Common Commands and Their Syntax for the Linux® OS Environment

Total Page:16

File Type:pdf, Size:1020Kb

Common Commands and Their Syntax for the Linux® OS Environment Filesystem Informational Text Filtering / Mutative bzip2 [opts] [filepattern] ·bzip2 Compression (better) cat [opts] [filepattern] ·Print file contents on STOUT average [opts] [fileargs] ·Print the average of all numbers encountered cd [-] [directory] ·Change directory -E :Display a $ at the end of each line awk [opts] [exp] ·pattern scanning and processing language - :Change to the previous directory you were in -T :Show tabs as ^I -F<fs> :Set the field separator to <fs> chmod [opts] <mode> <filepattern> ·Change permissions -v :Show non-printing characters Ex: cat access_log | awk {‘print $1’} (prints hostnames) -R :Change permissions recursively date [opts] ·Print or set the system date and time Do a ‘man awk’ for more information and examples STRING STRING comm [opts] [file1] [file2] ·Compare two sorted files chown [opts] <user>[.group] <file> ·Change ownership --date= :display time described by STRING STRING -R :Change ownership recursively --set= :set time described by -1 :Suppress lines unique to left file -2 :Suppress lines unique to right file cp opts from to ·Copy files and directories dmesg [opts] ·Print or control the kernel ring buffer [ ] < > < > -3 :Supress lines unique to both files -i :Interactive mode. Prompt before overwriting -c :Clear the contents of the ring buffer csplit [opts] [file] [pattern] ·Split a file on context -p :Preserve file permissions and ownership file [opts] [filepattern] ·Determine the file type prefix prefix -R :Copy directories recursively -z :Try to look inside compressed files -f :Use instead of xx in output filenames -n <digits> :Use <digits> number of digits instead of 2 df [opts] [device name] ·Print filesystem usage info finger [opts] [userpattern] ·Show info about system users -m :Match the exact username specified -z :Remove empty output files -a :Show all filesystems Ex: csplit mailspoolfile "/^From /" {*} -h :Human readable format/Quantify byte information free [opts] ·Display free and used memory in the system cut [opts] [filepattern] ·Remove sections from each line -i :Show inode usage info -b :Display the information in bytes -c range :Output only the characters in range du [opts] [pattern] ·Show space usage on files and dirs hexdump opts ·Show all the characters of a file [ ] Ex: cut –c 1-80 file (truncate lines at 80 characters) -c :Produce a grand total for all arguments -c :Display the input offset in hexidecimal diff [opts] [file1] [file2] ·Differentiate two files -h :Human readable format/Quantify byte information last opts username ·Show last system logins for users [ ] [ ] Ex: diff program-old.c program.c > program.patch -s :Summarize. Only show a total for each argument -num :Show last num of sessions echo [opts] [string] ·Print a line of text find <path> [opts] ·Search for a file -a :Display the hostname in the last column -d :Translates IP numbers to their hostname -e :Enable interpretation of backslashed sequences -f <file> :Use file as last log -n :Don’t automatically insert a newline character Learning find, once and for all! fold [opts] [files] ·Wrap each line to a specified width Find all non-world readable html/htm files and change less [opts] [filepattern] ·View a file a page at a time -i :Do case insensitive searching -s :Break at spaces instead of in the middle of a word. their user ownership to fred using chmod: WIDTH WIDTH -S :Don’t wrap long lines -w < > :Use < > columns rather than 80 find / -type f –name ‘*.html’ -o -name '*.htm' -a +[less commands] :Pass initial commands to less grep [opts] [pattern] [file] ·Print lines matching pattern –perms –644 -exec chown fred {} \; lsof [opts] [names] ·List all open files -B <num> :Print <num> lines of leading context on matches -C <num> :Print <num> lines of trailing context on matches gzip [opts] <filepattern> ·Compress a file or files -E :Interpret pattern as an extended regular expression -1..9 : Set compression level. 