Threadpools Enterprise Java beans Applications WASEJBCreateTimeHigh WASEJBMethodResponseTimeHigh WASEJBRemoveTimeHigh Web Applications Applications WASWebApplicationError Web Applications Sessions Applications WASSrvlSessAvgActiveSessionHigh WASSrvlSessExtReadTimeHigh WASSrvlSessExtWriteTimeHigh Applications Server JVM, OS WASHighCPUPercentUsed EJB Containers Applications Servlets JSPs Applications Servlet Sessions Applications Thread Pools Threadpools WASThreadPoolPercentMaxed WASThreadFreeLow Container Transactions Datasources WASContainerTransactionRollback WASCTGlbTransDurationHigh WASCTLclTransDurationHigh J2C Connection Pools Datasources WASJ2CConnectionPoolUsageMaxed WASJ2CCPAverageUsageTimeHigh WASJ2CCPAvgWaitTimeHigh WASServletsJSPError DCS Stack High Availability Manager Web Services Gateway Web Services Alarm Manager Scheduler Services Client Communications Services Durable Subscriptions Services Chapter 4. ITCAM Agent for WebSphere 219 TEMA Attribute Group Name Icons Messaging Engine Communications Services Messaging Engines Services Queue Services Service Component Elements Services Service Components Services Topic Spaces Services WMQ Client Link Communications Services WMQ Link Communications Services Predefined Situations Workplace Mail Service Datasources Workplace Mail Queues Datasources Workplace Mail IMAP/POP Services Portal Summary Services Portal Page Summary Services WASPortalPageResponseTime Portlet Summary Services WASPortletResponseTime Datasources Services WASDataSrcConWaitTimeHigh Request Times and Rates Applications WASHighResponseTime Request Analysis Applications WASReqSQLExecuteTimePercentHigh WASReqSQLQueryTimePercentHigh WASReqSQLUpdateTimePercentHigh JMS Summary Datasources Selected Request Applications Garbage Collection Analysis JVM Allocation Failure JVM Garbage Collection Cycle JVM WASHighGCTimePercent WASAvgHeapSizeAfterGCHigh WASOutofHeapSpace WebSphere Agent WASNotConnected WebSphere App Server WASHighCPUPercentUsed WASHighResponseTime Where NA is indicated for the icon, it means that situations created based on these attribute groups are not reported in the summary workspaces. This is because these tables are strictly related to TEMA configuration parameters which do not reflect the application or application server health. For additional information, see: WebSphere Agent situations WebSphere Agent attributes 220 ITCAM for Application Diagnostics: User Guide Summary Workspaces error messages Four possible error messages can be displayed in the summary workspace status bar. The following table lists and explains the error messages: Error Message Explanation Internal Communication Error This message indicates a communication problem between the summary workspaces front end and the summary workspaces back end code (called evaluator) running inside the embedded WebSphere server on the TEPS server. There are two reasons this error displays: 1. If this messages is displayed for all the summary workspaces, there is an installation error. Summary workspaces require code to run inside ITM eWAS. Ensure the following installation steps have been taken: a. For ITM 6.1, install the ITM TEP Server Extensions - this installs eWAS. Install ITCAM for Application Diagnostics. After installation, reconfigure the TEPS. b. For ITM 6.2, eWAS is already installed. Install ITCAM for Application Diagnostics. After installation, reconfigure the TEPS. If you don't reconfigure the TEPS, the Summary Workspace status bar will display ''Internal Communication Error". For further information about installation, see the ITCAM for Web Application Diagnostics: WebSphere Tivoli Enterprise Monitoring Agent Installation Guide publication in the Tivoli information center: http://publib.boulder.ibm.com/infocenter/tivihelp/ v3r1/topic/com.ibm.itcamwas_wr.doc_6.2/welcome.htm 2. If this error messages is displayed for only some of the summary workspaces, turn up tracing and send to IBM support for review. Invalid Data This message indicates that data being sent from the summary workspaces back end code (called evaluator) running inside the embedded WebSphere server on the TEPS server is malformed. Turn on the tracing, collect the logs and send to IBM support for further analysis. For further information about logs and tracing, see the ITCAM for Application Diagnostics: WebSphere Agent Problem Determination Guide publication in the Tivoli information center: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ topic/com.ibm.itcamwas_wr.doc_6.2/welcome.htm No Applications Configured This message indicates that no applications are configured on the WebSphere server. This message also displays if the WebSphere server is not connected to the TEMA. The message will no longer display when the WebSphere server is back online. No user action is needed. No Applications Servers This message indicates that no WebSphere servers are connected Connected to the TEMA. The message will no longer display when the WebSphere server is back online. No user action is needed. Configuration workspaces Monitoring Agent configuration and tuning is facilitated in the Tivoli Enterprise Portal through configuration workspaces. There are two configuration workspaces, one for the Monitoring Agent level and one for the server level: Chapter 4. ITCAM Agent for WebSphere 221 v WebSphere Agent Configuration workspace v Application Server Configuration workspace Both configuration workspaces have the same tabs and configuration settings. The WebSphere Agent Configuration workspace settings are initial settings applied to all data collectors managed by the Monitoring Agent. For example, when a Data Collector connects to the Monitoring Agent for the first time or if the Data Collector configuration was deleted. In both these examples, the configuration settings specified in the WebSphere Agent Configuration workspace are applied. The Application Server Configuration workspace contains individual server settings and the settings in this workspace override settings in the WebSphere Agent Configuration workspace. Settings for the WebSphere Agent Configuration and Application Server Configuration workspaces are saved in the following files: Table 14. Workspace configuration files Workspace Configuration file WebSphere Agent Configuration workspace in windows: CANDLE_HOME\TMAITM6\hostname_productcode.xml Application Server Configuration workspace in windows: CANDLE_HOME\TMAITM6\ hostname_productcode_servervendor.servernode.server name.xml CANDLE_HOME/config/hostname_productcode.xml WebSphere Agent Configuration workspace in other platforms: CANDLE_HOME/config/ Application hostname_productcode_servervendor.servernode.server name.xml Server Configuration workspace in other platforms: The WebSphere Agent Configuration workspace configuration settings are initial settings which are applied to all data collectors managed by the selected WebSphere agent. The Application Server Configuration workspace configuration settings override agent level configuration settings. Both configuration workspaces have the following two views: v Application Diagnostics Configuration view - this view has the following four tabs – Collection (Basic) – Collection (Advanced) – Application Dashboard (Basic) – Application Dashboard (Auto Threshold) 222 ITCAM for Application Diagnostics: User Guide v Application Servers view - this view has one tab which lists all application servers monitored by the selected WebSphere agent, for each application server, there is a link to Application Server Configuration workspace. Application Diagnostics Configuration - Basic Tab The Basic tab contains the following fields: v Request Data Monitoring - in this field, specify the monitoring level for request data from connected Data Collectors. The following values can be entered into this field: – Disable - request data is not monitored and is not displayed – Level 1 - only monitors edge request data, for example, servlets, JSPs, and EJBs – Level 2 - monitors nested request data in addition to edge request data, for example, JNDI, JMS, JDBC, and JCA requests v Request Data Monitoring Method - in this field, specify the monitoring method used by the Monitoring Agent to govern when it uploads request and garbage collection data from connected Data Collectors. The following values can be entered into this field: – On Demand - when the monitoring method is set to On Demand, data is uploaded only when requested by the user. The exception to this is if the cache of data is still current - whether or not this data is current is determined by the Request Data On Demand Maximum Sample Age (sec) field in the Collection Advanced tab. With On Demand monitoring, the Tivoli Enterprise Portal response time is slower as the data is collected as requested but the retrieved data will be the most current available. CPU and memory usage on the monitored systems is lower for On Demand monitoring. – Fixed Interval - when the monitoring method is set to Fixed Interval, the Monitoring Agent will upload sample data from the data collectors at regular fixed intervals, and respond to a user request using the latest cache of sample data gathered at the last interval. With Fixed Interval monitoring, CPU and memory usage can be higher because more data is collected more frequently but Tivoli Enterprise Portal response time is faster as the data is more readily available. Data samples are calculated for the same time interval and as a result are more consistent. v Resource Data Monitoring - in this field, specify whether resource data is monitored from connected Data Collectors. The following values can be entered in this field: – Disable - resource data is not collected by the Monitoring Agent and is not displayed in the Tivoli Enterprise Portal. – Enable - resource data is collected by the Monitoring Agent and is displayed in the Tivoli Enterprise Portal. v Resource Data Monitoring Method - in this field, specify the monitoring methodology used by the agent to govern when it uploads resource data from connected Data Collectors. The following values can be entered into this field – On Demand - when the monitoring method is set to On Demand, data is uploaded only when requested by the user. The exception to this is if the cache of data is still current - whether this data is current is determined by the Resource Data On Demand Maximum Sample Age (sec) field in the Collection Advanced tab. With On Demand monitoring, the Tivoli Enterprise Portal response time is slower as the data is collected as requested but the retrieved data is the most current available. CPU and memory usage on the monitored systems is lower for On Demand monitoring. Chapter 4. ITCAM Agent for WebSphere 223 – Fixed Interval - when the monitoring method is set to Fixed Interval, the Monitoring Agent will upload sample data from the data collectors at regular fixed intervals, and respond to a user request using the latest cache of sample data gathered at the last interval. With Fixed Interval monitoring, CPU and memory usage can be higher because more data is collected more frequently but Tivoli Enterprise Portal response time is faster as the data is more readily available. Data samples are calculated for the same time interval and as a result are more consistent. v Garbage Collection Monitoring - in this field, specify if verbose garbage collection output monitoring is enabled. The following values can be entered in this field: – Disable - verbose garbage collection output data is not collected by the Monitoring Agent and is not displayed in the Tivoli Enterprise Portal. – Enable - verbose garbage collection output data is collected by the Monitoring Agent and is displayed in the Tivoli Enterprise Portal. Application Dashboard (Basic) tab The Application Dashboard (Basic) tab contains the following fields: v Application Fair Completion Rate Threshold (%) - Defines the default completion percentage for application fair availability threshold. v Application Bad Completion Rate Threshold (%) - Defines the default completion percentage for application bad availability threshold. v Application Fair Resource Usage Threshold (%) - Defines the threshold percentage for fair usage level of an application resource. v Application Bad Resource Usage Threshold (%) - Defines the threshold percentage for bad usage level of an application resource. v Application Resource Usage Monitoring Cutoff Threshold (%) - Defines the cutoff threshold percentage for application resources usage monitoring. v Request Monitoring Control Level - Specifies the request monitoring control level for the server. The following entries can be entered to this field: – Application Request monitoring settings are defined for each application independently. – Server Request monitoring settings are defined on the server level and override the settings defined for applications. The Request Monitoring Control Level option gives you more control over request monitoring settings. In certain sequences, you can benefit from "locking" the request monitoring control on the server level, because you can change data collector monitoring level in one place. In ITCAM For Application Diagnostics 7.1, the request data monitoring level (Level1 or Level2) that displays on the Tivoli Enterprise Portal depends on the Request Monitoring Control Level setting you choose. v If you select the Request Monitoring Control Level as Application (the default setting), only Level2 data displays in the Tivoli Enterprise Portal when the Request Data Monitoring Level for the application is Level2. v If you select the Request Monitoring Control Level as Server, and then set the Request Data Monitoring Level at Level2 using take action Start_Request_Monitoring, the Request Data Monitoring Level for all the applications in this server is Level2. You can set Request Data Monitoring Level back to Level1 for any application in the server by using the take action, Set_Application_Monitoring and selecting Level1. However, in the Tivoli Enterprise Portal, the Request Data Monitoring Level still displays as Level2. 224 ITCAM for Application Diagnostics: User Guide This is because the Tivoli Enterprise Portal displays the effective request monitoring control level. When you change the Request Monitoring Control Level to Application, the Request Data Monitoring Level in the Application Configuration workspace becomes Level1 for that application. Collection Advanced tab The Collection Advanced tab contains the following fields: v Request Data On Demand Maximum Sample Age (sec) - The maximum allowed age of sample request data in seconds before collecting a new sample of data. If the monitoring method is set to On Demand, when a user request is received, and the current sample cache is older than the value specified, then the Monitoring Agent uploads a new sample before servicing the request. Two successive on-demand requests received from users within the period specified by the maximum sample age return the same results without incurring the CPU and memory cost of a new data sample. v Request Data Fixed Interval between Collections (sec) - The amount of time in seconds between uploads of sample request data from the data collectors to the Monitoring Agent when the monitoring method is set to Fixed Interval. When a user request is received, it is serviced from the latest uploaded sample. v Request Data Sampling Rate (%) - The percentage of requests that are sampled for request data monitoring. v Resource Data On Demand Maximum Sample Age (sec) - The maximum allowed age of sample resource data in seconds before collecting a new sample of data. If the monitoring method is set to On Demand, when a user request is received and the current sample cache is older than the value specified in this field, then the Monitoring Agent uploads a new sample before servicing the request. Two successive on-demand requests received from a user within the period specified by the maximum sample age return the same results without incurring the CPU and memory cost of a new data sample. v Resource Data Fixed Interval between Collections (sec) - The amount of time in seconds between uploads of sample resource data from the data collectors to the agent. When a Tivoli Enterprise Portal request is received, it is serviced from the latest uploaded sample. v Garbage Collection Polling Interval (sec) - The interval in seconds between the Monitoring Agent scanning the verbose Garbage Collection output. v Log Scan Polling Interval (sec) - The interval in seconds between the Agent scanning the Application Server standard output log for changes. Application Dashboard (Auto Threshold) tab The Application Dashboard (Auto Threshold) tab contains the fields: v Response Time Selection (%) - Defines the percentage from baseline to be used for response time auto-thresholding. v Response Time Deviation (%) - Defines the deviation for baseline selection to be used for response times auto-thresholding. v Fair Response Time Projection (%) - Defines the percentage to derive the fair response time threshold from the baseline selection. v Bad Response Time Projection (%) - Defines the percentage to derive the bad response time threshold from the baseline selection. Workspace link to Managing Server Visualization Engine With the appropriate configuration and permissions, you can access the Managing Server Visualization Engine from specific workspaces in the WebSphere Tivoli Enterprise Portal. Instead of opening another browser and clicking the relevant Chapter 4. ITCAM Agent for WebSphere 225 link, you can access the Managing Server Visualization Engine from Tivoli Enterprise Portal using a link called Diagnostic Server Activity Display. Some of the workspaces have additional links you can use to access the Managing Server Visualization Engine. All these links begin with the word Diagnostic. When you log in to the Welcome to the Application Monitor page, the information displayed is specific to the content in the Tivoli Enterprise Portal workspace you selected. You also have the option to manually create your own links to the Managing Server Visualization Engine using the Link Wizard which is available on all workspaces. You can access the Managing Server Visualization Engine from the following workspaces. v WebSphere Agent v Request Analysis v Garbage Collection Analysis v Datasources v JMS Summary v Web Applications v v v v EJB Containers DB Connection Pools J2C Connection Pools Thread Pools This is a list of the Managing Server Visualization Engine links available from the workspaces: v Diagnostic Server Activity display. Use this link to diagnose application problems, for example, slow transactions or high response times. This link is available from all workspaces except Request Analysis and Garbage Collection Analysis. v Diagnostic In-Flight Request Search. Use this link to identify any hanging transactions. This feature is only available from the WebSphere Agent and Request Analysis workspaces. v Diagnostic Recent Completed Requests. The Recent Requests tab displays data regarding recently completed server requests. This feature is only available from the Request Analysis workspace. v Diagnostic SMF Data. This feature is only available you are using a z/OS Data Collector and in the Request Analysis workspace. The SMF Overview displays summary information for all the resources on the selected application server. v Diagnostic JVM Thread Display Use this link to diagnose application problems, for example, slow transactions by examining threads running in JVM. This link is available from the Thread Pools workspace. v Diagnostic Memory Leak Use this link to diagnose memory leak problems. This link is available from the Garbage Collection Analysis workspace. For information about accessing workspaces, see “Accessing the Managing Server Visualization Engine from Tivoli Enterprise Portal workspaces” on page 228. Prerequisites for access The following conditions must be met to gain access to the Managing Server Visualization Engine through the Tivoli Enterprise Portal. 226 ITCAM for Application Diagnostics: User Guide v ITCAM for Application Diagnostics Managing Server version 7.1 and ITCAM for WebSphere Data Collector version 7.1. must be installed in your environment. v Tivoli Enterprise Portal users must be members of the Diagnostic Users Group within the Tivoli Enterprise Portal. For more information see “Granting Users access to Managing Server Visualization Engine from Tivoli Enterprise Portal.” v During the installation of the Managing Server, kernel properties in the Managing Server must be set up accordingly with the correct host name and port number. This action is completed by the user installing the Managing Server. You can also create your own links to the Managing Server Visualization Engine using the Link Wizard. For more information see “Creating links to the Managing Server Visualization Engine using the Link Wizard” on page 233 Kernel Settings to access the Managing Server Visualization Engine through the Tivoli Enterprise Portal If users are to access the Managing Server Visualization Engine through the Tivoli Enterprise Portal, the kernel properties in the Managing Server must be set up accordingly with the correct host name and port number. The following properties need to be added to kl1.properties and kl2.properties (By default, the Managing Server installer replaces @{HOST_VE} and @{PORT_VE_HTTP} at Managing Server installation time) : v ve.host=@{HOST_VE} v ve.port=@{PORT_VE_HTTP} At kernel startup time, the kernel needs to read these two properties, and set them as part of properties in PROBE_CONFIG.PROPS. If a user changes the VE host name or port number, then the kernel needs to be restarted. Use the following steps to start and stop the kernel In $MS_HOME/bin: 1. To start kernel, issue:./amctl.sh wd<kernel count> start 2. To stop kernel, issue: ./amctl.sh wd<kernel count> stop where <kernel count> is 1 by default. Granting Users access to Managing Server Visualization Engine from Tivoli Enterprise Portal As a user you must be set up as a member of the DIAGNOSTIC USERS group in the Tivoli Enterprise Portal, otherwise you will not have access to the Visualization Engine from the Tivoli Enterprise Portal. The default administration user Sysadmin is automatically a member of this group. Any user with administrator permissions can add or remove additional users to the DIAGNOSTIC USERS group. Before you begin To complete this task you must be a user with administrator permissions to add or remove additional users to the DIAGNOSTIC USERS group. For more information about access see “Prerequisites for access” on page 226. 1. From the Tivoli Enterprise Portal main menu, click Edit > Administer Users. 2. In the Administer Users window, in the top half of the window, click the Users Groups tab. Chapter 4. ITCAM Agent for WebSphere 227 3. Click the group name, in this case DIAGNOSTIC USERS. 4. In the bottom half of the window click the Members tab to view existing members of this group and to assign additional users. 5. To add users, in the Available Members section select the users you want to assign to the Group. 6. Click the left arrow to move the selected users to the Assigned Members section of the window. 7. Click Apply and OK to implement the changes. 8. If you want to remove a user from the group click the Assigned Members tab, select the users you want to remove. 9. Click the right arrow to move the selected users to the Available Members tab. Then click Apply and OK. What to do next Users who are members of this group can access the Managing Server Visualization Engine from the Tivoli Enterprise Portal. See “Accessing the Managing Server Visualization Engine from Tivoli Enterprise Portal workspaces.” Adding the LDAP user to Tivoli Enterprise Portal user accounts: About this task To add the LDAP user to Tivoli Enterprise Portal user accounts, use Tivoli Enterprise Portal user administration. 1. In the Tivoli Enterprise Portal main menu, select Administer Users. Click Create New User to create a user profile from defaults, or Create Another User to create a user profile as a copy of an existing one. 3. In the Modify User window, enter the user name for the new user in the User ID field. 4. In the Distinguished Name field, enter the following string: 2. uid=username,cn=users,dc=ibm,dc=com This string registers the LDAP user with Tivoli Enterprise Portal. If you are using an existing LDAP configuration, use the applicable distinguished name. Note: For more information about Single sign on refer to Appendix N Setting Up single sign on for Tivoli Enterprise Portal Users in the ITCAM for Application Diagnostics 7.1 Managing Server Installation and Customization Guide. Accessing the Managing Server Visualization Engine from Tivoli Enterprise Portal workspaces Use the following links for information about how to access the Managing Server Visualization Engine from the Tivoli Enterprise Portal workspaces. To ensure you have access to the Managing Server Visualization Engine see “Prerequisites for access” on page 226 before you begin. v “Accessing the Managing Server Visualization Engine from the WebSphere Agent workspace” on page 290 v “Accessing the Managing Server Visualization Engine from the Request Analysis workspace” on page 271 v “Accessing the Managing Server Visualization Engine from the Garbage Collection Analysis workspace” on page 254 228 ITCAM for Application Diagnostics: User Guide v “Accessing the Managing Server Visualization Engine from the Datasources workspace” on page 245 v “Accessing the Managing Server Visualization Engine from the JMS Summary workspace” on page 260 v “Accessing the Managing Server Visualization Engine from the Web Applications workspace” on page 288 v “Accessing the Managing Server workspace ” on page 251 v “Accessing the Managing Server Pools workspace” on page 247 v “Accessing the Managing Server Pools workspace” on page 258 v “Accessing the Managing Server workspace” on page 286 Visualization Engine from the EJB Containers Visualization Engine from the DB Connection Visualization Engine from the J2C Connection Visualization Engine from the Thread Pools For additional information, see: v “Workspace link to Managing Server Visualization Engine” on page 225 v “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal You can access the Managing Server Visualization Engine from links in the ITCAM Agent for WebSphere Applications workspaces. When you access the Managing Server Visualization Engine in this way, the Managing Server Visualization Engine displays in a browser view inside a workspace. The Tivoli Enterprise Portal navigation tree is automatically hidden in the workspace. To show or hide the Tivoli Enterprise Portal navigation tree, click the small black arrow on the left side of the window. The following table displays a list of Tivoli Enterprise Portal workspaces that have links to the Managing Server Visualization Engine. Table 15. Tivoli Enterprise Portal workspaces that have links to Managing Server Visualization Engine Workspace: Table View Name WebSphere Agent Summary Status > Application Servers WebSphere Agent Summary Status > Application Servers WebSphere Agent Configuration > Application Servers Number of links to Managing Server Visualization Engine Link Name Link Target Pages Managing Server Visualization Engine Pre-populated information in the link page to Managing Server Visualization Engine 2 v Server Activity Display – Active Requests The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. v Diagnostic Server Activity Display v Diagnostic In-Flight Request Search v In-Flight Request Search Chapter 4. ITCAM Agent for WebSphere 229 Table 15. Tivoli Enterprise Portal workspaces that have links to Managing Server Visualization Engine (continued) Workspace: Table View Name OS Stack > Current OS Stack Summary Number of links to Managing Server Visualization Engine Link Name Link Target Pages Managing Server Visualization Engine Pre-populated information in the link page to Managing Server Visualization Engine 3 v Server Activity Display – Active Requests The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. v Diagnostic Server Activity Display v Diagnostic In-Flight Request Search v In-Flight Request Search v Using the v <platform dynamic OS> workspace <platform> link to the is one of corresponding the OS agent following workspace. operating For z/OS, the systems: link is to Linux, OMEGAMON UNIX, XE for z/OS. Windows or z/OS JVM Stack Trend >JVM Stack Trend 230 1 ITCAM for Application Diagnostics: User Guide Diagnostic Memory Leak Memory Leak Analysis The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. Table 15. Tivoli Enterprise Portal workspaces that have links to Managing Server Visualization Engine (continued) Workspace: Table View Name Request Analysis > Requests – Current Interval Number of links to Managing Server Visualization Engine Link Name Link Target Pages Managing Server Visualization Engine 3 v Server Activity Display – Recent Requests Pre-populated information in the link page to Managing Server Visualization Engine v The Group Server dropdown menu is pre-populated v Diagnostic based on data v In-Flight In-Flight collector Requests Request information Search v SMF Data (for from Tivoli z/OS data v Diagnostic Enterprise collectors SMF Data workspace. only) (z/OS only) v Content in Request Detail column of Requests table view in Tivoli Enterprise Portal is pre-populated in the following fields: v Diagnostic Recent Completed Requests – Recent Requests: Client Request – In-Flight Request Search: Search Request/ Transaction field Garbage Collection Analysis >Garbage Collection Analysis 1 Diagnostic Memory Leak Memory Leak Analysis The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. Thread Pools >Thread Pools 1 Diagnostic JVM Thread Display The Group Server dropdown menu is pre-populated based on data collector information from Tivoli Enterprise workspace. JVM Thread Display Chapter 4. ITCAM Agent for WebSphere 231 Table 15. Tivoli Enterprise Portal workspaces that have links to Managing Server Visualization Engine (continued) Workspace: Table View Name Datasources > Datasources – Current Interval Number of links to Managing Server Visualization Engine Link Name Link Target Pages Managing Server Visualization Engine 1 Server Activity The Group Server Display – Active dropdown menu Requests is pre-populated based on data collector information from Tivoli Enterprise workspace. Web Applications >Web Applications EJB Containers >EJB Containers Diagnostic Server Activity Display Pre-populated information in the link page to Managing Server Visualization Engine JMS Summary >JMS Summary – Current Interval DB Connection Pools > DB Connection Pools J2C Connection Pools > J2C Connection Pools The Server Group feature that displays at the top of these pages applies to the Managing Server Visualization Engine. When you access any of these pages this page from the Tivoli Enterprise Portal the information in the Groups and Servers fields is automatically populated with the data collector associated with the link and workspace you selected in the Tivoli Enterprise Portal. Groups are a set of application servers which have similar functionality. All configured data collectors are automatically in the Unassigned Servers Group. The relationship between Server Group and data collector is many to many. A data collector can belong to one or more server groups. A server group can have one or more data collectors. You can add data collectors to groups using the Server Management functionality in the Managing Server Visualization Engine. For more information about adding data collectors to Server Groups, refer to the Composite Application Manager Help in the Managing Server Visualization Engine interface. The Server Activity Display section has three tabs. v Active Requests: provides real time request or transaction data for an application server at the time the page displays. v Recent Requests: displays the last 100 or less completed request or transaction data for an application server. v Lock Contentions: displays requests that are hanging because they are waiting on a lock. The data shows data that is currently locked and the item that is waiting to be locked. The Active Requests tab and the Recent Requests tab have a toolbox icon You can click this icon to access direct links to the following features: 232 ITCAM for Application Diagnostics: User Guide . v v v v v JVM Display System Resources Monitoring On Demand Data Collector Properties Trap and Alert Management When you access the Managing Server Visualization Engine in this way, the Managing Server Visualization Engine displays in a browser view inside a workspace. The Tivoli Enterprise Portal navigation tree is automatically hidden in the workspace. To show or hide the Tivoli Enterprise Portal navigation tree, click the small black arrow on the left side of the window. Creating links to the Managing Server Visualization Engine using the Link Wizard Throughout the Tivoli Enterprise Portal, you can use the Link Wizard to manually create links to the Managing Server Visualization Engine. Creating links You can access the Link Wizard feature from other views and workspaces in the Tivoli Enterprise Portal. 1. To access the Link Wizard, from any of the tables or views, right click the link and click Link Wizard. icon 2. Follow the steps in the wizard to do one of the following actions: v Create a new link. v Modify an existing link. v Delete one or more links. 3. Type the name and description of the link. 4. Choose one to the following options with the aid of the descriptions in the Link Wizard. v Dynamic v Absolute v Relative 5. Choose the option you want to use. Follow the instructions in the help within the application until you get to the Workspace Link Wizard Parameters page. Adding parameters to the Link Wizard When you get to the Workspace Link Wizard Parameters page in the Link Wizard you will need to manually add these two symbols VEHOSTPORT and VEPATH and add information to these parameters. There are two predefined workspaces which have an embedded browser as its only view. v Diagnostic Link for Agent. Choose this workspace if the link is from the agent level workspaces. v Diagnostic Link. Choose this workspace if the link is from the server level workspace. 1. 2. 3. 4. To add Symbols to the Link Wizard. Click Symbol and type VEHOSTPORT. Click OK to add the Symbol. To add an expression select VEHOSTPORT click Modify Expression. Basic Setup: In the text field, type the expression you want to add. The value for the VEHOSTPORT is <your ve host>:<your ve port>. For example, if in Chapter 4. ITCAM Agent for WebSphere 233 your environment, the Managing Server Visualization Engine is installed on host1, with port 9080, then the VEHOSTPORT value is: “host1:9080”. Note: v Double quotation marks are required in the expression. v If your Managing Server Visualization Engine host or port information changes, then you need to update the link you defined and correct the VEHOSTPORT information manually. Advanced Setup: In the text field, type the expression you want to add. The value for the VEHOSTPORT value is CALL(candle.kwj.ve.ITCAMLinkHelper, getVehostportForWASServer, null, null, $kfw.TableRow:ATTRIBUTE.<table_name>.ORIGINNODE$). To get the expression: $kfw.TableRow:ATTRIBUTE.<table_name>.ORIGINNODE$, in the Expression Editor, click Symbol. 5. Click Origin Node and click OK to get $kfw.TableRow:ATTRIBUTE.<table_name>.ORIGINNODE$. When using the Advanced set up option, if your Managing Server Visualization Engine host or port information changes, ITCAM for Application Diagnostics custom code updates the changes automatically, you do not need to modify the links you defined manually to correct the information. 6. To add an expression, Basic Setup: the VEPATH value can be set as “am/ve/sad/threadList?mappingTEPUrl=true” Note: v Double quotation marks are required in the expression. v When you use the Basic Setup option, you need to select the server group and the server in the Managing Server Visualization Engine yourself when you log in to Managing Server Visualization Engine. To add an expression, Advanced Setup: Set the VEPATH value in the Expression Editor as:"am/ve/sad/threadList?mappingTEPUrl=true&server=" + CALL(candle.kwj.ve.ITCAMLinkHelper, getServerIdForWASServer, null, null, $kfw.TableRow:ATTRIBUTE.<table_name>.ORIGINNODE$) Where the correct expression of $kfw.TableRow:ATTRIBUTE.<table_name>.ORIGINNODE$ can be found by using Symbols view under Expression Editor: $kfw.TableRow:ATTRIBUTE.<table_name>.ORIGINNODE$ (Symbol: Origin Node). 7. Review the details in the Workspace Link Wizard - Summary. Click Finish. 8. If you use the Advanced Setup options in Step 4 and Step 6, modify the linkIsEnabled parameter in the Workspace Link Wizard Parameters view with expression: CALL(candle.kwj.ve.ITCAMLinkHelper, isEnabledForWASServer, null, null, $kfw.TableRow:ATTRIBUTE.<table_name>.ORIGINNODE$) && $kfw.TableRow:ATTRIBUTE.<table_name>.ASID$ != -3. In the Expression Editor, use the Symbols view to find expressions of $kfw.TableRow:ATTRIBUTE.<table_name>.ORIGINNODE$ (Symbol: Origin Node)and $kfw.TableRow:ATTRIBUTE.<table_name>.ASID$ (Symbol: ASID). 234 ITCAM for Application Diagnostics: User Guide Manually adding your own links to the Link Wizard The minimum settings are VEHOSTPORT and VEPATH. If you need to link to a different page, you need to change this value to corresponding URL path. Here is a list of frequently used Managing Server Visualization Engine Paths page URL paths: v Enterprise Overview: am/home v Server Overview: am/ve/serverOverview v v v v v v v Server Statistics Overview : am/avm/main Server Activity Display: am/ve/sad/threadList Memory Leak: am/ve/memory/leakReport JVM Thread Display: am/ve/jtd/threadGroupList Monitoring On Demand: am/ve/mod/console Trap and Alert Management: am/trap System Resources:am/ve/jmxbrowser Note: If you change the host port number at any point. You need to modify these two properties again and the kernel properties on the MS install will need to be restarted to identify the changes. Link anchor You can use the Link anchor option to access the Link anchor properties window. You can use the Link anchor properties window to display visual indicators on tables where customized links have been defined, and to establish a default link that opens when the user clicks the indicator. and click Link 1. From any of the tables, right click the choose link icon Anchor to display the Link anchor properties window. 2. Depending on the area of the table item you select, the window displays the following information: v Default no link v Show Link indicator v Link indicator always enabled. 3. For more information about the uses of these items refer to the help within the Link anchor properties window. “Workspace link to Managing Server Visualization Engine” on page 225 Alarm Manager workspace This workspace displays aggregated information about the alarms for each work manager. This workspace displays data provided by the Alarm Manager attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report Chapter 4. ITCAM Agent for WebSphere 235 resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains: v Highest Alarm Rate bar chart, which displays the five highest number of alarms fired per second v Work Manager Alarms report, which displays detailed information about the alarms for each work manager Accessing the Alarm Manager workspace To access this workspace from the Thread Pools workspace, use one of the following procedures: v Within the Navigator, right-click the Thread Pools entry; then from the pop-up menu, select Workspace > Alarm Manager. v From the primary Tivoli Enterprise Portal menu, pull down the View menu, and select Workspace > Alarm Manager. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Allocation Failures workspace This workspace summarizes all the heap-allocation failures that occurred within the Java Virtual Machine (JVM) over the current interval and that caused the JVM to initiate garbage collection. This workspace displays data provided by the Allocation Failure attributes. Note to Solaris and HP-UX users: Allocation-failure information is not recorded on these platforms; hence this workspace is always empty. The predefined workspace contains the following items: v Allocation Failure Elapsed Times bar chart, which displays the number of allocation failures during the current interval v Heap Usage bar chart, which displays the heap usage for this JVM. The bar's fail over gives the allocation-failure ID number followed by a range of recording times. This allocation-failure number displays in the Allocation Failures report and associates each bar with that particular row within the report v Allocation Failures report, which displays information about the heap-allocation failure that caused the Java Virtual Machine hosting the application server to invoke its garbage-collection routine. The Allocation Failures report includes the ASID field. Accessing the Allocation Failures workspace To access this workspace from the Garbage Collector Activity workspace, complete the following steps: 236 ITCAM for Application Diagnostics: User Guide v From the Garbage Collection Analysis report, right-click the link icon to the left of any row; then, from the pop-up menu, click Allocation Failures. Note that in the Allocation Failure workspace, the ASID is displayed in the Allocation Failures report. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Selected Application - Application Trend at L1 workspace This workspace displays access trends for individual applications. It provides trend information for request and response times. It also provides trend information for application errors. This workspace provides a broad overview of the health of an application and draws data from multiple attribute groups. This workspace displays data provided by the Request Analysis and Request Times and Rates attribute groups. The predefined workspace contains: v Selected Application Summary report displays application name, average request response time, average request completion rate, error rate, and ASID. For TEMA running on z/OS, region ID can be found in the ASID column. v Response Time Trend chart displays summary trend times for the overall response time for the selected application. v Error Rate Trend chart displays the error rate for the application. v Request Rate Trend chart displays the number of requests completed per second for the application. Accessing the Selected Application - Configuration workspace Access this workspace using one of the following methods: v Double click any application in the Application Server Summary workspace. v Right-click on application icon in the Application Server Summary workspace and select Link To, then select Application Trend at L1. For additional information, see: v Application Server Summary Workspace v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Selected Application - Application Trend at L2/L3 workspace This workspace displays access trends for individual applications. It provides trend information for request and response times. It also provides trend information for application errors. This workspace provides a broad overview of the health of an application and draws data from multiple attribute groups. This workspace displays data provided by the Request Analysis and Request Times and Rates attribute groups. The predefined workspace contains: Chapter 4. ITCAM Agent for WebSphere 237 v Selected Application Summary report displays application name, average request response time, average request completion rate, error rate, and ASID. For TEMA running on z/OS, region ID can be found in the ASID column. v Response Time Trend chart displays trend times for the following different elements in milliseconds: JNDI, JMS, Application, JCA, Servlet and EJB. v Error Rate Trend chart displays the error rate for the application. v Request Rate Trend chart displays the number of requests completed per second for the application. Accessing the Selected Application - Configuration workspace Access this workspace using one of the following methods: v Double click any application in the Application Server Summary workspace. v Right-click on application icon in the Application Server Summary workspace and select Link To, then select Application Trend at L2/L3. For additional information, see: v Application Server Summary Workspace v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Application Health workspace The workspace displays the information about the real-time health status of applications monitored by the Tivoli Enterprise Monitoring Agent. The health status information is collected from the following sources. v Request Metrics - performance data that measures request execution time collected from the ITCAM instrumentation points in the application code. v Resource Metrics - pool usage and container performance statistics collected from the corresponding PMI modules or MBeans. v GC Metrics - metrics on garbage collection frequency and performance collected from parsing of the GC verbose log file when it is enabled for the application server JVM. v OS metrics - metrics collected about the JVM process and the whole system execution, such as CPU used percentage, paging rate, etc. Additionally, the monitoring agent uses thresholds, called Application Health Indicators, to determine the quality of the application service. For request response times, thresholds are assigned automatically during baselining. You can also manually customize the thresholds. There are three monitored application tiers evaluated for health status. v Client Tier provides performance data and status of application execution in servlets/JSPs or portal containers as well as corresponding thread pools servicing these containers. v Application Tier provides application execution metrics of EJB containers and custom requests. v Backend Tier provides application execution in JDBC, JCA, JMS, JNDI API calls. This workspace displays data provided by the Application Health Status attributes. By default, the predefined workspace has the following views: 238 ITCAM for Application Diagnostics: User Guide v Situation Event console view, which shows the event console with activity associated with the Application Health Summary Navigator item and any other workspaces in the group, as well as linked workspaces. The Navigator will display an event icon overlaid on the Application Health Summary node when a situation becomes true. The report is useful when multiple alerts are raised as you can see them all in a single filtered view. v Application Health Summary report, which shows the report of the application name, status, and health indicator for client, application, and backend tiers health status. Note: Due to the runtime MBeans configuration, the Tivoli Enterprise Monitoring Agent (TEMA) can only find composition units of business-level applications that associate with either web or EJB modules. Accessing the Application Health Summary workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux® Systems, z/OS Systems or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the note you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere Application server entry of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Application Health entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Application Registry workspace This workspace displays the information about the server configuration for the application. This workspace displays data provided by the Application Monitoring Configuration attributes. The predefined workspace contains: v Situation Event Console report, which shows the event activity for situations associated with the current Navigator item. The Navigator alerts you when a situation becomes true by overlaying the Navigator item with an event indicator. This report is useful when multiple alerts are raised and you might not know newly arrived alerts just by looking at the indicator. v Application Configuration report, which shows the configurations that are discovered, stored and managed for WebSphere applications running within that application server. Accessing the Application Registry workspace To access this workspace from the Application Health Summary workspace, use one of the following procedures: Chapter 4. ITCAM Agent for WebSphere 239 v Within the Navigator, right-click the Application Health entry; then, from the pop-up menu, click Workspace > Application Registry. