Sponsored Content
Operating Systems Linux Red Hat What is the best tools for performance data gathering and analysis? Post 302557466 by solaris_user on Wednesday 21st of September 2011 09:16:00 AM
Old 09-21-2011
Use top, vmstat command for the start point, for network you can use wireshark or tcpdump command, or even if you want to examine network security nmap command.
 

8 More Discussions You Might Find Interesting

1. AIX

I/O Performance Tools

In lieu of not having filemon (AIX 5100-09) does anyone have have any recomendations of freeware I can get to analyze an I/O issue on my AIX box? (1 Reply)
Discussion started by: capeme
1 Replies

2. Shell Programming and Scripting

Data gathering script

I am pretty new at shell scripting, but I managed to make a primative shell script to connect from my webserver (bluehost) to an external data server via ftp or sftp or whatever I need. This script is : #!/bin/sh HOST='ftp.host.com' USER='username' PASSWD='password' FILE='file' ftp -n... (7 Replies)
Discussion started by: mesoeast
7 Replies

3. UNIX for Dummies Questions & Answers

Gathering data from complex/large dataspreads .txt format

Hi, I'm working on gathering information stored in .txt files. The format of the data within the .txt files is shown in the picture uploaded with this post. Sections like the one pictured are repeated (with different data, same format) many times within each .txt file but each section is of data... (4 Replies)
Discussion started by: p43hd
4 Replies

4. Linux

Routing table vulnerability comparison between two versions and analysis of performance in a scenari

Hi Routing tables in a typical linux kernel are implemented using hash data structures. So if the hash table is forced to behave more like a linked list(i.e create chaining) the purpose of using hash is defeated and time complexity increases. I want to try to assess the performance deterioration... (0 Replies)
Discussion started by: coolvaibhav
0 Replies

5. UNIX for Advanced & Expert Users

Gathering data using SAR

Hi everyone, I would like to ask if it is possible to gather SAR data on a specified time. let say yesterdays report, i want to get data at around 12PM and 5PM. thank you. (2 Replies)
Discussion started by: cwiggler
2 Replies

6. UNIX for Dummies Questions & Answers

Performance analysis sed vs awk

Hi Guys, I've wondered for some time the performance analysis between using sed and awk. say i want to print lines from a very large file. For ex say a file with 100,000 records. i want to print the lines 25,000 to 26,000 i can do so by the following commands: sed -n '25000,26000 p'... (11 Replies)
Discussion started by: Irishboy24
11 Replies

7. AIX

Code analysis tools for C programs

Hi I need a list of code analysis tools for C programs, that can work on AIX environment such as : dynamic or static code analysis Code Complexity Measures Test Coverage Analyzer Unit tests profiling tools Source code formatter I've found several tools but not compatible with AIX... (0 Replies)
Discussion started by: SteAlma
0 Replies

8. Shell Programming and Scripting

Gathering data in columns from multiple files

Hello world! I need to gather all the data from different folders and copy it in an one unique text file in columns format. Let me explain, letīs say "a, b, c" are 3 data files of thousands and thousands lines (in the reality, I have nearly one hundred). "a, b, c" are located in the folders... (5 Replies)
Discussion started by: user10600
5 Replies
GONG(1) 						      General Commands Manual							   GONG(1)

NAME
gong - evaluate process performance SYNOPSIS
gong [-f] [-a] process-id DESCRIPTION
Gong is used to evaluate the performance of a process that is in execution. The process-id is the process number of the process whose performance is to be evaluated. The evaluation is performed by a set of three ``panelist'' routines, each of which analyzes one aspect (time, space, and tonality) of the performance of the process. If any of these routines is not amused by the performance, the process being analyzed is sent the gong(2) signal. In addition, the process-id of the eval- uated process is written on the standard gong, for possible future corrective action. (It is suggested that the standard gong be an audi- ble alarm for proper effect.) It is expected that after being gong(2)ed, the process will promptly commit suicide. The -f keyletter argument indicates that gong is to invoke flog(1) with the unmerciful argument if the process does not respond to gong(2)ing. In the absence of this argument, the process is continuously gong(2)ed, which may lead to the process becoming a deaf zombie. The -a keyletter argument indicates that if all three of the panelist routines gong(2) a process, the process should be unmercifully flog(1)ged whether or not the -f keyletter is supplied. FILES
/dev/ding.dong is the standard gong. SEE ALSO
On the Applicability of Gonging to the Performance and Merit Review Process, Journal of Irreproducible Results, vol. 263, issue 19, pp. 253-307. BUGS
If the named process does not exist, it is possible that gong will attempt an evaluation of itself, which may lead to a condition known as compounded double ringing (see echo(1)). Therefore, it is recommended that gong be used with extreme care. GONG(1)
All times are GMT -4. The time now is 06:58 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy