| Measurement |
Description |
Measurement Unit |
Interpretation |
| Data_received |
Indicates the amount of IP data received during the last measurement period. |
MB |
|
| Data_transmitted |
Indicates the amount of IP data transmitted during the last measurement period. |
MB |
|
| Packets_received |
Indicates the number of IP packets received during the last measurement period. |
Number |
|
| Packets_transmitted |
Indicates the number of IP packets transmitted during the last measurement period. |
Number |
|
| Routed_ip_packets |
Indicates the number of IP packets that were routed during the last measurement period. |
Number |
|
| Routed_ip_data |
Indicates the amount of IP data that was routed during the last measurement period. |
Mbits |
|
| Fragments_received |
Indicates the number of IP packet fragments received during the last measurement period. |
Number |
The Internet Protocol (IP) implements fragmentation, so that packets may be formed that can pass through a link with a smaller maximum transmission unit (MTU) than the original datagram size.
IP fragments received by the NetScaler appliance will have to be reassembled by the appliance before they are forwarded to the virtual server they are meant for. IP fragmentation and reassembly operations can cause the NetScaler appliance to incur heavy overheads. To alleviate this, you can enable the Path MTU discovery algorithm of the Netcaler apliance for dynamically learning the MTU (Maximum Transmission Unit) of any Internet path. The discovered Path MTU is then used by the TCP/IP stack on the NetScaler to create packets of this size (or smaller). Path MTU Discovery is disabled by default. |
| Successfully_reassembled |
Indicates the number of IP packets that were successfully reassembled by the NetScaler appliance during the last measurement period. |
Number |
IP fragments received by the NetScaler appliance will have to be reassembled by the appliance before they are forwarded to the virtual server they are meant for. Ideally therefore, the value of this measure should be high. A low value indicates too many reassembly failures. This can occur when there is a checksum failure, an identification field mismatch, or when one of the fragments is missing. |
| Reassembly_attempted |
Indicates the number of fragmented IP packets that the NetScaler attempted to reassemble during the last measurement period. |
Number |
|
| IP_address_lookups |
Indicates the number of IP address lookups performed by the Netscaler during the last measurement period. |
Number |
When an IP packet is received on a non-established session, the NetScaler checks if the destination IP address is one of the NetScaler owned IP addresses. |
| IP_address_lookup_fails |
Indicates the number of IP address lookups performed by the Netscaler has failed during the last measurement period. |
Number |
When an IP packet is received on a non-established session, the NetScaler checks if the destination IP address is one of the NetScaler owned IP addresses. The NetScaler-owned IP Addresses-NetScaler IP Address (NSIP), Virtual IP Addresses (VIPs), Subnet IP Addresses (SNIPs), Mapped IP Addresses (MIPs), and Global Server Load Balancing Site IP Addresses (GSLBIPs)-exist only on the NetScaler appliance. The NSIP uniquely identifies the NetScaler on your network, and it provides access to the appliance.
The IP address lookup failure occurs when the destination IP address of the packet does not match any of the NetScaler owned IP addresses.
Naturally therefore, the value of IP_address_lookup_fails measure should be very low. |
| Pct_of_ip_lookup_succes |
Indicates the percentage of IP address lookups that were successfully performed by the Netscaler during the last measurement period. |
Percent |
A high value is desired for this measure. |
| Pct_of_ip_lookup_fails |
Indicates the percentage of IP address lookups that failed during the last measurement period. |
Percent |
The IP address lookup failure occurs when the destination IP address of the packet does not match any of the NetScaler owned IP addresses.
The value of this measure is computed using the following formula:
(IP address lookup failures/IP address lookups) * 100.0
A low value is is desired for this measure. |
| Udp_frag_fwd |
Indicates the number of UDP fragments that were forwarded to the client or server during the last measurement period. |
Number |
|
| Tcp_frag_fwd |
Indicates the number of TCP fragments that were forwarded to the client or server during the last measurement period. |
Number |
|
| Frag_packets_created |
Indicates the number of UDP fragments that were forwarded to the client or server during the last measurement period. |
Number |
|
| Bad_ip_checksum |
Indicates the number of IP packets that were received with IP checksum error during the last measurement period. |
Number |
|
| Unsuccessful_reassambly |
Indicates the number of received IP packets that could not be reassembled during the measurement period. |
Number |
IP fragments received by the NetScaler appliance will have to be reassembled by the appliance before they are forwarded to the virtual server they are meant for. Ideally therefore, the value of this measure should be low. A high value indicates too many reassembly failures. This can occur when there is a checksum failure, an identification field mismatch, or when one of the fragments is missing. |
| Reassembled_data_too_big |
Indicates the number of IP packets whose data length exceeds the Ethernet packet data length of 1500 bytes after being reassembled by the Netscaler during the last measurement period. |
Number |
|
| Zero_frag_length_recvd |
Indicates the number of IP packets that were received with a fragment length of 0 bytes during the last measurement period. |
Number |
|
| Duplicate_frag_recvd |
Indicates the number of duplicate IP fragments received during the last measurement period. |
Number |
This can occur when the acknowledgement was not received within the expected time. |
| Out_of_order_frag_recvd |
Indicates the number of IP fragments that were received in out of order condition during the last measurement period. |
Number |
When a datagram is fragmented, each fragment becomes its own datagram and is routed to the NetScaler independently of any other datagrams. This is why, the original datagram often arrives at the NetScaler out of order. |
| Unknown_dest_recvd |
Indicates the number of IP packets received with the destination IP address not reachable or not owned by the NetScaler during the last measurement period. |
Number |
Ideally, the value of this measure should be 0. |
| Bad_transport |
Indicates the number of packets received in which the protocol specified in the IP header is unknown to the NetScaler during the last measurement period. |
Number |
Ideally, the value of this measure should be 0. |
| Vit_down |
Indicates the number of IP packets received by the Netscaler when the Virtual IP (VIP) is down during the last measurement period. |
Number |
A VIP is a public IP address to which a client sends requests.
The NetScaler receives these request packets when all the services bound to the VIP are down or the VIP is manually disabled. |
| Fix_header_failure |
Indicates the number of received packets with errors in one or more fields of the IP header during the last measurement period. |
Number |
Ideally, this value should be 0. |
| Ttl_expired_during_trans |
Indicates the number of packets for which the time-to-live (TTL) expired during transit during the last measurement period. |
Number |
These packets are dropped. |
| Max_non_tcp_clients |
Indicates the total number of times during the last measurement period NetScaler tried to open a new connection to a service having maximum number of allowed open client connections. |
Number |
|
| Unknown_services |
Indicates the number of IP packets received on a port or service that is not configured for the Netscaler during the last measurement period. |
Number |
|
| Land_attack_pkts_recvd |
Indicates the number of Land-attack packets received by the Netscaler during the last measurement period. |
Number |
The Land-attack packets are spoofed packets that are designed to attack systems. A Land Attack consists of a stream of TCP SYN packets that have the source IP address and TCP port number set to the same value as the destination address and port number (i.e., that of the attacked host). |
| Invalid_header_size |
Indicates the number of IP packets received with an invalid header size during the last measurement period. |
Number |
The IP header size may be termed as invalid due to an invalid data length in the header or when the value in the length field and the actual data length does not match. |
| Invalid_packet_size |
Indicates the number of IP packets received by the Netscaler with invalid packet size during the last measurement period. |
Number |
|
| Truncated_ip_packets |
Indicates the number of truncated IP packets received during the last measurement period. |
Number |
An overflow in the routers along the path can truncate the IP packets. |
| Truncated_non_ip_packets |
Indicates the number of truncated non-IP packets received during the last measurement period. |
Number |
|
| Zero_next_hop |
Indicates the number of IP packets received with a 0 value in the next hop field during the last measurement period. |
Number |
These packets are dropped. |
| Packets_with_length_gt |
Indicates the number of IP packets received with a length greater than the normal MTU (maximum transmission unit) of 1514 bytes during the last measurement period. |
MB |
|
| Pkts_with_bad_mac_sent |
Indicates the number of IP packets transmitted with a bad MAC address during the last measurement period. |
Number |
|