Solved

db2evmon for only 00000002.evt file

Posted on 2010-08-26
3
1,960 Views
Last Modified: 2012-06-22
Hi All,

can I run db2evmon command only on 00000002.evt file because Client sent only that file not 00000000.evt and 00000001.evt
After running this command :

db2evmon -path /local/backup/archive/temp/evemon>00000002.txt
i m getting error as
"Cannot open Event Monitor file "/local/backup/archive/temp/evemon/00000000.evt.""

is 00000000.evt this file necessary?
0
Comment
Question by:harsha_james
3 Comments
 
LVL 45

Accepted Solution

by:
Kdo earned 250 total points
Comment Utility
Hi Harsha,

Without a complete set of event monitor files I don't believe that you can get the full picture.

The parameter(s) to db2evmon require a directory where DB2 manages the event files.  With only a single file, and not even the "base" file, the tool can't function correctly.


Kent
0
 
LVL 4

Assisted Solution

by:gmarino
gmarino earned 250 total points
Comment Utility
00000000.evt has header information that is required for the db2evmon tool to run - such as the Database it was run against and the type of Event Monitor the data represents.  This header information is not copied into the subsequent evt files (00000001.evt, 00000002.evt, etc).  Therefore it is REQUIRED that you have the 00000000.evt file to run db2evmon.

Sorry!  See if you can get your hands on the 00000000.evt file - or just rerun the Event Monitor again.

Nice to see someone using such a powerful tool (Event Monitor) for monitoring their database.

- Greg
THE Performance Bigot
0
 

Author Comment

by:harsha_james
Comment Utility
Hi Kent,Greg

Thank you very much for helping me, 00000000.evt file is necessary to analyse event monitor output.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Recursive SQL in UDB/LUW (you can use 'recursive' and 'SQL' in the same sentence) A growing number of database queries lend themselves to recursive solutions.  It's not always easy to spot when recursion is called for, especially for people una…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now