IT tutorials
 
Technology
 

Windows Small Business Server 2011 : Using Reliability Monitor, Managing Collected Data

10/5/2013 4:17:40 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. Using Reliability Monitor

Reliability Monitor provides a System Stability Index that reflects whether unexpected problems are reducing system reliability. A graph of the Stability Index over time quickly identifies dates when problems began to occur. The accompanying System Stability Report presents details to help you locate and fix the root cause of reduced reliability. By looking at changes to the system (operating system updates or adding and removing software) along with failures (application, operating system, or hardware failures), you can develop a method for dealing with the problems.

To open Reliability Monitor, follow these steps:

  1. Open Control Panel, and select Action Center.

  2. Expand Maintenance and View Reliability History.

Click any item on the graph to view its details. Click events in the Action column for more details. Select either Days or Weeks to limit the report to specific time periods.

1.1. Viewing Reliability Monitor on a Remote Computer

Information about the location of Reliability Monitor files is stored in the registry. Therefore, remote registry access is required to open data on a remote computer. To enable the Remote Registry Service, complete the following steps:

  1. On the computer where you want to access Reliability Monitor data, click Start, type services.msc in the Start Search box, and press Enter.

  2. In the Services list, right-click Remote Registry and select Start, as shown in Figure 1.

Figure 1. Starting the Remote Registry Service


2. Managing Collected Data

Data collector sets create log files and optional report files. Data Manager allows you to configure how log data, reports, and compressed data are stored for each data collector set.

To configure Data Manager for a data collector set, follow these steps:

  1. Open Performance Monitor, expand Data Collector Sets, and expand User Defined.

  2. Right-click the name of the data collector set that you want to configure and select Data Manager.

  3. On the Data Manager tab, you can accept the default values or make changes according to your data retention policy. Table 1 describes each option.

    • Select Minimum Free Disk or Maximum Folders, and previous data will be deleted when the limit is reached according to the Resource Policy you choose (either Delete Largest or Delete Oldest).

    • Select Apply Policy Before The Data Collector Set Starts, and previous data will be deleted before the data collector set creates its next log file.

    • Select Maximum Root Path Size, and previous data will be deleted when the root log folder size limit is reached.

  4. Click the Actions tab. You can accept the default values or make changes. To make changes, use the Add, Edit, or Remove button. Table 2 describes each option.

  5. Click OK to finish.

Table 1. Data Manager options
OPTIONDEFINITION
Minimum Free DiskAmount of free disk space that must be available on the drive where log data is stored. When the limit is reached, previous data will be deleted based on your Resource Policy.
Maximum FoldersNumber of subfolders allowed in the data directory. When the limit is reached, previous data will be deleted according to your Resource Policy.
Resource PolicySpecifies whether the largest or oldest log file or directory will be deleted when limits are reached.
Maximum Root Path SizeMaximum size of the data collector set data directory, including all subfolders. When selected, this maximum path size overrides the Minimum Free Disk and Maximum Folders limits. When the limit of the Maximum Root Path Size is reached, previous data will be deleted according to your Resource Policy.

Table 2. Actions properties
OPTIONDEFINITION
Age/UnitsThe age of the data file in days or weeks. If the value is set to zero, the age is not considered.
Folder SizeThe size, in megabytes, of the log data folder. If the value is set to zero, the size is not considered.
Save, Create Or Delete A Cab FileCabinet files are archives that are created from raw log data that can be extracted later.
Delete Data FileRaw data log created by the data collector set. To save disk space, the data log can be deleted after a cab file is created.
Delete Report FileReport file generated from the log data. Report files can be retained even after the log data has been deleted. Select this option to delete the report file.

2.1. Working with Data Log Files

When log files grow large, reports are generated more slowly. If you review your logs frequently, setting limits will automatically break up logs to make them easier to view. The relog command can divide long log files into more manageable segments, or you can use it to combine multiple log files.

The relog command has the following syntax. The parameters are detailed in the following sections:

Relog [filename [filename ...]] [-a] [-c Path [Path ...]] [-cf filename] [-f {bin
| csv | tsv | SQL}] [-t Value] [-o {outputfile | DSN!Counterlog}] [-b M/D/YYYY
[[HH:]MM:]SS] [-e M/D/YYYY [[HH:]MM:]SS] [-config {filename | i}] [-q]
<filename [filename ...]>

The <filename [filename ...]> parameter specifies the path name of an existing
performance counter log. You can specify multiple input files.

The -a parameter appends output file instead of overwriting. This option does not apply
to SQL format where the default is always to append.

The -c <Path [Path ...]> parameter specifies the performance counter path to log. To
specify multiple counter paths, separate them with a space and enclose the counter paths
in quotation marks (for example, "CounterPath1 CounterPath2").

The -cf <FileName> parameter specifies the path name of the text file that lists the
performance counters to be included in a relog file. Use this option to list counter
paths in an input file, one per line. The default setting is all counters in the
original log file are relogged.

The -f {bin| csv| tsv| SQL} parameter specifies the path name of the output file
format. The default format is bin. For a SQL database, the output file specifies the
DSN!CounterLog. You can specify the database location by using the ODBC manager to
configure the DSN (Database System Name).

The -t <value> parameter specifies sample intervals in "N" records. Includes every nth
data point in the relog file. The default is every data point.

The -o {OutputFile | DSN!CounterLog} parameter specifies the path name of the output
file or SQL database where the counters will be written.

The -b <M/D/YYYY HH:MM:SS[AM|PM]> parameter specifies begin time for copying first
record from the input file. Date and time must be in this exact format: M/D/YYYY
H:MM:SS.

The -e <M/D/YYYY HH:MM:SS[AM|PM]> parameter specifies end time for copying last record
from the input file. Date and time must be in this exact format: M/D/YYYY HH:MM:SS.

The -config {FileName | i} parameter specifies the path name of the settings file that
contains command-line parameters. Use -i in the configuration file as a placeholder for
a list of input files that can be placed on the command line. On the command line,
however, you do not need to use i. You can also use wildcards such as *.blg to specify
many input filenames.

The -q parameter displays the performance counters and time ranges of log files
specified in the input file.

The -y parameter bypasses prompting by answering "yes" to all questions.

The /? parameter displays help at the command prompt.
 
Others
 
- Windows 8 : BitLocker Drive Encryption: The Essentials (part 3) - Deploying BitLocker Drive Encryption
- Windows 8 : BitLocker Drive Encryption: The Essentials (part 2) - Hardware Encryption, Secure Boot, and Network Unlock
- Windows 8 : BitLocker Drive Encryption: The Essentials (part 1) - Understanding BitLocker Drive Encryption
- System Center Configuration Manager 2007 : Patch Management - Troubleshooting Software Updates
- System Center Configuration Manager 2007 : Patch Management - Using NAP to Protect Your Network (part 2) - System Health , Client Compliance
- System Center Configuration Manager 2007 : Patch Management - Using NAP to Protect Your Network (part 1) - NAP Prerequisites , Agent Settings
- Implementing Edge Services for an Exchange Server 2007 Environment : Managing and Maintaining an Edge Transport Server
- Implementing Edge Services for an Exchange Server 2007 Environment : Implementing Safelist Aggregation for Outlook 2003 and Outlook 2007
- Implementing Edge Services for an Exchange Server 2007 Environment : Using EdgeSync to Synchronize Active Directory Information to the Edge Transport Server
- Implementing Edge Services for an Exchange Server 2007 Environment : Using Address Rewriting to Standardize on Domain Address Naming for an Organization
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us