The System Monitor Handbook. Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig

Similar documents
Remote Process Explorer

Chapter. Basic Administration. Secrets in This Chapter. Monitoring the System Viewing Log Files Managing Services and Programs Monitoring Disk Usage

Linux System Administration

Chapter 9: Process management. Chapter 9 Process management

Labs instructions for Enabling BeagleBone with TI SDK 5.x

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Author A.Kishore/Sachin WinSCP

WinSCP. Author A.Kishore/Sachin

Beginner's Tutorial. How to Create and Use a TrueCrypt Container

Windows XP. A Quick Tour of Windows XP Features

What is a Process? Processes and Process Management Details for running a program

Outlook Create a Contact Group

Excel window. This will open the Tools menu. Select. from this list, Figure 3. This will launch a window that

Advanced Unix System Administration

OS Structure, Processes & Process Management. Don Porter Portions courtesy Emmett Witchel

College of Pharmacy Windows 10

Visual Dialogue User Guide. Version 6.0

Virtual Infrastructure Web Access Administrator s Guide Update 2 and later for ESX Server 3.5 and VirtualCenter 2.5

Virtual Desktop Infrastructure Setup for Windows 10

NAME top display top CPU processes. SYNOPSIS top [ ] [d delay] [p pid] [q] [c] [C] [S] [s] [i] [n iter] [b]

Programs. Program: Set of commands stored in a file Stored on disk Starting a program creates a process static Process: Program loaded in RAM dynamic

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edit9on

SMARTdoc v2 User Manual

Checking Resource Usage in Fedora (Linux)

Virtual Infrastructure Web Access Administrator s Guide ESX Server 3.0 and VirtualCenter 2.0

Virtual Desktop Infrastructure Setup for MacOS

SMART Sync User Guide: Getting Started. School District of Palm Beach County

Guideline for the installation of C-MOR Video Surveillance Virtual Machine on VMware ESX Server

Function. Description

Lab #5 Guide: Installing Ubuntu as a Virtual Machine

Macrorit Partition Expert 4.3.5

Caja File Manager. Desktop User Guide

Quick Start Guide. Kaseya 2

Unit III: Working with Windows and Applications. Chapters 5, 7, & 8

Chapter 2: System Structures. Operating System Concepts 9 th Edition

Security Labs in OPNET IT Guru

VDI Users Guide. Mac OS X

CS Fundamentals of Programming II Fall Very Basic UNIX

The Kfloppy Formatter Handbook

Macintosh OS X 10.3 Tips

FarStone RestoreIT Users Guide

Instructions PLEASE READ (notice bold and underlined phrases)

INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University Updated May 19, 2017

Processes and Threads. Processes and Threads. Processes (2) Processes (1)

4. In the Address Book drop-down list, click the address book that contains the addresses you want in your distribution list.

Purchase and Setup instructions for SWVPS (Sept 15, 2014)

User pages for RM Portico

Network Management Software ALLNET Zone Controller

Use the Apple menu to change settings, get Mac OS X software, open recent items, and restart or shut down your computer.

Quick Guide for Excel 2015 Data Management November 2015 Training:

How to install the software of ZNS8022

Virtual Desktop Infrastructure Setup for Windows 7

4D WebSTAR V User Guide for Mac OS. Copyright (C) D SA / 4D, Inc. All rights reserved.

Real-Time Monitoring Configuration

Secure Guard Central Management System

NetDoc AD is a tool for the semi-automatic documentation of Active Directory Directory services based on Microsoft Visio.

Adding a VPN connection in Windows XP

Processes. Sanzheng Qiao. December, Department of Computing and Software

FrontPage 2000 Tutorial -- Advanced

The Start menu (overview)

Windows 2000 Safe Mode

FileLoader for SharePoint

2. create the workbook file

Gwenview User Manual. Aurélien Gâteau Christopher Martin Henry de Valence

Xfmea Version 10 First Steps Example

VERSION GROUPWISE WEBACCESS USER'S GUIDE

Virtual Desktop Infrastructure Setup for MacOS

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017

Section 2 Getting Started

KDE User Guide. This chapter will introduce the new appearance and basic operating of Asianux 2.0.

