By IBM Redbooks
This IBM Redbook takes an insightful examine the functionality tracking and tuning instruments which are supplied with AIX 5L. It discusses using the instruments in addition to the translation of the implications in lots of examples.This booklet is intended as a reference for approach directors and AIX technical aid execs to allow them to use the functionality instruments successfully and interpret the outputs while interpreting AIX approach performance.A basic proposal and creation to the instruments is gifted to introduce the reader to the method of AIX functionality analysis.The person functionality instruments mentioned during this e-book fall into those categories:- Multi-resource tracking and tuning instruments- CPU-related functionality instruments- Memory-related functionality instruments- Disk I/O-related functionality instruments- Network-related functionality instruments- functionality tracing instruments- extra functionality issues, together with functionality tracking API, Workload supervisor instruments, and function toolbox for AIX.
Read or Download AIX 5L Performance Tools Handbook PDF
Best unix books
A consultant to the cross-platform dossier server covers universal configurations, protection settings, connectivity, and function.
Metasploit Toolkit for Penetration trying out, make the most improvement, and Vulnerability Research is the 1st ebook on hand for the Metasploit Framework (MSF), that is the assault platform of selection for one of many quickest becoming careers in IT protection: Penetration trying out. The booklet will supply specialist penetration testers and protection researchers with an absolutely built-in suite of instruments for locating, working, and checking out make the most code.
For programmers, procedure architects, and technical programmer managers. supplying an summary of the Solaris and POSIX multithreading architectures, this booklet explains threads at a degree that's thoroughly obtainable to programmers and procedure architects without prior wisdom of threads. Covers the company and technical merits of threaded courses, besides discussions of 3rd celebration software program that's threaded, declaring the advantages.
Booklet by way of SAS institute
- Linux socket programming
- Advanced Linux Programming
- Sams Teach Yourself Red Hat Linux in 24 Hours
- Advanced Unix programming (SAMS)
- IBM Certification Study Guide AIX Problem Determination Tools and Techniques
- Multivariate Data Reduction and Discrimination with SAS Software
Additional resources for AIX 5L Performance Tools Handbook
When Strict = s, partitions of one mirror cannot share the same disk as partitions from a second or third mirror, further reducing the possibility of data loss due to a single disk failure. 24 AIX 5L Performance Tools Handbook In order to determine the data placement strategy for a mirrored logical volume, the settings for both the Range and Strict options must be carefully considered. As an example, consider a mirrored logical volume with range setting of minimum and a strict setting of yes. The LVM would attempt to place all of the physical partitions associated with the primary copy on one physical disk, with the mirrors residing on either one or two additional disks, depending on the number of copies of the logical volume (2 or 3).
It is the application above LVM that has to determine the validity of the data after a crash. There are three different states for the MWC: Disabled (off) MWC is not used for the mirrored logical volume. To maintain consistency after a system crash, the logical volumes file system must be manually mounted after reboot, but only after the syncvg command has been used to synchronize the physical partitions that belong to the mirrored logical partition. Active MWC is used for the mirrored logical volume and the LVDD will keep the MWC record synchronized on disk.
Placing it on a disk with the lowest I/O utilization will increase parallel resource usage. A separate log can be used for each file system. However, special consideration should be taken if multiple logs must be placed on the same physical disk, which should be avoided if possible. The general rule to determine the appropriate size for the JFS log logical volume is to have 4 MB of JFS log for each 2 GB of file system space. The JFS log is limited to a maximum size of 256 MB. Note that when the size of the log logical volume is changed, the logform command must be run to reinitialize the log before the new space can be used.