Supported Versions |
---|
AIX 7.1 TL02 instant of TL02 |
Introduction
IBM’s Advanced Interactive eXecutive, or AIX, is a series of proprietary UNIX-based operating systems built by IBM. AIX is the open standards-based UNIX operating system providing secure, scalable, and robust infrastructure solutions for enterprise.
Monitoring Use Case: IBM AIX helps to collect the metric values with respect to time and alerts your team to act immediately in case of any threshold breach or unexpected metric behavior observed based on configurations. In a way it helps you with smooth functioning of business with minimal or zero downtime in case of any infrastructure related issues occurring.
Pre-requisites
- OpsRamp Classic Gateway 10.0 and above.
- Credential Set: root users & non-root users member of system user group.
- To proceed, please ensure that the Adapter Integrations add-on is enabled in your client configuration. Once enabled, navigate to Setup > Integrations > Adapter to access the IBM AIX integration.
Install the integration
- From All Clients, select a client.
- Go to Setup > Integrations > Integrations.
- From Available Integrations, select Adapter > IBM AIX Server.
- From Install IBM AIX Server Integration,enter:
Object Name | Description |
---|---|
Name | Configuration name. |
Gateway Profile | Gateway management profile associated with the client. |
- Click Install.
The IBM-AIX-SERVER INTEGRATION page displays the installed integration in the CONFIGURATION section.
Configure the integration
- From CONFIGURATION, click +Add.
- From the Create Adapter Configuration page, enter:
- Name: Configuration name.
- IP Address/Host Name: IP address or host name of the target.
- Additional Configurations: Add additional configuration details, such as file system, process, and so on. The Log File Configuration is part of the additional configuration, configure the values for below fields as per your log file monitoring use case:
- Name
- File Name
- Rotated File Name
- Expression
- Check Type
- Threshold
- Severity
- Notification Alerts: Select TRUE or FALSE.
Notes:- By default False is selected.
- If you select TRUE, application will handle Critical/Recovery failure alert notifications for Connectivity, Authentication Exceptions.
- From the Credentials section, select Custom and enter the target device Username and Password.
- In the Resource Types & Metrics section, select the metrics you want and configure for availability and alert conditions.
- The Resource Types & Metrics section automatically displays the target device resource type such as VoIP.
- Use Import to read in metrics and Export to save metrics locally.
- (Optional) From the Discovery Schedule section, select the checkbox to add a Recurrence Pattern. Choose one of the following intervals:
- Minutes
- Hourly
- Daily
- Weekly
- Monthly
- From the Monitoring Schedule section, configure how frequently the monitoring action should trigger.
- Click Save.

After saving the configuration, the resources are discovered and monitoring is done as specified in the configuration profile.
The configuration is saved and displayed on the page.
View the IBM AIX details
The IBM AIX integration is displayed in the Infrastructure > Resources > Server.
Supported metric
Metric Names | Unit |
---|---|
ibmaix_server_openFileDescriptors_Utilization Open File Descriptors Used Percentage | % |
ibmaix_server_openFileDescriptors_UsedCount Current number of Open File Descriptors | count |
ibmaix_server_loggedInUsers_Pct Current number of logged in users percentage | % |
ibmaix_server_loggedInUsers_Count Current number of logged in users | count |
ibmaix_server_runningProcesses_Pct Current running processes percentage | % |
ibmaix_server_runningProcesses_Count Current number of running processes | count |
ibmaix_server_Semaphores_UsedCount Current number of semaphore ID’s in use | count |
ibmaix_server_messageQueueIDs_UsedCount Current number of message queue ID’s in use | count |
ibmaix_server_sharedMemoryIDs_UsedCount Current number of shared memory ID’s in use | count |
ibmaix_server_cpu_total_Utilization System CPU Utilization | % |
ibmaix_server_cpu_logicalProcessor_Utilization System CPU logical processor Utilization | % |
ibmaix_server_cpu_Load Average cpu load for 1 min, 5 min and 15 min | |
ibmaix_server_realMemory_ScanRate Memory scan rate in pages per second. | psec |
ibmaix_server_realMemory_pageOuts_PagesPerSec Memory page out rate in pages per second. | psec |
ibmaix_server_realMemory_pageOuts_KiloBytesPerSec Memory pages page out rate in KiloBytes per second. | KBps |
ibmaix_server_realMemory_memory_Utilization Memory Utilization | % |
