Introduction

IBM’s Advanced Interactive eXecutive, or AIX, is a series of proprietary UNIX-based operating systems built by IBM. AIX is the open standards-based UNIX operating system providing secure, scalable, and robust infrastructure solutions for enterprise.

Monitoring Use Case: IBM AIX helps to collect the metric values with respect to time and alerts your team to act immediately in case of any threshold breach or unexpected metric behavior observed based on configurations. In a way it helps you with smooth functioning of business with minimal or zero downtime in case of any infrastructure related issues occurring.

Pre-Requisites

Credential Set: root users & non-root users member of system user group.

Install the integration

  1. From All Clients, select a client.
  2. Go to Setup > Integrations > Integrations.
  3. From Available Integrations, select Adapter > IBM AIX Server.
    IBM-AIX
  4. From Install IBM AIX Server Integration,enter:
Object NameDescription
NameConfiguration name.
Gateway ProfileGateway management profile associated with the client.
  1. Click Install.
    The IBM-AIX-SERVER INTEGRATION page displays the installed integration in the CONFIGURATION section.
    IBM-AIX

Configure the integration

  1. From CONFIGURATION, click +Add.
  2. From the Create Adapter Configuration page, enter:
    • Name: Configuration name.
    • IP Address/Host Name: IP address or host name of the target.
    • Additional Configurations: Add additional configuration details, such as file system, process, and so on. The Log File Configuration is part of the additional configuration, configure the values for below fields as per your log file monitoring use case:
      • Name
      • File Name
      • Rotated File Name
      • Expression
      • Check Type
      • Threshold
      • Severity
    • Notification Alerts: Select TRUE or FALSE.
      Notes:
      • By default False is selected.
      • If you select TRUE, application will handle Critical/Recovery failure alert notifications for Connectivity, Authentication Exceptions.
  3. From the Credentials section, select Custom and enter the target device Username and Password.
  4. In the Resource Types & Metrics section, select the metrics you want and configure for availability and alert conditions.
  5. The Resource Types & Metrics section automatically displays the target device resource type such as VoIP.
  6. Use Import to read in metrics and Export to save metrics locally.
  7. (Optional) From the Discovery Schedule section, select the checkbox to add a Recurrence Pattern. Choose one of the following intervals:
    • Minutes
    • Hourly
    • Daily
    • Weekly
    • Monthly
  8. From the Monitoring Schedule section, configure how frequently the monitoring action should trigger.
  9. Click Save.
IBM-AIX

After saving the configuration, the resources are discovered and monitoring is done as specified in the configuration profile.

The configuration is saved and displayed on the page.

View the IBM AIX details

The IBM AIX integration is displayed in the Infrastructure > Resources > Server.

IBM-AIX
IBM-AIX

Supported metric

Metric NamesUnit
ibmaix_server_openFileDescriptors_Utilization

Open File Descriptors Used Percentage
%
ibmaix_server_openFileDescriptors_UsedCount

Current number of Open File Descriptors
count
ibmaix_server_loggedInUsers_Pct

Current number of logged in users percentage
%
ibmaix_server_loggedInUsers_Count

Current number of logged in users
count
ibmaix_server_runningProcesses_Pct

Current running processes percentage
%
ibmaix_server_runningProcesses_Count

Current number of running processes
count
ibmaix_server_Semaphores_UsedCount

Current number of semaphore ID’s in use
count
ibmaix_server_messageQueueIDs_UsedCount

Current number of message queue ID’s in use
count
ibmaix_server_sharedMemoryIDs_UsedCount

Current number of shared memory ID’s in use
count
ibmaix_server_cpu_total_Utilization

System CPU Utilization
%
ibmaix_server_cpu_logicalProcessor_Utilization

System CPU logical processor Utilization
%
ibmaix_server_cpu_Load

Average cpu load for 1 min, 5 min and 15 min
ibmaix_server_realMemory_ScanRate

Memory scan rate in pages per second.
psec
ibmaix_server_realMemory_pageOuts_PagesPerSec

Memory page out rate in pages per second.
psec
ibmaix_server_realMemory_pageOuts_KiloBytesPerSec

Memory pages page out rate in KiloBytes per second.
KBps
ibmaix_server_realMemory_memory_Utilization

