HI
We have been asked by our IT department to move from our current physical solution to a VM environment. I am not that clued up on VM.
I looked from some benchmark tests to run so i can see a comparison between our live and new VM we have been presented. Please see below for results.
To me the VM looks slower. Can someone advice please and offer advice on any other tests we can run please.
We are running Redhat Enterprise 6.4.
Thanks in Advanced
Treds
Moderator's Comments:
Please use code tags next time for your code and data not HTML Thanks
i recently purchased a dual ross sparc processor kit from someone.
the person listed these items as 133mhz processors, however, looking at bridgepoint's site, they do not make 133mhz processors.
so i was wondering, how can i check the processor speeds? (4 Replies)
Hello all,
We have a group of Solaris 8 machines that are having some real network performance issues, they all go through a switch which *should* be set at 100 mb full duplex on every port which goes back to a master switch. I have checked the machines and the NIC cards are all set at 100 full.... (9 Replies)
Hello,
I have a SUN T5240 running Solaris 10 with Logical Domain Manager (v 1.0.3). You can use the "ldm" command to display current resources on the box. Is there away to display all the "physical resources" on the box(i.e.,used and unused). For example, "ldm ls" will tell me what the... (5 Replies)
We have some AIX Unix Servers with 4 or 6 CPU and when type this command “c” in nmon always displays each cpu % with Averages on buttom. However we have several Servers with 18 CPU's and it only shows 16 17 on main page. Does nmon have some command that would show remaining with totals for Physical... (3 Replies)
Hello All,
Can anybody please tell me what is the maximum limit of Physical IBM Power Machine which can be handled by single HMC at a single point of time?
Thanks,
Jenish (1 Reply)
Hi all
I have connected new server to LAN but when I use rlogin command by server name it dose not work but by IP adderss it works.
can any one tell the reason? (4 Replies)
Hi All,
How can I know whether the server I am connecting to is a virtual or physical one? The server might be having any Unix OS (Linux/Solaris/HP-UX etc.).
Is there any system files / commands which can show these concrete information?
Thanks in advance for the replies.
sanzee (1 Reply)
Hi,
i am trying to find whether any particular solaris server is physical or virtual....are there any commands or set of commands which only runs (or provide specific pattern ) on physical machines and provides different pattern or error on virtual one...
Is this the correct approach to... (7 Replies)
Need inputs when physical server is coming down (ex- init 0) .
We have a physical server in that there are couple of LDOM's and in LDOM's there are couple of Zones . In zones there are applications running .
Physical Server (T4 Server) -> LDOM -> ZONES -> applications
There are scripts... (1 Reply)
Discussion started by: ajayram_arya
1 Replies
LEARN ABOUT MOJAVE
auditreduce
AUDITREDUCE(1) BSD General Commands Manual AUDITREDUCE(1)NAME
auditreduce -- select records from audit trail files
SYNOPSIS
auditreduce [-A] [-a YYYYMMDD[HH[MM[SS]]]] [-b YYYYMMDD[HH[MM[SS]]]] [-c flags] [-d YYYYMMDD] [-e euid] [-f egid] [-g rgid] [-j id]
[-m event] [-o object=value] [-r ruid] [-U] [-u auid] [-v] [file ...]
DESCRIPTION
The auditreduce utility selects records from the audit trail files based on the specified criteria. Matching audit records are printed to
the standard output in their raw binary form. If no file argument is specified, the standard input is used by default. Use the praudit(1)
utility to print the selected audit records in human-readable form.
The options are as follows:
-A Select all records.
-a YYYYMMDD[HH[MM[SS]]]
Select records that occurred after or on the given datetime.
-b YYYYMMDD[HH[MM[SS]]]
Select records that occurred before the given datetime.
-c flags
Select records matching the given audit classes specified as a comma separated list of audit flags. See audit_control(5) for a
description of audit flags.
-d YYYYMMDD
Select records that occurred on a given date. This option cannot be used with -a or -b.
-e euid
Select records with the given effective user ID or name.
-f egid
Select records with the given effective group ID or name.
-g rgid
Select records with the given real group ID or name.
-j id Select records having a subject token with matching ID.
-m event
Select records with the given event name or number. This option can be used more then once to select records of multiple event types.
See audit_event(5) for a description of audit event names and numbers.
-o object=value
file Select records containing path tokens, where the pathname matches one of the comma delimited extended regular expression con-
tained in given specification. Regular expressions which are prefixed with a tilde ('~') are excluded from the search
results. These extended regular expressions are processed from left to right, and a path will either be selected or
deslected based on the first match.
Since commas are used to delimit the regular expressions, a backslash ('') character should be used to escape the comma if
it is a part of the search pattern.
msgqid Select records containing the given message queue ID.
pid Select records containing the given process ID.
semid Select records containing the given semaphore ID.
shmid Select records containing the given shared memory ID.
-r ruid
Select records with the given real user ID or name.
-U Use unbuffered output. This option is automatically set when the input file is a character device (e.g. /dev/auditpipe), allowing
records to be fully processed as they are generated.
-u auid
Select records with the given audit ID.
-v Invert sense of matching, to select records that do not match.
EXAMPLES
To select all records associated with effective user ID root from the audit log /var/audit/20031016184719.20031017122634:
auditreduce -e root
/var/audit/20031016184719.20031017122634
To select all setlogin(2) events from that log:
auditreduce -m AUE_SETLOGIN
/var/audit/20031016184719.20031017122634
Output from the above command lines will typically be piped to a new trail file, or via standard output to the praudit(1) command.
Select all records containing a path token where the pathname contains /etc/master.passwd:
auditreduce -o file="/etc/master.passwd"
/var/audit/20031016184719.20031017122634
Select all records containing path tokens, where the pathname is a TTY device:
auditreduce -o file="/dev/tty[a-zA-Z][0-9]+"
/var/audit/20031016184719.20031017122634
Select all records containing path tokens, where the pathname is a TTY except for /dev/ttyp2:
auditreduce -o file="~/dev/ttyp2,/dev/tty[a-zA-Z][0-9]+"
/var/audit/20031016184719.20031017122634
SEE ALSO praudit(1), audit_control(5), audit_event(5)HISTORY
The OpenBSM implementation was created by McAfee Research, the security division of McAfee Inc., under contract to Apple Computer Inc. in
2004. It was subsequently adopted by the TrustedBSD Project as the foundation for the OpenBSM distribution.
AUTHORS
This software was created by McAfee Research, the security research division of McAfee, Inc., under contract to Apple Computer Inc. Addi-
tional authors include Wayne Salamon, Robert Watson, and SPARTA Inc.
The Basic Security Module (BSM) interface to audit records and audit event stream format were defined by Sun Microsystems.
BSD January 24, 2004 BSD