9=highest, 1=lowest Try these useful tasks with lsof -i :Do case insensitve matching -d :Decompress file. Same as the gunzip command When the CD-ROM is “busy”: lsof /dev/cdrom -l :Just print the files that match the pattern -v :List the statistics for a compressed file Programs using audio: lsof /dev/dsp -r :Read all files under each directory recursively ln [opts] <tofile> <linkfile> ·Create a sym/hard link -v :Print the lines that don’t match pattern lsof -i 4 -a -s :Create a symbolic link between files (alias name) List open ipv4 network files: head [opts] [file] ·Print the first part of a file -f :Force creation, even if the link file exists -n num :Print the first num lines instead of the first 10 man [opts] [section] <manpage> ·View software manual pages ls [opts] [pattern] ·List file and directory entries numsum [opts] [filepattern] ·Print the sum of a group of numbers -a :View all available manual pages for name Ex: cat numbers.txt | numsum (Add up all numbers in a file) -a :List all files including ones that start with '.' Ex: 'man ls' or 'man -a nice' or 'man 5 crontab' numgrep </numpattern/> [filepattern] ·Print lines matching numpattern -d :List directories themselves, not their contents md5sum [opts] [filepattern] ·Show the uniqueness of files Ex: cat numbers.txt | numgrep /2..100/ (Print numbers from 2 to 100) -l :Long list. Shows permissions and modified time nl [opts] [file] ·Number the lines of a file -r :Recusively list files in directories -c :Check MD5 sums of files against md5sum listfile paste [opts] [files] ·Merge lines of files horizontally -S :Sort output by file size ps [opts] ·Show what processes are running on the system -h :Human readable format/Quantify byte information a :Select all processes on a terminal patch [opts] [patchfile] ·Patch a file using a diff file -X :Sort by filename extension u :Display user oriented format. More columns sed [expression] [file] ·Stream editor -1 :Print output files one per line x :Select processes without a controlling TTY Ex: cat file | sed ‘s/frompattern/topattern/’ > output --time=atime :Show last access timestamp for file w :Show an extra line of process entry per w specified sort [opts] [file] ·Sort lines of text files mkdir [opts] <dirname> ·Make a new directory Ex: ps auxwww =Displays all process information on system -n :Compare according to string numerical value -p :Create parent directories if they don’t exist quota [opts] [user] ·Display disk usage and limits -r :Reverse the result of comparisons -v :Display filesystems where no quota is set mv [-i] <frompattern> <tofile> ·Move/Rename a file split [opts] [file] ·Split a file into pieces random </numpattern/> ·Print out a random number from numpattern -i :Interactive move (Prompt before moving files) -l <num> :Put <num> lines per output file Ex: random /500..1000/ (print a random number between 500 and 1000) opts filepattern ·Remove a file opts file ·Print the last lines of a file rm [ ] < > slocate [opts] [pattern] ·Locate pattern in file index db tail [ ] [ ] -f :Force removal (Don’t ask if it’s ok to remove) -i : Case insensitive search -f :Output appended data as the file grows num> num> -i :Interactive remove (Ask before removing each file) -r : Search the database using POSIX regular expressions -n < :Print last < lines of instead of the last 10 -r :Recusively delete directories an their contents opts file ·Send current output stream to file time [opts] [command] ·Show resource usage for a command tee [ ] [ ] shred [opts] <filepattern> ·Delete file data securely -a :Append to the given file instead of overwriting top [opts] ·Display top CPU processes every X seconds -n :Number of pattern iterations to run (default 25) tr [opts] <set1> [set2] ·Translate char. from set1 to set2 -d sec :Set the delay to sec seconds before refreshing -u :Truncate and remove the file after overwriting Ex: cat index.html | tr A-Z a-z > index-new.html -z :Add a final overwrite with zeros to hide shreding umask [opts] [mode] ·Set the default file permissions uniq [opts] [input] [output] ·Remove duplicate lines tar [opts] [tarfile] [pattern] ·Create an archive -S :Show current symbolic umask -c :Prefix lines with number of occurances uname opts ·Show OS and system information c :Create mode. Create a tar archive [ ] -d :Only print duplicated lines x :Extract mode. Untar archive contents -a :Show everything -u :Only print unique lines t :List mode. List the contents of the archive uptime ·Show system uptime and load -w <n> :Check no more than <n> characters in lines f :Specify a tarfile to use w [opts] [user] ·Show who is logged in/what they are doing wc [opts] [file] ·Print the number of lines in files, etc. v :Verbose mode. Show files being added or untared command ·Locate the related files for a command z,j :De/compress. Send i/o through gzip(z) or bzip2(j) whereis [ ] -m :Print the character count command Show full path to the specified command -l :Print the line count touch [opts] <pattern> ·Update the timestamp on a file which [ ] · who [opts] [args] ·Show who is logged in -w :Print the word count -t :Specify a timestamp to use instead of current time -L :Print the length of the longest line Network Bash Shell Admin ifconfig [devicename] [action] [options] > ·Send STDOUT to a file. overwrite/create a file adduser [opts] <username> ·Add a user to the local system ipchains [opts] ·Manip. ipchains firewall(kernel 2.2+) Ex: ls –l > list-of-files.txt -d <dir> : Set the home directory for the user to dir iptables [opts] ·Manip. iptables firewall(kernel 2.4+) >> ·Send STDOUT to a file, appending to te end of the file -g <group> : Set the primary group for the user to group group
