Solved

Linux, dstat

Posted on 2012-03-23
2
270 Views
Last Modified: 2012-03-25
I get the following from dstat

----total-cpu-usage---- -net/total- sda-
usr sys idl wai hiq siq| recv  send|util

 33  22  24   0   0  21| 462M  478M|   0

Open in new window


Since the utilization is 76, and the user and sys equal 66, that seems to be a disparity

Can I assume that

100 - idle = user + sys + siq

Open in new window


Or is that not correct ?
0
Comment
Question by:Los Angeles1
2 Comments
 
LVL 11

Expert Comment

by:legolasthehansy
ID: 37758548
Hi,

To make sure, here are some tools which measures CPU utilization (as this concerns CPU usage)
The sar command
use "sar -u 3 10" (10 entries are displayed every 3 seconds)
Check the %iowait and %idle values

Run the top command
ps -eo pcpu,pid,user,args | sort -r -k1 | less

You can get a top down view of the process with the highest CPU munchers.
0
 
LVL 30

Accepted Solution

by:
Kerem ERSOY earned 500 total points
ID: 37761849
Hi,

Basically usr+sys+idle+wait should add up to 100 but in your system you have high siq values and they are into the equation as well..

Cheers,
K.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you have a server on collocation with the super-fast CPU, that doesn't mean that you get it running at full power. Here is a preamble. When doing inventory of Linux servers, that I'm administering, I've found that some of them are running on l…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now