02-18-2013
Quote:
Originally Posted by
jayadeava
Thanks MichaelFelt..
Ill surely try it out now.. Thanks for your replay.
The "replay" is all yours.
FYI: I recommend
nmon -c 240 -s 360 ... whatever else you are doing ...
for 24 hour reports - so that the consolidator and trend analyzer can also be used easily. 12 hour reports (day/night collections, e.g. start at 0600 and 1800, or 0700 and 1900) I use
nmon -c 240 -s 180 ...
Have Fun!
The key here, to keep from having issues with excel and "larger than necesssary files" is to keep the count variable
-c at 240 or less
This User Gave Thanks to MichaelFelt For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I am facing the following issue when using db2. The JDBC prepared statement command is sending an incorrect value to the database for search. I did a truss on the app and here is the log. I want to know what is the value that is getting passed. is it possible.
26867/68: send(62,... (2 Replies)
Discussion started by: buytamil
2 Replies
2. AIX
Anyone ever experienced a core dump when running NMON. I am running AIX 5.3 on an 8 CPU LPAR (P570). This has only recently started to happen. (3 Replies)
Discussion started by: johnf
3 Replies
3. AIX
Can any one help where i can find articals about nomn
I need to know how to read this tools
┌─CPU-Utilisation-Small-View───────────────────────────────────────────────────┐
│ 0----------25-----------50----------75----------100│
│CPU User% Sys% Wait% Idle%| ... (3 Replies)
Discussion started by: habuzahra
3 Replies
4. UNIX for Dummies Questions & Answers
Is it possible to track the progress of a job (informatica) by analysing the progress of it's log file ? I have a long running job, and no way of tracking how far allong it is. Thanks. (4 Replies)
Discussion started by: cosmos328is
4 Replies
5. HP-UX
Hi,
Is there any way to find the mode of the binary file (debug or release) by analyzing the core file generated by that binary on the HPUX11i Platform? (5 Replies)
Discussion started by: Prajakta
5 Replies
6. UNIX for Dummies Questions & Answers
I'm not sure if this query is relevant to this forum but here goes anyways...
I want analyse log files that do not appear to be of standard format. I have tried using Analog but cannot config it to read the files.
Does anyone have any advice on working with log files taken from a Unix... (6 Replies)
Discussion started by: Sepia
6 Replies
7. Solaris
Friends
I was trying to analyse a core dump using pstack command in Sol5.9(Sparc)
The output is as below.
root: pstack core_mumux211_istauth_220_108_1229517198_21922
core 'core_mumux211_istauth_220_108_1229517198_21922' of 21922: istauth
fe1afbb8 ttcdrv (c10e0, c1db4, 30ad8, bc950, 0, 0)... (1 Reply)
Discussion started by: efunds
1 Replies
8. Shell Programming and Scripting
Hello,
I have a list of e-mails. I need to know, which email-s from that list not use. I want to do this things:
- take email address from email list
- find this address in mail logs
- if, there is no record about this e-mail adress in list, show this e-mail address on screen
I did... (0 Replies)
Discussion started by: naezdnik
0 Replies
9. Shell Programming and Scripting
Hi,
I have below type of data in a text file in unix.
Emp_Name Emp_Dept
Raj 101
Amruta 100
Shilpa 100
Rohit 123
Amol 198
Rosh 101
Gaurav 198
Number of employees can be even more.
Need a command or a... (2 Replies)
Discussion started by: rajneesh_kapoor
2 Replies
10. Shell Programming and Scripting
Attached is the log file that I have generated through the following script:
last | head -2 |sed '2q;d' |awk '{ print $1"\t"$2"\t"$3"\t\t"$4"\t"$5"\t"$6"\t"$7"\t"$8"\t" $9"\t"$10"\t"$11}'>>/var/log/logadmin/logtest.txt
But now I'm unable to run the following operations on it:
1. Count... (1 Reply)
Discussion started by: Lionking93
1 Replies
LEARN ABOUT MOJAVE
netmasks
netmasks(4) File Formats netmasks(4)
NAME
netmasks - network mask database
SYNOPSIS
/etc/inet/netmasks
/etc/netmasks
DESCRIPTION
The netmasks file contains network masks used to implement IP subnetting. It supports both standard subnetting as specified in RFC-950 and
variable length subnetting as specified in RFC-1519. When using standard subnetting there should be a single line for each network that is
subnetted in this file with the network number, any number of SPACE or TAB characters, and the network mask to use on that network. Network
numbers and masks may be specified in the conventional IP `.' (dot) notation (like IP host addresses, but with zeroes for the host part).
For example,
128.32.0.0 255.255.255.0
can be used to specify that the Class B network 128.32.0.0 should have eight bits of subnet field and eight bits of host field, in addition
to the standard sixteen bits in the network field.
When using variable length subnetting, the format is identical. However, there should be a line for each subnet with the first field being
the subnet and the second field being the netmask that applies to that subnet. The users of the database, such as ifconfig(1M), perform a
lookup to find the longest possible matching mask. It is possible to combine the RFC-950 and RFC-1519 form of subnet masks in the net-
masks file. For example,
128.32.0.0 255.255.255.0
128.32.27.0 255.255.255.240
128.32.27.16 255.255.255.240
128.32.27.32 255.255.255.240
128.32.27.48 255.255.255.240
128.32.27.64 255.255.255.240
128.32.27.80 255.255.255.240
128.32.27.96 255.255.255.240
128.32.27.112 255.255.255.240
128.32.27.128 255.255.255.240
128.32.27.144 255.255.255.240
128.32.27.160 255.255.255.240
128.32.27.176 255.255.255.240
128.32.27.192 255.255.255.240
128.32.27.208 255.255.255.240
128.32.27.224 255.255.255.240
128.32.27.240 255.255.255.240
128.32.64.0 255.255.255.192
can be used to specify different netmasks in different parts of the 128.32.0.0 Class B network number. Addresses 128.32.27.0 through
128.32.27.255 have a subnet mask with 28 bits in the combined network and subnet fields (often referred to as the subnet field) and 4 bits
in the host field. Furthermore, addresses 128.32.64.0 through 128.32.64.63 have a 26 bits in the subnet field. Finally, all other
addresses in the range 128.32.0.0 through 128.32.255.255 have a 24 bit subnet field.
Invalid entries are ignored.
SEE ALSO
ifconfig(1M), inet(7P)
Postel, Jon, and Mogul, Jeff, Internet Standard Subnetting Procedure, RFC 950, Network Information Center, SRI International, Menlo Park,
Calif., August 1985.
V. Fuller, T. Li, J. Yu, K. Varadhan, Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy, RFC 1519,
Network Information Center, SRI International, Menlo Park, Calif., September 1993.
T. Pummill, B. Manning, Variable Length Subnet Table For IPv4, RFC 1878, Network Information Center, SRI International, Menlo Park, Calif.,
December 1995.
NOTES
/etc/inet/netmasks is the official SVr4 name of the netmasks file. The symbolic link /etc/netmasks exists for BSD compatibility.
SunOS 5.10 7 Jan 1997 netmasks(4)