000031087 - Detailed report of memory utilization on Linux for RSA Authentication Manager 8.x

Document created by RSA Customer Support Employee on Jun 14, 2016Last modified by RSA Customer Support on Jan 9, 2020
Version 7Show Document
  • View in full screen mode

Article Content

Article Number000031087
Applies ToRSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
IssueSometimes it is necessary to generate a detailed report of Linux memory utilization on Linux for RSA Authentication Manager 8.x.  For example, 
  • Some processes cause memory leak.
  • Degraded performance due to lack of memory.
  • Degraded performance because memory is drained by one major parent process.

To successfully run the script, you must have Python 2.x or later.

Tasks
  1. Copy the serv_mon.sh file attached to this article to the server using scp.
  2. Launch an SSH client, such as PuTTY.
  3. Login to the RSA Authentication Manager server as rsaadmin and enter the operating system password.

Note that during Quick Setup another user name may have been selected. Use that user name to login.



  1. Change to the root user.


login as: rsaadmin
Using keyboard-interactive authentication.
Password: <enter operating system password>
Last login: Mon Feb 12 15:51:57 2018 from jumphost.vcloud.local
RSA Authentication Manager Installation Directory: /opt/rsa/am
rsaadmin@am82p:~> sudo su - root
rsaadmin's password: <enter operating system password>
am82p:~ #


  1. Change permissions on the shell script:


am82p:~ # chmod +x serv_mon.sh


  1. Run the shell script:


am82p:~ # ./serv_mon.sh
Notes
  • This script prints a human readable table with the collective memory utilization for each parent process separately.
  • It shows information about CPU, CPU utilization.
  • It shows disk space usage for each partition and the largest ten files on the system.
  • It collects /proc/meminfo.
  • It collects vmstat.
  • It watches free –m according to a user specified time interval.
  • You need to run this script as root.

User-added image

User-added image

User-added image
User-added image

User-added image

Attachments

Outcomes