Chapter 2. Operating-System Structures

Users Guide. Kerio Technologies

Processes. System tasks Campus-Booster ID : **XXXXX. Copyright SUPINFO. All rights reserved

Handout Objectives: a. b. c. d. 3. a. b. c. d. e a. b. 6. a. b. c. d. Overview:

SAS Viya 3.2 Administration: Monitoring

Getting to know you. Anatomy of a Process. Processes. Of Programs and Processes

Most of the work is done in the context of the process rather than handled separately by the kernel

CS370 Operating Systems

Chap 4, 5: Process. Dongkun Shin, SKKU

JAMS 7.X Getting Started Guide

About the XenClient Enterprise Solution

About the Presentations

Restoring data from a backup

SmartJCForms User Guide

Patricia Andrada Quick Guide Excel 2010 Data Management-July 2011 Page 1

Unit 2: Using Windows 7 Lesson 9

ICAU1128B: Operate a Personal Computer Student Handbook

Advanced Unix System Administration Spring 2008 Homework 1 Solutions

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

Enter your Appserv username and password to sign in to the Website

Mid Term from Feb-2005 to Nov 2012 CS604- Operating System

OUTLOOK 2007 BASICS. In this session you will: FOCUS

o Reality The CPU switches between each process rapidly (multiprogramming) Only one program is active at a given time

Chapter 2: Operating-System Structures

Remote Access to the CIS VLab (308)

WA2503 Hadoop Programming on the. Hortonworks Data Platform. Lab Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.

CS Unix Tools. Fall 2010 Lecture 10. Hussam Abu-Libdeh based on slides by David Slater. September 29th, 2010

Getting Help in Microsoft Office

CleanMyPC User Guide

VERUS Navigation Guide

Transcription:

Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig

2

Contents 1 Introduction 6 2 Using System Monitor 7 2.1 Getting started........................................ 7 2.2 Process Table......................................... 7 2.2.1 End Processes.................................... 9 2.2.2 Filter Bar....................................... 9 2.2.3 Process Filter.................................... 9 2.3 Work Space......................................... 9 2.3.1 Sensor Browser................................... 10 2.3.2 Line Graph..................................... 10 2.3.3 Digital Display................................... 10 2.3.4 Bar Graph...................................... 10 2.3.5 Log to a File..................................... 10 2.3.6 Partition Table.................................... 10 2.3.7 Connecting to other hosts............................. 11 3 Configuring ksysguardd 12 4 Credits and License 13

List of Tables 2.1 Default Columns in the Process Table.......................... 8 2.2 Additional Columns in the Process Table........................ 9 4

Abstract System Monitor is a network enabled task and system monitor application.

Chapter 1 Introduction System Monitor is the Plasma Task and Performance Monitor. It features a client/server architecture that allows monitoring of local as well as remote hosts. The graphical front end uses so-called sensors to retrieve the information it displays. A sensor can return simple values or more complex information like tables. For each type of information, one or more displays are provided. Displays are organized in worksheets that can be saved and loaded independently from each other. So, System Monitor is not only a simple task manager but also a very powerful tool to control large server farms. 6

Chapter 2 Using System Monitor 2.1 Getting started System Monitor can be started from the application launcher menu, using the entry System Monitor in the Applications System menu. Alternatively, you can start it by typing ksysguard in a terminal. The System Monitor main window consists of a menu bar, an optional tool bar and status bar, and the work space. Custom worksheets will also show the sensor browser. By default System Monitor shows two worksheets: Process Table and System Load. The Process Table lists the running processes and lets the user control them. Multiple processes can be selected and controlled at once. The System Load worksheet shows graphs of system utilization: CPU History, Memory and Swap History, and the Network History. This default setup is sufficient enough for an inexperienced user to do some system management. An experienced user or even a system administrator of a large computer lab has different needs. To address a wide range of users, System Monitor is highly flexible. NOTE You can launch the Process Table using the global shortcut Ctrl+Esc at any time. The process table is displayed in a window titled System Activities. 2.2 Process Table The Process Table gives you a list of processes on your system. The list can be sorted by each column. Just press the left mouse button at the head of the column. Use the What s This help for the columns titles to get additional information about the value displayed here. In the context menu of a process in the list view you find additional actions like changing the priority, sending signals to the process, switching to the application window, showing detailed memory information and killing the process. The list shows the following information about each process. Please note that not all properties are available on every operating system. 7

