Introduction
The IBM AS/400 (Application System/400) is a family of midrange computers from IBM. It is a multiuser, multitasking and very secure system.
- AS400 is based on Layered machine architecture. It enables user to move to new hardware technology at any time, without disrupting their application programs.
- It has Object orientation i.e. everything that can be stored or retrieved on the system is known as an “objects”. AS400 can recognize only the object types that have been defined for it. It cannot identify any unknown objects that don’t seem to be known. It adds extra security to the system.
- It provides contiguous memory between main storage and disk storage. It provides authority to add any disk space so that use. Another feature of AS400 is that it is very secure system making it to store sensitive data. It incorporates security at various levels. Any user can be limited to access/process only particular information on the system.
AS/400 B-series models (IBM 9404 and IBM 9406):

Use Cases
Discovery
Discovers the IBM AS400 Device.
Monitoring
- Provides monitoring related to availability, capacity, performance, and usage.
- Generates alerts when defined metric thresholds are breached and notifies users of potential issues.
- For a complete list of supported metrics and details on the default monitoring configurations, see Supported Metrics and Default Monitoring Configuration.
Supported Target Versions
Supported Target Versions |
---|
Verified in Version V7R3M0 - Version 7, Release 3 |
Hierarchy of IBM AS400 resources
- IBM AS400
Integration Version History
Click here to view the Integration Version History
Application Version | Bug fixes / Enhancements |
---|---|
3.0.0 | Added support to the additional metrics, including IBM AS400 job status, IBM AS400 IBM AS400 job queue count, and IBM AS400 printer status. It also monitors hardware alerts and applies message ID regex filtering during Event Polling. |
2.0.2 |
|
2.0.1 | Fixed the issue for execution of ssh commands. |
2.0.0 | Initial version with Discovery and Monitoring Implementations |