Recommended publications
  • Freenas® 11.0 User Guide
    FreeNAS® 11.0 User Guide June 2017 Edition FreeNAS® IS © 2011-2017 iXsystems FreeNAS® AND THE FreeNAS® LOGO ARE REGISTERED TRADEMARKS OF iXsystems FreeBSD® IS A REGISTERED TRADEMARK OF THE FreeBSD Foundation WRITTEN BY USERS OF THE FreeNAS® network-attached STORAGE OPERATING system. VERSION 11.0 CopYRIGHT © 2011-2017 iXsystems (https://www.ixsystems.com/) CONTENTS WELCOME....................................................1 TYPOGRAPHIC Conventions...........................................2 1 INTRODUCTION 3 1.1 NeW FeaturES IN 11.0..........................................3 1.2 HarDWARE Recommendations.....................................4 1.2.1 RAM...............................................5 1.2.2 The OperATING System DeVICE.................................5 1.2.3 StorAGE Disks AND ContrOLLERS.................................6 1.2.4 Network INTERFACES.......................................7 1.3 Getting Started WITH ZFS........................................8 2 INSTALLING AND UpgrADING 9 2.1 Getting FreeNAS® ............................................9 2.2 PrEPARING THE Media.......................................... 10 2.2.1 On FreeBSD OR Linux...................................... 10 2.2.2 On WindoWS.......................................... 11 2.2.3 On OS X............................................. 11 2.3 Performing THE INSTALLATION....................................... 12 2.4 INSTALLATION TROUBLESHOOTING...................................... 18 2.5 UpgrADING................................................ 19 2.5.1 Caveats:............................................
    [Show full text]
  • Oracle® Linux 7 Monitoring and Tuning the System
    Oracle® Linux 7 Monitoring and Tuning the System F32306-03 October 2020 Oracle Legal Notices Copyright © 2020, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • Tigersharc DSP Hardware Specification, Revision 1.0.2, Direct Memory Access
    7 DIRECT MEMORY ACCESS Figure 7-0. Table 7-0. Listing 7-0. Overview Direct Memory Access (DMA) is a mechanism for transferring data with- out core being involved. The TigerSHARC® DSP’s on-chip DMA controller relieves the core processor of the burden of moving data between internal memory and an external device, external memory, or between link ports and internal or external memory. The fully-integrated DMA controller allows the TigerSHARC® DSP core processor, or an external device, to specify data transfer operations and return to normal processing while the DMA controller carries out the data transfers in the background. The TigerSHARC® DSP DMA competes with other masters for internal memory access. For more information, see “Architecture and Microarchi- tecture Overview” on page 6-7. This conflict is minimized due to the large internal memory bandwidth that is available. The DMA includes 14 DMA channels, four of which are dedicated to external memory devices, eight to link ports, and two to AutoDMA registers. TigerSHARC DSP Hardware Specification 7 - 1 Overview Figure 7-1 shows a block diagram of the TigerSHARC® DSP’s DMA controller. TRANSMITTER RECEIVER TCB TCB REGISTERS REGISTERS Internal DMA DMA CONTROLLER Bus Requests Interface Figure 7-1. DMA Block Diagram Data Transfers — General Information The DMA controller can perform several types of data transfers: • Internal memory ⇒ external memory and memory-mapped periph- erals • Internal memory ⇒ internal memory of other TigerSHARC® DSPs residing on the cluster bus • Internal memory ⇒ host processor • Internal memory ⇒ link port I/O • External memory ⇒ external peripherals 7 - 2 TigerSHARC DSP Hardware Specification Direct Memory Access • External memory ⇒ internal memory • External memory ⇒ link port I/O • Link port I/O ⇒ internal memory • Link port I/O ⇒ external memory • Cluster bus master via AutoDMA registers ⇒ internal memory Internal-to-internal memory transfers are not directly supported.
