All Apps and Add-ons

NMON Performance Monitor for Unix and Linux Systems: Is it possible to add more mount points?

imthesplunker
Path Finder

Hi ,

Is there any way of adding some more mount points in NMON Performance Monitor for Unix and Linux Systems app in "UI JFSFILE, Percentage Usage of FileSystems"?

As of now , I could see /home , /boot , /users , /var , /opt , /oem . I would like to add /swap , and some more files under /opt/webapps/*

Thanks.

0 Karma
1 Solution

guilmxm
Influencer

Hi,

The nmon process is expected to list every mounted file system, at least at startup time (it is restarted about every 2 hours by default), as you ask the question I guess you can't find some of the file system you expect.

The easiest would be first to check using an SPL search (note you can use HOWTO interfaces):

Listing all file system:

eventtype=nmon:performance type=JFSFILE host=foo | stats count by host,device | sort limit=0 host,device

Charting over time:

eventtype=nmon:performance type=JFSFILE host=foo device=* | timechart avg(value) as pct_use by device

You should have the same list of available file system that you have within interfaces, unless there is an error I am not aware of.
In such a case it might help to force rebuilding the NMON Data JFS FILE data model that is being used by interfaces to build that list automatically.

As an advanced verification, you can directly check the content of the raw Nmon file, you will find them in $SPLUNK_HOME/var/log/nmon/var/nmon_repository/

Exemple:

grep JFSFILE,JFS /opt/splunk/var/log/nmon/var/nmon_repository/*.nmon

This will provides the first line which the csv header, and contains the list of file systems under analysis by Nmon processes.
If you can't find a file system here (such as the swap that you will not find there, it not considered as a file system and is analysed by Memory interfaces), you will not find it in interfaces of the app.

Don't hesitate to inform me the case interfaces would not provide the expected list of file systems.

Regards,

Guilhem

View solution in original post

0 Karma

guilmxm
Influencer

Hi,

The nmon process is expected to list every mounted file system, at least at startup time (it is restarted about every 2 hours by default), as you ask the question I guess you can't find some of the file system you expect.

The easiest would be first to check using an SPL search (note you can use HOWTO interfaces):

Listing all file system:

eventtype=nmon:performance type=JFSFILE host=foo | stats count by host,device | sort limit=0 host,device

Charting over time:

eventtype=nmon:performance type=JFSFILE host=foo device=* | timechart avg(value) as pct_use by device

You should have the same list of available file system that you have within interfaces, unless there is an error I am not aware of.
In such a case it might help to force rebuilding the NMON Data JFS FILE data model that is being used by interfaces to build that list automatically.

As an advanced verification, you can directly check the content of the raw Nmon file, you will find them in $SPLUNK_HOME/var/log/nmon/var/nmon_repository/

Exemple:

grep JFSFILE,JFS /opt/splunk/var/log/nmon/var/nmon_repository/*.nmon

This will provides the first line which the csv header, and contains the list of file systems under analysis by Nmon processes.
If you can't find a file system here (such as the swap that you will not find there, it not considered as a file system and is analysed by Memory interfaces), you will not find it in interfaces of the app.

Don't hesitate to inform me the case interfaces would not provide the expected list of file systems.

Regards,

Guilhem

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Take Action Automatically on Splunk Alerts with Red Hat Ansible Automation Platform

 Are you ready to revolutionize your IT operations? As digital transformation accelerates, the demand for ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...

Beyond Detection: How Splunk and Cisco Integrated Security Platforms Transform ...

Financial services organizations face an impossible equation: maintain 99.9% uptime for mission-critical ...