07-28-2005
linux prog for server space, load etc
Hi all
what are the ways by which we can know and generate a report of the space remaining, memory(ram) used and the load on the server over a period of time.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hello,
I'm facing a big problem with my hosting server (Dual Xeon 2.4GHz), I'm having a load in the CPU usage and the memory (maybe it's related) ALSO mySQL:
Server Load 5.34 (2 cpus) (to 22 sometime)
Memory Used 68.4 % (to 70% sometime)
When I go to 'CPU/Memory/MySQL Usage' I found:
... (3 Replies)
Discussion started by: Kh@lid
3 Replies
2. UNIX for Dummies Questions & Answers
Hi,
How do we check the free space for load servers?Is there any 'df'
command available for this?Your help is appreciated.
With Regards
Dileep (5 Replies)
Discussion started by: DILEEP410
5 Replies
3. UNIX for Dummies Questions & Answers
Hi everybody,
Can anyone suggest me some good books on Linux Prog.. I know richard stevens is always there.. But any specific books on Linux Porgramming and Networking in Linux.. Wud be of great help if anybody replies.. (4 Replies)
Discussion started by: srikumar_cs
4 Replies
4. Shell Programming and Scripting
Dear Friends,
I want to know how to call a Linux commands in C programs. (1 Reply)
Discussion started by: krishna_sicsr
1 Replies
5. Linux
Hi
anyone know how to setup a setup a virtual IP to control 2 server load for linux? i only have 2 server, i don want to buy another just for the load balance... is there a way to do it?
Sumemr (0 Replies)
Discussion started by: summerpeh
0 Replies
6. Linux
hi , i have 2 linux boxes with linksys wireless adapters everything is working fine.now i am trying to run client-server program written in C on these boxes but none of the box is receiving any packets. how different it is when using wireless . All these codes that i have works fine on Unix though... (1 Reply)
Discussion started by: phantom308
1 Replies
7. Solaris
Hello,
i am using Solaris 10, The sar running in my system might be corrupted, but not sure why as there has been no updates to it ( to the best of my knowledge) and it was working fine until few days back. If i try to get sar reports using sar -o <filename> 60 180
there is no error but the... (2 Replies)
Discussion started by: nimi20
2 Replies
8. Shell Programming and Scripting
Hi,
I am trying to run a sas prog on a remote server using ssh.
I have got the command that I am using in the below paragraph. With it, I was able to run shell scripts but when I tried 'sas' it errored out. I have got my keys exchanged so when I say ssh serverA I automatically connect to my... (4 Replies)
Discussion started by: coolavi
4 Replies
9. Programming
Here is a useful SSL (HTTPS) application for anyone with a remote Linux server they want to keep an eye on using Blynk and the NodeMCU ESP8266. This little app also works (have tested as well) on the WeMos D1 ESP8266 Arduino board.
The NodeMCU setup could not be easier, just find a... (8 Replies)
Discussion started by: Neo
8 Replies
10. Programming
Here we go....
Preface:
..... so in a galaxy far, far, far away from commercial, data sharing corporations.....
For this project, I used the ESP-WROOM-32 as an MQTT (publish / subscribe) client which receives Linux server "load averages" as messages published as MQTT pub/sub messages.... (6 Replies)
Discussion started by: Neo
6 Replies
makekey(8) System Manager's Manual makekey(8)
NAME
makekey - generate encryption key
SYNOPSIS
/usr/lbin/makekey
DESCRIPTION
The command improves the usefulness of encryption schemes depending on a key by increasing the amount of time required to search the key
space. It reads 10 bytes from its standard input, and writes 13 bytes on its standard output. The output depends on the input in a way
intended to be difficult to compute (that is, to require a substantial fraction of a second).
The first eight input bytes (the "input key") can be arbitrary ASCII characters. The last two (the salt) are best chosen from the set of
digits, uppercase and lowercase letters, the period (.), and the slash (/). The salt characters are repeated as the first two characters
of the output. The remaining 11 output characters are chosen from the same set as the salt and constitute the "output key".
The transformation performed is essentially the following: the salt is used to select one of 4096 cryptographic machines all based on the
National Bureau of Standards DES algorithm, but modified in 4096 different ways. Using the input key as key, a constant string is fed into
the machine and recirculated a number of times. The 64 bits that come out are distributed into the 66 useful key bits in the result.
The command is intended for programs that perform encryption (for instance, Usually input and output for are pipes.
RELATED INFORMATION
Commands: crypt(1), ed(1), ex(1), vi(1) delim off
makekey(8)