    [Show full text]
  • Performance, Scalability on the Server Side
    Performance, Scalability on the Server Side John VanDyk Presented at Des Moines Web Geeks 9/21/2009 Who is this guy? History • Apple // • Macintosh • Windows 3.1- Server 2008R2 • Digital Unix (Tru64) • Linux (primarily RHEL) • FreeBSD Systems Iʼve worked with over the years. Languages • Perl • Userland Frontier™ • Python • Java • Ruby • PHP Languages Iʼve worked with over the years (Userland Frontier™ʼs integrated language is UserTalk™) Open source developer since 2000 Perl/Python/PHP MySQL Apache Linux The LAMP stack. Time to Serve Request Number of Clients Performance vs. scalability. network in network out RAM CPU Storage These are the basic laws of physics. All bottlenecks are caused by one of these four resources. Disk-bound •To o l s •iostat •vmstat Determine if you are disk-bound by measuring throughput. vmstat (BSD) procs memory page disk faults cpu r b w avm fre flt re pi po fr sr tw0 in sy cs us sy id 0 2 0 799M 842M 27 0 0 0 12 0 23 344 2906 1549 1 1 98 3 3 0 869M 789M 5045 0 0 0 406 0 10 1311 17200 5301 12 4 84 3 5 0 923M 794M 5219 0 0 0 5178 0 27 1825 21496 6903 35 8 57 1 2 0 931M 784M 909 0 0 0 146 0 12 955 9157 3570 8 4 88 blocked plenty of RAM, idle processes no swapping CPUs A disk-bound FreeBSD machine. b = blocked for resources fr = pages freed/sec cs = context switches avm = active virtual pages in = interrupts flt = memory page faults sy = system calls per interval vmstat (RHEL5) # vmstat -S M 5 25 procs ---------memory-------- --swap- ---io--- --system- -----cpu------ r b swpd free buff cache si so bi bo in cs us sy id wa st 1 0 0 1301 194 5531 0 0 0 29 1454 2256 24 20 56 0 0 3 0 0 1257 194 5531 0 0 0 40 2087 2336 34 27 39 0 0 2 0 0 1183 194 5531 0 0 0 53 1658 2763 33 28 39 0 0 0 0 0 1344 194 5531 0 0 0 34 1807 2125 29 19 52 0 0 no blocked busy but not processes overloaded CPU in = interrupts/sec cs = context switches/sec wa = time waiting for I/O Solving disk bottlenecks • Separate spindles (logs and databases) • Get rid of atime updates! • Minimize writes • Move temp writes to /dev/shm Overview of what weʼre about to dive into.
    [Show full text]
  • Xcode Package from App Store
    KH Computational Physics- 2016 Introduction Setting up your computing environment Installation • MAC or Linux are the preferred operating system in this course on scientific computing. • Windows can be used, but the most important programs must be installed – python : There is a nice package ”Enthought Python Distribution” http://www.enthought.com/products/edudownload.php – C++ and Fortran compiler – BLAS&LAPACK for linear algebra – plotting program such as gnuplot Kristjan Haule, 2016 –1– KH Computational Physics- 2016 Introduction Software for this course: Essentials: • Python, and its packages in particular numpy, scipy, matplotlib • C++ compiler such as gcc • Text editor for coding (for example Emacs, Aquamacs, Enthought’s IDLE) • make to execute makefiles Highly Recommended: • Fortran compiler, such as gfortran or intel fortran • BLAS& LAPACK library for linear algebra (most likely provided by vendor) • open mp enabled fortran and C++ compiler Useful: • gnuplot for fast plotting. • gsl (Gnu scientific library) for implementation of various scientific algorithms. Kristjan Haule, 2016 –2– KH Computational Physics- 2016 Introduction Installation on MAC • Install Xcode package from App Store. • Install ‘‘Command Line Tools’’ from Apple’s software site. For Mavericks and lafter, open Xcode program, and choose from the menu Xcode -> Open Developer Tool -> More Developer Tools... You will be linked to the Apple page that allows you to access downloads for Xcode. You wil have to register as a developer (free). Search for the Xcode Command Line Tools in the search box in the upper left. Download and install the correct version of the Command Line Tools, for example for OS ”El Capitan” and Xcode 7.2, Kristjan Haule, 2016 –3– KH Computational Physics- 2016 Introduction you need Command Line Tools OS X 10.11 for Xcode 7.2 Apple’s Xcode contains many libraries and compilers for Mac systems.