Memory Utilization
%
ibmaix_server_swapMemory_Utilization

Swap memory utilization in percent.
%
ibmaix_server_individual_SwapArea_Utilization

Individual swap area utilization in percent.
%
ibmaix_server_fileSystem_Space_UsedInMB

File system space usage in MB
MB
ibmaix_server_fileSystem_Space_DeltaInKB

File system space usage(KB) delta
MB
ibmaix_server_fileSystem_Inodes_Utilization

File system Inodes utilization percent.
%
ibmaix_server_fileSystem_Inodes_Usage_Number

File system Inodes usage number.
count
ibmaix_server_fileSystem_Inodes_Delta

File system Inodes usage delta.
count
ibmaix_server_fileSystem_Mount_ChangeDetection

File system mount point change detection. It detects if any file system mount point is removed and if any new mount point added into the system. Below are the possible values: 0 - Available , 1 - Newly Added , 2 - Removed
ibmaix_server_network_interface_OutTraffic

Monitors Out traffic of each interface for ibmaix Devices
Kbps
ibmaix_server_network_interface_InDiscards

Monitors Network in discards of each interface for ibmaix Devices
psec
ibmaix_server_network_interface_OutPackets

Monitors Out packets of each interface for ibmaix Devices
packets/sec
ibmaix_server_network_interface_OutErrors

Monitors network out errors of each interface for ibmaix Devices
count
ibmaix_server_network_interface_OutDiscards

Monitors network Out Discards of each interface for ibmaix Devices
psec
ibmaix_server_network_interface_InPackets

Monitors in Packets of each interface for ibmaix Devices
packets/sec
ibmaix_server_network_interface_Status

Monitors status of each interface for ibmaix Devices. Possible values 0-down, 1-up.
ibmaix_server_network_interface_Collisions

Monitors network collisions of each interface for ibmaix Devices
count
ibmaix_server_network_interface_InErrors

Monitors network in errors of each interface for ibmaix Devices
count
ibmaix_server_network_interface_InTraffic

Monitors In traffic of each interface for ibmaix Devices
Kbps
ibmaix_server_process_RunningStatus

Monitors status of each user mentioned process. possible values 0-Not Running, 1- Running

Risks, Limitations & Assumptions

  • Currently we do not have monitoring support for below:
    • Hardware metrics
    • Programmable Resource Monitoring
    • Processes (We provided one metric for each process RunningStatus. i.e, ibmaix_server_process_RunningStatus)
  • For log monitoring, we expect below json payload as input.
    • “Name” can be any string used to identify individual log configuration.
    • “File Name” is a combination of folder path and file name. Folder path should contain the exact path for the file as prefix. File name can be any valid string or regular expression. In case of file not found with specified file name, alert will be generated with the severity specified by the user.
      Example 1: /var/adm/ras/Age.?t.log Matches: Agent.log, Ageat.log ,.
  • “Rotated File Name” is similar to filename field but specifying the rotated file. This field is optional.
  • “Expression” can be any valid string or regular expression used to specify the search string. It is a mandatory field
  • “Check Type” can be either “exists” or “not exists”(case insensitive). It is a mandatory field.
  • “Threshold” can be any valid integer. Alert will be generated in case a specified threshold breach happens.
  • “Severity” used to specify the alert type to be created in case of expression found. Possible values are CRITICAL,WARNING,INFO and OK (case insensitive) Log File configuration
    [
      {
      "Name":"",
      "File Name":"",
      "Rotated File Name":"",
      "Expression":"",
      "Check Type":"",
      "Threshold":"",
      "Severity":""
      }
    ]
  • We do not process logs for the first request, since it leads to performance issues due to huge data. We will consider the latest logs ( logs generated between first and second polls) from the second request and process accordingly.
  • No recovery alerts are generated for expression related alerts. we will get recovery only for file not found alerts.
  • Component level threshold configuration is not possible.
  • Resource level metric threshold customization and frequency setting are not possible.
  • Usability issues in application configuration page while adding/editing.
  • Optional configuration parameters cannot be defined.
  • Application upgrade is a manual process without version change.
  • We do not process logs of size greater than 1GB.