Sponsored Content
Full Discussion: Disk Space
Operating Systems Solaris Disk Space Post 302605746 by bitlord on Thursday 8th of March 2012 11:39:25 AM
Old 03-08-2012
I would look for the logs and delete them. I that should help.
to see the biggest offenders use this command
Code:
 du -sh *

do this at root and then drill down from there.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Out of disk space?

Hi I'm trying to install gcc and the installation program tells me that I'm out of disk space! I have just installed the os (using the default settings for partitions and sizes) and have only installed apache on the machine. Can it really be out of disk space already? How do I check how much... (4 Replies)
Discussion started by: alfabetman
4 Replies

2. UNIX for Dummies Questions & Answers

available disk space on disk device???

Hello, Can someone please tell me which command to use to determine the available disk space on a given disk device? I have to write a shell script that compresses files and stores them in a specific location but I am not sure how "conservative" I should be? Thanks in advance! Al. (4 Replies)
Discussion started by: alan
4 Replies

3. Solaris

Disk space?

I'm a Unix newbie running Solaris 9. After installing a fresh copy on a 40GB drive I noticed the available disk space is 2% free or approximately 200MB available. Is that possible? Did I do something wrong? (4 Replies)
Discussion started by: jbarbuto
4 Replies

4. HP-UX

Disk Space

Hi Experts. I had 100% disk full , even though i have removed 2 GB space still dbf command shows 100%. How to rectify that. Appreciate your prompt help. Thanks (1 Reply)
Discussion started by: test10002
1 Replies

5. Filesystems, Disks and Memory

disk space

Hello All- Am new member to this forum. Have some unix experience. But true believer in it compared to windows. Have a question regarding the disk space. I know a command to check the total disk space utilization using: df -k . but what is the command to check the same disk space by... (6 Replies)
Discussion started by: milkyway
6 Replies

6. Shell Programming and Scripting

Disk Space

Hi This is my script for disk space monitoring clear if then echo "You must be root user to execute the script" fi ALERT_LEVEL=10 CONSUMPTION_LEVEL= `df -k | awk {'print $5'} | cut -d '%' -f1 | sed "1 d"` for i in $CONSUMPTION_LEVEL do FILE_SYSTEM=`df -k | awk {'print $1'} |... (3 Replies)
Discussion started by: chrs0302
3 Replies

7. Shell Programming and Scripting

Disk Space

Hi Guys i have a nice little piece of code then i need to modify so that is does not look at /Voulmes/* thanks sub disk_full { my $i = 0; open( DF, "df -l|" ); while (<DF>) { #chomp(); next if (/^\/proc\b/); $i++; next if ( $i == 1 ); ... (3 Replies)
Discussion started by: ab52
3 Replies

8. Shell Programming and Scripting

disk space

Hi, I am new to shell scripting, and want to monitor disk space using shell script continously on server, which will shoot mail after crossing threshold limit Please suggest. Regards Manoj (1 Reply)
Discussion started by: manoj.solaris
1 Replies

9. Solaris

Disk Space

Hi, I am installing TAM-eb components in solaris V10.o, unfortunately am running out of space. when I -df i come across a lot of directories. i would like to know whether there is any way to free some disk space. (10 Replies)
Discussion started by: ichwaiznicht
10 Replies

10. UNIX for Dummies Questions & Answers

How much disk space?

Hi, I have this : uname -a Linux servername 2.6.18-194.11.3.el5PAE #1 SMP Mon Aug 23 15:57:10 EDT 2010 i686 i686 i386 GNU/Linux df -k Sys. de fich. 1K-blocs Occupied Disponible Capacity Monted on /u01/applis 10321208 3190160 6606760 33% /applis Does it mean... (1 Reply)
Discussion started by: big123456
1 Replies
drill(1)						      General Commands Manual							  drill(1)