Name Username CPU % Memory Shared Mem Window Title The name of the executable that started the process The user who owns this process The current total CPU usage of the process, divided by the number of processor cores in the machine This is the amount of real physical memory that this process is using by itself, and approximates the Private memory usage of the process. It does not include any swapped out memory, nor the code size of its shared libraries. This is often the most useful figure to judge the memory use of a program. This is approximately the amount of real physical memory that this process s shared libraries are using. This memory is shared among all processes that use this library The title of any window that this process is showing Table 2.1: Default Columns in the Process Table PID TTY Niceness CPU Time IO Read IO Write Virtual Size Command The unique Process ID that identifies this process The controlling terminal on which this process is running The priority with which this process is being run. For the normal scheduler, this ranges from 19 (very nice, least priority) to -19 (top priority) The total user and system time that this process has been running for, displayed as minutes:seconds The number of bytes read. The Display Units and the Displayed Information can be changed using the context menu of this column header The number of bytes written. The Display Units and the Displayed Information can be changed using the context menu of this column header This is the amount of virtual memory space that the process is using, included shared libraries, graphics memory, files on disk, and so on. This number is almost meaningless. Use the context menu to select the Display Units The command with which this process was launched 8

Table 2.2: Additional Columns in the Process Table At the top of the table you find three controls which will be described now from left to right. 2.2.1 End Processes If you have selected one or more processes you can press the End Process button to kill them. A so called SIGKILL is sent to the processes which causes them to terminate immediately. If these applications still have unsaved data this data will be lost. So use this button with care. 2.2.2 Filter Bar Filter which processes are shown by the text given here. The text can be a partial string match of the Name, Command or Window Title of the process. It can also be a Username or a Process ID number. 2.2.3 Process Filter The Process Filter can be used to reduce the number of processes displayed in the table. You can filter out processes you are not interested in. Currently you can display All Processes in a flat or tree view, System Processes only, User Processes only, your Own Processes only or Programs Only. The tree view has been designed to show the relationships between the running processes. A process that is started by another process is called the child of that process. A tree is an elegant way to show this parent-child relationship. The init process is the ancestor of all processes. If you are not interested in the children of a particular process you can click on the little box to the left of the parent and the subtree will collapse. Another click on that box will unfold the subtree again. 2.3 Work Space The work space is organized as worksheets. Select New Tab... from the File menu to create a new worksheet. A dialog will appear where you can set the name, the dimension and the update interval of the worksheet. To remove a worksheet again, select Close Tab from the File menu. Any modifications will be saved to the worksheet file. If a worksheet has never been saved, you will be asked for a file name. Worksheets consist of cells organized as a grid. Each cell can be filled with a display for one or more sensors. You can fill a cell by dragging a sensor from the sensor browser and dropping it over the cell. If there is more than one type of display available for that type of sensor, a popup menu will appear. You can then select which display you prefer to use. Certain types of displays can display more than one sensor. Add more sensors to a display by dragging them over from the sensor browser and dropping them over the already existing display. Worksheets can be configured by clicking Tab Properties at the View menu. In the appearing dialog you can set the dimension and the update interval. Displays can be configured by clicking with the right mouse button on them. A popup menu appear where you can select whether you want to change the properties of that display or remove it from the worksheet. 9

2.3.1 Sensor Browser The sensor browser exposes System Monitor s advanced functionality. To use it, you must first go to the File menu and create a new worksheet. It is shown whenever a custom worksheet is selected. The sensor browser displays the registered hosts and their sensors in a tree form. Click on the tree handles to open or close a branch. Each sensor monitors a certain system value. TIP After you have configured your custom worksheet use the splitter and move it to the right edge of the window to hide the sensor browser. If the sensor browser does not appear on a custom worksheet, it is probably hidden. To unhide it, select the right edge of the window and drag it to the left. 2.3.2 Line Graph The line graph prints samples of one or more sensors over time. If, several sensors are displayed, the values are piled in different colors. If the display is large enough a grid will be displayed to show the range of the plotted samples. By default, the automatic range mode is active so the minimum and maximum values will be set automatically. Sometimes you want fixed minimum and maximum values. In that case, you can deactivate automatic range mode and set the values in the properties dialog. 2.3.3 Digital Display The multimeter displays the sensor values as a digital meter. In the properties dialog you can specify a lower and upper limit. If the range is exceeded, the display is colored in the alarm color. 2.3.4 Bar Graph The bar graph displays the sensor values as dancing bars. In the properties dialog you can specify minimum and maximum values of range and a lower and upper limit. If the range is exceeded, the display is colored in the alarm color. 2.3.5 Log to a File The sensor logger does not display any values, but logs them in a file with additional date and time information. For each sensor you can specify a lower and upper limit in the properties dialog. If the range is exceeded, the entry of the sensor table is colored in the alarm color. 2.3.6 Partition Table The Partition Usage has a special table sensor showing information about all mounted partitions 10

