09-24-2014
Hi,
The RAID10 performance will be faster, but I'm not sure it will be twice as fast. Generally better performance is related to an increase on the number of spindles. There are also benefits to be derived from the committal regime but there can be a certain amount of trial and error, there are a great many factors that influence the performance of a RAID array - that's why there are a great many books and courses on the subject.
Regards
Dave
8 More Discussions You Might Find Interesting
1. Debian
I am having some troubles with apt-get. I did an apt-get update and an apt-get upgrade. Some dependencies did not download, and so I had to do `apt-get -f install` to fix that. The thing is I get an error about /var/lib/dpkg/available
root@hayek:~# apt-get -f install
Reading package lists...... (3 Replies)
Discussion started by: John Tate
3 Replies
2. Shell Programming and Scripting
Hi folks,
I am self-learning as I can
I have a script that has read a file into an array.
I can read out each line in the array with the code:
for INDEX in {0..$LENGTH} ## $LENGTH was determined at the read in
do
echo "${data}"
done
What I need to do is test the first char... (2 Replies)
Discussion started by: Marc G
2 Replies
3. Shell Programming and Scripting
Hi all,
I am looking for a quick/short way in awk to check if an associative array has any content.
I know I can split() it to an indexed array and check if the 1st element is set, or cycle through it with something like for( ele in arr ), but I want to avoid that, as I am looking for a shorter... (3 Replies)
Discussion started by: zaxxon
3 Replies
4. Linux
Hi everyone,
I am trying to prevent the ehci_hcd kernel module to load at boot time.
Here's what I've tried so far:
1) Add the following line to /etc/modprobe.d/blacklist.conf (as suggested here):
2) Blacklisted the module by adding the following string to
3) Tried to blacklist the module... (0 Replies)
Discussion started by: gacanepa
0 Replies
5. Shell Programming and Scripting
Hi,
another little question...
"sn" is an array whose elements can vary from about 55,000 to about 150,000 elements. Each element consists of an integer between 0-255, eg: ${sn} contain the value: 103 . For a decrypt-procedure I need scroll all the elements 4 or 5 times. Here is an example of... (15 Replies)
Discussion started by: math4
15 Replies
6. HP-UX
Hi Folks,
Could anyone please assist me with the what could be the scenarios to test the file system mount/umount performance check in HPUX.
Thanks in advance,
Vaishey (5 Replies)
Discussion started by: Vaishey
5 Replies
7. AIX
Hello,
P7 machine
PCI Express x8 Planar 3Gb SAS Adapter
RAID10 array(2 disks)(not AIX lvm) was configured and working, then one disk failed and IBM support replaced that. Now raid array is degraded, data is not lost. I see new disk model(same as original) serial and etc.
What I did trying... (0 Replies)
Discussion started by: vilius
0 Replies
8. Shell Programming and Scripting
Ya, I know, who in this day and age is mirroring rootvg...?
But yes, my shop does and I need to script checking for it.
I also know I could just inverse the the logic and call the LV mirrored
if the LPs and PPs were not equal. But I want to do the math in the if test
and also know I could... (5 Replies)
Discussion started by: gtsonoma
5 Replies
GONG(1) General Commands Manual GONG(1)
NAME
gong - evaluate process performance
SYNOPSIS
gong [-f] [-a] process-id
DESCRIPTION
Gong is used to evaluate the performance of a process that is in execution.
The process-id is the process number of the process whose performance is to be evaluated. The evaluation is performed by a set of three
``panelist'' routines, each of which analyzes one aspect (time, space, and tonality) of the performance of the process. If any of these
routines is not amused by the performance, the process being analyzed is sent the gong(2) signal. In addition, the process-id of the eval-
uated process is written on the standard gong, for possible future corrective action. (It is suggested that the standard gong be an audi-
ble alarm for proper effect.) It is expected that after being gong(2)ed, the process will promptly commit suicide.
The -f keyletter argument indicates that gong is to invoke flog(1) with the unmerciful argument if the process does not respond to
gong(2)ing. In the absence of this argument, the process is continuously gong(2)ed, which may lead to the process becoming a deaf zombie.
The -a keyletter argument indicates that if all three of the panelist routines gong(2) a process, the process should be unmercifully
flog(1)ged whether or not the -f keyletter is supplied.
FILES
/dev/ding.dong is the standard gong.
SEE ALSO
On the Applicability of Gonging to the Performance and Merit Review Process, Journal of Irreproducible Results, vol. 263, issue 19, pp.
253-307.
BUGS
If the named process does not exist, it is possible that gong will attempt an evaluation of itself, which may lead to a condition known as
compounded double ringing (see echo(1)). Therefore, it is recommended that gong be used with extreme care.
GONG(1)