    [Show full text]
  • Pingdirectory Administration Guide Version
    Release 7.3.0.3 Server Administration Guide PingDirectory | Contents | ii Contents PingDirectory™ Product Documentation................................................ 20 Overview of the Server............................................................................. 20 Server Features.................................................................................................................................20 Administration Framework.................................................................................................................21 Server Tools Location....................................................................................................................... 22 Preparing Your Environment....................................................................22 Before You Begin.............................................................................................................................. 22 System requirements..............................................................................................................22 Installing Java......................................................................................................................... 23 Preparing the Operating System (Linux).......................................................................................... 24 Configuring the File Descriptor Limits.................................................................................... 24 File System Tuning.................................................................................................................25
    [Show full text]
  • Linux Performance Tools
    Linux Performance Tools Brendan Gregg Senior Performance Architect Performance Engineering Team [email protected] @brendangregg This Tutorial • A tour of many Linux performance tools – To show you what can be done – With guidance for how to do it • This includes objectives, discussion, live demos – See the video of this tutorial Observability Benchmarking Tuning Stac Tuning • Massive AWS EC2 Linux cloud – 10s of thousands of cloud instances • FreeBSD for content delivery – ~33% of US Internet traffic at night • Over 50M subscribers – Recently launched in ANZ • Use Linux server tools as needed – After cloud monitoring (Atlas, etc.) and instance monitoring (Vector) tools Agenda • Methodologies • Tools • Tool Types: – Observability – Benchmarking – Tuning – Static • Profiling • Tracing Methodologies Methodologies • Objectives: – Recognize the Streetlight Anti-Method – Perform the Workload Characterization Method – Perform the USE Method – Learn how to start with the questions, before using tools – Be aware of other methodologies My system is slow… DEMO & DISCUSSION Methodologies • There are dozens of performance tools for Linux – Packages: sysstat, procps, coreutils, … – Commercial products • Methodologies can provide guidance for choosing and using tools effectively • A starting point, a process, and an ending point An#-Methodologies • The lack of a deliberate methodology… Street Light An<-Method 1. Pick observability tools that are: – Familiar – Found on the Internet – Found at random 2. Run tools 3. Look for obvious issues Drunk Man An<-Method • Tune things at random until the problem goes away Blame Someone Else An<-Method 1. Find a system or environment component you are not responsible for 2. Hypothesize that the issue is with that component 3. Redirect the issue to the responsible team 4.
    [Show full text]
  • David Gwynne <[email protected]>
    firewalling with OpenBSD's pf and pfsync David Gwynne <[email protected]> Thursday, 17 January 13 introduction ‣ who am i? ‣ what is openbsd? ‣ what are pf and pfsync? ‣ how do i use them? ‣ ask questions whenever you want Thursday, 17 January 13 who am i? ‣ infrastructure architect in EAIT at UQ ‣ i do stuff, including run the firewalls ‣ a core developer in openbsd ‣ i generally play with storage ‣ but i play with the network stack sometimes Thursday, 17 January 13 what is openbsd? ‣ open source general purpose unix-like operating system ‣ descended from the original UNIX by way of berkeley and netbsd ‣ aims for “portability, standardization, correctness, proactive security and integrated cryptography.” ‣ supports various architectures/platforms Thursday, 17 January 13 what is openbsd? ‣ one source tree for everything ‣ kernel, userland, doco ‣ bsd/isc/mit style licenses on all code (with some historical exceptions) ‣ 6 month dev cycle resulting in a release ‣ 3rd party software via a ports tree ‣ emergent focus on network services Thursday, 17 January 13 what is openbsd? ‣ it is very aggressive ‣ changes up and down the stack (compiler to kernel) to make a harsher, stricter, and less predictable runtime environment ‣ minimal or no backward compatibility as things move forward ‣ whole tree is checked for new bugs ‣ randomise as much as possible all over Thursday, 17 January 13 what is openbsd? ‣ it is extremely conservative ‣ tree must compile and work at all times ‣ big changes go in at the start of the cycle ‣ we’re not afraid to back stuff out ‣ peer review is necessary ‣ we do back away from some tweaks for the sake of usability Thursday, 17 January 13 what is pf? ‣ short for packet filter ‣ the successor to IP Filter (ipf) ‣ ipf was removed due to license issues ‣ the exec summary is that it is a stateful filter for IP (v4 and v6) traffic ‣ does a little bit more than that though..
