05-17-2017
Also, one of Robert Grossblatt's famous laws of life and design: "If you can't afford to blow it up, you can't afford to use it."
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
there are commands to monitor the memory, paging, io... how about network traffic. i mean commands to see whether the network traffic (LAN) is congested? the closest i got is netstat
thanks (6 Replies)
Discussion started by: yls177
6 Replies
2. Cybersecurity
Hi,
Can someone give me the clue on how to capture network traffic at gateway.
Thanx (2 Replies)
Discussion started by: kayode
2 Replies
3. Programming
I am developing a Network Appliation to monitor computers in a network.
Specs are
App monitors the current web page viewed in each system
App also can shutdown the computer in the network
App can show all process run by each computer in the network
I am now confused how to start my... (2 Replies)
Discussion started by: valaparambil88
2 Replies
4. Infrastructure Monitoring
Hi all,
Got a strange one here, well not so much strange, different :-)
I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies
5. HP-UX
I Colleagues,
Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me.
Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies
6. Red Hat
How to monitor network device traffic using MRTG?
How can I add network devices in MRTG configuration to monitor? (2 Replies)
Discussion started by: manalisharmabe
2 Replies
7. UNIX Desktop Questions & Answers
Hello,
I am working in office, where, more than 60 clients machines (only 16 machines are on windows) are there and one server Centos Server, I have configured clients with server, so that internet will be used form only one IP. Only 1 ip is assigned, but now a days, my client machines are... (2 Replies)
Discussion started by: RedRocks!!
2 Replies
8. Infrastructure Monitoring
If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ?
ps. because I always found the network is very slow , so I would like what the network port is doing .
Thanks
Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies
9. UNIX for Advanced & Expert Users
Hi All
I am resilience testing an application that is spread across multiple servers.
One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond....
I... (3 Replies)
Discussion started by: bbq
3 Replies
LEARN ABOUT CENTOS
sensors-detect
SENSORS-DETECT(8) System Manager's Manual SENSORS-DETECT(8)
NAME
sensors-detect - detect hardware monitoring chips
SYNOPSIS
sensors-detect
DESCRIPTION
sensors-detect is an interactive program that will walk you through the process of scanning your system for various hardware monitoring
chips, or sensors, supported by libsensors(3), or more generally by the lm_sensors tool suite.
sensors-detect will look for the following devices, in order:
o Sensors embedded in CPUs, south bridges and memory controllers.
o Sensors embedded in Super I/O chips.
o Hardware monitoring chips accessed through ISA I/O ports.
o Hardware monitoring chips reachable over the SMBus or more generally any I2C bus on your system.
As the last two detection steps can cause trouble on some systems, they are normally not attempted if the second detection step led to the
discovery of a Super I/O chip with complete hardware monitoring features. However, the user is always free to ask for all detection steps
if so is his/her wish. This can be useful if a given system has more than one hardware monitoring chip. Some vendors are known to do this,
most notably Asus and Tyan.
WARNING
sensors-detect needs to access the hardware for most of the chip detections. By definition, it doesn't know which chips are there before
it manages to identify them. This means that it can access chips in a way these chips do not like, causing problems ranging from SMBus
lockup to permanent hardware damage (a rare case, thankfully.)
The authors made their best to make the detection as safe as possible, and it turns out to work just fine in most cases, however it is
impossible to guarantee that sensors-detect will not lock or kill a specific system. So, as a rule of thumb, you should not run sensors-
detect on production servers, and you should not run sensors-detect if can't afford replacing a random part of your system. Also, it is
recommended to not force a detection step which would have been skipped by default, unless you know what you are doing.
SEE ALSO
sensors(1), libsensors(3)
AUTHOR
Frodo Looijaard and Jean Delvare
lm-sensors 3 December 2008 SENSORS-DETECT(8)