Solved

Linux and nmon

Posted on 2014-01-28
2
325 Views
Last Modified: 2014-01-28
While I think I know the answer to this one, I have to double check

On Linux with nmon I get the following:

-------------------------------¦
¦I/F Name Recv=KB/s Trans=KB/s packin packout insize outsize Peak->Recv Trans  ¦
¦    lo     0.0     0.0       0.0      0.0     0.0    0.0        0.0     0.0   ¦
¦  eth1 30493.8 30764.1    25225.5   26202.3  1237.9 1202.3    35019.2 50741.4 ¦
¦------------------------------------------------------------------------------¦
¦               

Open in new window

                         

So what this is telling me is that

1> nmon actuall reports in DB (Bytes), not bits, which I find surprising.

2> This is approx 2.5 percent utilization of a 10GB card, more or less

Thanks
0
Comment
Question by:Los Angeles1
2 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 39816072
1) Yes, that's KiloBytes

2= Yep

http://publib.boulder.ibm.com/infocenter/aix/v6r1/topic/com.ibm.aix.cmds/doc/aixcmds4/nmon.htm#nmon__niv

Click "Network Interface View" if it doesn't open automatically.

Don't worry that the above is for AIX, it's the same on Linux
0
 

Author Closing Comment

by:Los Angeles1
ID: 39816171
Excellent as always.

Thanks wmp
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now