Solved

Linux df command

Posted on 2014-11-28
6
220 Views
Last Modified: 2014-12-15
Hi Experts,
I've this Linux machine:
Linux version 2.6.18-371.3.1.el5xen (gcc version 4.1.2 20080704 (Red Hat 4.1.2-54))

I run df command:

[ora11g@hy]$ df -h
Filesystem            Size  Used Avail Use% Mounted on
/dev/vg_ora
                             9.7G  6.8G  2.5G  74%       /u01
/dev/lv_ora
                              59G   47G  8.2G  86%      /sxr/oracle
                                
      
I'd like to know Why the total size 9.7G isn't the same as Used+Available 6.8G + 2.5G (9.3G) and total 59G isn't the same as 47G + 8.2G (55.2)?

Thanks in advance!
0
Comment
Question by:ralph_rea
6 Comments
 
LVL 35

Accepted Solution

by:
Kimputer earned 500 total points
ID: 40470362
Automatically reserved for root (during disaster, like storage fully filled, root can still log in, and do some work).
0
 

Author Comment

by:ralph_rea
ID: 40470376
I Know that 5% of the disk might be reserved for root but with plus 5% is still less of total size 59G
0
 
LVL 13

Expert Comment

by:Alexander Eßer [Alex140181]
ID: 40470400
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 40

Expert Comment

by:omarfarid
ID: 40470468
The difference in size you observed is due to file system over head, There is no exact ratio for this as it depends on factor like number of files or dirs and their sizes.
0
 
LVL 76

Expert Comment

by:arnold
ID: 40470885
Amount of space used is based on number of files and their space, inodes have a minimum file size (often 4k)such that a 1character file (1 byte)  will account for 4k of space used when computing how much space is left while not being reflected in actual space used.
0
 
LVL 61

Expert Comment

by:gheist
ID: 40471926
Can you post df output without parameters?
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now