Hitachi

JP1 Version 12 JP1/Performance Management - Remote Monitor for Virtual Machine Description, User's Guide and Reference


List of alarms

A table that lists and describes one or more alarms is called an alarm table. Alarms defined in a monitoring template of PFM - RM for Virtual Machine are stored in alarm table format in the RM VirtualMachine folder, which is displayed under the Alarms tab in PFM - Web Console.

An alarm table name is as expressed as follows.

12.50 at the end of the alarm table name

Indicates an alarm table version.

When you use an alarm that is defined in a monitoring template, check the version of the alarm table being used by the Performance Management system and its version compatibility. For details about the alarm table version and version compatibility, see H. Version Compatibility.

The table below shows the alarms defined in the monitoring templates of PFM - RM for Virtual Machine.

Table 4‒1: Alarm list

Alarm name

Monitoring target

Monitoring purpose

Available virtual environment

VMware

Hyper-V

KVM

Docker environment

Podman environment

logical partitioning feature

Host Disk Usage

Logical disk usage in a physical server

Operation status monitoring

Y

Y

Y

N

N

N

Host Memory Usage

Memory usage in a physical server

Performance information monitoring

Y

Y

Y

N

N

Y

VM CPU Insufficient

CPU insufficiency in a virtual machine

Performance information monitoring

Y

N

N

N

N

Y

VM Disk Abort Cmds

Number of discarded disk commands in a virtual machine

Operation status monitoring

Y

N

N

N

N

N

VM Disk Usage

Logical disk usage in a virtual machine

Operation status monitoring

Y

N

N

N

N

N

VM Status

Virtual machine status

Operation status monitoring

Y

Y

Y

Y

Y

Y

Legend:

Y: Available

N: Not available

PFM - RM for Virtual Machine provides as monitoring templates an operating information monitoring alarm that monitors whether the system is operating normally, and a performance information monitoring alarm that monitors whether the system is providing sufficient services. Therefore, set the alarms that match your objectives.

If you use the monitoring templates, copy the provided monitoring template and customize them as appropriate for monitored environment.