09-21-2011
Use top, vmstat command for the start point, for network you can use wireshark or tcpdump command, or even if you want to examine network security nmap command.
8 More Discussions You Might Find Interesting
1. AIX
In lieu of not having filemon (AIX 5100-09) does anyone have have any
recomendations of freeware I can get to analyze an I/O issue on my AIX
box? (1 Reply)
Discussion started by: capeme
1 Replies
2. Shell Programming and Scripting
I am pretty new at shell scripting, but I managed to make a primative shell script to connect from my webserver (bluehost) to an external data server via ftp or sftp or whatever I need. This script is :
#!/bin/sh
HOST='ftp.host.com'
USER='username'
PASSWD='password'
FILE='file'
ftp -n... (7 Replies)
Discussion started by: mesoeast
7 Replies
3. UNIX for Dummies Questions & Answers
Hi, I'm working on gathering information stored in .txt files. The format of the data within the .txt files is shown in the picture uploaded with this post. Sections like the one pictured are repeated (with different data, same format) many times within each .txt file but each section is of data... (4 Replies)
Discussion started by: p43hd
4 Replies
4. Linux
Hi
Routing tables in a typical linux kernel are implemented using hash data structures. So if the hash table is forced to behave more like a linked list(i.e create chaining) the purpose of using hash is defeated and time complexity increases.
I want to try to assess the performance deterioration... (0 Replies)
Discussion started by: coolvaibhav
0 Replies
5. UNIX for Advanced & Expert Users
Hi everyone,
I would like to ask if it is possible to gather SAR data on a specified time. let say yesterdays report, i want to get data at around 12PM and 5PM.
thank you. (2 Replies)
Discussion started by: cwiggler
2 Replies
6. UNIX for Dummies Questions & Answers
Hi Guys,
I've wondered for some time the performance analysis between using sed and awk. say i want to print lines from a very large file. For ex say a file with 100,000 records. i want to print the lines 25,000 to 26,000 i can do so by the following commands:
sed -n '25000,26000 p'... (11 Replies)
Discussion started by: Irishboy24
11 Replies
7. AIX
Hi
I need a list of code analysis tools for C programs, that can work on AIX environment such as :
dynamic or static code analysis
Code Complexity Measures
Test Coverage Analyzer
Unit tests
profiling tools
Source code formatter
I've found several tools but not compatible with AIX... (0 Replies)
Discussion started by: SteAlma
0 Replies
8. Shell Programming and Scripting
Hello world!
I need to gather all the data from different folders and copy it in an one unique text file in columns format.
Let me explain, letīs say "a, b, c" are 3 data files of thousands and thousands lines (in the reality, I have nearly one hundred).
"a, b, c" are located in the folders... (5 Replies)
Discussion started by: user10600
5 Replies
GONG(1) General Commands Manual GONG(1)
NAME
gong - evaluate process performance
SYNOPSIS
gong [-f] [-a] process-id
DESCRIPTION
Gong is used to evaluate the performance of a process that is in execution.
The process-id is the process number of the process whose performance is to be evaluated. The evaluation is performed by a set of three
``panelist'' routines, each of which analyzes one aspect (time, space, and tonality) of the performance of the process. If any of these
routines is not amused by the performance, the process being analyzed is sent the gong(2) signal. In addition, the process-id of the eval-
uated process is written on the standard gong, for possible future corrective action. (It is suggested that the standard gong be an audi-
ble alarm for proper effect.) It is expected that after being gong(2)ed, the process will promptly commit suicide.
The -f keyletter argument indicates that gong is to invoke flog(1) with the unmerciful argument if the process does not respond to
gong(2)ing. In the absence of this argument, the process is continuously gong(2)ed, which may lead to the process becoming a deaf zombie.
The -a keyletter argument indicates that if all three of the panelist routines gong(2) a process, the process should be unmercifully
flog(1)ged whether or not the -f keyletter is supplied.
FILES
/dev/ding.dong is the standard gong.
SEE ALSO
On the Applicability of Gonging to the Performance and Merit Review Process, Journal of Irreproducible Results, vol. 263, issue 19, pp.
253-307.
BUGS
If the named process does not exist, it is possible that gong will attempt an evaluation of itself, which may lead to a condition known as
compounded double ringing (see echo(1)). Therefore, it is recommended that gong be used with extreme care.
GONG(1)