2.3.7 Connecting to other hosts Note that the Monitor Remote Machine menu item is only available on custom tabs. To connect to a new host use Monitor Remote Machine... from the File menu. A dialog box will appear and allows you to enter the name of the host you want to connect to. Below the name you can choose the connection method. The default is ssh, the secure shell. Alternatively the rsh, the remote shell, the daemon mode or a custom command can be used. Click OK to establish the connection. Shortly afterwards the new host will appear in the sensor browser and you can browse the list of sensors. To disconnect from a host, you have to shut down it and restart System Monitor again. To establish a connection, a program called ksysguardd, that can be started in the following two modes, must be installed on the new host. daemon mode You can start ksysguardd at boot time in Daemon mode by adding -d as the argument. In this case, you have to select daemon mode at the connection dialog of ksysguard. A disadvantage of this connection type is that you won t be able to kill or renice a process in the Process Table and the data exchange over network won t be encrypted. As a result, daemon mode is not recommended. shell mode In this mode ksysguardd is started at connecting time by ksysguard. To make that possible, its location needs to be included in your PATH. Unfortunately the ssh does not source your.profile file, so your regular PATH setting will not be available. Instead it uses a default PATH like /bin:/usr/bin. Since it is very likely that Plasma is not installed in these folders you need to create or update a file in your home folder. The file is called environment and needs to be in a hidden folder called.ssh. See the manual page for ssh for more details. The file needs to contain a line similar to: PATH =/ bin :/ usr/bin :/ opt/kde/bin assuming that ksysguardd can be found under /opt/kde/bin/ksysguardd. TIP When using ssh you should make sure that you have your identity.pub installed on the remote machine and the host key of the remote machine is already registered on your machine. If you don t set up identity.pub correctly, you will be asked for your password every time you start ksysguard. The easiest way to make sure that everything is working is to run ssh remotehost ksysguardd in a shell. If you are greeted by ksysguardd, then everything is working correctly and you can type quit to exit ksysguardd. NOTE For experts: ksysguardd is a very small program that is only linked against the libc. So it can also be used on machines that do not have a full blown Plasma installed, such as servers. Many major distributions provide a separate ksysguardd package for your convenience. If you choose the custom command option in the host connector you need to specify the complete command to start ksysguardd. 11

Chapter 3 Configuring ksysguardd The graphical front-end is available on any platform that Plasma runs on. The back-end is at the moment available on the following flavors of UNIX : Linux For ksysguardd to work it is necessary to compile the Linux Kernel with the /proc File system enabled. This is the default setting and most Linux Distributions have it already. FreeBSD The ksysguardd program needs to be owned by the kmem group and needs to have the setgid bit set. Solaris To be written Support for other platforms is in progress. Your help is greatly appreciated. 12

Chapter 4 Credits and License System Monitor is currently developed and maintained by John Tapsell john.tapsell@kde.org. System Monitor is a rewrite of KTop, the KDE 1.x task manager. Several other people have worked on KTop: A. Sanda alex@darkstar.ping.at Ralf Mueller ralf@bj-ig.de Bernd Johannes Wuebben wuebben@math.cornell.edu Nicolas Leclercq nicknet@planete.net The porting to other platforms than Linux was done by: FreeBSD: Hans Petter Bieker zerium@traad.lavvu.no This documentation is licensed under the terms of the GNU Free Documentation License. This program is licensed under the terms of the GNU General Public License. 13