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Application Registry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Cache Analysis workspace This workspace reports information about the dynamic cache. WebSphere Application Server consolidates several caching activities, including servlets, Web services, and WebSphere commands, into one service called the dynamic cache. These caching activities work together to improve application performance. The activities share many configuration parameters, which are set in an application server's dynamic cache service. The dynamic cache works within an application server's Java Virtual Machine (JVM), intercepting calls to cacheable objects, for example, through a servlet's service method or a command's execute method. The dynamic cache either stores the object's output to or serves the object's content from the dynamic cache. This workspace displays data provided by both the Dynamic Cache attributes and the Dynamic Cache Templates attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on-demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v In-memory Cache Sizes - History graph, which shows the sizes of in-memory cache entries for the specified interval v Highest Miss Rates bar chart, which shows the most frequent cache entry misses (per second). The Y-axis headings correspond to the row number of the Dynamic Cache Templates report v Dynamic Cache report, which displays information about the dynamic cache, including cache sizes and timeout rates v Dynamic Cache Templates report, which displays information about the cache template data. A cache template is an object type defined by a cache policy specified in WebSphere Application Server file cachespec.xml. A cache policy, which is specified the caching rules and indicates what will be cached, the invalidation and timeout conditions, and other data 240 ITCAM for Application Diagnostics: User Guide Accessing the Cache Analysis workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Cache Analysis entry. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Client Communications workspace This workspace provides overall Service Integration Bus communication performance data and counters for all clients connected to this application server. WebSphere Application Server 5.1 based products do not support this workspace. This workspace displays data provided by the Client Communications attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Connection Count - History graph, which shows the number of API sessions used by clients that were network connected to this application server v Error Count - History graph, which shows the communication errors that occurred and that resulted in the disconnection of a network connection to a client v Communication Statistics report, which displays information about client communications, including API connections, errors, reads, writes, sent priority, received priority, MessageSent priority, and MessageReceived priority Accessing the Client Communications workspace To access this workspace from the Platform Messaging workspace, use one of the following procedures: Chapter 4. ITCAM Agent for WebSphere 241 v Within the Navigator, right-click the Platform Messaging entry; then from the pop-up menu, click Workspace > Client Communications. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Client Communications. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Container Object Pools workspace This workspace displays aggregate information about the object pools associated with Enterprise Java Beans (EJBs). It provides a view of pool performance for all Enterprise Java Beans deployed to each container. This workspace displays data provided by the Container Object Pools attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Object Pool Rates - History graphs, which show the retrieval, return, discard, and drain rates for the EJBs in each EJB container v Container Object Pools report, which displays: – Aggregated information for each defined EJB container that aggregates bean object pool performance for all Enterprise beans deployed to that container – Aggregated information for the application server that aggregates bean object pool performance data for all Enterprise beans deployed to the application server Accessing the Container Object Pools workspace To access this workspace from the EJB Containers workspace, use one of the following procedures: v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Container Object Pools. v Within the Navigator, right-click the EJB Containers entry; then, from the pop-up menu, click Workspace > Container Object Pools. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces 242 ITCAM for Application Diagnostics: User Guide Container Transactions workspace This workspace displays data about the activities and transactions running in each application server. This workspace displays data provided by the Container Transactions attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Transaction Rates - History graph, which shows the per-second begin, commit, and rollback rates over time for local and global transactions v Transaction Durations - History graph, which shows the amount of time it takes to complete local and global transactions v Container Transactions report, which displays performance information for global and local transactions that run in each defined EJB container and an aggregated value for all transactions that run in the application server Accessing the Container Transactions workspace To access this workspace from the EJB Containers workspace, use one of the following procedures: v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Container Transactions. v Within the Navigator, right-click the EJB Containers entry; then, from the pop-up menu, click Workspace > Container Transactions. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Data sources workspace The data sources workspace displays statistical data for the data sources that your applications reference when accessing databases. This workspace displays data provided by the Datasources attributes. The predefined workspace contains the following items: v Worst Datasource Query Times bar chart, which shows the longest times (in milliseconds) the application spent waiting to retrieve data from the database during the specified interval Chapter 4. ITCAM Agent for WebSphere 243 v Worst Datasource Update Times bar chart, which shows the longest times (in milliseconds) the application spent updating data within the database during the specified interval v Datasources - Current Interval report, which displays database usage information. For example, this report shows traffic information such as the time the application spent trying to connect to the database and total and average processing times for database queries and updates. Accessing the Data sources workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Datasources entry. Selected Data source - History workspace The Selected Datasource - History workspace displays the historical information that corresponds to the information in the Datasource workspace for a selected data source. Historical information is collected over a specific time span. See the online help for Tivoli Enterprise Portal for a detailed explanation of historical reporting. Accessing the Selected Data source - History workspace To access this workspace from the Datasource workspace, use one of the following procedures: v From the Datasources - Current Interval report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Datasource History. v From Worst Datasource Query Times bar chart or the Worst Datasource Update Times bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Datasource - History. Selected Data source - Datasource Trend workspace The Datasources Trend workspace displays information about datasource connections. This workspace displays data provided by the Datasources attributes. This predefined workspace contains the following items: v Current Datasources report displays datasource name, total wait time, connection rate, connection average wait time and connection max wait time. For TEMA running on z/OS, region ID can be found in the ASID column. v Total Wait Time chart displays the total time that applications had to wait for a connection to the data source. 244 ITCAM for Application Diagnostics: User Guide v Connection Rate Trend chart displays the number of connection requests created for the data source per second. v Connection Average and Max Time Trend chart display the average time in milliseconds and the worst-case time in milliseconds that applications had to wait for a connection. Accessing the Selected Data source - Datasource Trend workspace Right-click the Datasources workspace, select Workspace and then Datasource Trend workspace For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Accessing the Managing Server Visualization Engine from the Datasources workspace In the Tivoli Enterprise Portal, access the Datasources workspace. You can use the Diagnostic Server Activity Display link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. 1. In the Datasources - Current Interval window, right click the choose link icon then click Diagnostic Server Activity Display. 2. If this is your first time to access the Managing server Visualization Engine during a session, you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. Click OK to display the Server Activity Display page in the Managing Server Visualization engine. You can use this page to diagnose application problems, for example, slow transactions or high response times. 4. In a z/OS environment, right click the link icon on a row where the ASID column displays Summary. a. Click Selected Datasource- Servant Regions. b. In the Selected Datasource - Servant Regions table, right click the link icon on a row. c. Click Diagnostic Server Activity Display. 5. For more information about the options available in a z/OS environment, refer to “Region workspaces in a z/OS environment” on page 298 and “Accessing a Region workspace” on page 300. 6. The results in this page relate directly to the context from where you launched the link in the Tivoli Enterprise Portal. For more information about using the Server Activity Display page, and additional features refer to the Composite Application Manager help within the Managing Server Visualization Engine Interface. 7. To return to the previous workspace in the Tivoli Enterprise Portal interface at any time choose from the following options: v from the Tivoli Enterprise Portal desktop client, click the back arrow on your web browser. Chapter 4. ITCAM Agent for WebSphere 245 v from the Tivoli Enterprise Portal browser client, click the browser back arrow. For additional information, see: v v “Workspace link to Managing Server Visualization Engine” on page 225. “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 DB Connection Pools workspace This workspace displays information about the database connection pools associated with each application server. You can use this workspace to monitor Java Database Connectivity (JDBC) performance for WebSphere Application Server applications. This workspace displays data provided by the DB Connection Pools attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of the high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Highest Average Pool Sizes bar chart, which shows the largest average size (that is, number of connections) for each database connection pool v Worst Wait Times bar chart, which shows the worst wait times (in milliseconds) for each database connection pool v Highest Allocation Rates bar chart, which shows the rate at which database connections are being made for each connection pool v DB Connection Pools report, which displays information about the database connection pool for each defined data source. The report also displays an aggregated value that aggregates over all data sources. For example, this report displays the number of threads waiting for a connection and the number of connections created and released Accessing the DB Connection Pools workspace To access this workspace, complete the following steps: 1. In the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server entry of your choice. 246 ITCAM for Application Diagnostics: User Guide 5. Within that server list of available WebSphere Application Server workspaces, click the DB Connection Pools entry. Selected DB Connection Pool - History workspace The Selected DB Connection Pool - History workspace displays historical information that corresponds to the information in the DB Connection Pools workspace for a selected connection pool. Historical information is collected over a specific time span. See the online help for Tivoli Enterprise Portal for a detailed explanation of historical reporting. Accessing the Selected DB Connection Pool - History workspace To access this workspace from the DB Connection Pools workspace, use one of the following procedures: v From the DB Connection Pools report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected DB Connection Pool - History. v From the Highest Average Pool Sizes bar chart, the Worst Wait Times bar chart, or the Highest Allocation Rates bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected DB Connection Pool - History. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Accessing the Managing Server Visualization Engine from the DB Connection Pools workspace In the Tivoli Enterprise Portal access the DB Connection Pools workspace. You can use the Diagnostic Server Activity Display link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. 1. In the DB Connection Pools window, right click the choose link icon then click Diagnostic Server Activity Display. 2. If this is your first time to access the Managing Server Visualization Engine during a session, you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. 4. Click OK to display the Server Activity Display page in the Managing Server Visualization engine. You can use link to diagnose application problems, for example, slow transactions or high response times. 5. The results relate directly to the context from where you launched the link in the Tivoli Enterprise Portal. For more information about using the Server Activity Display page and additional features, refer to the Composite Application Manager help within the Managing Server Visualization Engine Interface. 6. To return to the previous workspace in the Tivoli Enterprise Portal interface at any time choose from the following options: v from the Tivoli Enterprise Portal desktop client, click the back arrow on your web browser. Chapter 4. ITCAM Agent for WebSphere 247 v from the Tivoli Enterprise Portal browser client, click the browser back arrow. For additional information, see: v “Workspace link to Managing Server Visualization Engine” on page 225 v “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 DCS Stacks workspace This workspace displays aggregated information about each DCS stack within the entire WebSphere Application Server domain, including multiple nodes and servers. This workspace displays data provided by the DCS Stack attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Highest Message Buffer Reallocations bar chart, which displays the highest number of message buffer reallocations that occurred as a result of inadequate buffer size v Most Sent Messages bar chart, which shows most frequent number of message buffer reallocations that occurred as a result of inadequate buffer size v High Severity Congestion Events bar chart, which shows the number of times that a high severity congestion event for outgoing messages was raised v DCS Statistics report, which displays information for the DCS stack data, including incoming and outgoing message size, sent messages, and high severity congestion events Accessing the DCS Stacks workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the DCS Stacks entry. 248 ITCAM for Application Diagnostics: User Guide For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Destinations workspace In this workspace, you can view performance data and counters for the destinations of a selected messaging engine. A destination is a virtual location within a service integration bus, to which applications attach as producers, consumers, or both, to exchange messages. There are two types of destinations, queues and topic spaces. WebSphere Application Server 5.1 based products do not support this workspace. This workspace displays data provided by both the Topic Spaces attributes and the Queue attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains: v Queue report, which displays information about the queue data. A queue is a destination for point-to-point messaging v Topic Spaces report, which displays information about the topic space data. A topic space is a destination for publish/subscribe messaging Accessing the Destinations workspace To access this workspace from the “Messaging Engines workspace” on page 264, complete one of the following steps: v From the Messaging Engines report, right-click the link icon to the left of any row; then, from the pop-up menu, click Destinations. v From Average Local Wait Time - History graph, Expired Messages - History graph, Incomplete Topic Publications - History graph, or Total Published History graph, right-click any bar; then, from the pop-up menu, click Link To > Destinations. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Durable Subscriptions workspace In this workspace, you can view statistic counters for the durable subscriptions of a selected topic. Chapter 4. ITCAM Agent for WebSphere 249 The default messaging provider supports the use of durable subscriptions to topics. This enables a subscriber to receive a copy of all messages published to a topic, even messages published during periods of time when the subscriber is not connected to the server. WebSphere Application Server 5.1 based products do not support this workspace. This workspace displays data provided by the Durable Subscriptions attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Durable Subscriptions report, which displays information about durable subscriptions that pertain to a selected topic, including the number of messages consumed, and message wait time Accessing the Durable Subscriptions workspace To access this workspace from the Destinations workspace, complete the following step: v From the Topic Spaces report, right-click the link icon to the left of any row; then, from the pop-up menu, click Durable Subscriptions. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces EJB Containers workspace This workspace displays aggregated information about each defined EJB. This workspace displays aggregated bean performance data for all Enterprise beans deployed to an EJB container. It also displays aggregated information for the application server that aggregates bean performance data for all Enterprise beans deployed on the application server. This workspace displays data provided by the EJB Containers attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. 250 ITCAM for Application Diagnostics: User Guide v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on-demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Method Average Response Time - History graph, which shows the average response time for methods invoked by the EJBs in the container v Method Invocation Rate - History graph, which shows the rate at which an EJB container's methods were invoked v EJB Containers report, which displays aggregated information for each defined EJB container that aggregates bean performance data for all Enterprise beans deployed to that container. The report also displays aggregated information for the application server that aggregates bean performance data for all Enterprise beans deployed to the application server. For example, this report displays load values, response times, and lifecycle activities for Enterprise beans Accessing the EJB Containers workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the EJB Containers entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Accessing the Managing Server Visualization Engine from the EJB Containers workspace In The Tivoli Enterprise Portal access the EJB Containers workspace. You can use the Diagnostic Server Activity Display link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. then click 1. In the EJB Containers window, right click the choose link icon Diagnostic Server Activity Display. 2. If this is your first time to access the Managing Server Visualization Engine during a session, you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. Chapter 4. ITCAM Agent for WebSphere 251 4. Click OK to display the Server Activity Display page in the Managing Server Visualization engine. You can use link to diagnose application problems, for example, slow transactions or high response times. 5. The results relate directly to the context from where you launched the link in the Tivoli Enterprise Portal. For more information about using the Server Activity Display page and additional features, refer to the Composite Application Manager help within the Managing Server Visualization Engine Interface. 6. To return to the previous workspace in the Tivoli Enterprise Portal interface at any time choose from the following options: v from the Tivoli Enterprise Portal desktop client, click the back arrow on your web browser. v from the Tivoli Enterprise Portal browser client, click the browser back arrow. For additional information, see: v “Workspace link to Managing Server Visualization Engine” on page 225 v “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 Enterprise Java Beans workspace This workspace reports information about the each Enterprise Java Bean (EJB) defined for an EJB container. The workspace provides information about these beans that relates to their identity, instrumentation level settings, creation and destruction of bean objects, response times, invocations, calls, and rates for retrievals, returns, and discards. This workspace displays data provided by the Enterprise Java Beans attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Worst Method Response Times bar chart, which shows the worst response times (in milliseconds) for methods invoked by each bean instance v Highest Method Invocation Rates bar chart, which shows the methods that are invoked most often by each bean instance v Enterprise Java Beans report, which shows performance information about each EJB deployed to the application server. This report displays information about bean activity, including the rates at which beans are being instantiated and destroyed 252 ITCAM for Application Diagnostics: User Guide Accessing the Enterprise Java Beans workspace You access this workspace from the EJB Containers workspace. To list the EJBs for all containers, use one of the following procedures: v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Enterprise Java Beans. v Within the Navigator, right-click the EJB Containers entry; then, from the pop-up menu, click Workspace > Enterprise Java Beans. To see the EJBs referenced by a specific EJB container, complete the following step: v From the EJB Containers report, right-click the link icon to the left of any row; then, from the pop-up menu, click Enterprise Java Beans. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Garbage Collections - Selected Allocation Failure workspace This workspace provides detailed information about the garbage-collection cycles that occurred in response to a specific heap-allocation failure that occurred within the Java Virtual Machine. This workspace displays data provided by the Garbage Collection Cycle attributes. Note to Solaris and HP-UX users: Allocation-failure information is not recorded on these platforms. Consequently, this workspace is always empty. The predefined workspace contains the following items: v GC Elapsed Times bar chart, which breaks down the mark, sweep, and compact times (in milliseconds) for each garbage-collection cycle that occurred for the selected allocation failure v Heap Usage bar chart, which displays the JVM's heap usage (kilobytes in use, freed, and free at start of garbage collection) for each garbage-collection cycle v Garbage Collections - Selected Allocation Failure report, which displays information about a single garbage-collection cycle that the JVM hosting the application server performed. For example, this report displays the free heap space both before and after garbage collection, the heap space freed, and the number of objects moved during garbage collection. For TEMA running on z/OS, region ID can be found in the ASID column. Accessing the Garbage Collections - Selected Allocation Failure workspace To access this workspace from the Allocation Failures workspace, use one of the following procedures: v From the Allocation Failures report, right-click the link icon to the left of any row; then, from the pop-up menu, click Garbage Collections - Selected Allocation Failure. v From the Allocation Failure Elapsed Times bar chart or the Heap Usage History bar chart, right-click any bar; then, from the pop-up menu, click Link To > Garbage Collections - Selected Allocation Failure. For additional information, see: Chapter 4. ITCAM Agent for WebSphere 253 v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Garbage Collection Analysis workspace This workspace summarizes all the Java Virtual Machine's (JVM) garbage-collector activity over a user-defined interval. The JVM generates detailed garbage collection logs for an application server when started with the verbose:gc runtime parameter. This workspace displays data provided by the Garbage Collection Analysis attributes. The predefined workspace contains the following items: v Garbage Collection Rate - History graph, which displays the rate at which the garbage-collection algorithm is being invoked v Heap Usage - History bar chart, which displays the high-water mark of free storage (in kilobytes) available in the heap after each garbage-collector run v Percentage of Time Garbage Collector Running - History graph, which displays the percentage of real time the garbage collector was running during the current interval, for each server region v Garbage Collection Analysis report, which displays information about the garbage-collection activities within the Java Virtual Machine that is hosting the application server. For example, this report displays the number of times the collector ran during the interval and the resulting number of objects that the collector freed Accessing the Garbage Collection Analysis workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the name of the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Garbage Collection Analysis entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Accessing the Managing Server Visualization Engine from the Garbage Collection Analysis workspace In the Tivoli Enterprise Portal navigate to the Garbage Collection Analysis workspace. You can use the Diagnostic Server Activity Display link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. 1. In the Garbage Collection Analysis window, right click the choose link icon then click Diagnostic Memory Leak. 254 ITCAM for Application Diagnostics: User Guide 2. If this is the first time you access the Managing Server Visualization Engine you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. 4. Click OK to display the Memory Leak Confirmation report page in the Managing Server Visualization Engine. You can use this page to diagnose memory leak problems. 5. In a z/OS environment, right click the link icon on a row where the ASID column displays Summary. a. Click Garbage Collection Analysis Servant Regions. b. In the Garbage Collection Analysis - Servant Regions table, right click the link icon on a row. c. Click Diagnostic Memory Leak. For information about Creating a Memory Leak Confirmation report in this page, and additional features refer to the Composite Application Manager help within the Managing Server Visualization Engine Interface. 7. To return to the previous workspace in the Tivoli Enterprise Portal interface at any time choose from the following options: v from the Tivoli Enterprise Portal desktop client, click the back arrow on your web browser. 6. v from the Tivoli Enterprise Portal browser client, click the browser back arrow. For additional information, see: v v “Workspace link to Managing Server Visualization Engine” on page 225. “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 High Availability Manager workspace The High Availability Manager workspace provides aggregated information about high availability managers. This workspace displays data provided by the High Availability Manager attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set the Resource Data Collection Method configuration value to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Local Group - History graph, which shows the number of local groups. Chapter 4. ITCAM Agent for WebSphere 255 v Group State Rebuild Time - History graph, which shows the time taken to rebuild the global group state in milliseconds. v High Availability Manager report, which displays information about the high availability manager, including group state rebuild time, bulletin-board subjects, bulletin-board subscriptions, bulletin-board rebuild time, and local bulletin-board subjects Accessing the High Availability Manager workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the note you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the High Availability Manager entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces IMAP/POP workspace This workspace provides aggregated statistics of the usage information about the IMAP service and the POP3 service connectivity, especially for the performance-related connectivity. This workspace displays data provided by the Workplace Mail IMAP/POP attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. Note: The following WebSphere Application Diagnostics 7.1 features do not support the IMAP/POP workspace: configuration and links to the Managing Server Visualization Engine from the Tivoli Enterprise Portal. The predefined workspace contains the following items: v Active Sessions bar chart, which displays the number of active sessions during the sampling interval 256 ITCAM for Application Diagnostics: User Guide v Authentication Failures bar chart, which displays the number of authentications failures during the sampling interval v Workplace Mail report, which displays detailed information about the workplace mail for each protocol Accessing the IMAP/POP workspace To access this workspace from the Workplace Mail workspace, use one of the following procedures: v Within the Navigator, right-click the Workplace Mail entry; then from the pop-up menu, click Workspace > IMAP/POP. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > IMAP/POP. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces J2C Connection Pools workspace This workspace reports information about resource adapters and connectors that adhere to J2C, the WebSphere Application Server implementation of the J2EE Connector Architecture (JCA). Data counters for this category contain usage information about the J2C connection pools that enable enterprise beans to connect to and interact with systems such as the Customer Information Control System (CICS) and the Information Management System (IMS). This workspace displays data provided by the J2C Connection Pools attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Highest Average Pool Sizes bar chart, which shows the largest average number of managed connections for each J2C connection pool. The Y-axis headings correspond to the row number of the J2C Connection Pools report v Worst Wait Times bar chart, which shows the worst wait time (in milliseconds) for each of the J2C connection pools. The y-axis headings correspond to the row number of the J2C Connection Pools report v Highest Allocation Rates bar chart, which displays the highest managed-connection creation, destruction, and allocation rates (in events per second) Chapter 4. ITCAM Agent for WebSphere 257 v J2C Connection Pools report, which displays information about connectors that adhere to J2C. For example, this report displays the number of managed connections or physical connections and the total number of connections or connection handles Accessing the J2C Connection Pools workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the J2C Connection Pools entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Accessing the Managing Server Visualization Engine from the J2C Connection Pools workspace In The Tivoli Enterprise Portal access the J2C connection pools workspace. You can use the Diagnostic Server Activity Display link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. 1. In the J2C connection pools window, right click the choose link icon then click Diagnostic Server Activity Display. 2. If this is your first time to access the Managing Server Visualization Engine during a session, you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. 4. Click OK to display the Server Activity Display page in the Managing Server Visualization engine. You can use link to diagnose application problems, for example, slow transactions or high response times. 5. The results relate directly to the context from where you launched the link in the Tivoli Enterprise Portal. For more information about using the Server Activity Display page and additional features, refer to the Composite Application Manager help within the Managing Server Visualization Engine Interface. 6. To return to the previous workspace in the Tivoli Enterprise Portal interface at any time choose from the following options: v from the Tivoli Enterprise Portal desktop client, click the back arrow on your web browser. v from the Tivoli Enterprise Portal browser client, click the browser back arrow. 258 ITCAM for Application Diagnostics: User Guide For additional information, see: v “Workspace link to Managing Server Visualization Engine” on page 225 v “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 JMS Summary workspace The JMS Summary workspace displays information about queues being used by your applications using the Java Message Service (JMS) interface. The JMS Summary workspace also provides information about how WebSphere Application Server applications are using WebSphere MQ. It displays such information as the number of messages read and written and which queue managers and queues were used during the interval. This workspace displays data provided by the JMS Summary attributes. The predefined workspace contains the following items: v Worst JMS Send Times bar chart, which displays the longest times (in milliseconds) your application spent putting messages onto a queue during the interval v Worst JMS Receive Times bar chart, which displays the longest times (in milliseconds) your application spent getting messages from a queue during the interval v Worst JMS Browse Times bar chart, which displays the longest times (in milliseconds) your application spent browsing messages on a queue during the interval v JMS Summary - Current Interval report, which displays detailed information about how the WebSphere Application Server uses messaging middleware (that is, WebSphere MQ) using JMS. Details include the send, receive, browse, and publish times for your application. It also includes such information as, which queue managers and queues are being used and how many messages are being read and written Accessing the JMS Summary workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the JMS Summary entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Chapter 4. ITCAM Agent for WebSphere 259 Accessing the Managing Server Visualization Engine from the JMS Summary workspace In The Tivoli Enterprise Portal access the JMS Summary workspace. You can use the Diagnostic Server Activity Display link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. 1. In the JMS Summary - Current interval window, right click the choose link then click Diagnostic Server Activity Display. icon 2. If this is your first time to access the Managing Server Visualization Engine during a session, you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. 4. Click OK to display the Server Activity Display page in the Managing Server Visualization engine. You can use this link to diagnose application problems, for example, slow transactions or high response times. 5. In a z/OS environment, right click the link icon on a row where the ASID column displays Summary. a. Click Selected JMS - Servant Regions. b. In the Selected JMS - Servant Regions table, right click the link icon on a row. c. Click Diagnostic Server Activity Display. 6. For more information about the options available in a z/OS environment, refer to “Region workspaces in a z/OS environment” on page 298 and “Accessing a Region workspace” on page 300. 7. The results in this page relate directly to the context from where you launched the link in the Tivoli Enterprise Portal. For more information about using the Server Activity Display page, and additional features refer to the Composite Application Manager help within the Managing Server Visualization Engine Interface. 8. To return to the previous workspace in the Tivoli Enterprise Portal interface at any time choose from the following options: v from the Tivoli Enterprise Portal desktop client, click the back arrow on your web browser. v from the Tivoli Enterprise Portal browser client, click the browser back arrow. For additional information, see: v “Workspace link to Managing Server Visualization Engine” on page 225. v “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 JVM Stack Trend workspace This workspace displays trend data regarding JVM CPU usage, JVM garbage collection, and JVM heap usage. This workspace displays data provided by the Application Server and Garbage Collection Analysis attribute groups. The predefined workspace contains: 260 ITCAM for Application Diagnostics: User Guide v JVM CPU Trend chart indicates the percentage of the JVM CPU used. v Percent GC Time Used chart v Heap Usage Trend chart Accessing the Selected Application - Configuration workspace Access this workspace using one of the following methods: v Double click the JVM icon in Resources workspace. v Right click the JVM icon in the Resources workspace and select Link To, then select JVM Stack Trend. For additional information see: v Resources and Applications workspaces v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Log Analysis workspace This workspace reports application server error and exception conditions as recorded in the application server's log file. This workspace displays data provided by both the Log Analysis attributes and DC Messages attributes. The predefined workspace contains the following items: v DC Message Events, which displays aggregated information about the messages from WebSphere Data Collector v Log Analysis report, which displays application server error and exception conditions as recorded in the application server log file, SystemOut.log. This information includes the exception severity as well as the ID and text of the associated message. In the Log Analysis report, if the PID value is displayed as -1, it indicates that the data collector is disconnected. If a WebSphere server shutdown occurs the connection between the data collector and TEMA is closed but the data collector continues to write to log files and TEMA processes these records but sets the PID value to -1. Accessing the Log Analysis workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Log Analysis entry. For additional information, see: v Organization of the predefined workspaces Chapter 4. ITCAM Agent for WebSphere 261 v Attribute groups used by the predefined workspaces Lotus Workplace Server workspace The Lotus Workplace Server workspace displays overall statistics for each application server being monitored by the Tivoli Enterprise Monitoring Agent. Note: The following WebSphere Application Diagnostics 7.1 features do not support Lotus Workplace Server: configuration and links to the Managing Server Visualization Engine from the Tivoli Enterprise Portal. The predefined workspace contains the following items: v Heap Usage - History bar chart, which displays free memory size and used memory size (in kilo bytes) within the WebSphere Application Server's heap over time. The chart's flyovers display the exact values This view displays data provided by the Garbage Collection Analysis attributes. v Response Time - History graph, which shows the server response time to requests over time This view displays data provided by the Request Times and Rates attributes. v Request Rate - History graph, which shows the rate at which requests have been received by this server over time This view displays data provided by the Request Times and Rates attributes. v Percent CPU Used - History graph, which shows the percentage of the CPU that this server consumed over time This view displays data provided by the Application Server attributes. v Application Server Summary report, which displays overall information about this WebSphere application server, including JVM statistics and CPU usage statistics This view displays data provided by the Application Server attributes. Accessing the Lotus Workplace Server workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, click the Lotus Workplace Server entry of your choice. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Messages Queues workspace This workspace provides aggregated statistics about the usage information about the message delivery. This workspace displays data provided by the Workplace Mail Queues attributes. 262 ITCAM for Application Diagnostics: User Guide Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. Note: The following WebSphere Application Diagnostics 7.1 features do not support the Messages Queues workspace: configuration and links to the Managing Server Visualization Engine from the Tivoli Enterprise Portal. The predefined workspace contains the following items: v Queue Messages bar chart, which displays the number of message in the ready, retry, unprocessed, and dead state in the queue during the sampling interval v Workplace Mail Message Queues report, which displays detailed information about the state of messages in each queue Accessing the Messages Queues workspace To access this workspace from the Workplace Mail workspace, use one of the following procedures: v Within the Navigator, right-click the Workplace Mail entry; then from the pop-up menu, click Workspace > Messages Queues. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Messages Queues. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Messaging Engine Communications workspace This workspace provides aggregated counter statistics for all the messaging engines being hosted by the current application server. WebSphere Application Server 5.1 based products do not support this workspace. This workspace displays data provided by the Messaging Engine Communications attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. Chapter 4. ITCAM Agent for WebSphere 263 v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Situation Event Console report, which shows the event activity for situations associated with the current Navigator item and any items within the branch. The Navigator alerts you when a situation becomes true by overlaying the Navigator item with an event indicator. This report is useful when multiple alerts are raised and you might not know newly arrived alerts just by looking at the indicator. v Messaging Engine Communications report, which displays information about the messaging engine communications, including API connections, errors, reads, writes, message written and message read. Accessing the Messaging Engine Communications workspace To access this workspace from the Platform Messaging workspace, use one of the following procedures: v Within the Navigator, right-click the Platform Messaging entry; then, from the pop-up menu, click Workspace > Messaging Engine Communications. v From the primary Tivoli Enterprise Portal menu, click View >Workspace > Messaging Engine Communications. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Messaging Engines workspace In this workspace, you can view of performance counters of the Messaging Engines supported by a server. WebSphere Application Server 5.1 based products do not support this workspace. This workspace displays data provided by the Messaging Engines attributes. Note: v This workspace reports zeros for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Average Local Wait Time - History graph, which shows the historical time spent by messages on this durable subscription on consumption 264 ITCAM for Application Diagnostics: User Guide v Expired Messages - History graph, which shows the number of report-enabled messages that expired while on this queue v Incomplete Topic Publications - History graph, which shows the number of publications not yet received by all historical subscribers. v Total Published - History graph, which shows the historical number of publications to the message engines v Messaging Engines report, which displays the aggregated information about each messaging engine. A messaging engine is a server component that provides the core messaging functionality of a service integration bus. A messaging engine manages bus resources and provides a connection point for applications Accessing the Messaging Engines workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Platform Messaging entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces OS Stack workspace This workspace displays information about the operating system performance. This workspace displays data provided by the Application Server attribute group. The predefined workspace contains: v Current OS Stack Summary report which displays: – Server name – Platform CPU Used (ms) – System Paging Note: The feature Platform CPU Used (ms) does not apply the z/OS platform. v CPU Used chart v System Paging chart Accessing the Selected Application - Configuration workspace Access this workspace using one of the following methods: v Double click the OS icon in Resources workspace. v Right click the OS icon in the Resources workspace and select Link To, then select OS Stack Trend. Chapter 4. ITCAM Agent for WebSphere 265 For additional information see: v Resources and Applications workspaces v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Pool Analysis workspace This workspace displays information about the usage of several types of pools associated with each application server, including Web container pools, ORB pools, J2C connection pools, and database connection pools. This workspace helps you detect resource constraints and potential performance congestion. Note: v This workspace reports zeros for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Web Container Pool Usage - History graph, which shows the configured maximum number of Web container pooled threads and the average active threads in the Web container pool This view displays data provided by the Thread Pools attributes. v ORB Pool Usage - History graph, which shows the configured maximum number of ORB pooled threads and the average active threads in the ORB pool This view displays data provided by the Thread Pools attributes. v Web Container Pool % at Max - History bar chart, which shows the maximum usage percentage for the Web container's pooled threads over time This view displays data provided by the Thread Pools attributes. v ORB Pool % at Max - History bar chart, which shows the maximum usage percentage for the ORB's pooled threads over time This view displays data provided by the Thread Pools attributes. v Percent CPU Used - History graph, which shows the percentage of the CPU used over time This view displays data provided by the Application Server attributes. v DB Connection % at Max - Current Interval bar chart, which shows the maximum usage percentage for a database connection pool over time This view displays data provided by the DB Connection Pools attributes. v J2C Connection % at Max - Current® Interval bar chart, which shows the maximum usage percentage for a J2C connection pool over time This view displays data provided by the J2C Connection Pools attributes. Accessing the Pool Analysis workspace To access this workspace, complete the following steps: 266 ITCAM for Application Diagnostics: User Guide 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Pool Analysis entry. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Portal Pages Summary workspace This workspace reports performances statistics about WebSphere Portal page response times completed on the interval. A historical version of this workspace provides a long-term view of a single portal page that you select. The following workspace displays only if the request monitoring control level, monitoring level is set to Level2. For more information about the request monitoring control level, see “Application Dashboard (Basic) tab” on page 224. This workspace displays data provided by the Portal Page Summary attributes. The predefined workspace contains the following items: v Worst Response Times bar chart, which displays the worst average response times (in milliseconds) for portlet during the current interval v Most Popular Portal Pages bar chart, which shows the number of requests for portlet v Portal Pages report, which displays aggregated information about portal pages, including average response time and request count Accessing the Portal Pages Summary workspace To access this workspace from the Portal Summary workspace, use one of the following procedures: v Within the Navigator, right-click the Portal Summary entry; then, from the pop-up menu, click Workspace > Portal Pages Summary. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Portal Pages Summary. Selected Portal Page - History workspace The Selected Portal Page - History workspace displays the historical information that corresponds to the information in the Portal Pages Summary workspace for a selected portal page. Historical information is collected over a specific time span. See the online help for Tivoli Enterprise Portal for a detailed explanation of historical reporting. Chapter 4. ITCAM Agent for WebSphere 267 Accessing the Selected Portal Page - History workspace To access this workspace from the Portal Pages Summary workspace, use one of the following procedures: v From the Portal Pages report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Portal Page - History. v From the Worst Response Times bar chart, or the Most Popular Portal Pages bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Portal Page - History. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Portal Summary workspace The workspace reports summarized statistics about response times and functional decomposition of additional requests collected for WebSphere Portal applications. These include statistics about Portal Pages/Gateway Servlet aggregated response times collected on the interval, and more find grained statistics about Portlet, Model Building, Page Loading, Authentication and Authorization requests response times collected on the same interval. By default, this workspace is configured for long-term historical interval reporting. The following workspace displays only if the request monitoring control level, monitoring level is set to Level2. For more information about the request monitoring control level, see “Application Dashboard (Basic) tab” on page 224. This workspace displays data provided by the Portal Summary attributes. The predefined workspace contains the following items: v Portal Pages/Gateway Servlet - History graph, which shows the historical average response time (in milliseconds) of portal pages/Gateway Servlet v Portlet - History graph, which shows the historical average response time (in milliseconds) of portlets v Model Building - History graph, which shows the historical response time (in milliseconds) of model building v Page Loading - History graph, which shows the historical response time (in milliseconds) of page loading v Authentication - History graph, which shows the historical response time (in milliseconds) of authentication v Authorization - History graph, which shows the historical response time (in Milliseconds) of authorization Accessing the Portal Summary workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 268 ITCAM for Application Diagnostics: User Guide 4. Within the list of available agents, expand the WebSphere Portal server of your choice. 5. Within that server list of available WebSphere Portal Server workspaces, click the Portal Summary entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Portlet Summary workspace This workspace reports performances statistics about WebSphere Portal portlet response times completed on the interval. The following workspace displays only if the request monitoring control level, monitoring level is set to Level2. For more information about the request monitoring control level, see “Application Dashboard (Basic) tab” on page 224. A historical version of this workspace provides a long-term view of a single portlet that you select. This workspace displays data provided by the Portlet Summary attributes. The predefined workspace contains the following items: v Worst Response Times bar chart, which displays the worst average response times (in milliseconds) for portlet in the current interval v Most Popular Portlets bar chart, which shows the exception and request rates (in events per second) for portlet v Portlets report, which displays aggregated information about portlets, including average response time, request count and request rate Accessing the Portlet Summary workspace To access this workspace from the Portal Summary workspace, use one of the following procedures: v Within the Navigator, right-click the Portal Summary entry; then, from the pop-up menu, click Workspace > Portlet Summary. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Portlet Summary. Selected Portlet - History workspace The Selected Portlet - History workspace displays the historical information that corresponds to the information in the Portal Summary workspace for a selected portlet. Historical information is collected over a particular measured time span. See the online help for Tivoli Enterprise Portal for a detailed explanation of historical reporting. Accessing the Selected Portlet - History workspace To access this workspace from the Portlet Summary workspace, use one of the following procedures: v From the Portlets report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Portlet - History. Chapter 4. ITCAM Agent for WebSphere 269 v From the Worst Response Time bar chart, or the Most Popular Portlets bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Portlet - History. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Request Analysis workspace The workspace reports response times and functional decomposition information about requests (including servlets, JSPs, and EJB methods) that completed during the interval. A historical version of this workspace provides a long-term view of a single request that you select. This workspace displays data provided by the Request Analysis attributes. The predefined workspace contains the following items: v Worst Average Response Times bar chart, which displays the five worst response times for requests processed during the current interval v Worst Completion Rates bar chart, which displays the 10 requests that have the worst completion rates v Requests - Current Interval report, which displays detailed information about the response times recorded for each request Accessing the Request Analysis workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Request Analysis entry. Selected Request - History workspace The Selected Request - History workspace displays the historical information that corresponds to the information in the Request Analysis workspace for a single request type that you select. Historical information is collected over a specific time span. See the online help for Tivoli Enterprise Portal for a detailed explanation of historical reporting. Accessing the Selected Request - History workspace To access this workspace from the Request Analysis workspace, use one of the following procedures: v From the Requests - Current Interval report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Request - History. 270 ITCAM for Application Diagnostics: User Guide v From the Worst Average Response Times bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Request - History. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces The following workspaces display only if the request monitoring control level, monitoring level is set to Level2. For more information about the request monitoring control level, see “Application Dashboard (Basic) tab” on page 224. v Selected Request - Datasource v Selected Request - JMS Queues v Selected Request - Resource Adapters Accessing the Managing Server Visualization Engine from the Request Analysis workspace In the Tivoli Enterprise Portal access the request analysis workspace see “Accessing the Request Analysis workspace” on page 270. You can use you can use the following links to access the Managing Server Visualization Engine. v Diagnostic Recent Completed Requests v Diagnostic In-flight Request Search v Diagnostic SMF Data (This option is only available if the Tivoli Enterprise Portal is connected to a z/OS data controller.) For information about access requirements, see “Prerequisites for access” on page 226. 1. In the Requests - Current Interval window, right click the choose link icon then click one of the following options: v Diagnostic Recent Completed Requests v Diagnostic In-flight Request Search 2. To view Diagnostic Recent Completed Requests or Diagnostic In-flight Request Search in a z/OS environment, right click the link icon on a row where the ASID column displays Summary. a. Click Selected Request Servant Regions . b. In the Selected Requests - Servant Regions Current Interval table, right click the link icon on a row. c. Click Diagnostic Recent Completed Requests or Diagnostic In-flight Request Search. 3. To view Diagnostic SMF Data (z/OS data collector only) right click the link icon on a row where the ASID column displays Summary. a. Click Selected Request Servant Regions. b. In the Selected Requests - Servant Regions Current Interval table, right click the link icon on a row. c. Click Diagnostic SMF. For information about the options available in a z/OS environment, refer to “Region workspaces in a z/OS environment” on page 298 and “Accessing a Region workspace” on page 300 4. If this is your first time to access the Managing Server Visualization Engine during the session you see a Welcome to the Application Monitor page. Chapter 4. ITCAM Agent for WebSphere 271 5. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. 6. Click OK to display the relevant page in the Managing Server Visualization Engine. v If you click Diagnostic Recent Completed Requests you see the Server Activity Display page. v If you click Diagnostic In-flight Request Search you see the In-Flight Request Search page. v If you click Diagnostic SMF Data you see the SMF Overview page. 7. The information in these pages relates directly to the context from where you launched the link in the Tivoli Enterprise Portal. 8. To return to the Tivoli Enterprise Portal interface at any time click back on your web browser. For additional information, see: v v “Workspace link to Managing Server Visualization Engine” on page 225. “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 Request Baseline workspace This workspace displays aggregated information about the request baseline. The baselining collects statistical information about an application requests completion times and uses this information to assign fair and bad thresholds on the application requests. The product divides the whole request response times into buckets and collects individual hits into each bucket. Use these attributes to get statistics from individual requests collected during baselining interval. This workspace displays data provided by the Baseline attributes. The predefined workspace contains: v Baseline Data report, which shows lower and upper boundaries for each bucket request as well as the breakdown of nested request types in percentage. v Request Label report, which shows the monitoring configuration settings for selected requests, including auto-threshold settings and actual thresholds calculated from the baseline data. v Nested Delays Distribution bar chart, which displays a bar for each bucket of response times across the different nested types (JDBC, JCA, JMS, etc.). This chart provides you with additional hints and insight about how to interpret response times distribution displayed in the distribution chart. v Response Time Distribution bar chart, which displays the distribution of the servlet response times on the baselining interval, also called zones. You can use the bar charts to customize automatic request time thresholds. See “Enable_Auto_Threshold: set threshold parameters” on page 445. Accessing the Request Baseline workspace Complete the following steps to access this workspace from the Application Registry: 272 ITCAM for Application Diagnostics: User Guide 1. Click Application Configuration report. 2. Right click the link icon to the left of any row to display a pop-up menu. 3. Click Request Baseline. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces EJB Tier Analysis workspace The workspace displays detailed information about application tier health for a selected WebSphere application. The application tier health is derived from the following performance statistics: v Calculated application request delays in EJB container or custom requests delays compared against corresponding thresholds assigned in application configuration. v Completion rates for application edge EJB requests. v Application server ORB thread pool utilization level. v PMI statistics for application EJB container transactions begin, commit, and rollback rates. This workspace displays data provided by the Application Health Status attributes. The predefined workspace contains: v Application Tier Analysis report, which shows the overall health status of the Application tier for a selected application. For TEMA running on z/OS, region ID can be found in the ASID column. v Container Pool Usage bar chart, which displays the average number of concurrently active threads and the average number of free threads in the pool. This view displays data provided by the Thread Pools attributes. v Worst Application Tier Delays - Top 10 bar chart, which displays the top ten delayed requests in the application tier. This view displays data provided by the Request Analysis attributes. v Worst Application Tier Completion Rates - Top 10 bar chart, which displays the top ten worst requests in the application tier. This view displays data provided by the Request Analysis attributes. v Container Transactions bar chart, which displays the counts of global and local transactions that were started, committed, and undone during the interval. This view displays data provided by the Container Transactions attributes. v JVM Health - CPU Used % graph, which displays the percentage of the CPU used by the Java Virtual Machine (JVM) during the interval. This view displays data provided by the Application Server attributes. v JVM Health - Heap Used % graph, which displays the current heap usage for the monitored JVM. This view displays data provided by the Garbage Collection Analysis attributes. v JVM Health - GC Time % graph, which displays the percentage of real time that the garbage collector was active during the interval. This view displays data provided by the Garbage Collection Analysis attributes. Chapter 4. ITCAM Agent for WebSphere 273 Accessing the EJB Tier Analysis workspace To access this workspace from the Application Health Summary workspace, use the following procedures: v From the Application Health Summary report, right-click the link icon to the left of any row; then, from the pop-up menu, click EJB Tier Analysis. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Application Configuration workspace This workspace displays the information about the configuration details of the selected application. The workspace contains information about application requests and the corresponding thresholds assigned to them, as well as about status and configuration for application baselining activity. An entry is created for each application in the configuration report when a WebSphere application is discovered by the monitoring agent. The data is also stored in a context file local to monitoring agent where it can persist between monitoring agent restarts. This workspace displays data provided by the Application Monitoring Configuration attributes. The predefined workspace contains: v Longest Request Thresholds - Top 10 bar chart, which displays the ten longest (in time) request thresholds configured for the given application (Servlet/JSP URL or EJB class/method call). v Application Requests report, which shows the discovered application requests and thresholds assigned to them. Click the link in the Application Request Configuration report or right-click and select Selected Request - Baseline to go to the Request Baseline Workspace. The link to the Selected Request - Baseline is disabled when the baseline request count is less than or equal to 0. v Application report, which shows the common details about application configuration, including custom requests monitoring levels for application and current baselining status. Accessing the Application Configuration workspace To access this workspace from the Application Health Summary workspace, use the following procedures: v From the Application Health Summary report, right-click the link icon to the left of any row; then, from the pop-up menu, click Application Configuration. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Backend Tier Analysis workspace This workspace displays the information about the details of the backend tier for a selected application. 274 ITCAM for Application Diagnostics: User Guide This workspace displays data provided by the Application Health Status attributes. The predefined workspace contains: v Backend Tier Analysis report, which shows he overall health status of the backend tier for a selected application. For TEMA running on z/OS, region ID can be found in the ASID column. v Worst Backend Tier Delays - Top 10 bar chart, which displays the top ten delayed requests in the backend tier. This view displays data provided by the Request Analysis attributes. v Most Used Datasources - Top 10 bar chart, which displays the average time per request used by queries and updates to the data source. This view displays data provided by the Datasources attributes. v Most Used JMS Resources - Top 10 bar chart, which displays the longest times your application spent in getting messages from a queue, putting messages onto a queue, publishing messages to a queue, or browsing messages on a queue during the interval. This view displays data provided by the JMS Summary attributes. v Most Used JDBC Pools - Top 10 bar chart, which displays the average percentage of the connection pool in use during the interval. This view displays data provided by the DB Connection Pools attributes. v Most Used JCA Pools - Top 10 bar chart, which displays the average percent of the pool that is in use for the interval. This view displays data provided by the J2C Connection Pools attributes. v JVM Health - CPU Used % graph, which displays the percentage of the CPU used by the Java Virtual Machine (JVM) during the interval. This view displays data provided by the Application Server attributes. v JVM Health - Heap Used % graph, which displays the current heap usage for the monitored JVM. This view displays data provided by the Garbage Collection Analysis attributes. v JVM Health - GC Time % graph, which displays the percentage of real time that the garbage collector was active during the interval. This view displays data provided by the Garbage Collection Analysis attributes. Accessing the Backend Tier Analysis workspace To access this workspace from the Application Health Summary workspace, use the following procedures: v From the Application Health Summary report, right-click the link icon to the left of any row; then, from the pop-up menu, click Backend Tier Analysis. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Application Health History workspace The workspace displays the information about the historical health status of a selected application. By default, the history data is collected for the last 24 hours. The workspace displays data provided by the Application Health Status attributes. The predefined workspace contains: Chapter 4. ITCAM Agent for WebSphere 275 v Availability/Throughput - History graph, which displays average request processing rate by application over the time. This view displays data provided by the Request Times and Rates attributes. v Availability/Completion Rate - History graph, which displays the average request completion rate by application over the time; Completion rate is defined as ratio of successfully completed requests count to the total count of requests processed by application on the interval. This view displays data provided by the Request Times and Rates attributes. v Availability/Average Load- History graph, which displays the average number of concurrent application requests over the time. This view displays data provided by the Request Times and Rates attributes. v Response Time - History graph, which displays the average application response time over the time. This view displays data provided by the Request Times and Rates attributes. v Server Resources/CPU Used - History graph, which displays the percent of CPU time used by the application JVM process over the time. This view displays data provided by the Application Server attributes. v Server Resources/Paging Rate - History graph, which displays the system paging rate in kilobytes per second over the time. This view displays data provided by the Application Server attributes. v Server Resources/GC Active Time - History graph, which displays the percentage of total CPU time for which the garbage collector was active over the time. This view displays data provided by the Garbage Collection Analysis attributes. Accessing the Application Health History workspace Complete the following steps to access this workspace from the Application Health Summary: 1. Click Application Health Summary report. 2. Right-click the link icon to the left of any row to display the pop-up menu. 3. Click Application Health history. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Web Tier Analysis workspace This workspace displays detailed information about the client tier health for a selected WebSphere application. The client tier health indicator is derived from the following performance statistics: v Calculated application request delays inside Servlet/JSP or Portal container compared against corresponding thresholds assigned in application configuration. v Completion rates for edge Servlet/JSP and Portal application requests. v Application server WebContainer thread pool utilization level. v PMI statistics for HTTP session counts by application. This workspace displays data provided by the Application Health Status attributes. The predefined workspace contains: 276 ITCAM for Application Diagnostics: User Guide v Client Tier Analysis report, which shows the overall health status of application execution in Web or portal containers. For TEMA running on z/OS, region ID can be found in the ASID column. v Web Contain bar chart, which displays the current utilization level of the Web Container thread pool. This view displays data provided by the Thread Pools attributes. v HTTP Sessions bar chart, which displays the average number of concurrently active and live HTTP session numbers for the selected application during the interval. This view displays data provided by the Servlet Sessions attributes. v Worst Client Tier Delays - Top 10 bar chart, which displays the top ten requests with biggest delays (threshold violations) in the client tier. This view displays data provided by the Request Analysis attributes. v Worst Client Tier Completion Rates - Top 10 bar chart, which displays the top ten Servlet/JSP/Portal edge requests with the worst completion rates. This view displays data provided by the Request Analysis attributes. v JVM Health - CPU Used % graph, which displays the percentage of the CPU used by the Java Virtual Machine (JVM) during the interval. This view displays data provided by the Application Server attributes. v JVM Health - Heap Used % graph, which displays the current heap usage for the monitored JVM. This view displays data provided by the Garbage Collection Analysis attributes. v JVM Health - GC Time % graph, which displays the percentage of real time that the garbage collector was active during the interval. This view displays data provided by the Garbage Collection Analysis attributes. Accessing the Web Tier Analysis workspace Complete the following steps to access this workspace from the Application Health Summary: 1. Click Application Health Summary report. 2. Right-click the link icon to the left of any row to display the pop-up menu. 3. Click Web Tier Analysis. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Selected Datasources - Datasource Trend workspace The Datasources Trend workspace displays information about datasource connections. This workspace displays data provided by the Datasources attributes. The predefined workspace contains the following items: v Current Datasources report displays datasource name, total wait time, connection rate, connection average wait time and connection max wait time. v Total Wait Time Trend line chart displays the total time that applications had to wait for a connection to the data source. v Connection Rate Trend bar chart displays the number of connection requests (per second) created for the data source. Chapter 4. ITCAM Agent for WebSphere 277 v Connection Average and Max Time Trend line chart displays the average time (in milliseconds) and the worst-case time (in milliseconds) that applications had to wait for a connection. Selected Request - Data sources workspace The Selected Request - Data sources workspace displays information about JDBC activity performed by the request you selected in the primary Request Analysis workspace. This workspace displays data provided by the Selected Request attributes. The predefined workspace contains the following items: v Worst Datasources Response Times bar chart, which shows the worst response times (in milliseconds) for data sources accessed by this request v Selected Request - Datasources report, which displays detailed information about the data sources accessed for the selected request. For TEMA running on z/OS, region ID can be found in the ASID column. Accessing the Selected Request - Data sources workspace To access this workspace from the Request Analysis workspace, use one of the following procedures: v From the Requests - Current Interval report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Request - Datasources. v From Worst Average Response Times bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Request - Datasources. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Selected Request - JMS Queues workspace The Selected Request - JMS Queues workspace displays information about message queues owned by messaging middleware and accessed by the request that you selected in the primary Request Analysis workspace. This workspace displays data provided by the Selected Request attributes. The predefined workspace contains the following items: v Worst JMS Queues Response Times bar chart, which shows the worst response times (in milliseconds) for JMS resources accessed by this request v Selected Request - JMS Queues report, which displays detailed information about the JMS resources accessed by the selected request. For TEMA running on z/OS, region ID can be found in the ASID column. Accessing the Selected Request - JMS Queues workspace To access this workspace from the Request Analysis workspace, use one of the following procedures: v From the Requests - Current Interval report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Request - JMS Queues. 278 ITCAM for Application Diagnostics: User Guide v From Worst Average Response Times bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Request - JMS Queues. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Selected Request - Portal Processing workspace The Selected Request - Portal Processing workspace displays information about portlet and/or portal page response times referenced by the request you selected in the primary Request Analysis workspace. This workspace displays data provided by the Selected Request attributes. Note: This workspace will appear under all WebSphere application servers, but it will have data only under the WebSphere Portal Server. The predefined workspace contains the following items: v Worst Portal Processing Response Times bar chart, which shows the worst response times (in milliseconds) for portal sources accessed by this request v Selected Request - Portal Processing report, which displays detailed information about the portal sources accessed for the selected request. For TEMA running on z/OS, region ID can be found in the ASID column. Accessing the Selected Request - Portal Processing workspace To access this workspace from the Request Analysis workspace, use one of the following procedures: v From the Requests - Current Interval report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Request - Portal Processing. v From Worst Average Response Times bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Request - Portal Processing. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Selected Request - Resource Adapters workspace The Selected Request - Resource Adapters workspace displays response-time information about the J2C resources adapters referenced by the request you selected in the primary Request Analysis workspace. This workspace displays data provided by the Selected Request attributes. The predefined workspace contains the following items: v Worst Average Response Times bar chart, which shows the worst-performing J2C resource adapter's nested requests, in milliseconds v Selected Request - Resource Adapters report, which displays detailed information about each J2C resource adapter that was accessed by the selected request. For TEMA running on z/OS, region ID can be found in the ASID column. Chapter 4. ITCAM Agent for WebSphere 279 Accessing the Selected Request - Resource Adapters workspace To access this workspace from the Request Analysis workspace, use one of the following procedures: v From the Requests - Current Interval report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Request - Resource Adapters. v From Worst Average Response Times bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Request - Resource Adapters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Service Component Elements workspace This workspace lists performance metrics for all the service components and their elements. Service components contain one or more elements, which are sets of different steps processed in each service component. In turn, each element has its own set of event natures, which are key points that are reached when processing a service component element. This workspace displays data provided by the Service Component Elements attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Worst Service Times bar chart, which shows the numbers of the Average Response Time in milliseconds v Most Invocations bar chart, which shows the numbers of the invocations per second v Most Failures bar chart, which shows the numbers of the failed invocation counts v Service Component Elements report, which shows aggregated data about the average response time, failed count, success count, error rate, and request rate. Accessing the Service Component Elements workspace To access this workspace from the Service Components workspace, use one of the following procedures: v Within the Navigator, right-click the Service Components entry; then, from the pop-up menu, click Workspace > Service Component Elements. 280 ITCAM for Application Diagnostics: User Guide v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Service Component Elements. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Service Components workspace This workspace provides overview performance of the key service components. WebSphere servers feature their own service components, and each of these components has its own set of event points that can be monitored. This workspace displays data provided by both the Service Components attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Service Component Architecture - History graph, which shows historical bad request count, the instrumentation level, set instrumentation level type, and summary, when the component name of the service is Service Component Architecture v Business Rules - History graph, which shows historical bad request count, the instrumentation level, set instrumentation level type, and summary, when the name is Business Rules v Map - History graph, which shows historical bad request count, the instrumentation level, set instrumentation level type, and summary, when the name is Map v Mediation - History graph, which shows historical bad request count, the instrumentation level, set instrumentation level type, and summary, when the name is Mediation v Business State Machine - History graph, which shows historical bad request count, the instrumentation level, set instrumentation level type, and summary, when the name is Business State Machine v Selector - History graph, which shows historical bad request count, the instrumentation level, set instrumentation level type, and summary, when the name is Selector v Bad Requests report, which displays a summary of the bad request counts Accessing the Service Components workspace To access this workspace, complete the following steps: Chapter 4. ITCAM Agent for WebSphere 281 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Service Components entry. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Servlets/JSPs - Selected Enterprise Application workspace This workspace displays statistical data regarding the servlets and JSPs invoked by a single Enterprise application. This workspace displays data provided by the Servlets JSPs attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Worst Servlet/JSP Response Times bar chart, which displays the worst average response times (in milliseconds) for servlets and JSP invoked by the selected Web application v Most Popular Servlet/JSP bar chart, which shows the servlet and JSP exception and request rates (in events per second) for the selected application v Worst Servlet/JSP Error Rates bar chart, which shows the worst servlet and JSP error rates for the selected application during the interval v Servlets/JSPs - Selected Web Application report, which displays performance information about the servlets and JSPs invoked by the application. For example, this report displays the average number of concurrent requests for a servlet and the amount of time it takes a servlet to respond to a request Accessing the Servlets/JSPs - Selected Enterprise Application workspace To access this workspace from the Web Applications workspace, use one of the following procedures: 282 ITCAM for Application Diagnostics: User Guide v From the Web Applications report, right-click the link icon to the left of any row; then, from the pop-up menu, click Servlets/JSPs - Selected Enterprise Application. v From the Worst Response Times bar chart, the Most Popular Web Applications bar chart, or the Worst Error Rates bar chart, right-click any bar; then, from the pop-up menu, click Link To > Servlets/JSPs - Selected Enterprise Application. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Scheduler workspace The Scheduler workspace contains data for the Scheduler service. The scheduler service schedules and tracks the starting and stopping of applications. This workspace displays data provided by the Scheduler attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Highest Task Failures bar chart, which shows the number of the task failure count. The y-axis headings correspond to the row number of the Scheduler report v Highest Completed Tasks bar chart, which shows the number of the task finished count. The y-axis headings correspond to the row number of the Scheduler report v Scheduler report, which displays information about the scheduler data, including task finish count, task failure count, task expiration rate, task finish rate, and task run rate Accessing the Scheduler workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. Chapter 4. ITCAM Agent for WebSphere 283 5. Within that server list of available WebSphere Application Server workspaces, click the Scheduler entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Sessions workspace This workspace displays information about servlet sessions. A session is a series of requests to a servlet, originating from the same user at the same browser. Applications running in a Web container can use these sessions to keep track of individual users. This workspace displays data provided by the Servlet Sessions attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Most Active Sessions bar chart, which shows the most frequently referenced servlet sessions for each listed Web application v Largest Total Session Object Sizes bar chart, which shows the total session object sizes (in bytes) and the associated Web applications v Servlet Sessions report, which shows usage data about the servlet sessions, including the rates as which sessions are created and destroyed and their read and write times Accessing the Sessions workspace To access this workspace from the Web Applications workspace, use one of the following procedures: v Within the Navigator, right-click the Web Applications entry; then, from the pop-up menu, click Workspace > Servlet Sessions. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > Servlet Sessions. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces 284 ITCAM for Application Diagnostics: User Guide Thread Pools workspace This workspace reports information about the various thread pools that support the applications running in your Java Virtual Machine (JVM). This workspace displays data provided by the Thread Pools attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on-demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Highest Average Pool Sizes bar chart, which shows the largest thread pools in the JVM v Average Thread Pool Usage bar chart, which shows the average active and free threads for each thread pool v Thread Pools report, which shows information about the usage statistics for thread pools that belong to a WebSphere Application Server, such as average and maximum pool sizes and creation and destruction rates Accessing the Thread Pools workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Thread Pools entry. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Chapter 4. ITCAM Agent for WebSphere 285 Accessing the Managing Server Visualization Engine from the Thread Pools workspace In The Tivoli Enterprise Portal access the Thread Pools workspace. You can use the Diagnostic Server Activity Display link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. then click 1. In the Thread Pools window, right click the choose link icon Diagnostic JVM Thread Display. 2. If this is your first time to access the Managing Server Visualization Engine during a session, you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. 4. Click OK to display the Diagnostic JVM Thread Display page in the Managing Server Visualization engine. You can use link to diagnose application problems, for example, slow transactions or high response times. 5. The results relate directly to the context from where you launched the link in the Tivoli Enterprise Portal. For more information about using the Diagnostic JVM Thread Display page and additional features, refer to the Composite Application Manager help within the Managing Server Visualization Engine Interface. 6. To return to the previous workspace in the Tivoli Enterprise Portal interface at any time choose from the following options: v from the Tivoli Enterprise Portal desktop client, click the back arrow on your web browser. v from the Tivoli Enterprise Portal browser client, click the browser back arrow. For additional information, see: v “Workspace link to Managing Server Visualization Engine” on page 225 v “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 Thread Pool Trend workspace The Thread Pool Trend workspace displays information about thread pool size and usage. This workspace displays data provided by the Selected Request attributes. This predefined workspace contains the following items: v Current Thread Pool report displays thread pool name, average active threads, average pool size, percentage of time pool at max and average free threads. v Average Pool Size Trend bar chart displays the average number of threads in the pool. v Average Thread Pool Usage Trend bar chart displays the average percentage of time that all threads were in use during the sampling interval. v Percent of Time Pool Size at Max Trend bar chart displays the percentage of time the pool size is running at the maximum value. 286 ITCAM for Application Diagnostics: User Guide Accessing the Threadpool Trend workspace Select the Thread Pools workspace, in the Thread Pools report displayed at the bottom of the workspace, click the link icon and select Thread Pool Trend. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Web Applications workspace This workspace displays information about the Web applications running in J2EE application servers. This workspace displays data provided by the Web Applications attributes. Note: v The Web Applications workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v Worse Response Times bar chart, which shows the worst servlet response times (in milliseconds) during the interval v Most Popular Web Applications bar chart, which shows the servlet exception and request rates (in events per second) v Worse Error Rates bar chart, which shows the worst servlet error rates during the interval v Web Applications report, which displays aggregated performance data for each Web application, about all servlets and JSPs deployed to that Web application, including response and error rates and response times. Accessing the Web Applications workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Web Applications entry. Chapter 4. ITCAM Agent for WebSphere 287 For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Accessing the Managing Server Visualization Engine from the Web Applications workspace In the Tivoli Enterprise Portal access the WebSphere Agent workspace. You can use the Diagnostic Server Activity Display link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. then 1. In the Web Applications window, right click the choose link icon click Diagnostic Server Activity Display. 2. If this is your first time to access the Managing Server Visualization Engine during a session, you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. 4. Click OK to display the Server Activity Display page in the Managing Server Visualization engine. You can use link to diagnose application problems, for example, slow transactions or high response times. 5. The results in this page relate directly to the context from where you launched the link in the Tivoli Enterprise Portal. For more information about using the Server Activity Display page and additional features, refer to the Composite Application Manager help within the Managing Server Visualization Engine Interface. 6. To return to the previous workspace in the Tivoli Enterprise Portal interface at any time choose from the following options: v from the Tivoli Enterprise Portal desktop client, click the back arrow on your web browser. v from the Tivoli Enterprise Portal browser client, click the browser back arrow. For additional information, see: v “Workspace link to Managing Server Visualization Engine” on page 225 v “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 Web Services workspace The Web Services workspace displays information about the data counters of the Web services. The examples of the information include the number of loaded Web services, the number of requests delivered and processed, the request response time, and the average size of requests. This workspace displays data provided by both the Web Services attributes and the Web Services Gate Way attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report 288 ITCAM for Application Diagnostics: User Guide resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains: v Worst Response Times bar chart, which displays the worst average response times (in milliseconds) for the selected Web services v Most Popular bar chart, which shows the exception and request rates (in events per second) for the selected services v Web Services report, which displays aggregated performance data for each Web service, including requests, response times, and payload sizes v Web Service Gateway report, which displays aggregated performance data for each Web service gateway, including the number of synchronous and asynchronous requests and responses Accessing the Web Services workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Web Services entry. Selected Web Services - History workspace The Selected Web Services - History workspace displays the historical information that corresponds to the information in the Web Services workspace for a selected Web service. Historical information is collected over a particular measured time span. See the online help for Tivoli Enterprise Portal for a detailed explanation of historical reporting. Accessing the Selected Web Services - History workspace To access this workspace from the Web Services workspace, use one of the following procedures: v From the Web Services report, right-click the link icon to the left of any row; then, from the pop-up menu, click Selected Web Services - History. v From the Worst Response Times bar chart, or the Most Popular bar chart, right-click any bar; then, from the pop-up menu, click Link To > Selected Web Services - History. For additional information, see: v Organization of the predefined workspaces Chapter 4. ITCAM Agent for WebSphere 289 v Attribute groups used by the predefined workspaces WebSphere Agent workspace This workspace displays product events that affect the ability of the WebSphere Application Server agent to collect data. This workspace displays events occurring within the WebSphere Application Server agent and WebSphere application servers that are installed on the host computer. It also displays the status of the Tivoli Enterprise Monitoring Agent. The predefined workspace contains the following items: v Agent Events report, which displays information about agent-level events that affect the ability of the Tivoli Enterprise Monitoring Agent to collect data for the WebSphere application server. You can use this view to see exception and error messages, their IDs, and their severity. The Agent Events report also shows the result of issuing a Take Action command. Place your cursor over a truncated message to display the text of the complete message This report displays data reported by the WebSphere Agent Events attributes. v Application Servers Summary report displays information about status of the WebSphere server. This report displays data reported by the Application Server Status attributes. Accessing the WebSphere Agent workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of available Tivoli Enterprise Monitoring Agents, click the WebSphere Agent entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Accessing the Managing Server Visualization Engine from the WebSphere Agent workspace In the Tivoli Enterprise Portal access the WebSphere agent workspace. You can use the Diagnostic Server Activity Display or the Diagnostic In-flight Request Search link to access the Managing Server Visualization Engine. For information about access requirements see “Prerequisites for access” on page 226. 1. In the Applications Server Summary window, right click the choose link icon then click Diagnostic Server Activity Display or Diagnostic In-flight Request Search. 2. If this is your first time to access the Managing Server Visualization Engine during the session you see a Welcome to the Application Monitor page. 3. Depending on the user setup configuration in your environment you may or may not have to type your Managing Server Visualization Engine User Name and Password. If you do, you only need to log in using your User Name and Password once per session. 290 ITCAM for Application Diagnostics: User Guide 4. Click OK to display the relevant page in the Managing Server Visualization engine. v If you click Diagnostic In-flight Request Search you see the In-Flight Request Search page in Managing Server Visualization Engine. v If you click Diagnostic Server Activity Display you see the Server Activity Display page in the Managing Server Visualization Engine. The information in both of these pages relates directly to the context from where you launched the link in the Tivoli Enterprise Portal. 6. To return to the Tivoli Enterprise Portal interface at any time click back on your web browser. 5. For additional information, see: v “Workspace link to Managing Server Visualization Engine” on page 225 v “Access the Managing Server Visualization Engine from the Tivoli Enterprise Portal” on page 229 WebSphere Application Server workspace The WebSphere Application Server workspace displays overall statistics for each application server being monitored by the Tivoli Enterprise Monitoring Agent. The predefined workspace contains the following items: v Heap Usage - History bar chart, which displays free memory size and used memory size (in kilobytes) within the WebSphere Application Server's heap over time. The chart's flyovers display the exact values This view displays data provided by the Garbage Collection Analysis attributes. v Response Time - History graph, which shows the server response time to requests over time This view displays data provided by the Request Times and Rates attributes. v Request Rate - History graph, which shows the rate at which requests have been received by this server over time This view displays data provided by the Request Times and Rates attributes. v Percent CPU Used - History graph, which shows the percentage of the CPU that this server used over time This view displays data provided by the Application Server attributes. v Application Server Summary report, which displays overall information about this WebSphere application server, including JVM statistics and CPU usage statistics This view displays data provided by the Application Server attributes. In the Application Server Summary report, each row represents a different region. When you right-click the link for a row, you can choose to go to Selected Region - Application Server Summary, Selected Region - Request Analysis, Selected Region - Application Health Status, Selected Region - Datasources, Selected Region - Log Analysis or Selected Region - JMS Summary. All these links are disabled when TEMA is running on Distributed data collector and enabled when TEMA is running on z/OS data collector. Accessing the WebSphere Application Server workspace Complete the following steps to access this workspace: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you're monitoring. Chapter 4. ITCAM Agent for WebSphere 291 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, click the WebSphere App Server entry of your choice. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces WebSphere ESB Server workspace The WebSphere ESB Server workspace displays overall statistics for each application server being monitored by the Tivoli Enterprise Monitoring Agent. The predefined workspace contains the following items: v Heap Usage - History bar chart, which displays free memory size and used memory size (in kilo bytes) within the WebSphere Application Server's heap over time. The chart's flyovers display the exact values This view displays data provided by the Garbage Collection Analysis attributes. v Response Time - History graph, which shows the server response time to requests over time This view displays data provided by the Request Times and Rates attributes. v Request Rate - History graph, which shows the rate at which requests have been received by this server over time This view displays data provided by the Request Times and Rates attributes. v Percent CPU Used - History graph, which shows the percentage of the CPU that this server consumed over time This view displays data provided by the Application Server attributes. v Application Server Summary report, which displays overall information about this WebSphere application server, including JVM statistics and CPU usage statistics This view displays data provided by the Application Server attributes. Accessing the WebSphere ESB Server workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, click the WebSphere ESB Server entry of your choice. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces 292 ITCAM for Application Diagnostics: User Guide WebSphere Portal Server workspace The WebSphere Portal Server workspace displays overall statistics for each application server being monitored by the Tivoli Enterprise Monitoring Agent. The predefined workspace contains the following items: v Heap Usage - History bar chart, which displays free memory size and used memory size (in kilo bytes) within the WebSphere Application Server's heap over time. The chart's flyovers display the exact values This view displays data provided by the Garbage Collection Analysis attributes. v Response Time - History graph, which shows the server response time to requests over time This view displays data provided by the Request Times and Rates attributes. v Request Rate - History graph, which shows the rate at which requests have been received by this server over time This view displays data provided by the Request Times and Rates attributes. v Percent CPU Used - History graph, which shows the percentage of the CPU that this server consumed over time This view displays data provided by the Application Server attributes. v Application Server Summary report, which displays overall information about this WebSphere application server, including JVM statistics and CPU usage statistics This view displays data provided by the Application Server attributes. In the Application Server Summary report, each row represents a different region. When you right-click the link for a row, you can choose to go to Selected Region - Application Server Summary, Selected Region - Request Analysis, Selected Region - Application Health Status, Selected Region - Datasources, Selected Region - Log Analysis, Selected Region - JMS Summary, Selected Region - Portal Summary, Selected Region - Portlet Summary. All these links are disabled when TEMA is running on Distributed data collector and enabled when TEMA is running on z/OS data collector. Accessing the WebSphere Portal Server workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, click the WebSphere Portal Server entry of your choice. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces WebSphere Process Server workspace The WebSphere Process Server workspace displays overall statistics for each application server being monitored by the Tivoli Enterprise Monitoring Agent. Chapter 4. ITCAM Agent for WebSphere 293 The predefined workspace contains the following items: v Heap Usage - History bar chart, which displays free memory size and used memory size (in kilo bytes) within the WebSphere Application Server's heap over time. The chart's flyovers display the exact values This view displays data provided by the Garbage Collection Analysis attributes. v Response Time - History graph, which shows the server response time to requests over time This view displays data provided by the Request Times and Rates attributes. v Request Rate - History graph, which shows the rate at which requests have been received by this server over time This view displays data provided by the Request Times and Rates attributes. v Percent CPU Used - History graph, which shows the percentage of the CPU that this server consumed over time This view displays data provided by the Application Server attributes. v Application Server Summary report, which displays overall information about this WebSphere application server, including JVM statistics and CPU usage statistics This view displays data provided by the Application Server attributes. Accessing the WebSphere Process Server workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, z/OS Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, click the WebSphere Process Server entry of your choice. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces WMQ Client Link Communications workspace This workspace provides aggregated counter statistics for all of the clients of WMQ Queue Managers that are or have been connected to this application server. WebSphere Application Server 5.1 based products do not support this workspace. This workspace displays data provided by the WMQ Client Link Communications attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. 294 ITCAM for Application Diagnostics: User Guide v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v WMQ Client Link Communication Errors - History graph, which shows the number of errors that have caused connections to WMQ JMS clients to be dropped v WMQ Client Link Statistics report, which displays information about the messaging engine communications, including batch sent, message sent, message received, comm errors, writes blocked, and reads blocked Accessing the WMQ Client Link Communications workspace To access this workspace from the Platform Messaging workspace, use one of the following procedures: v Within the Navigator, right-click the Platform Messaging entry; then, from the pop-up menu, click Workspace > WMQ Client Link Communications. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > WMQ Client Link Communications. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces WMQ Link Communications workspace This workspace provides aggregated counter statistics for all of the WMQ Queue Managers that are or have been connected to this application server. WebSphere Application Server 5.1 based products do not support this workspace. This workspace displays data provided by the WMQ Link Communications attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v WMQ Link Communication Errors - History graph, which shows the historical number of communication errors that resulted in the disconnection of a network connection to a WMQ Queue Manager Chapter 4. ITCAM Agent for WebSphere 295 v WMQ Link Statistics report, which displays information about the messaging engine communications, including batches sent, batches received, message sent, message received, and comm errors Accessing the WMQ Link Communications workspace To access this workspace from the Platform Messaging workspace, use one of the following procedures: v Within the Navigator, right-click the Platform Messaging entry; then, from the pop-up menu, click Workspace > WMQ Link Communications. v From the primary Tivoli Enterprise Portal menu, click View > Workspace > WMQ Link Communications. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Workload Management workspace This workspace displays information about the Workload Management (WLM) server and about the WLM client that initiates workload requests to that server. Workload management optimizes the distribution of client processing tasks. Incoming work requests are distributed to the application servers, enterprise beans, servlets, and other objects that can most effectively process the requests. Workload management also provides failover protection when servers are not available, improving application availability. In a WebSphere Application Server environment, you implement workload management using clusters, transports, and replication domains. This workspace displays data provided by both the Workload Management Server attributes and the Workload Management Client attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. The predefined workspace contains the following items: v WLM Server Incoming Requests bar chart, which shows the incoming strong affinity requests and the incoming nonaffinity requests (per second) v WLM Client Outgoing Requests bar chart, which shows the outgoing requests (per second) v Workload Management Server report, which shows detailed information about the WLM server, such as incoming requests and clients served 296 ITCAM for Application Diagnostics: User Guide v Workload Management Client report, which shows information about the clients that initiate workload requests, such as outgoing requests and response times Accessing the Workload Management workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Workload Management entry. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Workplace Mail workspace This workspace provides aggregated statistics of the usage information about the incoming message traffic. This workspace displays data provided by the Workplace Mail Service attributes. Note: v This workspace reports blanks for resource data on the first invocation if PMI data collection is configured for on-demand sampling (that is, if your site set configuration value Resource Data Collection Method to On Demand) or if you have not yet run applications that generate PMI resource data. To report resource data in this workspace after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v Because of high overhead, the Tivoli Enterprise Monitoring Agent provides on demand sampling by default. To activate PMI monitoring, you must first select this workspace and then select it again later. Each time you select the workspace, it displays the data collected during the interval between selections. Note: The following WebSphere Application Diagnostics 7.1 features do not support the Workplace Mail workspace: configuration and links to the Managing Server Visualization Engine from the Tivoli Enterprise Portal. The predefined workspace contains the following items: v Connections bar chart, which displays the number of connections to the SMTP server, SMTP client connections, and the maximum number of concurrent LDAP connections during the sampling interval v Workplace Mail report, which displays detailed information about the workplace mail connections Chapter 4. ITCAM Agent for WebSphere 297 Accessing the Workplace Mail workspace To access this workspace, complete the following steps: 1. Within the Navigator, expand Windows Systems, Linux Systems, or UNIX Systems, as appropriate for the node you are monitoring. 2. Within the node list, expand the entry that corresponds to the node you want to select. 3. Within that node list of monitored applications, expand the list of WebSphere agents. 4. Within the list of available agents, expand the WebSphere application server of your choice. 5. Within that server list of available WebSphere Application Server workspaces, click the Workplace Mail entry. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Region workspaces in a z/OS environment For z/OS installations workspace tables report data at both a region and server instance level. The advantage is that you can view metrics collected at both levels and switch between server instance lever and region level. The following table lists the workspaces that show information and both a region and server level. All workspaces except the Garbage Collection Analysis workspace report data on both levels. The Garbage collection analysis workspace does not have links to the top-level workspaces. Table 16. Workspaces and the Servant and Selected Regions in a z/OS environment Workspace Table Name Link Name Description WebSphere App Server Application Server Summary WebSphere App Server Application Server Summary - Selected Region - Application Server Summary Application Server Summary workspace. This workspace displays data at regional level. Click the Selected Region links to access region-specific links to other top-level workspaces. When a workspace is linked from the application server summary you can view specific drill-down metrics. To view a report for an individual region, see “Accessing a Region workspace” on page 300 Selected Region Application Health Status Selected Region - Request Analysis Selected Region - Log Analysis Selected Region - Data Sources Selected Region - JMS Summary 298 ITCAM for Application Diagnostics: User Guide Table 16. Workspaces and the Servant and Selected Regions in a z/OS environment (continued) Workspace Table Name Link Name Description Application Health Application Health Summary Selected Application Servant regions In an z/OS environment, the Application Health Summary report displays the total results for the server instances. To view report results by region, Click the WebSphere App Server Application Server Summary table and right click a link icon in the table to view the available options. Selected Application Health History Selected Application- Web Tier Analysis Selected Application - EJB Tier Analysis Selected Application Backend Tier Analysis Selected Application Request Analysis Selected Application Configuration Request Analysis Selected Request Requests Current Interval Datasource Selected Request - JMS Queues Selected Request Resource Adaptors In an z/OS environment, when you select Request Analysis Requests Current Interval, this report displays the total results for the server instances. To view a report for an individual Request Analysis region, see “Accessing a Region workspace” on page 300. Selected Request - History Selected Request - Servant Regions Garbage Collection Analysis - Garbage Collection Analysis Selected Region - History Log Analysis - Log Analysis Selected Region - Log Analysis Garbage Collection Analysis - Servant Region (only available when you click a [Summary] row) Data sources - Data Selected Datasource sources - Current Interval Selected Datasource History When you click Garbage Collection Analysis the results of the report display in the table at the bottom of the screen. There is a summary report of all regions and there are also reports by individual region. Log Analysis workspace. In a z/OS environment, the log analysis workspace reports data in two ways. When you select the Log analysis workspace the report displays JVM Log Analysis and DC message events from all regions. To view a report for an individual log analysis region, see “Accessing a Region workspace” on page 300. In an z/OS environment, this report displays the total results for the server instances. To view a report for an individual Data source region, see, “Accessing a Region workspace” on page 300. Chapter 4. ITCAM Agent for WebSphere 299 Table 16. Workspaces and the Servant and Selected Regions in a z/OS environment (continued) Workspace Table Name Link Name Description JMS Summary - JMS Summary - Current Interval JMS Selected JMS - Servant Regions In an z/OS environment, this report displays the total results for the server instances. To view a report for an individual JMS Summary region, see“Accessing a Region workspace.” WebSphere Portal Server Selected Region - Portal Server Summary In an z/OS environment, this report displays the total results for the server instances. To view a report for an individual Portal Server summary, see “Accessing a Region workspace” Portal Summary Selected Region - Portal Summary In an z/OS environment report displays the total results for the server instances. To view a report for an individual region see “Accessing a Region workspace” Selected Region - Portlet Summary Selected Portal Page History Selected Portlet - History Selected Region - Portal Page Summary Accessing a Region workspace To access this workspace, complete the following steps: 1. In the Navigator, expand z/OS system, as appropriate for the node you are monitoring. 2. In the node list, expand the entry that corresponds to the node you want to select. 3. In that node list of monitored agents, expand the list of the servers. 4. In the list of available servers, click the WebSphere agent of your choice. 5. In the list of available Servers select the Server of your choice. 6. Right click the selected Server node and select WebSphere App Server workspace. 7. Right click a link icon in the Application Server Summary table to display all the available workspaces connected with current region. 8. Select the workspace of your choice from the following list: v Selected Region Application Server Summary v Selected Region - Application Health Status v v v v Selected Selected Selected Selected Region Region Region Region - Request Analysis Log Analysis Data Sources JMS - Summary For additional information, see: 300 ITCAM for Application Diagnostics: User Guide v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces ITCAM for Application Diagnostics- WebSphere Agent attributes IBM Tivoli Composite Application Manager for Application Diagnostics WebSphere Agent is a Tivoli Enterprise Management Agent that resides within your distributed systems. This agent gathers data about running WebSphere Application Server processes that have been collected and stored by the ITCAM for WebSphere data collector, and stores those data in elements called attributes. Each attribute is a characteristic of an object. For example, the Receive Count attribute in the JMS Summary attribute group counts the number of messages your applications have retrieved from JMS messages queues. Attribute groups The IBM Tivoli Composite Application Manager for Application Diagnostics WebSphere Agent attributes are organized into groups of related items. These attribute groups comprise the attribute tables for this agent. For example, the Garbage Collection Analysis attribute group provides information about the frequency with which the Java Virtual Machine (JVM) invokes its garbage collector. Attributes and workspaces Within the Tivoli Enterprise Portal workspaces, these attributes get displayed in, and correspond to, the columns in the reports and the items in the graphic displays for charts and graphs. You can use the collected data to analyze and monitor the performance of your WebSphere application servers and the applications running within them. For an overview of the correlations between the predefined workspaces and the attribute groups, see Attribute Groups Used by the Predefined Workspaces. Attributes and situations Various attributes are referenced by the product's predefined situations. You can also use the IBM Tivoli Composite Application Manager for Application Diagnostics - WebSphere Agent attributes to create your own situations to monitor the performance of your WebSphere application servers and their applications. These situations can monitor your WebSphere Application Server resources or correlate multiple conditions to alert you to problems that may have occurred when attribute values exceed thresholds that you define. Attribute groups used by the predefined workspaces A workspace contains graphical data or report columns that correspond directly to particular attributes in an attribute group. The following table shows the correlations between the predefined workspaces and the attribute groups. The workspaces, primary and secondary, are listed alphabetically, not in the order in which they appear in the Navigator. Table 17. Workspaces and the attribute groups they reference Workspace Related Attribute Groups Application Health Summary Application Health Status Application Registry Application Monitoring Configuration Allocation Failures Allocation Failure Chapter 4. ITCAM Agent for WebSphere 301 Table 17. Workspaces and the attribute groups they reference (continued) Workspace Related Attribute Groups Cache Analysis Dynamic Cache Dynamic Cache Templates Client Communications Client Communications Container Object Pools Container Object Pools Container Transactions Container Transactions Datasources Selected Datasource - History Datasources DB Connection Pools Selected DB Connection Pool - History DB Connection Pools DCS Stacks DCS Stack Counter Destinations Topic Spaces Queue Durable Subscriptions Durable Subscriptions EJB Containers EJB Containers Enterprise Java Beans Enterprise Java Beans Garbage Collections - Selected Allocation Garbage Collection Cycle Failure 302 Garbage Collector Analysis Garbage Collection Analysis High Availability Manager High Availability Manager IMAP/POP Workplace Mail IMAP/POP J2C Connection Pools J2C Connection Pools JMS Summary JMS Summary Log Analysis Log Analysis Lotus Application Server Request Times and Rates Garbage Collection Analysis Messages Queues Workplace Mail Queues Messaging Engine Communications Messaging Engine Communications Platform Messaging Messaging Engines Pool Analysis Thread Pools DB Connection Pools J2C Connection Pools Application Server Portal Pages Summary Selected Portal Page - History Portal Page Summary Portal Summary Portal Summary Portlet Summary Selected Portlet - History Portlet Summary Request Analysis Selected Request - History Request Analysis Selected Request - Baseline Baseline Scheduler Scheduler ITCAM for Application Diagnostics: User Guide Table 17. Workspaces and the attribute groups they reference (continued) Workspace Selected Application Analysis Selected Application Analysis Selected Application Selected Application Analysis Related Attribute Groups - Application Tier Application Health Status - Backend Tier - Health History - Client Tier Selected Application - Configuration Application Monitoring Configuration Selected Request - Datasources Selected Request Selected Request - JMS Queues Selected Request Selected Request - Resource Adapters Selected Request Servlets/JSPs - Selected Web Application Servlets JSPs Sessions Servlet Sessions Thread Pools Thread Pools Web Applications Web Applications Web Services Selected Web Services - History Web Services Counters Web Services Gateway Counters WebSphere Agent WebSphere Agent Events Application Server Status “Remote Configuration Requests attributes” on page 382 WebSphere App Server Application Server Request Times and Rates Garbage Collection Analysis WebSphere ESB Server Application Server Request Times and Rates Garbage Collection Analysis WebSphere Portal Server Application Server Request Times and Rates Garbage Collection Analysis WebSphere Process Server Application Server Request Times and Rates Garbage Collection Analysis WMQ Client Link Communications WMQ Client Link Communications WMQ Link Communications WMQ Link Communications Workload Management Workload Management Client Workload Management Server Workplace Mail Workplace Mail Service Alarm Manager attributes The Alarm Manager attributes provide information for the alarm management. Use these attributes to manage alarms fired by the application for each work manager. The attributes within this group are used to build the Alarm Manager workspace. Note: Chapter 4. ITCAM Agent for WebSphere 303 v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Alarms Canceled The number of alarms canceled by the application. The valid format is a positive integer. Alarms Created The total number of alarms created by all asynchronous scopes for the current Work Manager. The valid format is a positive integer. Alarms Fired The number of alarms fired. The valid format is a decimal (formatted to 3 decimal places). Alarms Latency Duration The latency of alarms fired in milliseconds. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Alarms Pending Size The number of alarms waiting to fire. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Alarms Rate The number of alarms firing per second. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Instrumentation Level For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Row Number The row number. The valid format is a positive integer. 304 ITCAM for Application Diagnostics: User Guide Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 18. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. Work Manager Name The name of the work manager. The value format is an alphanumeric string, with a maximum of 256 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Allocation Failure attributes The Allocation Failure attribute group provides information about the heap-allocation failure that caused the Java Virtual Machine hosting the application server to invoke its garbage-collection routine. You can use the Allocation Failure attributes in situations to determine the events that caused the JVM to invoke garbage collection. The attributes within this group are used to build the Allocation Failures workspace. Allocation Failure Number The identifier assigned to the current allocation-failure block, which is associated with a bar in the Heap Usage - History bar chart. The valid format is a positive integer. ASID The identifier (decimal) assigned to the address space running this servant region. Bytes Needed The number of bytes needed on the heap when this allocation failure occurred. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 305 GC Cycle Count The number of garbage-collection cycles caused by this allocation failure. The valid format is a positive integer. Heap Expanded The total number of kilobytes by which the heap expanded or contracted as a result of garbage collection. The valid format is a positive integer. Heap Free (%) after GC The percentage of heap space that is available after garbage collection. The valid format is a positive integer. Heap Status Whether the out-of-heap-space alert has been raised. Valid values are Normal and Out_of_heap_space. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Kbytes Free at Start of GC The number of kilobytes available in the heap before garbage collection began in response to this allocation failure. The valid format is a positive integer. Kbytes Freed by GC The number of kilobytes freed by the garbage collector for this allocation failure. The valid format is a positive integer. Kbytes Used The number of kilobytes in the heap that were in use when this allocation failure occurred. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Objects Moved The number of objects the garbage collector moved during compaction. The valid format is a positive integer. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID The unique identifier of the JVM process (the class ID of the JVM). The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 19. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. 306 ITCAM for Application Diagnostics: User Guide This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Time since Last Failure (ms) The time (in milliseconds) since the previous allocation failure. The valid format is a positive integer. Time to Complete (ms) The time (in milliseconds) required to complete the action that resulted from this allocation failure. The valid format is a positive integer. Total Kbytes Freed by GC The total number of kilobytes freed by the garbage collector in response to this allocation failure. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Application Health Status attributes The Application Health Status attributes provide information for real-time and historical application health status. The attributes within this group are used to build the Application Health Summary workspace. Application Health The combined application health level. Valid values are Unknown, Good, Fair, and Bad. Application ID The unique identifier that is assigned automatically when the application is first configured and is preserved during the whole application life cycle. The valid format is a positive integer or -1 which means that Application ID is aggregated statistic for all applications. Application Name The name of the application to which the request belongs. The valid format is an alphanumeric string, with a maximum of 256 characters. Application Status The current status of the monitored application. Valid values are Standby, Discovered, Unknown, Starting, Running, Stopping, Stopped, and Failed. Application Tier Health The health level of the application tier. Valid values are Unknown, Good, Fair, and Bad. Application tier health indicator is determined from EJB or custom request delays collected on the interval and compared against thresholds configured for application requests. ASID The identifier (decimal) assigned to the address space running this servant region. Backend Tier Health The health level of the backend tier. Backend tier health indicator is determined from JDBC, JCA, JNDI, JMS delays collected on the interval and compared against thresholds configured for application requests. Valid values are Unknown, Good, Fair, and Bad. Chapter 4. ITCAM Agent for WebSphere 307 Client Tier Health The health level of the client tier. Valid values are Unknown, Good, Fair, and Bad. Client tier health indicator is determined from servlet/JSP or portal delays collected on the interval and compared against thresholds configured for application requests. Completion Level The completion level of the requests during the interval. Valid values are Unknown, Good, Fair, and Bad. This attribute is determined from request data as the percentage of number of failed requests to the total number of application requests on the interval. Custom Requests The availability indicator of the custom requests. Valid values are Unknown, Good, Fair, and Bad. EJB Container The health level of the EJB container. Valid values are Unknown, Good, Fair, and Bad. This attribute is determined from EJB delay types collected during the interval and compared against application thresholds. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. JCA The overall health status of J2EE Connector Architecture (JCA) resources used by applications. Valid values are Unknown, Good, Fair, and Bad. This attribute is determined from JCA delay types collected during the interval and compared against application thresholds. JDBC The overall health status of Java DataBase Connectivity (JDBC) resources used by applications. Valid values are Unknown, Good, Fair, and Bad. This attribute is determined from JDBC delay types collected during the interval and compared against application thresholds. JNDI The overall health status of Java Naming and Directory Interface (JNDI) resources used by applications. Valid values are Unknown, Good, Fair, and Bad. This attribute is determined from JNDI delay types collected during the interval and compared against application thresholds. JMS The overall health status of Java Message Service (JMS) resources used by applications. Valid values are Unknown, Good, Fair, and Bad. This attribute is determined from JMS delay types collected during the interval and compared against application thresholds. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Portal Container The health level of the portal container. Valid values are Unknown, Good, Fair, and Bad. This attribute is determined from portal delay types collected during the interval and compared against application thresholds. Response Level The health level of the response time for the requests. Valid values are Unknown, Good, Fair, and Bad. This attribute is determined from application requests response times collected during the interval and compared against application thresholds. 308 ITCAM for Application Diagnostics: User Guide Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 20. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Indicates that this row is a summary row of statistical totals for all rows. Web Container The health level of the Web container. Valid values are Unknown, Good, Fair, and Bad. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Application Monitoring Configuration attributes The Application Monitoring Configuration attributes provide information for the Application Monitoring Configuration. Use these attributes to monitor different WebSphere applications running within an application server. The attributes within this group are used to build the Selected Application - Configuration workspace. Application Alias The alias name that you can optionally assign for the application. In practice, this attribute enables you to combine multiple applications under the same common alias and report their request in the Tivoli Enterprise Portal as it would come from same application. This attribute is blank by default. You can assign the value to it from Take Actions at any time in the application monitoring life cycle. The valid format is an alphanumeric string, with a maximum of 256 characters. App ID The unique identifier that is assigned automatically when the application is first configured and is preserved during the whole application life cycle. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 309 Application Name The name of the application to which the request belongs. You can define the pattern of this name in the Application Registry workspace. The valid format is an alphanumeric string, with a maximum of 256 characters. Bad Completion Rate (%) The bad completion rate threshold for the requests. The valid format is an alphanumeric string, with a maximum of 256 characters. Baselining Elapsed Time The number of seconds during which the application baselining has been running. The valid format is a positive integer. Baselining Status The current status of the application baselining process. Valid values are Idle, Running, and Standby. Baselining Scheduled Stop Time The date and time baselining is scheduled to finish. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 21. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Baselining Start Time The date and time when the application baselining was started. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 22. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Baselining Update Interval The number of seconds that defines how often active baselining data is incrementally updated to the monitoring agent. The valid format is a positive integer. Fair Completion Rate (%) The fair completion rate threshold for the requests. The valid format is an alphanumeric string, with a maximum of 256 characters. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. 310 ITCAM for Application Diagnostics: User Guide Monitoring Status The current application monitoring status. Valid values are Discovered, Enabled, Disabled, and Standby. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Data Monitoring Level The custom request aggregation level for all application requests. Valid values are Default, Disabled, Level1, and Level2. This attribute is set to Default when the application is first discovered. Request Data Sampling Rate The custom request aggregation rate for all application requests. The valid format is a positive integer. Reflex Automation Mode When reflex automation mode is enabled, application monitoring level is automatically updated on WASAppHealth* situation event. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 23. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Application Server Status attributes The Application Server Status attributes provide status information for all WebSphere application servers (and the WebSphere administrative server) being monitored by the agent. Chapter 4. ITCAM Agent for WebSphere 311 The attributes within this group are used to build the WebSphere Agent workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Cluster Name The name of the server group (cluster) that this application server belongs to. The valid format is an alphanumeric string, with a maximum of 128 characters. Cluster Type Indicates the type of the server group (cluster) the application server belongs to. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 128 characters. Process ID The process identifier of the Java virtual machine. The valid format is a positive integer. Regions Number The number of z/OS regions connected. This applies to z/OS environments only. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 24. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Mode The mode of the WebSphere Application Server. 312 ITCAM for Application Diagnostics: User Guide Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Server Origin Node Name Indicates the origin node name of the server subnode.The valid format is an alphanumeric string, with a maximum of 128 characters. Server Subnode Name The name of the server node in the navigation tree. The valid format is an alphanumeric string, with a maximum of 32 characters. Server Type The type of server process. The valid values are: Table 25. Types of server processes Server Type Definition Unknown The server type cannot be determined AppServer A process that executes applications AdminServer The administrative server that one uses when configuring WebSphere Application Server environments NodeAgent The WebSphere Application Server node agent JMSServer The WebSphere Application Server JMS server DeploymentMgr The WebSphere Application Server deployment (cell) manager ManagedProcess A standalone WebSphere Application Server process UnManagedProcess A WebSphere Application Server process that is managed by a WebSphere Application Server deployment manager through a node agent Start Date and Time The date and time when the WebSphere application server started. The valid format is a timestamp. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Status The status of the WebSphere application server. Valid values are Connected and Disconnected. WAS Cell Name The name of the WebSphere Application Server cell to which this application server belongs. The valid format is an alphanumeric string, with a maximum of 64 characters. WAS Configuration Repository Directory Name The name of the WebSphere Application Server configuration repository directory, which normally resides in the config subdirectory of the product installation root directory. The valid format is an alphanumeric string, with a maximum of 128 characters. WAS Node Name The name of the WebSphere Application Server node group to which this application server belongs. The valid format is an alphanumeric string, with a maximum of 64 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Chapter 4. ITCAM Agent for WebSphere 313 Application Server attributes The Application Server attributes provide the status and summary data for a specific WebSphere Application Server instance. The attributes provide performance data for the WebSphere Application Server runtime (JVM memory), thread pools, HTTP sessions, and configuration parameters. They also provide some information from other attribute groups to give an overall view of the WebSphere application server. Use the Application Server attributes in situations to monitor the health and performance of a WebSphere application server. The attributes within this group are used to build the WebSphere Application Server and the Pool Analysis Workspace workspaces. Note: v The attributes in this attribute group contain zeros for performance data if your site sets the configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes when you have installed and configured the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; this means the attributes in this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. ASID The identifier (decimal) assigned to the address space running this servant region. CPU Used (ms) Indicates the number of milliseconds the JVM CPU used during the interval. The valid format is a positive integer. CPU Used (%) Indicates the percentage of the JVM CPU used during the interval. For UNIX users, this attribute has a meaningful value only if the Tivoli Enterprise Monitoring Agent is running with superuser authority. The valid format is a decimal (formatted to 1 decimal place). Platform CPU Used (ms) Indicates the number of milliseconds the host platform (OS) CPU used during the interval. This feature does not apply to the z/OS platform. Garbage Collection Monitoring The monitoring level for garbage-collection data. Valid values are Disabled and Enabled. Instrumentation Level The JVM instrumentation level. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. 314 ITCAM for Application Diagnostics: User Guide JVM Memory Free (Kbytes) The JVM free memory size in Kbytes. JVM Memory Total (Kbytes) The JVM total memory size in Kbytes. JVM Memory Used (Kbytes) The JVM used memory size in Kbytes. JVM Memory Free (bytes) The JVM free memory size (in bytes). The valid format is a positive integer. JVM Memory Total (bytes) The JVM total memory size (in bytes). The valid format is a positive integer. JVM Memory Used (bytes) The JVM used memory size (in bytes). The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID The process identifier of the Java virtual machine. The valid format is a positive integer. Request Data Monitoring Level The monitoring level for request data stored by the Data Collector. Valid values are Disabled, Level1 edge request data, such as servlets and JSPs are displayed), and Level2 (nested request data such as JDBC and JMS requests are also displayed). Request Data Sampling Rate (%) The percentage of Level1 requests (that is, edge requests) being sampled. The valid format is a positive integer. Resource Data Monitoring The monitoring level for resource (that is, PMI) data stored by the Data Collector. Valid values are Disabled and Enabled. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12 character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 26. Format of the 12 character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. Chapter 4. ITCAM Agent for WebSphere 315 This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Instance Name The name of the WebSphere application server. This is a logical grouping of one or more server instances (called a "generic server" or "cluster") any one of which can run an application. The valid format is an alphanumeric string, with a maximum of eight characters. Server Mode Indicates the mode of the WebSphere Application Server. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Server Type The type of the WebSphere application server. Valid values are Unknown, AppServer, AdminServer, NodeAgent, JMSServer, DeploymentManager, ManagedProcess, and UnManagedProcess. Server Subnode Name Indicates the sub node name of the application server. Start Date and Time The date and time when the WebSphere application server started. The valid format is a timestamp. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Status The status of the WebSphere application server. Valid values are Connected and Disconnected. Summary Indicates that this row is a summary row of statistical totals for all rows. System Paging Rate (Kbytes/sec) The system paging rate in kilobytes per second during the interval. The valid format is a positive integer. Version The version of WebSphere Application Server. The valid format is an alphanumeric string, with a maximum of 8 characters. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Baseline attributes The Baseline attributes provide information for baseline extract data for the given application. The baselining collects statistical information about an application requests completion times and uses this information to assign fair and bad thresholds on the application requests. The product divides the whole request response times into buckets and collects individual hits into each bucket. Use these attributes to get statistics from individual requests collected during baselining interval. The attributes within this group are used to build the Selected Request - Baseline workspace. 316 ITCAM for Application Diagnostics: User Guide Application ID The unique identifier that is assigned automatically when the application is first configured and is preserved during the whole application life cycle. The valid format is a positive integer. Bad Hits (%) The percentage of bucket hits in the metric bad value zone. The valid format is a positive integer. Bucket Number The bucket number of the baselining data. The valid format is a positive integer. EJB (%) The average percent of time that bucket requests were executed inside EJB container. The valid format is a positive integer. Fair Hits (%) The percentage of bucket hits in the metric fair value zone. The valid format is a positive integer. Good Hits (%) The percentage of bucket hits in the metric good value zone. The valid format is a positive integer. Hits (%) The percentage of hits for the bucket during the baselining. The valid format is a positive integer. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. JCA (%) The average percent of time that bucket requests spent for JCA access. The valid format is a positive integer. JDBC (%) The average percent of time that bucket requests spent for JDBC access. The valid format is a positive integer. JMS (%) The average percent of time that bucket requests spent for JMS access. The valid format is a positive integer. JNDI (%) The average percent of time that bucket requests spent for JNDI access. The valid format is a positive integer. Lower Boundary (msec) The lower boundary of bucket response times in milliseconds. The valid format is a positive integer. Metric ID The metric identifier of the baselining data. The valid format is a positive integer. Metric Type The metric type of the baselining data. Valid formats are Request, Error, and Resource. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Portal (%) The average percent of time that bucket requests were executed inside portal container. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 317 Response Time Mean (msec) The mean time of bucket response times. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 27. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Selection Hits (%) The percentage of bucket hits in the metric selection value zone. The valid format is a positive integer. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Servlet JSP (%) The average percent of time that bucket requests were executed inside the servlet container. The valid format is a positive integer. Total Hits The total hits number for the bucket during the baselining. The valid format is a positive integer. Upper Boundary (msec) The upper boundary of bucket response times. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Client Communications attributes The Client Communications attributes display overall statistics about server-side monitoring and a client-side API to retrieve performance data. The attributes within this group are used to build the Client Communications workspace. Note: Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. 318 ITCAM for Application Diagnostics: User Guide Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. API Connections The number of API sessions being used by clients that are currently network connected to this application server. Some of these API connections might be being by internal system processes on behalf of a client. The valid format is a positive integer. Buffered Read (bytes) The number of bytes of data that have been received from the network and are held pending further processing. Large values might indicate that the application server is unable to process data fast enough to keep up with the clients attached. The valid format is a positive integer. Buffered Write (bytes) The number of bytes of data being held pending transmission. Large values might indicate network congestion or clients which are unable to process data fast enough to keep up with the application server. The valid format is a positive integer. Clients Attached The number of distinct client processes currently network connected to this application server. The valid format is a positive integer. Errors The communication errors that have occurred and resulted in a network connection to a client being disconnected. The valid format is a positive integer. Instrumentation Level The instrumentation level for the client communications. For WebSphere 5, the valid values are None, Low, Medium, High, and Maximum; for WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Message Read (bytes) The number of bytes of message data received from client processes over network connections. This does not include data used to negotiate the transmission of messages. The valid format is a positive integer. Messages Received at JMS 0 Priority (bytes) The number of messages received at JMS priority 0. The valid format is a positive integer. Messages Received at JMS 1 Priority (bytes) The number of messages received at JMS priority 1. The valid format is a positive integer. Messages Received at JMS 2 Priority (bytes) The number of messages received at JMS priority 2. The valid format is a positive integer. Messages Received at JMS 3 Priority (bytes) The number of messages received at JMS priority 3. The valid format is a positive integer. Messages Received at JMS 4 Priority (bytes) The number of messages received at JMS priority 4. The valid format is a positive integer. Messages Received at JMS 5 Priority (bytes) The number of messages received at JMS priority 5. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 319 Messages Received at JMS 6 Priority (bytes) The number of messages received at JMS priority 6. The valid format is a positive integer. Messages Received at JMS 7 Priority (bytes) The number of messages received at JMS priority 7. The valid format is a positive integer. Messages Received at JMS 8 Priority (bytes) The number of messages received at JMS priority 8. The valid format is a positive integer. Messages Received at JMS 9 Priority (bytes) The number of messages received at JMS priority 9. The valid format is a positive integer. Messages Sent at JMS 0 Priority (bytes) The number of messages transmitted at JMS priority 0. The valid format is a positive integer. Messages Sent at JMS 1 Priority (bytes) The number of messages transmitted at JMS priority 1. The valid format is a positive integer. Messages Sent at JMS 2 Priority (bytes) The number of messages transmitted at JMS priority 2. The valid format is a positive integer. Messages Sent at JMS 3 Priority (bytes) The number of messages transmitted at JMS priority 3. The valid format is a positive integer. Messages Sent at JMS 4 Priority (bytes) The number of messages transmitted at JMS priority 4. The valid format is a positive integer. Messages Sent at JMS 5 Priority (bytes) The number of messages transmitted at JMS priority 5. The valid format is a positive integer. Messages Sent at JMS 6 Priority (bytes) The number of messages transmitted at JMS priority 6. The valid format is a positive integer. Messages Sent at JMS 7 Priority (bytes) The number of messages transmitted at JMS priority 7. The valid format is a positive integer. Messages Sent at JMS 8 Priority (bytes) The number of messages transmitted at JMS priority 8. The valid format is a positive integer. Messages Sent at JMS 9 Priority (bytes) The number of messages transmitted at JMS priority 9. The valid format is a positive integer. Message Written (bytes) The number of bytes of message data sent to client processes over network connections. This does not include data used to negotiate the transmission of messages. The valid format is a positive integer. Messaging Engine Name The name of the message engine. The value format is an alphanumeric string, with a maximum of 256 characters. Multicast Send Messages The number of messages transmitted using multicast protocols. The valid format is a positive integer. Multicast Write The number of bytes transmitted using multicast protocols. The valid format is a positive integer. 320 ITCAM for Application Diagnostics: User Guide Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Reads The number of read operations used to receive data from client processes through network connections. The valid format is a positive integer. Reads Blocked The number of read operations that could not be completed immediately. This number can be used as an indicator of network congestion when communicating with client processes. The valid format is a positive integer. Received at High Priority (bytes) The number of bytes of data received at a high priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Received at Highest Priority (bytes) The number of bytes of data received at the highest possible priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Received at JMS 0 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 0 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 1 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 1 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 2 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 2 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 3 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 3 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 4 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 4 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 5 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 5 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from Chapter 4. ITCAM Agent for WebSphere 321 time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 6 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 6 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 7 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 7 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 8 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 8 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at JMS 9 Priority (bytes) The number of bytes of data received at the priority used by JMS priority 9 messages. Typically this is an accurate measure of the number of bytes of message data received at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Received at Low Priority (bytes) The number of bytes of data received at a low priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Received at Lowest Priority (bytes) The number of bytes of data received at the lowest possible priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Received at Very High Priority (bytes) The number of bytes of data received at a very high priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Received at Very Low Priority (bytes) The number of bytes of data received at a very low priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 28. Format of the 12-character timestamp Character String Meaning MM Month 322 ITCAM for Application Diagnostics: User Guide Table 28. Format of the 12-character timestamp (continued) Character String Meaning DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Sent at High Priority (bytes) The number of bytes of data transmitted at a high priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Sent at Highest Priority (bytes) The number of bytes of data transmitted at the highest possible priority for transmission. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Sent at JMS 0 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 0 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 1 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 1 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 2 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 2 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 3 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 3 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 4 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 4 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, Chapter 4. ITCAM Agent for WebSphere 323 from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 5 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 5 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 6 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 6 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 7 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 7 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 8 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 8 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at JMS 9 Priority (bytes) The number of bytes of data transmitted at the priority used by JMS priority 9 messages. Typically this is an accurate measure of the number of bytes of message data transmitted at this priority level. However, from time to time, control transmissions used to negotiate the flow of messages might be transmitted at this priority level. The valid format is a positive integer. Sent at Low Priority (bytes) The number of bytes of data transmitted at a low priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Sent at Lowest Priority (bytes) The number of bytes of data transmitted at the lowest priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Sent at Very High Priority (bytes) The number of bytes of data transmitted at a very high priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Sent at Very Low Priority (bytes) The number of bytes of data transmitted at a very low priority. Message data cannot be transmitted with this priority, so typically these bytes of data will comprise control transmissions used to negotiate the flow of messages. The valid format is a positive integer. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. 324 ITCAM for Application Diagnostics: User Guide Summary Whether this row is a summary row of statistical totals for all messaging engines. Valid values are No and yes. Total Read (bytes) The number of bytes of data received from client processes. This includes both message data and data used to negotiate the transmission of messages. The valid format is a positive integer. Total Written (bytes) The number of bytes of data sent to client processes. This includes both message data and data used to negotiate the transmission of messages. The valid format is a positive integer. Writes The number of write operations used to transmit data to client processes via network connections. The valid format is a positive integer. Writes Blocked The number of write operations that could not be completed immediately. This number can be used as an indicator of network congestion when communicating with client processes. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Container Object Pools attributes Use the Container Object Pools attributes in situations to monitor the effectiveness of the object cache and of resource usage. These attributes provide aggregated information for each defined EJB container that aggregates bean object pool performance for all Enterprise beans deployed to that container and aggregated information for the application server that aggregates bean object pool performance data for all Enterprise beans deployed to the application server. The attributes within this group are used to build the Container Object Pools workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Average Objects Discarded The average number of objects discarded each time the bean object pool was emptied of idle objects during the interval. The valid format is a decimal (formatted to 3 decimal places). Chapter 4. ITCAM Agent for WebSphere 325 Average Objects in Pool The average number of objects in the bean object pool during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Discard Count The number of times the object returned to the bean-object pool was discarded because the bean object pool was already full during the interval. The valid format is a positive integer. Discard Rate (per sec) The bean object pool discard rate (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Drain Count The number of times the bean object pool was found idle and an attempt was made to remove idle objects during the interval. The valid format is a positive integer. Drain Rate (per sec) The number of times (per second) that the bean object pool was found idle during the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Find Count The number of times a retrieval call found an available object in the bean object pool during the interval. The valid format is a positive integer. Find Rate (per sec) The availability of bean object pool retrievals (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Get Count The number of calls retrieving an object from the bean object pool during the interval. The valid format is a positive integer. Get Rate (per sec) The number of bean objects retrieved (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Interval (sec) The length (in seconds) of the interval. The valid format is a positive integer. Instrumentation Level The instrumentation level for this container. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Return Count The number of calls returning an object to the bean object pool during the interval. The valid format is a positive integer. Return Rate (per sec) The bean objects returned (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). 326 ITCAM for Application Diagnostics: User Guide Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 29. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Summary of All Containers Whether this row is a summary row of statistical totals aggregated over all bean object pools in the application server. Valid values are No and Yes. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Container Transactions attributes The Container Transactions attribute group provides performance information about transactions that run in each defined EJB container and an aggregated value for all transactions that run in the application server. Use the Container Transactions attributes in situations to monitor transaction activity for each EJB container and for the application server. The attributes within this group are used to build the Container Transactions workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. Chapter 4. ITCAM Agent for WebSphere 327 v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Global Transaction before Completion Duration (ms) The average duration before completion for global transactions during the interval. The valid format is a decimal (formatted to 3 decimal places). Global Transaction Commit Duration (ms) The time (in milliseconds) that the transaction required for its resolution phase during the interval. The valid format is a decimal (formatted to 3 decimal places). Global Transaction Commit Rate (per sec) The number of times (per second) global transactions were committed during the interval. The valid format is a decimal (formatted to 3 decimal places). Global Transaction Duration (ms) The average duration (in milliseconds) for global transactions during the interval. The valid format is a decimal (formatted to 3 decimal places). Global Transaction Optimize Rate (per sec) The number of times (per second) that global transactions were converted to single phase since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Global Transaction Prepare Duration (ms) The average preparation duration (in milliseconds) for global transactions during the interval. . The valid format is a decimal (formatted to 3 decimal places). Global Transaction Rollback Rate (per sec) The number of times (per second) that global transactions were undone because they could not complete during the interval. The valid format is a decimal (formatted to 3 decimal places). Global Transaction Timeout Rate (per sec) The number of global transaction timeouts (per second) since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Global Transaction Timeouts The number of global transactions that timed out during the interval. The valid format is a positive integer. Global Transactions Active The number of concurrently active global transactions running in the container during the interval. Global transactions involve multiple resource managers. The valid format is a decimal (formatted to 3 decimal places). Global Transactions Begin Rate (per sec) The number of times global transactions were started (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Global Transactions Begun The total number of global transactions that the server began during the interval. The valid format is a positive integer. 328 ITCAM for Application Diagnostics: User Guide Global Transactions Committed The number of global transactions that were completed during the interval. The valid format is a positive integer. Global Transactions Involve Rate (per sec) The number of times (per second) global transactions were involved during the interval. The valid format is a positive integer. Global Transactions Involved The number of global transactions that were involved at the server during the interval, including those that were begun or imported. The valid format is a positive integer. Global Transactions Rolled Back The total number of global transactions that were undone because they could not complete during the interval. The valid format is a positive integer. Global Transactions Optimized The number of global transactions converted to single phase for optimization since the previous sample. The valid format is a positive integer. Instrumentation Level The instrumentation level for this container. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the interval. The valid format is a positive integer. Local Transaction before Completion Duration (ms) The average duration before completion for local transactions during the interval. The valid format is a decimal (formatted to 3 decimal places). Local Transaction Commit Duration (ms) The average duration for commit for local transactions during the interval. The valid format is a decimal (formatted to 3 decimal places). Local Transaction Commit Rate (per sec) The number of local transactions (per second) committed during the interval. The valid format is a decimal (formatted to 3 decimal places). Local Transaction Duration (ms) The average duration (in milliseconds) of local transactions during the interval. The valid format is a decimal (formatted to 3 decimal places). Local Transaction Rollback Rate (per sec) The number of times (per second) that local transactions were undone because they could not be completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Local Transaction Timeout Rate (per sec) The number of local transactions that timed out per second during the interval. The valid format is a decimal (formatted to 3 decimal places). Local Transaction Timeouts The number of local transactions that timed out during the interval. The valid format is a positive integer. Local Transactions Active The number of concurrently active local transactions running in the container during the interval. Local transactions involve a single resource manager. The valid format is a decimal (formatted to 3 decimal places). Chapter 4. ITCAM Agent for WebSphere 329 Local Transactions Begin Rate (per sec) The number of times (per second) local transactions were started during the interval. The valid format is a positive integer. Local Transactions Begun The number of local transactions begun at the server since the previous sample. The valid format is a positive integer. Local Transactions Committed The number of local transactions committed during the interval. The valid format is a positive integer. Local Transactions Rolled Back The number of local transactions that were undone during the interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 30. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Data sources attributes The Data sources attributes provide database usage information. 330 ITCAM for Application Diagnostics: User Guide These attributes provide traffic information such as, response times for database requests, the frequencies at which database connections are created and destroyed, and how often databases are being accessed. The attributes within this group are used to build the Datasources workspace. Note: The attributes within this attribute group contain meaningful values only if your site has set the request data monitoring level to Level2 to collect data on data source requests. Application ID The unique identifier that is assigned automatically when the application is first configured and is preserved during the whole application life cycle. The valid format is a positive integer or -1 which means that Application ID is aggregated statistic for all applications. ASID The identifier (decimal) assigned to the address space running this servant region. Average Processing Time (ms) The total average processing time (in milliseconds) that the data source is used by an application. The valid format is a decimal (formatted to 3 decimal places). Average Query Processing Time (ms) The average time (in milliseconds) per request used by queries to the data source. The valid format is a decimal (formatted to 3 decimal places). Average Update Processing Time (ms) The average time (in milliseconds) per request used by updates to the data source. The valid format is a decimal (formatted to 3 decimal places). Connection Average Wait Time (ms) The average time (in milliseconds) that applications had to wait for a connection. The valid format is a decimal (formatted to 3 decimal places). Connection Count The number of connections to the data source. The valid format is a positive integer. Connection Max Wait Time (ms) The worst-case time (in milliseconds) that applications had to wait for a connection. The valid format is a positive integer. Connection Rate (per sec) The number of connection requests (per second) created for the data source. The valid format is a decimal (formatted to 3 decimal places). Connection Total Wait Time (ms) The total time (in milliseconds) that applications had to wait for a connection to the data source. The valid format is a positive integer. Database Product The name of the database product. The valid format is an alphanumeric string, with a maximum of 128 characters. Database Product Version The version of the database product. The valid format is an alphanumeric string, with a maximum of 128 characters. Datasource Name The name of the data source. The valid format is an alphanumeric string, with a maximum of 256 characters. Chapter 4. ITCAM Agent for WebSphere 331 Datasource Label A shortened version of Datasource Name, used to display the data source name in the chart view. The valid format is an alphanumeric string, with a maximum of 12 characters. Interval (sec) The length (in seconds) of the interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the application server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID The unique identifier of the process running the Java Virtual Machine (JVM). The valid format is a positive integer. Query Count The number of queries performed against the data source. The valid format is a positive integer. Query Rate (per sec) The number of queries (per second) being made to the data source. The valid format is a decimal (formatted to 3 decimal places). Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 31. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Sampling Rate (%) The percentage of edge requests-such as servlets and JSPs-that were sampled for data source requests during the interval. The valid format is a positive integer. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Indicates that this row is a summary row of statistical totals for all rows. 332 ITCAM for Application Diagnostics: User Guide Total Query Processing Time (ms) The total time (in milliseconds) used to process queries made to the data source. The valid format is a positive integer. Total Update Processing Time (ms) The total time (in milliseconds) used to update the data source. The valid format is a positive integer. Total Wait Time (ms) The time (in milliseconds) that applications had to wait for connections to the data source. The valid format is a positive integer. Update Count The number of updates performed against the data source. The valid format is a positive integer. Update Rate (per sec) The number of updates (per second) made to the data source. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces DB Connection Pools attributes The DB Connection Pools attributes provide information about the database connection pool for each defined data source, and an aggregated value that aggregates over all data sources. Examples of DB Connection Pools include; the number of threads waiting for a connection and the number of connections created and released. Use the DB Connection Pools attributes to analyze JDBC performance for WebSphere Application Server applications. The attributes within this group are used to build the DB Connection Pools and the Pool Analysis workspaces. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Application ID Indicates J2EE application ID. Average Free Pool Size Indicates the average size of the pool based upon the number of free connections. Average Pool Size The average size of the pool (based upon the number of connections) during the interval. The valid format is a decimal (formatted to 3 Chapter 4. ITCAM Agent for WebSphere 333 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Usage Time (ms) The average time (in milliseconds) a connection was in use; blank if no transactions are completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Average Wait Time (ms) The average time (in milliseconds) a client waited for a connection; blank if no transactions are completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Average Waiting Threads The average number of threads waiting for a connection during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Connection Allocation Rate (per sec) The connections allocated (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Connection Creation Rate (per sec) The connections created (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Connection Destruction Rate (per sec) The connections released (per second) during the interval. The valid format is a positive integer. Connection Handle Indicates the number of Connection objects in use for a particular connection pool. Connection Used The number of managed connection objects in use for a particular EIS product name. The valid format is a positive integer. Connections Allocated The number of connections allocated during the interval. The valid format is a positive integer. Connections Created The number of connections created during the interval. The valid format is a positive integer. Connections Destroyed The number of connections released during the interval. The valid format is a positive integer. Connections Granted The sum of connections allocated and connections created during the interval. The valid format is a positive integer. Datasource Label The abbreviated name of the data source. The valid format is an alphanumeric string, with a maximum of 32 characters. Datasource Name The name of the data source. The valid format is an alphanumeric string, with a maximum of 256 characters. Instrumentation Level The instrumentation level for the database connection pool for the data source. For WebSphere 5, the valid values are None, Low, Medium, 334 ITCAM for Application Diagnostics: User Guide High, and Maximum; for WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the interval. The valid format is a positive integer. JDBC Time (ms) Indicates the amount of time spent running in the JDBC driver which includes time spent in the JDBC driver, network, and database. Maximum Pool Size The maximum number of connections that can be created in this connection pool. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Pool Size Indicates the size of the connection pool. Percent of Time Pool at Max The average percentage of time the number of connections in the pool reached the maximum number during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Percent Used The average percentage of the connection pool in use during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Percent Used Bad The bad percent of pool usage by application. The valid format is a positive integer. Percent Used Fair The fair percent of pool usage by application. The valid format is a positive integer. Percent Used Good The good percent of pool usage by application. The valid format is a positive integer. Prep Statement Cache Discard Rate (per sec) The cache discards (per second) of prepared statements during the interval. The valid format is a decimal (formatted to 3 decimal places). Prep Statement Cache Discards The number of prepared statements discarded from the cache during the interval. The valid format is a positive integer. Pool Size Indicates the size of the connection pool. Return Count The number of connections that applications returned to the pool during the interval. The valid format is a positive integer. Return Rate (per sec) The number of connections (per second) returned since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Chapter 4. ITCAM Agent for WebSphere 335 Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 32. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Summary of All DB Connections Whether this row is a summary row of statistical totals collected for all the DB connection pools. Valid values are No and Yes. Thread Timeout Rate (per sec) The number of threads (per second) that timed out during the interval. The valid format is a decimal (formatted to 3 decimal places). Threads Timed Out The number of threads that timed out while waiting for a connection during the interval. The valid format is a positive integer. Total Usage (ms) The total time (in milliseconds) the connection object used. The valid format is a decimal (formatted to 3 decimal places). Total Wait (ms) The total time (in milliseconds) the connection object waited. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces DC Messages attributes The DC Messages attributes provide message information from WebSphere Data Collector. 336 ITCAM for Application Diagnostics: User Guide The attributes within this group are used to build the Log Analysis workspace. ASID The identifier (decimal) assigned to the address space running this servant region. Component The name of the component that caused the error. The value format is an alphanumeric string, with a maximum of 32 characters. Event Date and Time The date and time the event occurred. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 33. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. File Name The name of the file. The valid format is an alphanumeric string, with a maximum of 256 characters. Message Description The description of the message. The valid format is an alphanumeric string, with a maximum of 256 characters. Message ID The unique identifier of the message. The valid format is an alphanumeric string, with a maximum of 8 characters. Method Name The name of the method. The valid format is an alphanumeric string, with a maximum of 256 characters. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID Indicates the process ID of the JVM. Sequence Number The sequence number in the JMX notifications stream. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 337 Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Severity The severity of the message. Valid values are Info, Warning, Error, and Severe. Thread ID The identifier of the thread where the event occurred. The valid format is an alphanumeric string, with a maximum of 16 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces DCS Stack attributes The DCS Stack attributes reports information about the statistical data within the entire WebSphere Application Server domain, including multiple nodes and servers. Examples of DCS Stack attributes include; the incoming and outgoing message size, the number of incoming and outgoing messages, congestion events, and message buffer reallocations. The attributes within this group are used to build the DCS Stacks workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Average Incoming Message Size The average size (in bytes) of the messages that were received by the DCS stack. The valid format is a positive integer. Average Outgoing Message Size The average size (in bytes) of the messages that were sent through the DCS stack. The valid format is a positive integer. Coalesce Time The amount of time it actually takes to coalesce a view. The valid format is a decimal (formatted to 3 decimal places). DCS Stack Name The name of the Topic Space. The value format is an alphanumeric string, with a maximum of 256 characters. Group Size The size of the group the local member belongs to. The valid format is a positive integer. 338 ITCAM for Application Diagnostics: User Guide High Severity Congestion Events The number of times that a high severity congestion event for outgoing messages was raised. The valid format is a positive integer. Incoming Messages The number of messages received by the DCS stack. The valid format is a decimal (formatted to 3 decimal places). Instrumentation Level The instrumentation level for the DCS stack. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Join View Change Time The time to do a merge view change. The DCS stack is blocked during this time. The valid format is a decimal (formatted to 3 decimal places). Maximum Incoming Message Size The maximal size (in bytes) of the messages that were received by the DCS stack. The valid format is a positive integer. Maximum Outgoing Message Size The maximal size (in bytes) of the messages that were sent through the DCS stack. The valid format is a positive integer. Message Buffer Reallocations The number of message buffer reallocations due to inadequate buffer size. If this number is larger than 20 percent of the number of sent messages, contact IBM Support. The valid format is a positive integer. Minimum Incoming Message Size The minimal size (in bytes) of the messages that were received by the DCS stack. The valid format is a positive integer. Minimum Outgoing Message Size The minimal size (in bytes) of the messages that were sent through the DCS stack. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Outgoing Messages The number of messages sent through the DCS stack. The valid format is a positive integer. Remove View Change Time The time to do a split view change. The DCS stack is blocked during this time. The valid format is a decimal (formatted to 3 decimal places). Row Number The row number. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Chapter 4. ITCAM Agent for WebSphere 339 Table 34. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Sent Messages The number of messages sent through the DCS stack. The valid format is a positive integer. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and yes. Suspicions The number of times that the local member suspected other members. The valid format is a positive integer. Synchronization Completion Time The amount of time needed to guarantee that all view members are synchronized. The valid format is a decimal (formatted to 3 decimal places). Synchronization Timeouts The number of times that the synchronization procedure timed out. The valid format is a positive integer. View Changes The number of times that this member underwent view changes. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Durable Subscriptions attributes The Durable Subscriptions attributes display overall statistics about the durable subscriptions of a selected topic. A durable subscription can be used to preserve messages published on a topic while the subscriber is not active. The attributes within this group are used to build the Durable Subscriptions workspace. Note: 340 ITCAM for Application Diagnostics: User Guide v The attributes in this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. v Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Aggregate Message Wait Time The time spent by messages in the bus at consumption. If this time is not what was expected, view the message using the admin console to decide what action needs to be taken. The valid format is a positive integer. Assured Persistent Messages Consumed The number of Assured Persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Available Message The number of messages waiting to be consumed. The valid format is a positive integer. Best Effort Non-persistent Messages Consumed The number of best effort non-persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Express Non-persistent Messages Consumed The number of express non-persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Instrumentation Level The instrumentation level for the Durable Subscriptions. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Local Oldest Message Age The longest time any message has spent on this subscription. If this time is not what was expected, view the message using the admin console to decide what action needs to be taken. The valid format is a positive integer. Local Message Wait Time The time spent by messages on this durable subscription at consumption. If this time is not what was expected, view the message using the admin console to decide what action needs to be taken. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 341 Messaging Engine Name The name of the message engine. The value format is an alphanumeric string, with a maximum of 256 characters. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Reliable Non-persistent Messages Consumed The number of reliable non-persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Reliable Persistent Messages Consumed The number of Reliable Persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 35. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Subscription Name The name of the subscriptions. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. Topic Space Name The name of the topic space. The valid format is an alphanumeric string, with a maximum of 256 characters. Total Messages Consumed The total number of messages consumed from this durable subscription. The valid format is a positive integer. 342 ITCAM for Application Diagnostics: User Guide For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Dynamic Cache attributes The Dynamic Cache attribute group provides information about the dynamic cache. WebSphere Application Server consolidates several caching activities, including servlets, Web services, and WebSphere commands, into one service called the dynamic cache. These caching activities work together to improve application performance and share many configuration parameters, which are set in an application server's dynamic cache service. The dynamic cache works within an application server Java Virtual Machine (JVM), intercepting calls to cacheable objects, for example, through a servlet's service method or a command's execute method. It either stores the object's output to, or serves the object's content from, the dynamic cache. The attributes within this group are used to build the Cache Analysis workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Cache Instance Name Indicates the cache instance name. Cache Instance Type Indicates Cache instance type. Current In-Memory Cache Size The number of cache entries currently in memory. The valid format is a positive integer. In-Memory and Disk Timeout Rate (per sec) The rate (per second) of total in-memory and disk timeouts for the sampling interval. The valid format is a decimal (formatted to 3 decimal places). In-Memory and Disk Timeouts The total number of in-memory and disk timeouts during the sampling interval. The valid format is a positive integer. Instrumentation Level The instrumentation level for the dynamic cache. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Chapter 4. ITCAM Agent for WebSphere 343 Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Maximum In-Memory Cache Size The maximum number of cache entries in memory. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 36. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Summary of Cache Indicates that this row is a summary row of statistical totals collected for all the cache object types. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Dynamic Cache Templates attributes The Dynamic Cache Templates attribute group provides information about the cache template data. 344 ITCAM for Application Diagnostics: User Guide A cache template is an object type defined by a cache policy specified in the WebSphere Application Server cachespec.xml file. A cache policy specifies the cache rules indicating what will be cached, the invalidation, timeout conditions, and other data. The attributes within this group are used to build the Cache Analysis workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Cache Instance Name The cache instance name. Cache Instance Type The cache instance type. Cache Miss Rate (per sec) The rate (per second) of requests for this cacheable object type that were not found in the cache during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Cache Misses The number of requests for this cacheable object type that were not found in the cache (in memory, on disk or on other cooperating caches); this would have caused the underlying servlet or command to be executed in order to obtain the results. The valid format is a positive integer. Cache Object Type The name of the object type specified in the cache policy of the cache spec XML file. The valid format is an alphanumeric string, with a maximum of 256 characters. Client Request Rate (per sec) The request rate (per second) for this cacheable object type made by clients directly accessing this application server. The valid format is a decimal (formatted to 3 decimal places). Client Requests The number of requests for this cacheable object type made by clients directly accessing this application server. The valid format is a positive integer. Cluster Request Rate (per sec) The request rate (per second) for this cacheable object type made by cooperating caches in this cluster. The valid format is a decimal (formatted to 3 decimal places). Cluster Requests The number of requests for this cacheable object type made by cooperating caches in this cluster. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 345 Current Cache Size The current number of entries for this cacheable object type present in the dynamic cache. The valid format is a positive integer. Disk Hit Rate (per sec) The rate (per second) of the requests for this cacheable object type served from disk during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Disk Hits The number of requests for this cacheable object type that were served from disk; this is applicable only when the disk offload is turned on for the dynamic cache. The valid format is a positive integer. Explicit Disk Invalidations Rate (per sec) The rate at which the entries of this cacheable object type were removed from disk due to explicit invalidations issued by the clients. The valid format is a decimal (formatted to 3 decimal places). Explicit Disk Invalidations The number of entries of this cacheable object type that were removed from disk due to explicit invalidations issued by the clients (directly accessing the application server and by remote JVMs in the cluster). The valid format is a positive integer. Explicit Local Invalidation Rate (per sec) The rate at which the explicit invalidations were received for this cacheable object type from clients accessing the application server directly, either programmatically or by a cache policy. The valid format is a decimal (formatted to 3 decimal places). Explicit Local Invalidations The number of explicit invalidations received for this cacheable object type from clients accessing the application server directly, either programmatically or by a cache policy. The valid format is a positive integer. Explicit Memory Invalidation Rate (per sec) The rate at which the entries of this cacheable object type were removed from memory due to explicit invalidations issued by the clients. The valid format is a decimal (formatted to 3 decimal places). Explicit Memory Invalidations The number of entries of this cacheable object type that were removed from memory due to explicit invalidations issued by the clients (directly accessing the application server and by remote JVMs in the cluster). The valid format is a positive integer. Explicit Remote Invalidation Rate (per sec) The rate at which explicit invalidations were received for this cacheable object type from cooperating JVMs in the cluster. The valid format is a decimal (formatted to 3 decimal places). Explicit Remote Invalidations The number of explicit invalidations received for this cacheable object type from cooperating JVMs in the cluster. The valid format is a positive integer. Instrumentation Level The PMI instrumentation level set for collecting dynamic cache data. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. 346 ITCAM for Application Diagnostics: User Guide Least Recently Used Invalidation Rate (per sec) The rate (per second) at which entries of this cacheable object type were evicted from memory by a least-recently-used algorithm. The valid format is a decimal (formatted to 3 decimal places). Least Recently Used Invalidations The number of entries of this cacheable object type that were evicted from memory by a least-recently-used algorithm. This happens when the in-memory cache becomes full and subsequent requests for new entries have to be accommodated. The entries removed from memory are passivated to disk if disk overflow is enabled. If this number is high, consider increasing the in-memory cache size. The valid format is a positive integer. Memory Hit Rate (per sec) The rate (per second) of the requests for this cacheable object type served from memory during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Memory Hits The number of requests for this cacheable object type served from memory. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Remote Cache Entries Received The number of entries received from cooperating dynamic caches in this cluster. The valid format is a positive integer. Remote Cache Entry Receive Rate (per sec) The rate (per second) of entries received from cooperating dynamic caches in this cluster for the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Remote Hit Rate (per sec) The rate (per second) of the requests for this cacheable object type served from other JVMs in the cluster during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Remote Hits The requests for this cacheable object type served from other JVMs in the cluster. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 37. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Chapter 4. ITCAM Agent for WebSphere 347 Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Summary of Cache Templates Whether this row is a summary row of statistical totals collected for all the cache object types. The valid values are No and Yes. Template Row Number The number of the row in the report that displays in the workspace, which is associated with a bar in the Ten Worst Hits Rate bar chart. The valid format is an integer. Timeout Invalidation Rate (per sec) The rate (per second) at which entries are removed from the cache (memory or disk) because their timeout has expired. The valid format is a decimal (formatted to 3 decimal places). Timeout Invalidations The number of entries of this cacheable object type that were removed from memory or disk because their timeout (as specified in the cache spec XMLfile) has expired. The valid format is a positive integer. Total Explicit Invalidation Rate (per sec) The rate at which invalidations were issued for entries for this cacheable object type explicitly by the clients. The valid format is a decimal (formatted to 3 decimal places). Total Explicit Invalidations The number of invalidations issued for entries of this cacheable object type explicitly by the clients (directly accessing the application server and by remote JVMs in this cluster). The valid format is a positive integer. Total Hit Rate (per sec) The total hit rate per second. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces EJB Containers attributes The EJB Containers attributes provide aggregated information for each defined EJB container that aggregates bean performance data for all Enterprise beans deployed to that container. The attributes also provide aggregated information for the application server that aggregates bean performance data for all Enterprise beans deployed to the application server. These attributes provide load values, response times, and lifecycle activities for Enterprise beans. Use the EJB Containers attributes in situations to monitor application server load and resource usage. 348 ITCAM for Application Diagnostics: User Guide The attributes within this group are used to build the EJB Containers workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Activate Count The number of times a bean instance was activated during the interval. The valid format is a positive integer. Activation Rate (per sec) The bean activations (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Active Method Count The average number of bean methods concurrently active during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Concurrently Live Beans The average number of bean objects concurrently live during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Concurrently Ready Beans The average number of beans concurrently active during the last interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Create Average Time (ms) The average method response time for creates during the interval. The valid format is a decimal (formatted to 3 decimal places). Create Count The number of bean create calls during the interval. The valid format is a positive integer. Creation Rate (per sec) The bean create calls (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Chapter 4. ITCAM Agent for WebSphere 349 Destroy Count The number of times bean objects were destroyed by garbage collection during the interval. The valid format is a positive integer. Destruction Rate (per sec) The beans destroyed by garbage collection (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Entity Bean Load Count The number of times an entity bean data was loaded during the interval. The valid format is a positive integer. Entity Bean Load Rate (per sec) The number of entity beans (per second) that were loaded during the interval. The valid format is a decimal (formatted to 3 decimal places). Entity Bean Store Count The number of times entity bean data was written to the database during the interval. The valid format is a positive integer. Entity Bean Store Rate (per sec) The entity bean stores (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Instantiate Count The number of times bean objects were instantiated during the interval. The valid format is a positive integer. Instantiation Rate (per sec) The number of times bean objects were instantiated (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Instrumentation Level The instrumentation level for this EJB container. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the interval. The valid format is a positive integer. Method Average Response Time (ms) The average response time (in milliseconds) on remote interface methods for all beans during the interval. The valid format is a decimal (formatted to 3 decimal places). Method Invocation Count The number of method invocations during the interval. The valid format is a positive integer. Method Invocation Rate (per sec) The rate of invocations (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Passivate Count The number of times a bean instance was passivated during the interval. The valid format is a positive integer. Passivation Rate (per sec) The bean passivations (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). 350 ITCAM for Application Diagnostics: User Guide Removal Rate (per sec) The bean remove calls (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Remove Average Time (ms) The average method response time for removes during the interval. The valid format is a decimal (formatted to 3 decimal places). Remove Count The number of bean remove calls during the interval. The valid format is a positive integer. Request Count The number of requests during the interval. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 38. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Summary of All Containers Whether this row is a summary row of statistical totals collected for all EJB containers. The valid values are No and Yes. Total (ms) The total time used during the interval. The valid format is a decimal (formatted to 3 decimal places). Total Create (ms) The total time (in milliseconds) of bean create calls during the interval. The valid format is a decimal (formatted to 3 decimal places). Total Method Invocation (ms) The total time (in milliseconds) of method invocations during the interval. The valid format is a decimal (formatted to 3 decimal places). Chapter 4. ITCAM Agent for WebSphere 351 Total Remove (ms) The total time (in milliseconds) of bean remove calls during the interval. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Enterprise Java Beans attributes The Enterprise Java Beans attributes provide performance information about each Enterprise Java Bean (EJB) deployed to the application server. These attributes provide information about bean activity and bean object pool activity. Use the Enterprise Java Beans attributes in situations to monitor performance and problems for an individual bean. The attributes within this group are used to build the Enterprise Java Beans workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then reselect it later. Each time you reselect the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Activate Count The number of times a bean instance was activated during the interval. The valid format is a positive integer. Activation Rate (per sec) The bean instance activations (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Active Method Count The average number of invocations being processed concurrently for all the methods during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Application EJB Module Name The name of the Web Application or EJB Module. The valid format is an alphanumeric string, with a maximum of 64 characters. Average Concurrently Live Beans The average number of live bean objects during the interval, which include objects that were instantiated but not yet destroyed. This is a load value providing data on the average level as a function of time. It is the average number of bean objects that exist in the run time, whether active or pooled. This is a measure of how many resources the home interface is consuming. 352 ITCAM for Application Diagnostics: User Guide The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Concurrently Ready Beans The average number of active beans during the interval. This is a load value providing data on the average level as a function of time. It is the average number of bean instances of the home that are in the ready state. This is a measure of how busy the server is. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Objects Discarded The average number of objects that were discarded each time the bean object pool was emptied of idle objects during the interval. The valid format is a decimal (formatted to 3 decimal places). Average Objects in Pool The average number of objects in the bean object pool during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Bean Name The name of the Enterprise JavaBean (EJB). This name prefixes the application name and the EJB jar name. The valid format is an alphanumeric string, with a maximum of 128 characters. Bean Type The type of bean. Valid values are Stateless, Stateful, Entity, and Message Driven. Create Average Time (ms) The average method response time to create bean objects during the interval. The valid format is a decimal (formatted to 3 decimal places). Create Count The number of create calls during the interval. The valid format is a positive integer. Creation Rate (per sec) The create calls (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Destroy Count The average number of times bean objects were destroyed by garbage collection during the interval. The valid format is a positive integer. Destruction Rate The rate of destructions (per second) for bean objects by the garbage collector during the interval. The valid format is a decimal (formatted to 3 decimal places). Discard Count The number of times the returned object to the bean object pool was discarded because the bean object pool was already full during the interval. The valid format is a positive integer. Discard Rate (per sec) The bean object pool discards (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Chapter 4. ITCAM Agent for WebSphere 353 Drain Count The number of times the bean object pool was found idle and an attempt was made to remove idle objects during the interval. The valid format is a positive integer. Drain Rate (per sec) The drain rate (per second) for the bean object pool during the interval. The valid format is a decimal (formatted to 3 decimal places). Entity Bean Load Count The number of times bean data was loaded during the interval. The valid format is a positive integer. Entity Bean Load Rate (per sec) The bean data loads (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Entity Bean Store Count The number of times bean data was written to the database during the interval. The valid format is a positive integer. Entity Bean Store Rate (per sec) The rate at which data was written (per second) to the database for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Find Count The number of times a retrieval call found an object available in the bean object pool during the interval. The valid format is a positive integer. Find Rate (per sec) The bean object pool retrieve availability (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Get Count The number of calls that retrieved an object from the bean object pool during the interval. The valid format is a positive integer. Get Rate (per sec) The number of times bean objects were retrieved (per second) during the interval. The valid format is a decimal (formatted to 3 decimal places). Instantiate Count The number of times bean objects were created during the interval. The valid format is a positive integer. Instantiation Rate (per sec) The bean objects created (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Instrumentation Level The instrumentation level of this enterprise bean. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the interval. The valid format is a positive integer. Method Average Response Time (ms) The average response time (in milliseconds) for all methods of the remote interface for this bean during the interval. The valid format is a decimal (formatted to 3 decimal places). Method Invocation Rate (per sec) The invocations (per second) for all methods during the sampling interval. This is a load value that provides data on the average level as a function of time. This is a measure of how busy the server is. The valid format is a decimal (formatted to 3 decimal places). 354 ITCAM for Application Diagnostics: User Guide Method Invocations The total number of remote interface method invocations during the interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Passivate Count The number of times a bean instance was passivated during the interval. The valid format is a positive integer. Passivation Rate (per sec) The number of passivations (per second) during the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Removal Rate (per sec) The remove calls (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Remove Average Time (ms) The average method response time to remove bean objects during the interval. The valid format is a decimal (formatted to 3 decimal places). Remove Count The number of remove calls during the interval. The valid format is a positive integer. Return Count The number of calls that returned an object to the bean object pool during the interval. The valid format is a positive integer. Return Rate (per sec) The bean object pool returns (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 39. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Chapter 4. ITCAM Agent for WebSphere 355 Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Garbage Collection Analysis attributes The Garbage Collection Analysis attribute group provides information about the garbage collector in the Java Virtual Machine that is hosting the application server. The garbage collection attributes report the number of times the collector ran during the interval and the resulting number of objects that the collector freed. Use the Garbage Collection Analysis attributes in situations to monitor garbage-collection performance and possible problems. The attributes within this group are used to build the Garbage Collection Analysis and the WebSphere Application Server workspaces. ASID The identifier (decimal) assigned to the address space running this servant region. GC Rate (per min) The rate (per minute) at which the Java Virtual Machine is invoking its garbage-collection routine. The valid format is a decimal (formatted to 3 decimal places). Heap Used (%) The percentage of heap used at the end of the interval. The valid format is a decimal (formatted to 1 decimal places). Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Kbytes Free The total number of free kilobytes in the heap at the end of the last garbage-collection cycle during the interval. The valid format is a positive integer. Kbytes Total Freed by GC The total number of kilobytes freed by the garbage collector during the interval. The valid format is a positive integer. Kbytes Used The number of kilobytes in the heap that were in use at the end of the last garbage collection cycle during the interval. The valid format is a positive integer. Kbytes Used Delta The difference between the Kbytes Used value for this interval and the Kbytes Used value for the prior interval. The valid format is a positive or negative integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 256 characters. 356 ITCAM for Application Diagnostics: User Guide Objects Freed The number of objects the garbage collector freed during the interval (only supported for IBM JDK). The valid format is a positive integer. Not monitored on non-IBM Java Virtual Machines, including those commonly used on HP-UX and Solaris platforms. Objects Moved The number of objects the garbage collector moved during the interval (only supported for IBM JDK). The valid format is a positive integer. Not monitored on non-IBM Java Virtual Machines, including those commonly used on HP-UX and Solaris platforms. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID The unique identifier of the JVM process (the class ID of the JVM). The valid format is a positive integer. Real Time (ms) The total real time (in milliseconds) the garbage collector required during the most recent cycle. The valid format is a positive integer. Real Time (%) The percentage of real time that the garbage collector was active during the interval. The valid format is a decimal (formatted to 1 decimal place). Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 40. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Indicates that this row is a summary row of statistical totals for all rows. Times Run The number of times the garbage collector ran during the interval. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces Chapter 4. ITCAM Agent for WebSphere 357 v Attribute groups used by the predefined workspaces Garbage Collection Cycle attributes The Garbage Collection Cycle attribute group provides information about a single garbage-collection cycle that the Java Virtual Machine hosting the application server performed. The Garbage Collection Cycle attributes report the free heap space both before and after garbage collection, the heap space freed, and the number of objects moved during garbage collection. Use the Garbage Collection Cycle attributes in situations to examine the results of a particular garbage collection. The attributes within this group are used to build the Garbage Collections Selected Allocation Failure workspace. Allocation Failure Number The identifier assigned to the allocation-failure block for which the JVM ran the current garbage-collection cycle, which is associated with a bar in the Heap Usage - History bar chart. If your Java code called System.gc to invoke garbage collection, this number is 0. The valid format is a positive integer. ASID The identifier (decimal) assigned to the address space running this servant region. Compact (ms) The time (in milliseconds) required for the compaction phase of the garbage-collection cycle. The valid format is a positive integer. Compaction Reason The code describing the reason garbage collection was initiated. The valid format is a positive integer. The compaction codes are: Table 41. Reasons for initiating garbage collection Compaction Code Definition 1 Insufficient free space for the allocation request following the mark and sweep phases. 2 The heap is fragmented and will benefit from a compaction. 3 Less than 15% free space available. 4 A call to System.gc requested garbage collection. 5 Less than 5% free space available. 6 Less than 128K free space available. 7 Parameter Xcompactgc specified. 8 The transient heap has less than 5% free space available. 9 The heap is fragmented (this code marks additional reasons for compaction apart from compaction code 2). Final References The number of final reference objects collected during this garbage-collection cycle. The valid format is a positive integer. Garbage Collection Date and Time The date and time the Java Virtual Machine invoked the garbage collector. The valid format is a 16-character timestamp. This attribute was designed for logging and reporting data-collection times rather than 358 ITCAM for Application Diagnostics: User Guide for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Note to Solaris and HP-UX users: Since allocation-failure information is not recorded on these platforms, this column is always empty on these platforms. Garbage Collection Number The number of this garbage-collection cycle. The valid format is a positive integer. Heap Capacity (Kbytes) The total number of kilobytes allocated to the main heap after this garbage-collection cycle. The valid format is a positive integer. Heap Free (%) after GC The percentage of heap space that is available after this garbage-collection cycle. The valid format is a decimal (formatted to 1 decimal place). Heap Space Free (Kbytes) The number of kilobytes available within the heap after this garbage-collection cycle. The valid format is a positive integer. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. KBytes Free at Start of GC The number of kilobytes available in the heap before garbage collection began. The valid format is a positive integer. Kbytes Freed The number of kilobytes freed by the garbage collector. The valid format is a positive integer. Kbytes Moved The number of kilobytes moved on the heap during this compaction. The valid format is a positive integer. Kbytes Used The number of kilobytes in the heap that were in use after this garbage-collection cycle. The valid format is a positive integer. Mark (ms) The time (in milliseconds) required for the mark phase of the garbage-collection cycle. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Objects Moved The number of objects the garbage collector moved during this compaction. The valid format is a positive integer. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Phantom References The number of phantom reference objects collected during this garbage-collection cycle. "Phantom" refers to a specific Java class that defines object reachability. The valid format is a positive integer. Process ID The unique identifier of the JVM process (the class ID of the JVM). The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR Chapter 4. ITCAM Agent for WebSphere 359 and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 42. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Soft References The number of soft reference objects collected during this garbage-collection cycle. "Soft" refers to a specific Java class that defines object reachability. The valid format is a positive integer. Sweep (ms) The time (in milliseconds) required for the sweep phase of the garbage-collection cycle. The valid format is a positive integer. Time to Complete (ms) The time (in milliseconds) required to complete this garbage-collection cycle. The valid format is a positive integer. Weak References The number of weak reference objects collected during this garbage-collection cycle. "Weak" refers to a specific Java class that defines object reachability. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces High Availability Manager attributes The High Availability Manager attributes provide aggregated information about the high availability managers. The attributes within this group are used to build the High Availability Manager workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after 360 ITCAM for Application Diagnostics: User Guide installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Bulletin-Board Rebuild Time The time taken (in milliseconds) to rebuild the global state of the bulletin-board. During this time no messages will be received by the subscribers. If this time is too high, and is unacceptable, you may want to increase the number of coordinators. The valid format is a decimal (formatted to 3 decimal places). Bulletin-Board Subjects The total number of subjects managed. The valid format is a positive integer. This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Bulletin-Board Subscriptions The total number of bulletin-board subscriptions. The valid format is a positive integer. This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Group State Rebuild Time The time taken (in milliseconds) to rebuild the global group state. During the rebuild time, no fail-over can happen. If this time is too high and is unacceptable for the desired availability, you may want to increase the number of coordinators. For proper operation of this counter, you must host the active coordinator in an application server other than the deployment manager. The valid format is a decimal (formatted to 3 decimal places). Instrumentation Level The instrumentation level for availability manager counters. For WebSphere 5, the valid values are None, Low, Medium, High, and Maximum; for WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Local Bulletin-Board Subjects The total number of subjects being posted to locally. The number includes the proxy postings (if any) done by the core group bridge service on behalf of servers belonging to different WebSphere cells. The valid format is a positive integer. This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Local Bulletin-Board Subscriptions Indicates the total number of bulletin-board subscriptions being posted to locally. Chapter 4. ITCAM Agent for WebSphere 361 Local Groups The total number of local groups. The valid format is a positive integer. This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Row Number The row number. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 43. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces J2C Connection Pools attributes The J2C Connection Pools attribute group provides information about connectors that adhere to J2C, the WebSphere Application Server implementation of the J2C architecture. Data counters for this category contain usage information about the J2C architecture that enables enterprise beans to connect and interact with procedural 362 ITCAM for Application Diagnostics: User Guide backend systems, such as Customer Information Control System (CICS) and Information Management System (IMS). Examples include the number of managed connections or physical connections and the total number of connections or connection handles. The attributes within this group are used to build the J2C Connection Pools workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Application ID Indicates J2EE application ID. Average Free Connections The average number of free Managed Connections for the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Pool Size The average number of Managed Connections for the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Usage Time (ms) The average time (in milliseconds) that connections are in use (measured from when the connection is allocated to when it is returned). The valid format is a decimal (formatted to 3 decimal places). Average Wait Time (ms) The average waiting time (in milliseconds) until a connection is granted for the interval. The valid format is a decimal (formatted to 3 decimal places). Concurrent Waiting Threads The average number of threads concurrently waiting for a connection for the interval. The valid format is a positive integer. This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Chapter 4. ITCAM Agent for WebSphere 363 Connection Allocation Rate (per sec) The rate (per second) of application connections allocated from Managed Connections for the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Connection Creation Rate (per sec) The rate (per second) of Managed Connections created for the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Connection Destruction Rate (per sec) The rate (per second) of Managed Connections destroyed for the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Connection Factory Name The name of the connection factory. The valid format is an alphanumeric string, with a maximum of 256 characters. Connection Handles The number of open application connections that have been allocated from the managed connections. The valid format is a positive integer. Connection Pool Timeout Rate (per sec) The rate (per second) of connection pool timeouts for the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Connection Pool Timeouts The number of faults, such as timeouts, in connection pools for the sampling interval. The valid format is a positive integer. Connection Return Rate (per sec) The rate (per second) of allocated application connections that have been returned for the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Connections Allocated The number of application connections allocated from Managed Connections. The valid format is a positive integer. Connections Created The total number of Managed Connections created during the sampling interval. The valid format is a positive integer. Connections Destroyed The number of Managed Connections destroyed during the sampling interval. The valid format is a positive integer. Connections Granted The number of Managed Connections granted during the interval. The valid format is a positive integer. Connections Returned The number of allocated application connections that have been returned (closed) during the sampling interval. The valid format is a positive integer. Connections Used The number of Managed Connection objects available in a particular connection pool; this number includes all Managed Connection objects that have been created but not destroyed. The valid format is a positive integer. Factory Label The abbreviated name of the connection factory. The valid format is an alphanumeric string, with a maximum of 32 characters. Instrumentation Level The instrumentation level for the J2C connection pools. For WebSphere 5, the valid values are None, Low, Medium, High, and Maximum; for WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. 364 ITCAM for Application Diagnostics: User Guide Interval Time The length (in seconds) of the sampling interval. The valid format is a positive integer. Maximum Pool Size The maximum number of managed connections that can be created in this connection pool (blank for each individual managed connection). The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Percent of Time Pool at Max The average percent of the time that all connections are in use for the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Percent Used Bad The bad percent of pool usage by application. The valid format is a positive integer. Percent Used Fair The fair percent of pool usage by application. The valid format is a positive integer. Percent Used Good The good percent of pool usage by application. The valid format is a positive integer. Pool Used (%) The average percent of the pool that is in use for the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Row Number The number of the row within the report, which corresponds to a bar in the Highest Miss Rates bar chart. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 44. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Chapter 4. ITCAM Agent for WebSphere 365 Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Summary of J2C Connections Whether this row is a summary row of statistical totals collected for all the J2C connection pools. Valid values are No and Yes. Total Usage (ms) The total time (in milliseconds) the connection object used. The valid format is a decimal (formatted to 3 decimal places). Total Wait (ms) The total time (in milliseconds) the connection object waited. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces JMS Summary attributes The JMS Summary attributes provide information about how WebSphere Application Server applications are interacting with messaging middleware (WebSphere MQ) using the Java Messaging Service (JMS). It provides such information as which queue managers and queues are being used and how many messages are being read and written. The attributes within this group are used to build the JMS Summary workspace. Note: The attributes within this attribute group contain meaningful values only if your site has set the request data monitoring level to Level2 to collect data on JMS requests. Application ID The unique identifier that is assigned automatically when the application is first configured and is preserved during the whole application life cycle. The valid format is a positive integer or -1 which means that Application ID is aggregated statistic for all applications. ASID The identifier (decimal) assigned to the address space running this servant region. Average Processing Time (ms) The average time (in milliseconds) per request using the JMS. The valid format is a decimal (formatted to 3 decimal places). Browse Average Time (ms) The average time (in milliseconds) for each browse request from the queue. The valid format is a decimal (formatted to 3 decimal places). 366 ITCAM for Application Diagnostics: User Guide Browse Count The number of messages browsed from the queue. The valid format is a positive integer. Browse Rate (per sec) The number of messages (per second) browsed from a JMS queue. The valid format is a decimal (formatted to 3 decimal places). Browse Total Time (ms) The total time (in milliseconds) consumed by browse requests from the queue. The valid format is a positive integer. Full Name The complete name of the message queue, which consists of the queue manager name concatenated to the queue name and separated by a slash. The valid format is an alphanumeric string, with a maximum of 100 characters. Interval (sec) The length (in seconds) of the interval. The valid format is a positive integer. JMS Connection Label A shortened version of the full name. The valid format is an alphanumeric string, with a maximum of 12 characters. Manager Name The name of the WebSphere MQ queue manager. This attribute is blank if WebSphere MQ is not being used. The valid format is an alphanumeric string, with a maximum of 48 characters. Name The name of the WebSphere MQ queue. The valid format is an alphanumeric string, with a maximum of 48 characters. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the application server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID The unique identifier of the JVM process (the class ID of the JVM). The valid format is a positive integer. Publish Average Time (ms) The average time (in milliseconds) for each publish request to be sent to the queue. The valid format is a decimal (formatted to 3 decimal places). Publish Count The number of publish requests sent to the queue. The valid format is a positive integer. Publish Rate (per sec) The number of publish requests (per second) sent to a JMS queue. The valid format is a decimal (formatted to 3 decimal places). Publish Total Time (ms) The total time (in milliseconds) consumed by all publish requests for the queue. The valid format is a positive integer. Receive Average Time (ms) The average time (in milliseconds) for each get from the queue. The valid format is a decimal (formatted to 3 decimal places). Receive Count The number of destructive gets from the queue. The valid format is a positive integer. Receive Rate (per sec) The number of destructive gets (per second) made from the queue. The valid format is a decimal (formatted to 3 decimal places). Chapter 4. ITCAM Agent for WebSphere 367 Receive Total Time (ms) The total time (in milliseconds) consumed by gets from the queue. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 45. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Send Average Time (ms) The average time (in milliseconds) for each put to the queue. The valid format is a decimal (formatted to 3 decimal places). Send Count The number of messages put to the queue. The valid format is a positive integer. Send Rate (per sec) The number of messages (per second) put to the queue. The valid format is a decimal (formatted to 3 decimal places). Send Total Time (ms) The total time (in milliseconds) consumed by puts to the queue. The valid format is a positive integer. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Indicates that this row is a summary row of statistical totals for all rows. Total Time (ms) The total time (in milliseconds) spent accessing the queue. The valid format is a positive integer. Type The type of message manager. the valid values are Queue and Topic. For additional information, see: v v 368 Organization of the predefined workspaces Attribute groups used by the predefined workspaces ITCAM for Application Diagnostics: User Guide Log Analysis attributes The Log Analysis attributes provide application server error and exception conditions which are recorded in the application server log files. The log files are SystemOut.log and SystemErr.log. Use the Log Analysis attributes in situations to monitor errors and exception conditions and their severity. The attributes within this group are used to build the Log Analysis workspace. ASID The identifier (decimal) assigned to the address space running this servant region. Component The name of the component that caused the error. The valid format is an alphanumeric string, with a maximum of 32 characters. Error Date and Time The date and time the event occurred. The valid format is a timestamp. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Job ASID The identifier (hexadecimal) assigned to the address space running this servant region. The valid format is an alphanumeric string, with a maximum of 4 characters. Job Name The job name assigned to this servant region. The valid format is an alphanumeric string, with a maximum of 8 characters. Message ID The identifier assigned to the message. The valid format is an alphanumeric string, with a maximum of 12 characters. Message Origin Where the message originates; that is, the log file name and line number. The valid format is an alphanumeric string, with a maximum of 32 characters. This field is not empty only on the z/OS system. Message Text The text of the message. The valid format is alphanumeric string, with a maximum of 256 characters. All error message text data that goes beyond 256 characters are truncated and are not shown in the portal. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID The process identifier of the Java virtual machine. The valid format is an alphanumeric string, with a maximum of 8 characters. In a z/OS system, this field displays in hexadecimal format. Sequence Number The sequence number in the JMX notifications stream. The valid format is positive integer. Server Instance Name The name of the application server instance. This is the name of a single address space that can run application code (called a "specific server" or simply a "server"). The valid format is an alphanumeric string, with a maximum of 8 characters. Chapter 4. ITCAM Agent for WebSphere 369 Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Severity The severity of the message. The valid values are: Table 46. Message severities and their meanings Severity Definition Informational A message intended to convey only user information Unconditional A message of type Unconditional Dump A message of type Dump SystemOut A message written directly to System.out by the user application or internal components SystemError A message written directly to System.err by the user application or internal components User A message of type User EntryMethod A message written upon entry to a method ExitMethod A message written upon exit from a method Event A message of type Event Debug A message of type Debug Audit An audit message Warning A warning message Error An error message Terminate A message of type Terminate (exit process) Fatal A fatal message Unknown A placeholder that indicates the message type was not recognized Thread ID The unique identifier of the thread where the event occurred. The valid format is an alphanumeric string, with a maximum of 16 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Messaging Engine Communications attributes The Messaging Engine Communications attributes display statistics for all the messaging engines being hosted by the current application server. The attributes within this group are used to build the Messaging Engine Communications workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. 370 ITCAM for Application Diagnostics: User Guide v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. v Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. API Connections The number of sessions being used by messaging engines that are currently network connected to this application server. The valid format is a positive integer. Buffered Reads (bytes) The number of bytes of data that have been received from the network and are held pending further processing. Large values might indicate that the application server is unable to process data fast enough to keep up with the other application server processes hosting messaging engines that it is network attached. The valid format is a positive integer. Buffered Writes (bytes) The number of bytes of data being held pending transmission. Large values might indicate network congestion or application server processes hosting messaging engines which are unable to process data fast enough to keep up with the application server. The valid format is a positive integer. Errors The communication errors that have occurred and resulted in a network connection to a messaging engine being disconnected. The valid format is a positive integer. Instrumentation Level The instrumentation level for the Messaging Engine Communications. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Message Read (bytes) The number of bytes of message data received from application server processes hosting messaging engines over network connections. This does not include data used to negotiate the transmission of messages. The valid format is a positive integer. Message Written (bytes) The number of bytes of message data sent to application server processes hosting messaging engines over network connections. This does not include data used to negotiate the transmission of messages. The valid format is a positive integer. Messaging Engine Attached The number of distinct application server processes hosting messaging engines currently network connected to this application server. The valid format is a positive integer. Messaging Engine Name The name of the message engine. The value format is an alphanumeric string, with a maximum of 256 characters. Chapter 4. ITCAM Agent for WebSphere 371 Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Reads The number of read operations used to receive data from application server processes hosting messaging engines via network connections. The valid format is a positive integer. Reads Blocked The number of read operations that could not be completed immediately. This number can be used as an indicator of network congestion when communicating with application server processes hosting messaging engines. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 47. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all messaging engine communications. Valid values are No and Yes. Total Read (bytes) The Number of bytes of data received from application server processes hosting messaging engines. The valid format is a positive integer. Total Written (bytes) The Number of bytes of data sent to application server processes hosting messaging engines. The valid format is a positive integer. Writes The number of write operations used to transmit data to application server processes hosting messaging engines via network connections. The valid format is a positive integer. 372 ITCAM for Application Diagnostics: User Guide Writes Blocked The number of write operations that could not be completed immediately. This number can be used as an indicator of network congestion when communicating with application server processes hosting messaging engines. The valid format is a positive integer. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Messaging Engines attributes The Messaging Engines attributes display aggregated information about the performance of the messaging engines supported by WebSphere server. The attributes within this group are used to build the Messaging Engines workspace. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Note: Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Average Local Wait Time (ms) The time spent by messages on this durable subscription at consumption. If this time is not what was expected, view the message using the admin console to decide what action needs to be taken. The valid format is a positive integer. Expired Messages The number of report enabled messages that expired while on this queue. The valid format is a positive integer. Incomplete Topic Publications The number of publications not yet received by all current subscribers. If this number is unexpected, view the publication using the admin console to take any actions. The valid format is a positive integer. Instrumentation Level The instrumentation level for the messaging engines. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Messaging Engine Name The name of the message engine. The valid format is an alphanumeric string, with a maximum of 256 characters. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR Chapter 4. ITCAM Agent for WebSphere 373 and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 48. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Status The status of the message engine. The valid format is a positive integer. Summary of All Applications Whether this row is a summary row of statistical totals for all messaging engines. Valid values are No and Yes. Total Published The total number of publications to the message engines. The valid format is a positive integer. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Portal Page Summary attributes The Portal Page Summary attributes provide information about response times statistics for all portal page requests that completed on monitored WebSphere Portal server during the interval. The attributes within this group are used to build the Portal Pages Summary workspace. ASID The identifier (decimal) assigned to the address space running this servant region. Average Response Time (ms) The average response time (in milliseconds) of requests processed by the portal pages during the current interval. The valid format is a decimal (formatted to 3 decimal places). Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. 374 ITCAM for Application Diagnostics: User Guide Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID The unique identifier of the JVM process (the class ID of the JVM). The valid format is a positive integer. Portal Page Name The name of the portal page. The value format is an alphanumeric string, with a maximum of 128 characters. Request Count The count of requests processed by the portlet page during the current interval. The valid format is a positive integer. Row Number The number of the row. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 49. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Indicates that this row is a summary row of statistical totals for all rows. Total Response (ms) The total time (in milliseconds) of responses. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Chapter 4. ITCAM Agent for WebSphere 375 Portal Summary attributes The Portal Summary attributes provide aggregated response times statistics about all portal pages and portlet requests that completed on monitored WebSphere Portal server during the interval. The attributes within this group are used to build the Portal Summary workspace. ASID The identifier (decimal) assigned to the address space running this servant region. Authentication Request Count The number of authentication requests during the interval. The valid format is a positive integer. Authentication Total (ms) The total time (in milliseconds) of authentication requests completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Authorization Request Count The number of authorization requests during the interval. The valid format is a positive integer. Authorization Total (ms) The total time (in milliseconds) of authorization requests completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Average Response Time of Portal Pages (ms) The average response time (in milliseconds) of all portal pages/Gateway Servlet requests completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Average Response Time of Portlets (ms) The average response time (in milliseconds) of all portlets requests completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Model Building Request Count The number of model building requests during the interval. The valid format is a positive integer. Model Building Total (ms) The total time (in milliseconds) of model building requests completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Page Loading Request Count The number of page loading requests during the interval. The valid format is a positive integer. Page Loading Total (ms) The total time (in milliseconds) of page loading requests completed during the interval. The valid format is a decimal (formatted to 3 decimal places). 376 ITCAM for Application Diagnostics: User Guide Portal Page Request Count The number of portal page requests during the interval. The valid format is a positive integer. Portal Pages Total Response (ms) The total response time (in milliseconds) of all portal pages/Gateway Servlet requests completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Portlets Request Count The number of portlets requests during the interval. The valid format is a positive integer. Process ID The unique identifier of the JVM process (the class ID of the JVM). The valid format is a positive integer. Portlets Total Response(ms) The total response time (in milliseconds) of all portlets requests completed during the interval. The valid format is a decimal (formatted to 3 decimal places). Response Time of Authentication (ms) The response time (in milliseconds) of authentication. The valid format is a positive integer. Response Time of Authorization (ms) The response time (in milliseconds) of authorization. The valid format is a positive integer. Response Time of Model Building (ms) The response time (in milliseconds) of model building. The valid format is a positive integer. Response Time of Page loading (ms) The response time (in milliseconds) of page loading. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 50. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Chapter 4. ITCAM Agent for WebSphere 377 Summary Indicates that this row is a summary row of statistical totals for all rows. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Portlet Summary attributes The Portlet Summary attributes provide information about response times of all portlet requests that completed on monitored WebSphere Portal. The attributes within this group are used to build the Portlet Summary workspace. ASID The identifier (decimal) assigned to the address space running this servant region. Average Response Time (ms) The average response time for portlet during the current interval. The valid format is a decimal (formatted to 3 decimal places). Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Portlet Name The name of the portlet. The value format is an alphanumeric string, with a maximum of 256 characters. Process ID The unique identifier of the JVM process (the class ID of the JVM). The valid format is a positive integer. Request Count The count of requests for portlet during the current interval. The valid format is a positive integer. Request Rate The rate at which the requests processed by portlet during the current interval. The valid format is a decimal (formatted to 3 decimal places). Row Number The number of the row. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 51. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute 378 ITCAM for Application Diagnostics: User Guide Table 51. Format of the 12-character timestamp (continued) Character String Meaning SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Indicates that this row is a summary row of statistical totals for all rows. Total Response (ms) The total response time for portlet during the current interval. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Queue attributes The Queue attributes provide aggregated information about the point to point messaging. The attributes within this group are used to build the Destinations workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. v Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Aggregate Message Wait Time The time spent by messages in the bus at consumption. If this time is not what was expected, view the message using the admin console to decide what action needs to be taken. The valid format is a positive integer. Assured Persistent Messages Consumed The number of assured persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 379 Assured Persistent Messages Produced The number of assured persistent messages produced, for the lifetime of this messaging engine. The valid format is a positive integer. Available Message The number of messages available for a queue for consumption. If this number is close to the destination high messages value, review the high messages value. The valid format is a positive integer. Best Effort Non-persistent Messages Consumed The number of best effort non-persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Best Effort Non-persistent Messages Produced The number of best effort non-persistent messages produced, for the lifetime of this messaging engine. The valid format is a positive integer. Express Non-persistent Messages Consumed The number of express non-persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Express Non-persistent Messages Produced The number of express non-persistent messages produced, for the lifetime of this messaging engine. The valid format is a positive integer. Instrumentation Level The instrumentation level for the database connection pool for the data source. Valid values are None, Low, Medium, High, Basic, Extended, All, Custom, and Maximum. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Local Consumer The number of currently attached local consumers. The valid format is a positive integer. Local Consumer Attaches The number of times an attachment has been made to this queue by local consumers. The lifetime of this value is the lifetime of the messaging engine. The valid format is a positive integer. Local Message Wait Time The time spent by messages on this queue at consumption. If this time is not what was expected, view the message using the admin console to decide what action needs to be taken. The valid format is a positive integer. Local Oldest Message Age The longest time any message has spent on this queue. If this time is not what was expected, view the message using the admin console to decide what action needs to be taken. The valid format is a positive integer. Local Producer The number of currently attached local producers. The valid format is a positive integer. Local Producer Attaches The number of times an attachment has been made to this queue by local producers. The lifetime of this value is the lifetime of the messaging engine. The valid format is a positive integer. Messaging Engine Name The name of the message engine. The value format is an alphanumeric string, with a maximum of 256 characters. 380 ITCAM for Application Diagnostics: User Guide Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Queue Name The name of the queue. The value format is an alphanumeric string, with a maximum of 256 characters. Reliable Non-persistent Messages Consumed The number of reliable non-persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Reliable Non-persistent Messages Produced The number of reliable non-persistent messages produced, for the lifetime of this messaging engine. The valid format is a positive integer. Reliable Persistent Messages Consumed The number of reliable persistent messages consumed, for the lifetime of this messaging engine. The valid format is a positive integer. Reliable Persistent Messages Produced The number of reliable persistent messages produced, for the lifetime of this messaging engine. The valid format is a positive integer. Report Enabled Messages Expired The number of report enabled messages that expired while on this queue. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 52. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Chapter 4. ITCAM Agent for WebSphere 381 Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. Total Messages Consumed The total number of messages consumed from this queue, for the lifetime of this messaging engine. The valid format is a positive integer. Total Messages Produced The total number of messages produced to this queue, for the lifetime of this messaging engine. The valid format is a positive integer. Unavailable Message The number of messages locked or uncommitted. This means messages that have been added or removed but the transaction has not been committed yet. If this number is high, check which messages are locked and why. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Remote Configuration Requests attributes The Remote Configuration Requests attributes provide information about remote configuration. The attributes within this group are used to build the WebSphere Agent workspace. Command Indicates the Command of the request. Node Name The system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node Indicates the server name subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Package Count Indicates the package count for this request/response. Package Index Indicates the current index of the packages. Request Context Indicates the request context. Response Context Indicates the response context. Request Identifier Indicates Request ID. Return Value Indicates the return value of the request. Target Agent Code Two-letter agent product code that specifies information about the product being configured. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces 382 ITCAM for Application Diagnostics: User Guide Request Analysis attributes The Request Analysis attributes provide response times and functional decomposition information about requests (servlets, JSPs, and EJB methods) that ran on the application server. The attributes within this group are used to build the Request Analysis workspace. Application Name The name of the application to which the request belongs. The valid format is an alphanumeric string, with a maximum of 256 characters. Application Time (ms) The average time (in milliseconds) this request spent processing application requests other than JCA, JMS, JNDI, and JDBC requests; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. Application Time (% of Average Response) The percentage of time this request spent processing application requests other than JCA, JMS, JNDI, and JDBC requests. The valid format is a decimal (formatted to 1 decimal place). Application Bad Delay (msec) The delay time (in milliseconds) in the application tier collected during the interval. This column is non-zero value when application delay exceeds the bad threshold configured for it. The valid format is a positive integer. Application Fair Delay (msec) The delay time (in milliseconds) in the application tier collected during the interval. This column is non-zero value when application delay exceeds the fair threshold configured for it. The valid format is a positive integer. Application Good Delay (msec) The delay time (in milliseconds) in the application tier collected during the interval. This column is non-zero when application delay is less than fair threshold configured for it. The valid format is a positive integer. Application Tier Delay Type This attribute defines the request type based on its delay time in the application tier. Valid values are Unknown, Good, Fair, and Bad. Application Tier Response (msec) The actual response time in milliseconds in the application tier collected during the interval. The valid format is a positive integer. Average Response (ms) The average time (in milliseconds) required each time this request ran during the interval. The valid format is a positive integer. ASID The identifier (decimal) assigned to the address space running this servant region. Backend Bad Delay (msec) The delay time (in milliseconds) in the backend tier collected during the interval. This column is non-zero value when backend delay exceeds the bad threshold configured for it. The valid format is a positive integer. Backend Fair Delay (msec) The delay time (in milliseconds) in the backend tier collected during the interval. This column is non-zero value when backend delay exceeds the fair threshold configured for it. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 383 Backend Good Delay (msec) The delay time (in milliseconds) in the backend tier collected during the interval. This column is non-zero when backend delay is less than fair threshold configured for it. The valid format is a positive integer. Backend Tier Delay Type This attribute defines the request type based on its delay time in the backend tier. Valid values are Unknown, Good, Fair, and Bad. Backend Tier Response (msec) The actual response time in milliseconds in the backend tier collected during the interval. The valid format is a positive integer. Client Bad Delay (msec) The delay time (in milliseconds) in the client tier collected during the interval. This column is non-zero value when client delay exceeds the bad threshold configured for it. The valid format is a positive integer. Client Fair Delay (msec) The delay time (in milliseconds) in the client tier collected during the interval. This column is non-zero value when client delay exceeds the fair threshold configured for it. The valid format is a positive integer. Client Good Delay (msec) The delay time (in milliseconds) in the client tier collected during the interval. This column is non-zero when client delay is less than fair threshold configured for it. The valid format is a positive integer. Client Tier Delay Type This attribute defines the request type based on its delay time in the client tier. Valid values are Unknown, Good, Fair, and Bad. Client Tier Response (msec) The actual response time in milliseconds in the client tier collected during the interval. The valid format is a positive integer. Completion Count The number of requests that successfully completed during the interval. The valid format is a positive integer. Custom Request Count The number of custom requests. The valid format is a positive integer. Custom Request Time (ms) The average time (in milliseconds) the custom requests spent. The valid format is a positive integer. Custom Request Time (%) The percentage of time the custom requests spent. The valid format is a decimal (formatted to 1 decimal place). EJB Count The number of times this request invoked an Enterprise Java Bean (EJB) request. The valid format is a positive integer. EJB Time (ms) The average time (in milliseconds) this request spent processing Enterprise Java Bean (EJB) requests; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. EJB Time (%) The percentage of time this request spent processing Enterprise Java Bean (EJB) requests. The valid format is a decimal (formatted to 1 decimal place). Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. JCA Count The number of times this request invoked a J2EE Connector Architecture (JCA) request. The valid format is a positive integer. 384 ITCAM for Application Diagnostics: User Guide JCA Time (ms) The average time (in milliseconds) this request spent processing J2EE Connector Architecture (JCA) requests; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. JCA Time (%) The percentage of time this request spent processing J2EE Connector Architecture (JCA) requests. The valid format is a decimal (formatted to 1 decimal place). JMS Count The number of times this request invoked a Java Message Service (JMS) request. The valid format is a positive integer. JMS Time (ms) The average time (in milliseconds) this request spent processing Java Message Service (JMS) requests; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. JMS Time (%) The percentage of time this request spent processing Java Message Service (JMS) requests. The valid format is a decimal (formatted to 1 decimal place). JNDI Count The number of times this request invoked a Java Naming and Directory Interface (JNDI) request. The valid format is a positive integer. JNDI Time (ms) The average time (in milliseconds) this request spent processing Java Naming and Directory Interface (JNDI) requests; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. JNDI Time (%) The percentage of time this request spent processing Java Naming and Directory Interface (JNDI) requests. The valid format is a decimal (formatted to 1 decimal place). Level 2 Request Count The number of times this request was run with Mod Level 2 turned on. The valid format is a positive integer. Level 2 Total Time (ms) The total time (in milliseconds) this request was run with Mod Level 2 turned on. The valid format is a positive integer. Longest Response (ms) The maximum time (in milliseconds) it took this request to run during the interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the application server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Portal Processing Count The number of times the request invoked a WebSphere Portal page or portlet request. The valid format is a positive integer. Portal Processing Time (ms) The average time (in milliseconds) the request spent in processing WebSphere Portal page or portlet requests. This field can have a zero value if the total time is less than the number of requests. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 385 Portal Processing Time (%) The percentage of time the request spent in processing WebSphere Portal page or portlet requests. The valid format is a decimal (formatted to 1 decimal place). Process ID The process identifier of the Java virtual machine. The valid format is a positive integer. Request Bad Response Threshold (msec) The threshold that defines the bad requests. A request that spends more time to complete than this threshold to complete is a bad request. The valid format is a positive integer. Request Completion (%) The percentage of the requests that completed successfully during the interval. The valid format is a positive integer. Request Completion Level The completion level of the requests during the interval. Valid values are Unknown, Good, Fair, and Bad. Request Count The number of times this request ran during the interval. The valid format is a positive integer. Request Detail The URI for servlet requests, or the method name for EJBs. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Fair Response Threshold (msec) The threshold that defines the fair requests. A request that spends more time than this threshold and less time than the Request Bad Response Threshold (msec) attribute to complete is a fair request. The valid format is a positive integer. Request Bad Delay (msec) The delay time (in milliseconds) collected during the interval. This column is non-zero value when the whole request response time exceeds the bad threshold configured for it. The valid format is a positive integer. Request Fair Delay (msec) The delay time (in milliseconds) collected during the interval. This column is non-zero value when the whole request response time exceeds the fair threshold configured for it. The valid format is a positive integer. Request Good Delay (msec) The delay time (in milliseconds) collected during the interval. This column is non-zero value when the whole request response time is less than fair threshold configured for it. The valid format is a positive integer. Request Delay Type The type of the request delay. Valid values are Unknown, Good, Fair, and Bad. Request Label A shortened version of Request Name, used to display the request name in the chart view. The valid format is an alphanumeric string, with a maximum of 32 characters. Request Name The URL for servlet requests, or the fully qualified class name for EJBs. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Rate (per sec) The number of requests completed per second during the interval. If the sampling rate is less than 100%, this number is extrapolated to estimate 100% of completed requests. The valid format is a decimal (formatted to 3 decimal places). 386 ITCAM for Application Diagnostics: User Guide Request Type The type of request being run. Valid values are Servlet, EJB_Method, Custom, All_Workloads, Unknown, and Portlet. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 53. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Sampling Rate (%) The percentage of requests being sampled. The valid format is a positive integer. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Servlet Count The number of times this request invoked a Servlet request. The valid format is a positive integer. Servlet Time (ms) The average time (in milliseconds) this request spent processing Servlet requests; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. Servlet Time (%) The percentage of time this request spent processing Servlet requests. The valid format is a decimal (formatted to 1 decimal place). SQL Connect Count The number of times this request connected to a JDBC database. The valid format is a positive integer. SQL Connect Time (ms) The average time (in milliseconds) this request spent connecting to a JDBC database; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. SQL Connect Time (%) The percentage of time this request spent connecting to a JDBC database. The valid format is a decimal (formatted to 1 decimal place). SQL Execute Count The number of times this request executed a JDBC database. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 387 SQL Execute Time (ms) The average time (in milliseconds) this request spent executing a JDBC database; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. SQL Execute Time (%) The percentage of time this request spent executing a JDBC database. The valid format is a decimal (formatted to 1 decimal place). SQL Query Count The number of times this request queried a JDBC database. The valid format is a positive integer. SQL Query Time (ms) The average time (in milliseconds) this request spent querying a JDBC database; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. SQL Query Time (%) The percentage of time this request spent querying a JDBC database. The valid format is a decimal (formatted to 1 decimal place). SQL Update Count The number of times this request updated a JDBC database. The valid format is a positive integer. SQL Update Time (ms) The average time (in milliseconds) this request spent updating a JDBC database; this field can have a zero value if the total time is less than the number of requests, due to truncation. The valid format is a positive integer. SQL Update Time (%) The percentage of time this request spent updating a JDBC database. The valid format is a decimal (formatted to 1 decimal place). Summary Indicates that this row is a summary row of statistical totals for all rows. Total Time (ms) The total CPU time (in milliseconds) this request consumed during the interval. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Requests Monitoring Configuration attributes The Requests Monitoring Configuration attributes provide information for all requests monitored in application. Use these attributes to monitor application edge requests. The agent supports three types of edge requests, Servlet/JSP, EJB, and Portal. The attributes within this group are used to build the Request Baseline workspace. Application Name The name of the application to which the request belongs. The valid format is an alphanumeric string, with a maximum of 256 characters. Application ID The unique identifier that is assigned automatically when the application is first configured and is preserved during the whole application life cycle. The valid format is a positive integer. 388 ITCAM for Application Diagnostics: User Guide Application Tier Threshold (msec) The response time threshold in the application tier in milliseconds. The valid format is a positive integer. Auto Threshold Bad Projection (%) The bad response time projection used for auto threshold. The valid format is a positive integer. Auto Threshold Fair Ratio The percentage to derive the fair response time threshold from the baseline selection. The valid format is a positive integer. Auto Threshold Fair Projection (%) The fair response time projection used for auto threshold. The valid format is a positive integer. Auto Threshold Mode The request auto threshold mode. Valid values are Default, Custom, and Disabled. Auto Threshold Deviation (%) The maximum allowed deviation of requests baseline data used for auto threshold. The valid format is a positive integer. Auto Threshold Percent (%) The minimum percent of requests baseline data used for auto threshold. The valid format is a positive integer. Backend Tier Threshold (msec) The response time threshold in the backend tier in milliseconds. The valid format is a positive integer. Bad Response Threshold (msec) The time (in milliseconds) that defines the bad requests. A request that spends more time than this threshold to complete is a bad request. Use this attribute with Fair Response Threshold (msec) attribute and Fair Response Zone (msec) attribute. The valid format is a positive integer. Bad Errors Rate Threshold The value of bad error rate percentage. The valid format is a positive integer. Baselined Request Count The total number of requests accumulated in the baseline. This counter shows the data since the baseline starts. The valid format is a positive integer. Client Tier Threshold (msec) The response time threshold in the client tier in milliseconds. The valid format is a positive integer. Fair Response Threshold (msec) The time (in milliseconds) that defines the fair requests. A request that spends less time than this threshold to complete is a good request. Use this attribute with Fair Response Zone (msec) attribute and Bad Response Threshold (msec) attribute. The valid format is a positive integer. Fair Response Zone (msec) The time span (in milliseconds) that defines the fair requests. This time span is between the fair response time threshold and the bad time threshold. If the response time of a request falls into this time span, the request is a fair request. Use this attribute with Fair Response Threshold (msec) attribute and Bad Response Threshold (msec) attribute. The valid format is a positive integer. Fair Errors Rate Threshold The value of fair error rate percentage. The valid format is a positive integer. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 389 Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Detail The request detail name. The valid format is an alphanumeric string, with a maximum of 256 characters. Request ID The unique identifier of the request that belongs to the application. The valid format is a positive integer. Request Label A shortened version of Request Name, used to display the request name in the chart view. The valid format is an alphanumeric string, with a maximum of 24 characters. Request Name The URL for servlet requests, or the fully qualified class name for EJBs. The valid format is an alphanumeric string, with a maximum of 256 characters. Request Type The type of request being run. Valid values are All, Servlet/JSP, EJB, and Portal. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 54. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces 390 ITCAM for Application Diagnostics: User Guide Request Times and Rates attributes The Request Times and Rates attribute group provides information about historical request throughput and average response time for a particular application server. The attributes within this group are used to build the WebSphere App Server workspace. Application Name The name of the application to which the request belongs. The valid formats are as follows: v An alphanumeric string, with a maximum of 256 characters. v An empty string means that this sample is aggregated data for all applications v It does not support application level monitoring at all and only shows server level statistics when the agent is TEMA 6.1. ASID The identifier (decimal) assigned to the address space running this servant region. Average Load The average number of concurrent requests during the interval. The valid format is a decimal (formatted to 3 decimal places). Average Request Completion Rate The average request completion rate (that is, the request throughput). If the sampling rate is less than 100%, this number is extrapolated to estimate 100% of completed requests. The valid format is a positive integer. Average Request Response Time The average request response time, in milliseconds. The valid format is a positive integer. Error Rate (%) The error rate of the request during the interval. The valid format is a decimal (formatted to 3 decimal places). Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID Indicates the process ID of the JVM. Request Count The number of requests processed during the current interval. The valid format is a positive integer. Request Data Monitoring Level Indicates request data monitoring level for application. Request Type The type of request being run. Valid values are Servlet, EJB_Method, Custom, All_Workloads, Unknown, and Portlet. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR Chapter 4. ITCAM Agent for WebSphere 391 and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 55. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Sampling Rate (%) The percentage of edge requests-such as servlets and JSPs-that were sampled during the interval. The valid format is a positive integer. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Indicates that this row is a summary row of statistical totals for all rows. Total (ms) The total time used (in milliseconds) during the interval. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Selected Request attributes The Selected Request attribute group provides detailed information about transactions' requests for database (that is, JDBC), messaging (that is, JMS), or EIS (that is, J2C) services. The attributes within this group are used to build these workspaces: v Selected Request - Datasources v Selected Request - JMS Queues v Selected Request - Resource Adapters v Selected Request - Portal Processing Note: The attributes within this attribute group contain meaningful values only if your site has set the request data monitoring level to Level2 to collect data on nested requests. Activity Category The type of request. Valid values are n/a (not applicable), JDBC, JMS, JCA, and Unknown. 392 ITCAM for Application Diagnostics: User Guide Activity Detail Detailed information about the activity performed by the selected request, for example, the SQL statement being processed. The valid format is an alphanumeric string, with a maximum of 128 characters. Activity Label An abbreviated version of Activity Name, used to display the activity name in the chart view. The valid format is an alphanumeric string, with a maximum of 32 characters. Activity Name The resource that the request is accessing, for example, the data source name. The valid format is an alphanumeric string, with a maximum of 128 characters. Activity Type The type of the resource being requested. Valid values are: Table 56. Activity types Type Definition n/a not applicable Servlet A call to a servlet's doGet or doPost methods EJB_Method_Call A call to a business method for an EJB class Obtain_SQL_Connection_from_Datasource A call to obtain a connection from a JDBC data source SQL_Query A Query request to a JDBC data source SQL_Update An Update request to a JDBC data source SQL_Other Any other request to a JDBC data source JMS_Message_Browse A call to browse a message from a JMS queue JMS_Message_Get A call to receive a message from a JMS queue (that is, a destructive get) JMS_Message_Put A call to put a message from a JMS queue JMS_Publish_Message A call to publish a publication to a JMS queue JCA_CCI_Execute_interaction A request by a J2EE application to execute a JCA interaction (a JDBC, JMS, or other JCA-supported operation) against a backend system JNDI_Lookup A call to JNDI to build an InitialContext or to perform a lookup Unknown The activity type cannot be determined Portlet_Processing A call for portlet processing request Portlet_Authorization A call for portlet authorization request Portal_Authentication A call for portal authentication request Portal_Model_Building A call for portal page model building request Portal_Page_Loading A call for portal page loading request Portal_Page_Rendering A call for portal page rendering request Portal_Legacy_Action A call for portal legacy action request Portal_Standard_Action A call for portal standard action (JSR-88) request ASID The identifier (decimal) assigned to the address space running this servant region. Average Response (ms) The average time (in milliseconds) executing this request, per occurrence. The valid format is a decimal (formatted to 1 decimal place). Chapter 4. ITCAM Agent for WebSphere 393 Delay (%) The percentage of execution time this activity consumed on average when processing this request. The valid format is a decimal (formatted to 1 decimal place). Interval (sec) The length (in seconds) of the interval. The valid format is a positive integer. Longest Response (ms) The worst-case response time (in milliseconds) experienced by this request. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Occurrences The number of times this request was executing during the interval. The valid format is a positive integer. Origin Node The name of the application server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Process ID The unique identifier of the JVM process (the class ID of the JVM). The valid format is a positive integer. Request Detail The URI for servlet requests, or the method name for EJBs. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Name The URL for servlet requests, or the fully qualified class name for EJBs. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Type The type of transaction being run. Valid values are Servlet, EJB_Method, Custom, All_Workloads, Unknown, and Portlet. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 57. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. 394 ITCAM for Application Diagnostics: User Guide Sampling Rate (%) The percentage of edge requests-such as servlets and JSPs-that were sampled for nested requests during the interval. The valid format is a positive integer. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Indicates that this row is a summary row of statistical totals for all rows. Total Time (ms) The total CPU time (in milliseconds) consumed by this request. The valid format is a positive integer. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Servlet Sessions attributes The Servlet Sessions attribute group provides information about servlet sessions. A session is a series of requests to a servlet, originating from the same user at the same browser. Applications running in a Web container use Sessions to monitor the actions of individual users. The attributes within this group are used to build the Sessions workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Average Concurrently Active Sessions The average number of concurrently active sessions during the sampling interval. A session is active if WebSphere Application Server is currently processing a request that uses the session. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Concurrently Live Sessions The average number of sessions cached in memory during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an Chapter 4. ITCAM Agent for WebSphere 395 interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Serializable Session Object Size (bytes) The average size (in bytes) of the serializable attributes of in-memory sessions. This number is at a session level only and includes only session objects that contain at least one serializable attribute object (a session may contain some attributes that are serializable and some that are not). This value is a measurement of the data at the end of the PMI sampling interval, not of the data in the entire sampling interval. The valid format is a positive integer. Average Session Lifetime (ms) The average session lifetime (in milliseconds), calculated by subtracting the time the session was created from the time it was invalidated. The valid format is a decimal (formatted to 3 decimal places). Broken Session Affinities The number of HTTP session affinities that broke, not counting WebSphere Application Server intentional breaks of session affinity. This is the number of requests received for sessions that were last accessed from another Web application and can indicate failover processing or a corrupted plug-in configuration. The valid format is a positive integer. Broken Session Affinity Rate (per sec) The rate (per second) of the number of HTTP session affinities that break, not counting the WebSphere Application Server intentional breaks of session affinity, during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Cache Discard Rate (per sec) The rate (per second) at which session objects have been forced out of the cache during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Cache Discards The number of session objects that have been forced out of the cache. An LRU algorithm removes old entries to make room for new sessions and cache misses (this applies only to persistent sessions). The valid format is a positive integer. Enterprise Application Name The name of the Enterprise application running the servlet. The valid format is an alphanumeric string, with a maximum of 256 characters. External Read Size (bytes) The size (in bytes) of the session data read from the persistent store (applicable only to serialized, persistent sessions). The valid format is a decimal (formatted to 3 decimal places). External Read Time (ms) The time (in milliseconds) taken to read the session data from the persistent store (applicable only to persistent sessions). For multirow sessions, the metrics are for the attributes; for single-row sessions, the metrics are for the whole session. When using a JMS persistent store, the user has the choice of whether to serialize the data being replicated; if the data are not serialized, this counter is not available. The valid format is a decimal (formatted to 3 decimal places). External Write Size (bytes) The size (in bytes) of session data written to the persistent store (applicable only to serialized, persistent sessions). The valid format is a decimal (formatted to 3 decimal places). 396 ITCAM for Application Diagnostics: User Guide External Write Time (ms) The time (in milliseconds) taken to write the session data from the persistent store (applicable only to serialized, persistent sessions). The valid format is a decimal (formatted to 3 decimal places). Failed Session Request Rate (per sec) The rate (per second) that a request for a new session could not be handled because it would exceed the maximum session count for the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Failed Session Requests This attribute collects data from the NoRoomForNewSessionCount metric in the Servlet Sessions Counters PMI module. The number of times a request for a new session could not be handled because it would exceed the maximum session count; this applies only to a session in memory with AllowOverflow=false. The valid format is a positive integer. Instrumentation Level The Web instrumentation level for this Web application. For WebSphere 5, the valid values are None, Low, Medium, High, and Maximum; for WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Max Serializable Session Object Size (bytes) The maximum size (in bytes) of the serializable attributes of in-memory sessions. This number is at a session level only and includes only session objects that contain at least one serializable attribute object (a session may contain some attributes that are serializable and some that are not). This value is a measurement of the data at the end of the PMI sampling interval, not of the data in the entire sampling interval. The valid format is a positive integer. Min Serializable Session Object Size (bytes) The minimum size (in bytes) of the serializable attributes of in-memory sessions. This number is at a session level and includes only session objects that contain at least one serializable attribute object (a session may contain some attributes that are serializable and some that are not). This value is a measurement of the data at the end of the PMI sampling interval, not of the data in the entire sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Nonexistent Session Request Rate (per sec) The rate (per second) of requests for a session that no longer exists (presumably because the session timed out) during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Nonexistent Session Requests The number of requests for a session that no longer exists (presumably because the session timed out). Use this counter to determine if the timeout is too short. The valid format is a positive integer. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR Chapter 4. ITCAM Agent for WebSphere 397 and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 58. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Session Creation Rate (per sec) The rate (per second) of sessions created during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Session Invalidation Rate (per sec) The rate (per second) at which sessions were invalidated during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Sessions Created The number of sessions created during the sampling interval. The valid format is a positive integer. Sessions Invalidated The number of sessions invalidated during the sampling interval. The valid format is a positive integer. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Summary of Servlet Sessions Whether this row is a summary row of statistical totals collected for the servlet sessions. The valid values are No and Yes. Time since Last Activated The time difference (in hh:mm:ss:msecs format) between the previous and current access timestamps. Does not include session timeouts. The valid format is a timestamp. Total Serializable Session Object Size (bytes) The total size (in bytes) of all the in-memory session objects. This includes only the serializable attributes in the session object; at least one such attribute must be present to be included in this total. This value is a measurement of the data at the end of the PMI sampling interval, not of the data in the entire sampling interval. The valid format is a positive integer. 398 ITCAM for Application Diagnostics: User Guide Web Application Archive The name of the Web application WAR file. The valid format is an alphanumeric string, with a maximum of 128 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Servlets JSPs attributes The Servlets JSPs attributes provide performance information for servlets and Java server pages (JSPs). Examples of Servlets JSPs attributes include the average number of concurrent requests for a servlet and the amount of time it takes for a servlet to perform a request. Use the Servlets JSPs attributes in situations to monitor performance and the usage of servlets and JSPs. The attributes within this group are used to build the Servlets/JSPs - Selected Web Application workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Average Concurrent Requests The average number of concurrent requests for the servlet or JSP during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Response Time (ms) The time (in milliseconds) it took the servlet to perform a task during the interval. The valid format is a decimal (formatted to 3 decimal places). Enterprise Application Name The name of the Enterprise application. The valid format is an alphanumeric string, with a maximum of 128 characters. Error Count The number of errors or exceptions that have occurred in the servlet during the interval. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 399 Error Rate (per sec) The servlet exceptions or errors (per second) since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Instrumentation Level The instrumentation level for this servlet. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Count The number of total requests for the servlet during the interval. The valid format is a positive integer. Request Rate (per sec) The servlet requests (per second) since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 59. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Servlet/JSP Name The name of the current servlet or JSP. The valid format is an alphanumeric string, with a maximum of 128 characters. Total (ms) The total time (in milliseconds) used during the interval. The valid format is a decimal (formatted to 3 decimal places). 400 ITCAM for Application Diagnostics: User Guide Type Whether this entry represents a servlet or Java server page (JSP). The valid values are Servlet and JSP. Web Application Archive The name of the Web application WAR file. The valid format is an alphanumeric string, with a maximum of 128 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Scheduler attributes The Scheduler attributes display data for the Scheduler service. The attributes within this group are used to build the Scheduler workspace. Instrumentation Level The instrumentation level for the Scheduler. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Poll Count The number of polls which are collected on the intervals. The valid format is a positive integer. Poll Duration The average alarms during the latency. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Poll Query Duration The duration of poll query. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Row Number The row number. The valid format is a positive integer. Run Duration The run duration. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Chapter 4. ITCAM Agent for WebSphere 401 Table 60. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Scheduler Name The name of the scheduler. The valid format is an alphanumeric string, with a maximum of 256 characters. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. Task Collision Rate The rate of the task collision. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Task Delay Duration The duration of the task delay. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Task Expiration Rate The rate of the task expiration. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Task Failure Count The number of the failed tasks. The valid format is a positive integer. Task Finish Count The number of the finished tasks which are collected on the intervals. The valid format is a positive integer. Task Finish Rate The rate of the finished tasks. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous 402 ITCAM for Application Diagnostics: User Guide time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Task Run Rate The rate of the run tasks. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Service Component Elements attributes The Service Component Elements attributes provide aggregated information about the performance data for all the service components and their elements. The attributes within this group are used to build the Service Component Elements workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. v Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Average Response Time (ms) The average response time (in milliseconds) in the current interval. The valid format is a decimal (formatted to 3 decimal places). Component The type of the component. The value format is an alphanumeric string, with a maximum of 256 characters. Component Name The component name of the service. The value format is an alphanumeric string, with a maximum of 256 characters. Element The type of the element. The valid format is a positive integer. Element Name The name of the element. The value format is an alphanumeric string, with a maximum of 256 characters. Chapter 4. ITCAM Agent for WebSphere 403 Error Rate (per sec) The computed error rate. The valid format is a decimal (formatted to 3 decimal places). Failed Count The failed invocations. The valid format is a positive integer. Instrumentation Level The instrumentation level for the service component elements. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Count The number of requests during the interval. The valid format is a positive integer. Request Rate (per sec) The rate of requests during the interval per second. The valid format is a decimal (formatted to 3 decimal places). Row Number The row number. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 61. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Success Count The successful invocations. The valid format is a positive integer. 404 ITCAM for Application Diagnostics: User Guide Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. Total (ms) The total time used (in milliseconds) during the interval. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Service Components attributes The Service Components attributes provide aggregated information about the overview performance of the key service components. The attributes within this group are used to build the Service Components workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. v Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Count The bad request count. The valid format is a positive integer. Instrumentation Level The instrumentation level for the service components. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Name The component name of the service. Valid values are Service_Component_Architecture, Business Rules, Map, Mediation, Business State Machine, and Selector. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Chapter 4. ITCAM Agent for WebSphere 405 Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 62. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Thread Pools attributes The Thread Pools attribute group provides information about the data source, as well as connection statistics, for database connection pools in a WebSphere Application Server. Use it to monitor pools activity and to spot potential throttling. The attributes within this group are used to build the Pool Analysis and Thread Pools workspaces. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. 406 ITCAM for Application Diagnostics: User Guide Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Application ID Indicates J2EE application ID. Average Active Threads The average number of concurrently active threads during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Free Threads The average number of free threads in the pool. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Pool Size The average number of threads in the pool. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Note: This value may exceed Maximum Pool Size in certain configurations where the pool is enabled to grow beyond the specified maximum size. Instrumentation Level The instrumentation level for the thread pools. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Maximum Pool Size The configured maximum number of threads allowed in the pool. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Percent of Time Pool at Max The average percentage of time that all threads were in use during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Percent Used Bad The bad percent of pool usage by application. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 407 Percent Used Fair The fair percent of pool usage by application. The valid format is a positive integer. Percent Used Good The good percent of pool usage by application. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 63. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Summary of Thread Pools Whether this row is a summary row of statistical totals collected for all thread pools. The valid values are No and Yes. Thread Creation Rate (per sec) The rate (per second) at which threads were created during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Thread Destruction Rate (per sec) The rate (per second) at which threads were destroyed during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Thread Pool Name The name of the thread pool. The valid format is an alphanumeric string, with a maximum of 256 characters. Threads Created The number of threads created during the sampling interval. The valid format is a positive integer. Threads Destroyed The number of threads destroyed during the sampling interval. The valid format is a positive integer. 408 ITCAM for Application Diagnostics: User Guide For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Topic Spaces attributes The Topic Spaces attributes provide aggregated information about publish/subscribe messaging. The attributes within this group are used to build the Destinations workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. v Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Assured Persistent Local Subscription Hits The cumulative total of subscriptions which have matched assured persistent publications. The valid format is a positive integer. Assured Persistent Messages Published The number of Assured Persistent messages published. The valid format is a positive integer. Best Effort Non-persistent Local Subscription Hits The cumulative total of subscriptions which have matched best effort non-persistent publications. The valid format is a positive integer. Best Effort Non-persistent Messages Published The number of best effort non-persistent messages published. The valid format is a positive integer. Durable Local Subscription The number of durable subscriptions. The valid format is a positive integer. Express Non-persistent Local Subscription Hits The cumulative total of subscriptions which have matched express non-persistent publications. The valid format is a positive integer. Express Non-persistent Messages Published The number of express non-persistent messages published. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 409 Incomplete Publication The number of publications not yet received by all current subscribers. If this number is unexpected, view the publication using the admin console to take any actions. The valid format is a positive integer. Instrumentation Level The instrumentation level for the topic spaces. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Local Oldest Publication The longest time any publication has spent on this topic space. If this time is not what was expected, view the message using the admin console to decide what action needs to be taken. The valid format is a positive integer. Local Publisher The number of local publishers to topics in this topic space. The valid format is a positive integer. Local Publisher Attaches The number of times an attachment has been made to this topic space by local producers. The lifetime of this value is the lifetime of the messaging engine. The valid format is a positive integer. Messaging Engine Name The name of the message engine. The value format is an alphanumeric string, with a maximum of 256 characters. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Non-Durable Local Subscription The number of non-durable subscriptions. The valid format is a positive integer. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Reliable Non-persistent Local Subscription Hits The cumulative total of subscriptions which have matched reliable non-persistent publications. The valid format is a positive integer. Reliable Non-persistent Messages Published The number of reliable non-persistent messages published. The valid format is a positive integer. Reliable Persistent Local Subscription Hits The cumulative total of subscriptions which have matched reliable persistent publications. The valid format is a positive integer. Reliable Persistent Messages Published The number of reliable persistent messages published. The valid format is a positive integer. Report Enabled Publication Expired The number of report enabled incomplete publications that expired while on this topic space. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR 410 ITCAM for Application Diagnostics: User Guide and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 64. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. Topic Space Name The name of the topic space. The valid format is an alphanumeric string, with a maximum of 256 characters. Total Local Subscription The number of local subscriptions to topics in this topic space. Each subscription is ed once, even if the topic includes wildcards. The valid format is a positive integer. Total Local Subscription Hits The cumulative total of subscriptions which have matched topic space publications. The valid format is a positive integer. Total Messages Published The total number of publications to this topic space. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Web Applications attributes Use the Web Applications attributes to create situations that monitor Web application performance and application server loads. The Web Applications attributes provide aggregated information for each Web application and for the application server running that application. These performance data describe all servlets and JSPs deployed to that Web application as well as performance data for all servlets and JSPs running in the application Chapter 4. ITCAM Agent for WebSphere 411 server. Examples include the number of loaded servlets and JSPs and total requests. The attributes within this group are used to build the Web Applications workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Average Concurrent Requests The average number of concurrent requests for servlets and JSPs during the interval. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Average Response Time (ms) The average time (in milliseconds) required for a servlet to perform a task during the interval. Calculated by dividing the total responses by Request Count; if Request Count is zero, this value is set to blank. The valid format is a decimal (formatted to 3 decimal places). Enterprise Application Name The name of the Enterprise application. The valid format is an alphanumeric string, with a maximum of 128 characters. Error Count The number of errors or exceptions that have occurred in the servlet. The valid format is a positive integer. Error Rate (per sec) The servlet exceptions or errors (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Instrumentation Level The Web instrumentation level for this Web application. For WebSphere 5, the valid values are None, Low, Medium, High and Maximum; for WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 256 characters. 412 ITCAM for Application Diagnostics: User Guide Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Request Count The number of total requests for the servlet during the interval. The valid format is a positive integer. Request Rate (per sec) The servlet requests (per second) for the interval since the previous sample. The valid format is a decimal (formatted to 3 decimal places). Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 65. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Servlets Loaded The number of servlets loaded during the interval. The valid format is a positive integer. Servlets Reloaded The number of servlets reloaded during the interval. The valid format a positive integer. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. Subinstrumentation Level The subinstrumentation level for the Web application's servlet submodule. For WebSphere Application Server 5 the valid values are None, Low, Medium, High, and Maximum. Note: Subinstrumentation Level is not supported in WebSphere Application Server 6.0 or higher. The Tivoli Enterprise Monitoring agent uses the Instrumentation Level instead. Chapter 4. ITCAM Agent for WebSphere 413 Summary of All Applications Whether this row is a summary row of statistical totals for all Web applications executed during the interval. The valid values are Yes and No. Total (ms) The total time used during the interval. The valid format is a decimal (formatted to 3 decimal places). Web Application Archive The name of the Web application WAR file. The valid format is an alphanumeric string, with a maximum of 128 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Web Services attributes The Web Services attributes display aggregated information about the Web services, including the number of loaded Web services, the number of requests delivered and processed, the request response time, and the average size of requests. The attributes within this group are used to build the Web Services workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Dispatched Requests The number of requests the service dispatched or delivered. The valid format is a positive integer. Dispatch Response Time The average response time, in milliseconds, to dispatch a request. The valid format is a decimal (formatted to 3 decimal places). Instrumentation Level The instrumentation level for the web services counters. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. 414 ITCAM for Application Diagnostics: User Guide Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Payload Size The average payload size in bytes of a received request or reply. The valid format is a positive integer. Processed Requests The number of requests the service successfully processed. Valid format is a positive integer. Received Requests The number of requests the service received. The valid format is a positive integer. Reply Payload Size The average payload size (in bytes) of a reply. The valid format is a positive integer. Reply Response Time The average response time, in milliseconds, to prepare a reply after dispatch. The valid format is a decimal (formatted to 3 decimal places). Request Payload Size The average payload size, in bytes, of a request. The valid format is a positive integer. Request Response Time The average response time, in milliseconds, to prepare a request for dispatch. The valid format is a decimal (formatted to 3 decimal places). Response Time The average response time (in milliseconds) for a successful request. The valid format is a decimal (formatted to 3 decimal places). Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 66. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. Chapter 4. ITCAM Agent for WebSphere 415 Total Dispatch (ms) The total time (in milliseconds) the service dispatches requests. The valid format is a decimal (formatted to 3 decimal places). Total Prepare (ms) The total time (in milliseconds) the service prepares requests. The valid format is a decimal (formatted to 3 decimal places). Total Processing (ms) The total time (in milliseconds) the service processes requests. The valid format is a decimal (formatted to 3 decimal places). Web Service The name of the Web service. The valid format is an alphanumeric string, with a maximum of 256 characters. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Web Services Gate Way attributes The Web Services Gate Way attributes display aggregated information about the Web Services Gateway, including synchronous requests, asynchronous requests, synchronous responses, and asynchronous responses. The attributes within this group are used to build the Web Services workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Asynchronous Requests The number of asynchronous requests made. The valid format is a positive integer. Asynchronous Responses The number of asynchronous responses made. The valid format is a positive integer. Instrumentation Level The instrumentation level for the Web Services Gateway counters. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. 416 ITCAM for Application Diagnostics: User Guide Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 67. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Summary Whether this row is a summary row of statistical totals for all rows. Valid values are No and Yes. Synchronous Requests The number of synchronous requests made. The valid format is a positive integer. Synchronous Responses The number of synchronous responses made. The valid format is a positive integer. Web Service The name of the Web service. The valid format is an alphanumeric string, with a maximum of 256 characters. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces WebSphere Agent Events attributes The WebSphere Agent Events attributes provide information about agent-level events that affect the ability of the Tivoli Enterprise Monitoring Agent to collect data about WebSphere Application Server. These attributes provide exception and error messages, their IDs, and their severities. Chapter 4. ITCAM Agent for WebSphere 417 The attributes within this group are used to build the WebSphere Agent workspace. Event Date and Time The date and time the event occurred. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 68. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Message Description The message description. The valid format is an alphanumeric string, with a maximum of 256 characters. Message ID The message ID. The valid format is an alphanumeric string, with a maximum of 8 characters. Node Name The system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Sequence Number The sequence number of the message. The valid format is a positive integer. Severity The severity of the event. Valid values are Info, Warning, Error, and Severe. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces WMQ Client Link Communications attributes The WMQ Client Link Communications attributes display aggregated information for all the clients of WMQ Queue Managers that are or have been connected to this application server. 418 ITCAM for Application Diagnostics: User Guide The attributes within this group are used to build the WMQ Client Link Communications workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then reselect it later. Each time you reselect the workspace, these attributes are updated with the latest data. v Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. API Calls Serviced The number of MQ API call requests serviced on behalf of WMQ JMS clients. The valid format is a positive integer. Batches Sent The number of batches of messages sent to network attached WMQ JMS clients. The valid format is a positive integer. Clients Attached The current number of WMQ JMS clients attached to this application server. The valid format is a positive integer. Comms Errors The number of errors that have caused connections to WMQ JMS clients to be dropped. The valid format is a positive integer. Instrumentation Level The instrumentation level for the WMQ client link communications. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Messages Received The number of messages received from network attached WMQ JMS clients. The valid format is a positive integer. Messages Sent The number of messages sent to network attached WMQ JMS clients. The valid format is a positive integer. Messaging Engine Name The name of the message engine. The value format is an alphanumeric string, with a maximum of 256 characters. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Chapter 4. ITCAM Agent for WebSphere 419 Reads Blocked The number of read operations that could not be completed immediately. This number can be used as an indicator of network congestion when communicating with WMQ JMS clients. The valid format is a positive integer. Received (bytes) The number of bytes of data received from network attached WMQ JMS clients. This includes bytes of message data as well as bytes of data used to control the flow of messages. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 69. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Sent (bytes) The number of bytes of data sent to network attached WMQ JMS clients. This includes bytes of message data as well as bytes of data used to control the flow of messages. The valid format is a positive integer. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Writes Blocked The number of write operations that could not be completed immediately. This number can be used as an indicator of network congestion when communicating with WMQ JMS clients. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces WMQ Link Communications attributes The WMQ Link Communications attributes display aggregated information for all the WMQ Queue Managers that are or have been connected to this application server. The attributes within this group are used to build the WMQ Link Communications workspace. 420 ITCAM for Application Diagnostics: User Guide Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. v Attributes in this group are only provided for IBM WebSphere Application Server version 6.0 or later. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Batches Received The number of batches of messages received from network attached WMQ Queue Managers. The valid format is a positive integer. Batches Sent The number of batches of messages sent to network attached WMQ Queue Managers. The valid format is a positive integer. Comms Errors The number of communication errors that resulted in a network connection to a WMQ Queue Manager being disconnected. The valid format is a positive integer. Instrumentation Level The instrumentation level for the WMQ link communications. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Long Retries The number of long retries. This indicates the number of times channels were disconnected and could not be re-established for longer periods of time. The valid format is a positive integer. Messages Received The number of messages received from network attached WMQ Queue Managers. The valid format is a positive integer. Messages Sent The number of messages sent to network attached WMQ Queue Managers. The valid format is a positive integer. Messaging Engine Name The name of the message engine. The value format is an alphanumeric string, with a maximum of 256 characters. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Chapter 4. ITCAM Agent for WebSphere 421 QM Attached The total number of WMQ Queue Managers currently network attached to this application server. The valid format is a positive integer. Reads Blocked The number of read operations that could not be completed immediately. This number can be used as an indicator of network congestion when communicating with WMQ Queue Managers. The valid format is a positive integer. Receiver Received (bytes) The number of bytes of data received by receiver channels from network attached WMQ Queue Managers. The valid format is a positive integer. Receiver Sent (bytes) The number of bytes data sent by receiver channels to network attached WMQ Queue Managers. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 70. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Sender Received (bytes) The number of bytes of data received by sender channels from network attached WMQ Queue Managers. The valid format is a positive integer. Sender Sent (bytes) The number of bytes of data sent by sender channels to network attached WMQ Queue Managers. The valid format is a positive integer. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Short Retries The number of short retries. This indicates the number of times channels were disconnected and could not be re-established for short periods of time. The valid format is a positive integer. 422 ITCAM for Application Diagnostics: User Guide Writes Blocked The number of write operations that could not be completed immediately. This number can be used as an indicator of network congestion when communicating with WMQ Queue Managers. The valid format is a positive integer. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Workload Management Client attributes The Workload Management Client attribute group provides information about the client that initiates workload requests. Workload management (WLM) optimizes the distribution of client processing tasks. Incoming work requests are distributed to the application servers, enterprise beans, servlets, and other objects that can most effectively process their requests. Workload management also provides failover when servers are not available, improving application availability. In a WebSphere Application Server environment, you implement workload management by using clusters, transports, and replication domains. The attributes within this group are used to build the Workload Management workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Client Cluster Update Rate (per sec) The rate (per second) at which times this client has received new server cluster information during the sampling interval. Use this metric to determine how often cluster information is being propagated. The valid format is a decimal (formatted to 3 decimal places). Client Cluster Updates The number of times initial or updated server cluster data is sent to a WLM-enabled client from a server cluster member. Use this metric to determine how often cluster information is being propagated. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 423 Client Response Time (ms) The response time (in milliseconds) for IIOP requests sent by a client. This response time is calculated based on the time the client sends the request to the time the server sends the reply. The valid format is a decimal (formatted to 3 decimal places). Instrumentation Level The instrumentation level for the WLM client. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Outgoing Request Rate (per sec) The rate (per second) at which outgoing IIOP requests were being sent from this client to an application server during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Outgoing Requests The number of outgoing IIOP requests being sent from this client to an application server. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 71. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. 424 ITCAM for Application Diagnostics: User Guide Total Client Response (ms) The total response time (in milliseconds) for IIOP requests sent by a client. The valid format is a decimal (formatted to 3 decimal places). For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Workload Management Server attributes The Workload Management Server attribute group provides information about the workload management server. Workload management (WLM) optimizes the distribution of client processing tasks. Incoming work requests are distributed to the application servers, enterprise beans, servlets, and other objects that can most effectively process those requests. Workload management also provides failover when servers are not available, improving application availability. In a WebSphere Application Server environment, you implement workload management by using clusters, transports, and replication domains. The attributes within this group are used to build the Workload Management workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Concurrent Requests The number of remote IIOP requests being processed by this server. The valid format is a decimal (formatted to 3 decimal places). This value is an average of several values collected over an interval. The interval can be either between this time and the previous time you activated this workspace, or fixed (normally 60 seconds), depending on the configuration of the Monitoring Agent. Incoming Non-WLM Object Request Rate (per sec) The rate (per second) of incoming IIOP requests from an application running on a non-WLM client during the sampling interval. This type of client either does not have the WLM runtime present, or the client's object reference was flagged not to participate in workload management. The valid format is a decimal (formatted to 3 decimal places). Chapter 4. ITCAM Agent for WebSphere 425 Incoming Non-WLM Object Requests The number of incoming IIOP requests to an application from a client that does not have the WLM runtime present or whose object reference was flagged not to participate in workload management. The valid format is a positive integer. Incoming Nonaffinity Request Rate (per sec) The rate (per second) of incoming IIOP requests to an application server based on no affinity during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Incoming Nonaffinity Requests The number of incoming IIOP requests to an application server based on no affinity. This request was sent to this server based on workload management selection policies that were decided in the client's WLM runtime. The valid format is a positive integer. Incoming Request Rate (per sec) The rate (per second) of incoming IIOP requests to an application server during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Incoming Requests The number of incoming IIOP requests to an application server during the sampling interval. The valid format is a positive integer. Incoming Strong Affinity Request Rate (per sec) The rate (per second) of incoming IIOP requests to an application server that are based on a strong affinity during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Incoming Strong Affinity Requests The number of incoming IIOP requests to an application server that are based on a strong affinity. A strong affinity request is one that must be serviced by this application server because of a dependency that resides on the server. This request could not successfully be serviced by another member of the server cluster. The valid format is a positive integer. Instrumentation Level The instrumentation level for the WLM server. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The valid format is an alphanumeric string, with a maximum of 128 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 72. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year 426 ITCAM for Application Diagnostics: User Guide Table 72. Format of the 12-character timestamp (continued) Character String Meaning HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Cluster Update Rate (per sec) The rate (per second) at which this server received new server cluster information during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Server Cluster Updates The number of times initial or updated server cluster data are sent to a server member from the deployment manager. This metric determines how often cluster information is being propagated. The valid format is a positive integer. Server Name The name of the WebSphere application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Server Response Time (ms) The response time (in milliseconds) at which IIOP requests were serviced by an application server, calculated based on the time the request is received versus the time the reply is sent. The valid format is a decimal (formatted to 3 decimal places). Total Server Response (ms) The total response time (in milliseconds) at which IIOP requests were serviced by an application server. The valid format is a decimal (formatted to 3 decimal places). Set Instrumentation Level Type Indicates the WebSphere resource category, which is used by the agent to modify the Instrumentation Level for transaction data collection. WLM Clients Serviced The number of WLM-enabled clients this application server has serviced during the interval. The valid format is a positive integer. WLM Clients Serviced Rate (per sec) The rate (per second) at which this server has serviced WLM-enabled clients during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). WLM Server Weight A control for work directed to the application server: if the server's weight value is greater than the weight values assigned to other servers in the cluster, then the server receives a larger share of the cluster's workload. The valid format is a positive integer. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Chapter 4. ITCAM Agent for WebSphere 427 Workplace Mail IMAP/POP attributes The Workplace Mail IMAP/POP attributes displays the usage information for the IMAP service and POP3 service connectivity. The attributes within this group are used to build the IMAP/POP workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: The following WebSphere Application Diagnostics 7.1 features do not support the IMAP/POP workspace: configuration and links to the Managing Server Visualization Engine from the Tivoli Enterprise Portal. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Active Sessions The number of active sessions during the sampling interval. The valid format is a positive integer. Active SSL Sessions The number of active, secure sessions during the sampling interval. The valid format is a positive integer. Authentication Failures The number of authentications failures during the sampling interval. The valid format is a positive integer. Connection (ms) The time (in milliseconds) spent connected to clients during the sampling interval. The valid format is a positive integer. IMAP Instrumentation Level The instrumentation level for IMAP PMI module. Valid values are None, Low, Medium, High, Basic, Extended, All, Custom, and Maximum. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Peak Session load The maximum number of concurrent sessions during the sampling interval. The valid format is a positive integer. 428 ITCAM for Application Diagnostics: User Guide POP Instrumentation Level The instrumentation level for POP PMI module. Valid values are None, Low, Medium, High, Basic, Extended, All, Custom, and Maximum. Blank if no instrumentation level is set. Protocol The protocol type of the workplace mail. Valid values are IMAP and POP. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 73. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Successful Authentications The number of successful authentications during the sampling interval. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces Workplace Mail Queues attributes The Workplace Mail Queues attributes display information about the message delivery state, including ready retry, unprocessed, and dead. The attributes within this group are used to build the Messages Queues workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. Chapter 4. ITCAM Agent for WebSphere 429 v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select again it later. Each time you select the workspace, these attributes are updated with the latest data. Note: The following WebSphere Application Diagnostics 7.1 features do not support the Message Queues workspace: configuration and links to the Managing Server Visualization Engine from the Tivoli Enterprise Portal. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Dead The number of message in the dead state in the queue during the sampling interval. The valid format is a positive integer. Instrumentation Level The instrumentation level for the service components. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Queue The Lotus Workplace Mail queue name. Valid values are A, B, C, D, E, F, G, H, and Summary. Ready The number of message in the ready state in the queue during the sampling interval. The valid format is a positive integer. Retry The number of message in the retry state in the queue during the sampling interval. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: Table 74. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second 430 ITCAM for Application Diagnostics: User Guide Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Unprocessed The number of message in the unprocessed state in the queue during the sampling interval. The valid format is a positive integer. For additional information, see: v v Organization of the predefined workspaces Attribute groups used by the predefined workspaces Workplace Mail Service attributes The Workplace Mail Service attributes display aggregated usage information about the incoming mail message traffic. The attributes within this group are used to build the Workplace Mail workspace. Note: v The attributes within this attribute group contain zeros for performance data if your site set configuration value Resource Data Collection Method to On Demand (for on-demand sampling) and you have not yet run applications that generate performance data. To report performance data in these attributes after installing and configuring the Data Collector, use the WebSphere administrative console to set the appropriate PMI instrumentation level. v The Tivoli Enterprise Monitoring Agent is set by default to provide on-demand sampling; thus the attributes within this attribute group initially contain zeros until you select the workspace and then select it again later. Each time you select the workspace, these attributes are updated with the latest data. Note: The following WebSphere Application Diagnostics 7.1 features do not support Workplace Mail Service: configuration and links to the Managing Server Visualization Engine from the Tivoli Enterprise Portal. Note: For information about WebSphere PMI metrics, refer to Appendix A. WebSphere PMI Attribute Mapping ITCAM for Application Diagnostics User Guide, available from: http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/ index.jsp?toc=/com.ibm.itcamwas.doc/toc.xml. Active LDAP Connections The number of active LDAP connections during the sampling interval. The valid format is a positive integer. Delivered Messages The total number of delivered messages during the sampling interval. The valid format is a positive integer. Deliverer Dropped Messages The total number of messages rejected by the SMTP outbound server during the sampling interval. The valid format is a positive integer. Chapter 4. ITCAM Agent for WebSphere 431 Deliverer Message (ms) The total time in milliseconds taken by SMTP outbound server to process messages during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Dropped SMTP Connections The total number of the dropped SMTP connections during the sampling interval. The valid format is a positive integer. DSN Failure Messages The total number of failure DSNs sent during the sampling interval. The valid format is a positive integer. Handled Messages The total number of messages processed by the mail handler server during the sampling interval. The valid format is a positive integer. Handler Dropped Messages The total number of messages rejected by the mail handler server during the sampling interval. The valid format is a positive integer. Instrumentation Level The instrumentation level for the service components. For WebSphere 6 or higher, the valid values are None, Basic, Extended, All, Custom. Blank if no instrumentation level is set. Interval (sec) The length (in seconds) of the sampling interval. The valid format is a positive integer. Live SMTP Server Connections The number of live SMTP server connections during the sampling interval. The valid format is a positive integer. Live SMTP Client Connections The number of live SMTP client connections during the sampling interval. The valid format is a positive integer. Lost SMTP Client Connections The total number of lost SMTP client connections during the sampling interval. The valid format is a positive integer. Lost SMTP Connections The total number of the lost SMTP connections during the sampling interval. The valid format is a positive integer. Message Delivery (ms) The total time in milliseconds taken to deliver messages during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Messages Handling (ms) The total time in milliseconds taken to handle messages during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). Node Name The name of the system on which the server is running. The value format is an alphanumeric string, with a maximum of 256 characters. Origin Node The name of the server subnode. The valid format is an alphanumeric string, with a maximum of 128 characters. Peak LDAP Connections The maximum number of concurrent LDAP connections during the sampling interval. The valid format is a positive integer. Sample Date and Time The date and time the Tivoli Enterprise Management Agent collected the data. The valid format is a 12-character timestamp. For the STR and SCAN functions, the format is MM/DD/YY HH:MM:SS; the following table shows the values contained in this character string: 432 ITCAM for Application Diagnostics: User Guide Table 75. Format of the 12-character timestamp Character String Meaning MM Month DD Day YY Year HH Hour MM Minute SS Second Example: 09/13/06 18:32:03 indicates the data was collected on September 13, 2006, at 18:32:03. This attribute was designed for logging and reporting data-collection times rather than for creating situations. To specify a time and date for comparison and testing, use attributes from the Universal Time or Local Time groups. Server Name The name of the application server. The valid format is an alphanumeric string, with a maximum of 256 characters. Smarthost Messages The total number of messages sent to the Smarthost during the sampling interval. The valid format is a positive integer. SMTP Client Connections The total number of SMTP client connections during the sampling interval. The valid format is a positive integer. SMTP Client (ms) The total time in milliseconds taken to deliver messages during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). SMTP Connections The total number of connections to the SMTP server during the sampling interval. The valid format is a positive integer. SMTP (ms) The total time in milliseconds that SMTP has conversed during the sampling interval. The valid format is a decimal (formatted to 3 decimal places). SMTP Server Threads The number of active SMTP outbound server threads during the sampling interval. The valid format is a positive integer. For additional information, see: v Organization of the predefined workspaces v Attribute groups used by the predefined workspaces ITCAM for Application Diagnostics - WebSphere Agent situations IBM Tivoli Composite Application Manager for Application Diagnostics WebSphere Agent has a number of predefined situations that you can use to complete the following tasks: v Monitor your WebSphere application servers v Monitor and manage widely dispersed WebSphere Application Server resources through localized automation v Create your own situations using the predefined situations as examples Chapter 4. ITCAM Agent for WebSphere 433 These predefined situations display an alert status. When these situations trigger an alert, you can investigate the event by opening its workspace. For example, you can use these situations to monitor a WebSphere application server for errors occurring within it or Web applications based at your site. How the situations work Situations are tests expressed in IF-TRUE format of system conditions that you want to monitor; the tested value is an ITCAM for Application Diagnostics WebSphere Agent attribute expressed in the form attribute-group.attribute-name. If the specified condition occurs or exists, the situation is true, and an alert is issued. Avoid using negative values If you define situations that use a counter or a range of numbers, always provide a threshold or use values in a positive range of numbers. For example, use a greater-than-or-equal-to-zero expression as shown in some of the following predefined situations. This practice prevents a situation from falsely tripping. If the ITCAM for Application Diagnostics - WebSphere Agent Tivoli Enterprise Management Agent encounters an undefined attribute value, it interprets this value as a negative number and will erroneously fire a situation that specifies a negative number. Note: For the following situations; WASDBConPAvgWaitTimeHigh, DB_Connection_Pools, J2C_Connection_Pools, and Thread_PoolsApplication the Application ID column is not supported and always displays -1 by default. Accessing the situations A number of the predefined situations run by default from the WebSphere Agent, for the situations that do not run automatically you need to start these situations manually. To start these situations access the situations in the Tivoli Enterprise Portal using one of the following methods: v In the WebSphere agent, right click the specific server. Right click Enterprise then, click Manage Situations to display all the managed situations available on the server. If you want to start, stop edit or model a situation right click the situation and select the option you want. v From the toolbar on the main menu click the Situation Editor icon scroll to the situation you want to view. and For information on predefined situations and formulas see “Predefined situations-descriptions and formulas (that run automatically)” and “Predefined situations descriptions and formulas (that run manually)” on page 438. See also “ITCAM for Application Diagnostics- WebSphere Agent attributes” on page 301. Predefined situations-descriptions and formulas (that run automatically) The following predefined situations run automatically from the WebSphere Agent and support the following applications servers unless stated otherwise. v WebSphere Application Server v WebSphere Application Server portal v WebSphere Application Server Process 434 ITCAM for Application Diagnostics: User Guide v WebSphere Application Server ESB v Lotus Workplace server Note: v If you want to start, stop or edit any of these situations see “Accessing the situations” on page 434. v For information about situations that run manually see “Predefined situations descriptions and formulas (that run manually)” on page 438. WASAppDiscovered monitors WebSphere applications deployed in the application server and issues an Informational alert when a new application is discovered. The monitoring agent checks for new applications each time it connects to the Data Collector or when an application is deployed when the Data Collector is already active. The formula is: If Application_Monitoring_Configuration.Monitoring_Status equals 0 then the situation WASAppDiscovered is true. Note: This situation does not support Lotus Workplace server. The predefined Take Action command Start_Baselining associated with the WASAppDiscovered situation enables you to automate the baselining of newly discovered applications. WASAppHealthBad monitors the overall application health and issues a Critical alert when the application health is bad. The formula is: If Application_Health_Status.Web_Tier_Health equals 3 then the situation WASAppHealthBad is true. The predefined Take Action command Set_Appliction_Monitoring associated with WASAppHealthBad situation increases the request monitoring rate for applications generated alert. This command enables you to collect more detailed performance data and helps to collect the most precise data about each application tier health level. WASAppHealthFair monitors the overall application health and issues a warning alert when application health is fair. The formula is: If Application_Health_Status.Application_Health equals 2 then Chapter 4. ITCAM Agent for WebSphere 435 the situation WASAppHealthFair is true. The predefined Take Action command Set_Appliction_Monitoring associated with WASAppHealthFair situation raises the request monitoring level for applications generated alert. This command enables you to collect detailed performance data that helps to pinpoint a bottleneck down to particular application tiers. WASAppHealthGood monitors the overall application health and issues an Informational alert when application health is good. The formula is: If Application_Health_Status.Application_Health equals 1 then the situation WASAppHealthGood is true. The predefined Take Action command Set_Appliction_Monitoring associated with the WASAppHealthGood situation lowers the request monitoring level for applications generated alert, and reduces the monitoring workload. WASError monitors the error severity for a single WebSphere Application Server and issues a Critical condition whenever that severity is greater than 21. Its formula is: If Log_Analysis.Severity is greater than 21 then the situation WASError is true. WASHighCPUPercentUsed monitors the percentage of the CPU being consumed and issues a Critical condition whenever that time exceeds 80%. The formula is: If Application_Server.CPU_Used_Percent is greater than 80 then the situation WASHighCPUPercentUsed is true. WASHighGCTimePercent monitors the percentage of time being spent by the garage collector and issues a Critical condition whenever that time exceeds 80%. The formula is: If Garbage_Collection_Analysis.Real_Time_Percent is greater than 80 then the situation WASHighGCTimePercent is true. 436 ITCAM for Application Diagnostics: User Guide WASHighResponseTime monitors the average request response time and issues a Critical condition whenever that time exceeds 2 seconds. The formula is: If Request_Times_and_Rates.Average_Request_Response_Time is greater than 2000 then the situation WASHighResponseTime is true. WASNotConnected monitors the connection between the ITCAM for WebSphere Data Collector running in an application server and the ITCAM for Application Diagnostics - WebSphere Agent monitoring agent to ensure that the monitoring agent is connected and issues a Critical condition whenever it is not. Its formula is: If Application_Server_Status.Status equals 0 then the situation WASNotConnected is true. WASOutofHeapSpace monitors the heap allocation status and issues a Critical condition whenever heap space is exhausted. The formula is: If Allocation_Failure.Heap_Status equals 1 then the situation WASOutofHeapSpace is true. Note: This situation is not available when monitoring non-IBM Java Virtual Machines, including machines commonly used on HP-UX and Solaris platforms. WASAvgHeapSizeAfterGCHigh monitors the average heap size free percentage after garbage collection. This situation issues a Critical alert if the average heap size free percentage after garbage collection is greater than 80%. Its formula is: If Garbage_Collection_Cycle.Heap_Free_Percent_after_GC is greater than 80 then the situation WASAvgHeapSizeAfterGCHigh is true. Note: This situation does not support Lotus Workplace server. WASJ2CConnectionPoolUsageMaxed monitors the J2C pool percentage usage and issues a Warning alert if the pool usage is greater than or equal to 100%. Its formula is: Chapter 4. ITCAM Agent for WebSphere 437 If J2C_Connection_Pools.Pool_Used_Percent is greater than or equal to 100% then the situation WASJ2CConnectionPoolUsageMaxed is true. Note: This situation does not support Lotus Workplace server. WASDBConnectionPoolUsageMaxed monitors the JDBC pool usage and issues a Critical alert if the pool usage is greater than or equal to 100%. Its formula is: If DB_Connection_Pools.Percent_Used is greater than or equal to 100% then the situation WASDBConnectionPoolUsageMaxed is true. Note: This situation does not support Lotus Workplace server. See also “ITCAM for Application Diagnostics- WebSphere Agent attributes” on page 301. Predefined situations descriptions and formulas (that run manually) Situations that are run manually The following situations do not run automatically, to run them you need to access them from the Manage Situations view. These situations support the following application servers unless stated otherwise: v WebSphere Application Server v WebSphere Application Server portal v WebSphere Application Server Process v WebSphere Application Server ESB v Lotus Workplace server Note: v If you want to start, stop or edit any of these situations see “Accessing the situations” on page 434. v For information about situations that run automatically see “Predefined situations-descriptions and formulas (that run automatically)” on page 434. WASDBConnectionPoolThreadTimeout monitors the thread timeout count. This situation issues a Critical condition whenever the timeout count is greater than zero. Its formula is: If DB_Connection_Pools.Threads_Timed_Out is greater than 0 438 ITCAM for Application Diagnostics: User Guide then the situation WASDBConnectionPoolThreadTimeout is true. WASContainerTransactionRollback monitors the rollback count of the WebSphere Application Server. This situation issues a Critical alert whenever the count becomes nonzero. Its formula is: If Container_Transactions.Global_Transactions_Rolled_Back is greater than 0 or Container_Transactions.Local_Transactions_Rolled_Back is greater than 0 or Container_Transactions.Transactions_Rolled_Back is greater than 0 then the situation WASContainerTransactionRollBack is true. WASEJBCreateTimeHigh monitors the average time of a bean create call and issues a Critical alert when the time is longer than 2 seconds. Its formula is: If Enterprise_Java_Beans.Create_Average_Time is greater than 2000 then the situation WASEJBCreateTimeHigh is true. Note: This situation does not support Lotus Workplace server. WASEJBRemoveTimeHigh monitors the average time of a bean remove call and issues a Critical alert when the time is longer than 2 seconds. Its formula is: If Enterprise_Java_Beans.Remove_Average_Time is greater than 2000 then the situation WASEJBRemoveTimeHigh is true. Note: This situation does not support Lotus Workplace server. WASEJBMethodResponseTimeHigh monitors the average response time on remote interface methods for all beans. This situation issues a Critical alert if the response time is longer than 2 seconds. Its formula is: If Chapter 4. ITCAM Agent for WebSphere 439 Enterprise_Java_Beans.Method_Average_Response_Time is greater than 2000 then the situation WASEJBMethodResponseTimeHigh is true. Note: This situation does not support Lotus Workplace server. WASThreadFreeLow monitors the average free threads in the pool and issues a Critical alert if the number of threads is less than 200. Its formula is: If Thread_Pools.Average_Free_Threads is less than 200 then the situation WASThreadFreeLow is true. Note: This situation does not support Lotus Workplace server. WASDataSrcConWaitTimeHigh monitors the average time an application has to wait for a connection. This situation issues a Critical alert if the wait time is longer than 2 seconds. Its formula is: If Datasources_Connection_Average_Wait_Time is greater than 2000 then the situation WASDataSrcConWaitTimeHigh is true. Note: This situation does not support Lotus Workplace server. WASReqSQLExecuteTimePercentHigh monitors the percentage of time the request spends executing a JDBC database. This situation issues a Critical alert if the percentage of time is higher than 80%. Its formula is: If Request_Analysis.SQL_Execute_Time_Percent is greater than 80 then the situation WASReqSQLExecuteTimePercentHigh is true. Note: This situation does not support Lotus Workplace server. WASReqSQLQueryTimePercentHigh monitors the percentage of time the request spends querying a JDBC database. This situation issues a Critical Alert if the percentage of time is higher than 80%. Its formula is: If Request_Analysis.SQL_Query_Time_Percent is greater than 80 440 ITCAM for Application Diagnostics: User Guide then the situation WASReqSQLQueryTimePercentHigh is true. Note: This situation does not support Lotus Workplace server. WASReqSQLUpdateTimePercentHigh monitors the percentage of time the request spends updating a JDBC database. This situation issues a Critical Alert if the percentage of time is higher than 80%. Its formula is: If Request_Analysis.SQL_Update_Time_Percent is greater than 80 then the situation WASReqSQLUpdateTimePercentHigh is true. Note: This situation does not support Lotus Workplace server. WASDBConPAverageTimeHigh monitors the average time that a connection in use is high. This situation issues a Critical alert if the average time the connection in use is longer than 2 seconds. Its formula is: If DB_Connection_Pools.Average_Usage_Time is greater than 2000 then the situation WASDBConPAverageTimeHigh is true. Note: This situation does not support Lotus Workplace server. WASDBConPPercentUsedTimeHigh monitors the average percentage of time the connection pool in use is high. This situation issues a Critical alert if the average percentage of time the connection pool in use is higher than 80%. Its formula is: If DB_Connection_Pools.Percent_Used is greater than 80 then the situation WASDBConPPercentUsedTimeHigh is true. Note: This situation does not support Lotus Workplace server. WASDBConPAvgWaitTimeHigh monitors the average time that a client has to wait for a connection. This situation issues a Critical alert when the time period is longer than 2 seconds. Its formula is: If DB_Connection_Pools.Average_Wait_Time is greater than 2000 Chapter 4. ITCAM Agent for WebSphere 441 then the situation WASDBConPAvgWaitTimeHigh is true. Note: This situation does not support Lotus Workplace server. WASJ2CCPAverageUsageTimeHigh monitors the average time that connections are in use (it measures from when the connection is allocated to when it is returned). This situation issues a Critical alert when the combined conne
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project