Linux monitoring
The Linux Monitoring lets you monitor and manage your Linux environment. It monitors the availability of your servers, which includes the following elements:
Monitored Objects  | Application classes  | Description  | 
|---|---|---|
Manages and monitors data collection.  | ||
Monitors processor statistics such as percentages of CPU utilization, CPU idle time, CPU time spent on user and system activities.  | ||
Monitors basic CPU utilization statistics for multiple processors on a computer  | ||
Provides information such as Kernel Memory Allocation (KMA) statistics, i-node usage, and Kernel usage of system resources  | ||
Monitors the Overall CPU usage, filesystem usage, and virtual memory of the system  | ||
Monitors memory activities and reports detailed memory utilization.  | ||
Monitors virtual memory and provides the memory utilization for the entire system and for each swap area  | ||
Monitors the network for information about interfaces, addresses, protocols, and traffic.  | ||
Provides you with an abstract view of the entire filesystem, regardless of the various systems' architectures and operating systems  | ||
Displays statistics on process switches, run queues, messaging, and semaphores and allows you to list zombie processes and change process priorities.  | ||
Monitors specified processes running on your system.  | ||
Schedules processes and establishes monitoring blackout periods in your environment  | ||
Provides listings of the group and password files and shows the failed logins  | ||
Monitors whether the SNMP Master Agent and subagent are running, lists configuration information, and provides diagnostic tests with which you can troubleshoot problems.  | ||
Monitors the resource consumption of individual users as well as the number of users and sessions that run on the system  | ||
Monitors the filesystems mounted on a system for information such as disk space, i-nodes, mount and unmounts file systems.  | ||
Monitors the disk drives that are mounted on a system  | ||
Monitors remote hosts running Secure Shell (SSH) protocol version 2 (SSH2) using the PSL collection method.  | ||
Acts as a container KM and hosts the instances of all remote hosts.  | ||
Monitors the virtual machines statistics such as 
  |