    [Show full text]
  • UNIX OS Agent User's Guide
    IBM Tivoli Monitoring Version 6.3.0 UNIX OS Agent User's Guide SC22-5452-00 IBM Tivoli Monitoring Version 6.3.0 UNIX OS Agent User's Guide SC22-5452-00 Note Before using this information and the product it supports, read the information in “Notices” on page 399. This edition applies to version 6, release 3 of IBM Tivoli Monitoring (product number 5724-C04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1994, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables ...............vii Solaris System CPU Workload workspace ....28 Solaris Zone Processes workspace .......28 Chapter 1. Using the monitoring agent . 1 Solaris Zones workspace ..........28 System Details workspace .........28 New in this release ............2 System Information workspace ........29 Components of the monitoring agent ......3 Top CPU-Memory %-VSize Details workspace . 30 User interface options ...........4 UNIX OS workspace ...........30 UNIX Detail workspace ..........31 Chapter 2. Requirements for the Users workspace ............31 monitoring agent ...........5 Enabling the Monitoring Agent for UNIX OS to run Chapter 4. Attributes .........33 as a nonroot user .............7 Agent Availability Management Status attributes . 36 Securing your IBM Tivoli Monitoring installation 7 Agent Active Runtime Status attributes .....37 Setting overall file ownership and permissions for AIX AMS attributes............38
    [Show full text]
  • Nxadmin CLI Reference Guide Unity Iv Contents
    HYPER-UNIFIED STORAGE nxadmin Command Line Interface Reference Guide NEXSAN | 325 E. Hillcrest Drive, Suite #150 | Thousand Oaks, CA 91360 USA Printed Thursday, July 26, 2018 | www.nexsan.com Copyright © 2010—2018 Nexsan Technologies, Inc. All rights reserved. Trademarks Nexsan® is a trademark or registered trademark of Nexsan Technologies, Inc. The Nexsan logo is a registered trademark of Nexsan Technologies, Inc. All other trademarks and registered trademarks are the property of their respective owners. Patents This product is protected by one or more of the following patents, and other pending patent applications worldwide: United States patents US8,191,841, US8,120,922; United Kingdom patents GB2466535B, GB2467622B, GB2467404B, GB2296798B, GB2297636B About this document Unauthorized use, duplication, or modification of this document in whole or in part without the written consent of Nexsan Corporation is strictly prohibited. Nexsan Technologies, Inc. reserves the right to make changes to this manual, as well as the equipment and software described in this manual, at any time without notice. This manual may contain links to web sites that were current at the time of publication, but have since been moved or become inactive. It may also contain links to sites owned and operated by third parties. Nexsan is not responsible for the content of any such third-party site. Contents Contents Contents iii Chapter 1: Accessing the nxadmin and nxcmd CLIs 15 Connecting to the Unity Storage System using SSH 15 Prerequisite 15 Connecting to the Unity
    [Show full text]
  • Cisco Identity Services Engine CLI Reference Guide, Release 2.2 Americas Headquarters Cisco Systems, Inc
    Cisco Identity Services Engine CLI Reference Guide, Release 2.2 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • SUSE Linux Enterprise Server 11 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 11 SP4
    SUSE Linux Enterprise Server 11 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 11 SP4 Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see http://www.suse.com/company/legal/ . All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xi 1 Available Documentation xii 2 Feedback xiv 3 Documentation Conventions xv I BASICS 1 1 General Notes on System Tuning 2 1.1 Be Sure What Problem to Solve 2 1.2 Rule Out Common Problems 3 1.3 Finding the Bottleneck 3 1.4 Step-by-step Tuning 4 II SYSTEM MONITORING 5 2 System Monitoring Utilities 6 2.1 Multi-Purpose Tools 6 vmstat 7
    [Show full text]