NAME
drill - get (debug) information out of DNS(SEC) SYNOPSIS
drill [ OPTIONS ] name [ @server ] [ type ] [ class ] DESCRIPTION
drill is a tool to designed to get all sorts of information out of the DNS. It is specificly designed to be used with DNSSEC. The name drill is a pun on dig. With drill you should be able get even more information than with dig. If no arguments are given class defaults to 'IN' and type to 'A'. The server(s) specified in /etc/resolv.conf are used to query against. name Ask for this name. @server Send to query to this server. If not specified use the nameservers from /etc/resolv.conf. type Ask for this RR type. If type is not given on the command line it defaults to 'A'. Except when doing to reverse lookup when it defaults to 'PTR'. class Use this class when querying. SAMPLE USAGE
drill mx miek.nl Show the MX records of the domain miek.nl drill -S jelte.nlnetlabs.nl Chase any signatures in the jelte.nlnetlab.nl domain. This option is only available when ldns has been compiled with openssl-sup- port. drill -TD www.example.com Do a DNSSEC (-D) trace (-T) from the rootservers down to www.example.com. This option only works when ldns has been compiled with openssl support. drill -s dnskey jelte.nlnetlabs.nl Show the DNSKEY record(s) for jelte.nlnetlabs.nl. For each found DNSKEY record also print the DS record. OPTIONS
-D Enable DNSSEC in the query. When querying for DNSSEC types (DNSKEY, RRSIG, DS and NSEC) this is not automaticly enabled. -T Trace name from the root down. When using this option the @server and the type arguments are not used. -S Chase the signature(s) of 'name' to a known key or as high up in the tree as possible. -V level Be more verbose. Set level to 5 to see the actual query that is sent. -Q Quiet mode, this overrules -V. -f file Read the query from a file. The query must be dumped with -w. -i file read the answer from the file instead from the network. This aids in debugging and can be used to check if a query on disk is valid. If the file contains binary data it is assumed to be a query in network order. -w file Write an answer packet to file. -q file Write the query packet to file. -v Show drill's version. -h Show a short help message. QUERY OPTIONS -4 Stay on ip4. Only send queries to ip4 enabled nameservers. -6 Stay on ip6. Only send queries to ip6 enabled nameservers. -a Use the resolver structure's fallback mechanism if the answer is truncated (TC=1). If a truncated packet is received and this option is set, drill will first send a new query with EDNS0 buffer size 4096. If the EDNS0 buffer size was already set to 512+ bytes, or the above retry also results in a truncated answer, the resolver struc- ture will fall back to TCP. -b size Use size as the buffer size in the EDNS0 pseudo RR. -c file Use file instead of /etc/resolv.conf for nameserver configuration. -d domain When tracing (-T), start from this domain instead of the root. -t Use TCP/IP when querying a server -k keyfile Use this file to read a (trusted) key from. When this options is given drill tries to validate the current answer with this key. No chasing is done. When drill is doing a secure trace, this key will be used as trust anchor. Can contain a DNSKEY or a DS record. Alternatively, when DNSSEC enabled tracing (-TD) or signature chasing (-S), if -k is not specified, and a default trust anchor (/etc/unbound/root.key) exists and contains a valid DNSKEY or DS record, it will be used as the trust anchor. -o mnemonic Use this option to set or unset specific header bits. A bit is set by using the bit mnemonic in CAPITAL letters. A bit is unset when the mnemonic is given in lowercase. The following mnemonics are understood by drill: QR, qr: set, unset QueRy (default: on) AA, aa: set, unset Authoritative Answer (default: off) TC, tc: set, unset TrunCated (default: off) RD, rd: set, unset Recursion Desired (default: on) CD, cd: set, unset Checking Disabled (default: off) RA, ra: set, unset Recursion Available (default: off) AD, ad: set, unset Authenticated Data (default: off) Thus: -o CD, will enable Checking Disabled, which instructs the cache to not validate the answers it gives out. -p port Use this port instead of the default of 53. -r file When tracing (-T), use file as a root servers hint file. -s When encountering a DNSKEY print the equivalent DS also. -u Use UDP when querying a server. This is the default. -w file write the answer to a file. The file will contain a hexadecimal dump of the query. This can be used in conjunction with -f. -x Do a reverse loopup. The type argument is not used, it is preset to PTR. -y <name:key[:algo]> specify named base64 tsig key, and optional an algorithm (defaults to hmac-md5.sig-alg.reg.int) -z don't randomize the nameserver list before sending queries. FILES
/etc/unbound/root.key The file from which trusted keys are loaded when no -k option is given. SEE ALSO
unbound-anchor(8) AUTHOR
Jelte Jansen and Miek Gieben. Both of NLnet Labs. REPORTING BUGS
Report bugs to <ldns-team@nlnetlabs.nl>. BUGS
COPYRIGHT
Copyright (c) 2004-2008 NLnet Labs. Licensed under the revised BSD license. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. SEE ALSO
dig(1), RFC403{3,4,5}. 28 May 2006 drill(1)
All times are GMT -4. The time now is 06:33 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy