Reset Search



KB40204 - Pulse Connect Secure Health Check and System Monitoring Guide

« Go Back


Last Modified Date5/6/2020 1:11 PM
This article provides an overview of the system dashboard graphs and provides thresholds that PCS admins should be aware of when monitoring the health of the system.  

Problem or Goal
PCS admins can monitor the overall health of the system by navigating to System > Overview.  The dashboard graphs displayed on this page can provide important indicators of the overall system health and should be provided for any support case that is open for system performance issues, in the form of screenshots.

User-added image

Pulse Secure recommends that the following thresholds should not be exceeded in the following dashboard graphs:
  • CPU and Virtual Swap Memory Utilization graph:
  • Virtual (Swap) Memory Utilization:
    • Virtual Swap Memory graph only tracks virtual memory in use after all physical memory has been consumed.  If any swap memory is being used, this should be investigated further by Pulse Secure support team as it could indicate a memory leak.
    • Customers should monitor for periods of swap memory being in use in the graph and take a system snapshot while the swap memory line is above '0' and provide this when opening a case with Pulse Secure support.
  • Concurrent User graph - The concurrent user graph line on this graph includes VPN tunnel users and all other users, such as Web, Terminal Services, File browsing users, etc.  
    • Can be monitored for any sudden drops in the number of users signed in which can indicate an outage has occurred that has caused sessions to be terminated suddenly.
    • Can also be monitored to insure that the number of concurrent users is not exceeding the license count allowed for the device. 
  • Throughput:
    • Graph activity is measured in bits entering and leaving on each interface; but the scale will change to make the best use of the space available.  k=kilobits/second, K=kilobytes/second, m=megabits/second M=Megabytes on the 'y axis'.
    • The threshold for throughput will depend on a number of different factors:
      • ESP versus SSL mode
      • Packet Length (Larger payload volumes will increase throughput and smaller payloads will decrease throughput)
      • Hardware form (Each PSA and MAG models will have different thresholds)
    • In general, if the throughput is exceeded, performance will be impacted and considerations should be made to split the load between two Active/Active nodes or upgrade the hardware to support the load. 
    • External and Internal port throughput should be similar and the graph lines for each should line up fairly closely.  If the external throughput differs greatly from the internal throughput, or vice versa, then this could indicate a large number of packets are being dropped.  
​Other statistics to monitor on the Status page that are not graphed:
  • State Storage:
    • Should always be less than 60% full and not exceed 50% fragmented at any given time.
User-added image
  • ​Logging Disk: 
User-added image
  • Percentage should be below 80%.  Performance issues can occur as the logging disk reaches 100% full and should be maintained by deleting system logs/snapshots that can be recycled.

Customer can connfigure SNMP to monitor the health of the device, this has more description of the device resources. Refer to PSC-SNMP-Monitoring-Guide.pdf
Login to the Admin page to view the graph below. 
Related Links
Attachment 1 
Created ByHamza Hamza



Was this article helpful?



Please tell us how we can make this article more useful.

Characters Remaining: 255