02-12-2017
Quote:
Originally Posted by
alexcol
So Could you tell me if below theories could affect Performance ?
- I run netstat command and displays more than 102 connections some of them established state, some of them time wait, etc. So the question is having many connections could affect the performance of the application?
If I killed and restart connections would be a good idea to improve performance?
- Having one or more Filesystem backups could affect Performance too ?
Many network connections
might affect performance, but right now it isn't even established if you have "many" of them. Connections in the stated of "TIME_WAITING" will not contribute to the load at all and your suggested solution of killing and restarting connections would definitely not help at all.
Running filesystem backups
could very well degrade performance but if that is the case or not we can't say.
Quote:
Originally Posted by
alexcol
T
which administrative commands can i use besides top for finding the stumbling blocks you mention and taking account the OS is obsolete ?
You might want to read
this little introduction to performance tuning i wrote. Most of the tools mentioned there should work for you and most of the concepts explained there should apply to your server.
I hope this helps.
bakunin
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello,
I have 2 sun servers. We are running Oracle apps. We have to apply patches to both servers whenever a patch needs to be applied for Oracle.
We use the same username eg. applmgr on both servers. We have a shared patch area which we can run the patch from on both boxes.
the uid for... (2 Replies)
Discussion started by: d__browne
2 Replies
2. Solaris
How do you make the changes take affect when you change the subnet masks or default router without rebooting? (1 Reply)
Discussion started by: BG_JrAdmin
1 Replies
3. Shell Programming and Scripting
hi ,
i want to store variable but i get always error when i excute this command ligne :
var = awk '{print $1}' file1
echo $var
how can i store the var?
thanks (7 Replies)
Discussion started by: kamel.seg
7 Replies
4. Solaris
Hello gurus,
I have question. I have enabled ssh on the servers.
I am planning to change the oracle user's(os user) password. If I change the password will it affect the authorized_keys? Do I need to regenerate it.
Thanks, (2 Replies)
Discussion started by: oracleuser
2 Replies
5. UNIX for Dummies Questions & Answers
I have modified the .profile in my profile and I don't see any effect.
Why the changes don't have effect?
I tried both on the account at a server where I have limited permissions as user and to my local pc (as user).
Is it the .profile overridden by some other file? It looks weird because I... (8 Replies)
Discussion started by: myle
8 Replies
6. Solaris
Hi,
I have a quick question with regards to creating symbolic links. Would creating a symbolic link from one directory to a file in another cause any issues for users that are currently logged into the box. I don't believe it will unless they are using the file in question, but I would like... (2 Replies)
Discussion started by: Chains
2 Replies
7. Shell Programming and Scripting
I would like to affect an exploded string into an array.
one:two::fourinto an array:
a => one
a => two
a =>
a => four
Quite simple in other languages with functions like explode() or split().
The best I could come up with was this:
until
do
token=${string%%:*} # takes the... (8 Replies)
Discussion started by: ripat
8 Replies
8. Shell Programming and Scripting
Hello
I have created next scritpt to do the next: chekp if host is alive. When the host down, launch telnet other equip to do checks.
When execute the script the load average of the machines increase. For example:
Before launch script
top - 11:14:56 up 14 days, 18:06, 3 users, load... (3 Replies)
Discussion started by: capilla
3 Replies
GONG(1) General Commands Manual GONG(1)
NAME
gong - evaluate process performance
SYNOPSIS
gong [-f] [-a] process-id
DESCRIPTION
Gong is used to evaluate the performance of a process that is in execution.
The process-id is the process number of the process whose performance is to be evaluated. The evaluation is performed by a set of three
``panelist'' routines, each of which analyzes one aspect (time, space, and tonality) of the performance of the process. If any of these
routines is not amused by the performance, the process being analyzed is sent the gong(2) signal. In addition, the process-id of the eval-
uated process is written on the standard gong, for possible future corrective action. (It is suggested that the standard gong be an audi-
ble alarm for proper effect.) It is expected that after being gong(2)ed, the process will promptly commit suicide.
The -f keyletter argument indicates that gong is to invoke flog(1) with the unmerciful argument if the process does not respond to
gong(2)ing. In the absence of this argument, the process is continuously gong(2)ed, which may lead to the process becoming a deaf zombie.
The -a keyletter argument indicates that if all three of the panelist routines gong(2) a process, the process should be unmercifully
flog(1)ged whether or not the -f keyletter is supplied.
FILES
/dev/ding.dong is the standard gong.
SEE ALSO
On the Applicability of Gonging to the Performance and Merit Review Process, Journal of Irreproducible Results, vol. 263, issue 19, pp.
253-307.
BUGS
If the named process does not exist, it is possible that gong will attempt an evaluation of itself, which may lead to a condition known as
compounded double ringing (see echo(1)). Therefore, it is recommended that gong be used with extreme care.
GONG(1)