ibmaix_server_swapMemory_Utilization Swap memory utilization in percent. | % |
ibmaix_server_individual_SwapArea_Utilization Individual swap area utilization in percent. | % |
ibmaix_server_fileSystem_Space_UsedInMB File system space usage in MB | MB |
ibmaix_server_fileSystem_Space_DeltaInKB File system space usage(KB) delta | MB |
ibmaix_server_fileSystem_Inodes_Utilization File system Inodes utilization percent. | % |
ibmaix_server_fileSystem_Inodes_Usage_Number File system Inodes usage number. | count |
ibmaix_server_fileSystem_Inodes_Delta File system Inodes usage delta. | count |
ibmaix_server_fileSystem_Mount_ChangeDetection File system mount point change detection. It detects if any file system mount point is removed and if any new mount point added into the system. Below are the possible values: 0 - Available , 1 - Newly Added , 2 - Removed | |
ibmaix_server_network_interface_OutTraffic Monitors Out traffic of each interface for ibmaix Devices | Kbps |
ibmaix_server_network_interface_InDiscards Monitors Network in discards of each interface for ibmaix Devices | psec |
ibmaix_server_network_interface_OutPackets Monitors Out packets of each interface for ibmaix Devices | packets/sec |
ibmaix_server_network_interface_OutErrors Monitors network out errors of each interface for ibmaix Devices | count |
ibmaix_server_network_interface_OutDiscards Monitors network Out Discards of each interface for ibmaix Devices | psec |
ibmaix_server_network_interface_InPackets Monitors in Packets of each interface for ibmaix Devices | packets/sec |
ibmaix_server_network_interface_Status Monitors status of each interface for ibmaix Devices. Possible values 0-down, 1-up. | |
ibmaix_server_network_interface_Collisions Monitors network collisions of each interface for ibmaix Devices | count |
ibmaix_server_network_interface_InErrors Monitors network in errors of each interface for ibmaix Devices | count |
ibmaix_server_network_interface_InTraffic Monitors In traffic of each interface for ibmaix Devices | Kbps |
ibmaix_server_process_RunningStatus Monitors status of each user mentioned process. possible values 0-Not Running, 1- Running |
Risks, Limitations & Assumptions
- Currently we do not have monitoring support for below:
- Hardware metrics
- Programmable Resource Monitoring
- Processes (We provided one metric for each process RunningStatus. i.e, ibmaix_server_process_RunningStatus)
- For log monitoring, we expect below json payload as input.
- “Name” can be any string used to identify individual log configuration.
- “File Name” is a combination of folder path and file name. Folder path should contain the exact path for the file as prefix. File name can be any valid string or regular expression. In case of file not found with specified file name, alert will be generated with the severity specified by the user.
Example 1: /var/adm/ras/Age.?t.log Matches: Agent.log, Ageat.log ,.
- “Rotated File Name” is similar to filename field but specifying the rotated file. This field is optional.
- “Expression” can be any valid string or regular expression used to specify the search string. It is a mandatory field
- “Check Type” can be either “exists” or “not exists”(case insensitive). It is a mandatory field.
- “Threshold” can be any valid integer. Alert will be generated in case a specified threshold breach happens.
- “Severity” used to specify the alert type to be created in case of expression found. Possible values are CRITICAL,WARNING,INFO and OK (case insensitive)
Log File configuration
[ { "Name":"", "File Name":"", "Rotated File Name":"", "Expression":"", "Check Type":"", "Threshold":"", "Severity":"" } ]
- We do not process logs for the first request, since it leads to performance issues due to huge data. We will consider the latest logs ( logs generated between first and second polls) from the second request and process accordingly.
- No recovery alerts are generated for expression related alerts. we will get recovery only for file not found alerts.
- Component level threshold configuration is not possible.
- Resource level metric threshold customization and frequency setting are not possible.
- Usability issues in application configuration page while adding/editing.
- Optional configuration parameters cannot be defined.
- Application upgrade is a manual process without version change.
- We do not process logs of size greater than 1GB.
- The availability is shown unknown for few resources even if it is enabled on the respective resource metrics. This is because of the presence of multiple native type resources under the same resource type.