Siemens SM2 monitoring system 用户手册

下载
页码 500
40
U3585-J-Z125-8-76
DISK-FILE
SM2 monitoring programs
Due to the large amount of data generated and the resulting high load on the CPU, this
monitoring program should be used for short monitoring operations only (between half an
hour and one hour), and only on a small number of disk devices.
Note
The only access values recorded are ones where an I/O chain begins with a search
command (SEEK). This is usually the case for most access attempts, with the exception
of the following instances:
1. When formatting disks (VOLIN)
2. When accessing the VOL1 label
DISK-FILE
Monitored data on file access for selected disks
This monitoring program provides information on physical access to files on a selected disk,
provided that access was by way of the I/O output system of privileged PAM (PPAM). This
includes file access using the methods EAM (Evanescent Access Method), ISAM (Indexed
Sequential Access Method), SAM (Sequential Access Method) and UPAM (User Primary
Access Method).
In the case of multiprocessor systems, monitoring is restricted to I/O operations originating
in the local system running SM2.
Note
Due to the extension of the I/O path, the monitoring program should only be used for
short periods of time.
DLM
Monitored data on lock requests
The DLM (Distributed Lock Manager) monitoring program provides information on lock
requests from TU, TPR and NSM.