Avaya R3.0 manual File systems, Virtual memory, Space used by files in a directory

Page 25
File systems

Monitoring system processes

File systems

The df command reports the systems’ disk space usage. If you type the command df at a shell prompt, the output looks similar to the following:

Filesystem

1k-blocks

Used

Available

Use%

Mounted on

/dev/hda2

10325716

2902060

6899140

30%

/

/dev/hda1

15554

8656

6095

59%

/boot

/dev/hda3

20722644

2664256

17005732

14%

/home

none

256796

0

256796

0%

/dev/shm

By default, this utility shows the partition size in 1 kilobyte blocks and the amount of used and available disk space in kilobytes. To view the information in megabytes and gigabytes, use the command df -h.

The -hargument stands for human-readable format. The output looks similar to the following:

Filesystem

Size

Used

Avail

Use%

Mounted on

/dev/hda2

9.8G

2.8G

6.5G

30%

/

/dev/hda1

15M

8.5M

5.9M

59%

/boot

/dev/hda3

20G

2.6G

16G

14%

/home

none

251M

0

250M

0%

/dev/shm

Virtual memory

In the list of partitions, there is an entry for /dev/shm. This entry represents the systems’ virtual memory file system.

Space used by files in a directory

The du command displays the estimated amount of space being used by files in a directory. If you type du at a shell prompt, the disk usage for each of the subdirectories will be displayed in a list. The total for the current directory and subdirectories will also be shown as the last line in the list. If you do not want to see the totals for all the subdirectories, use the command du -hsto see only the total for the directory in human-readable format. Use the du --helpcommand to see more options.

42.4. Hardware

You can also use the lspci command to list all PCI devices. Use the command

lspci -vfor detailed information or

lspci -vvfor detailed information plus additional output.

Issue 6 August 2005 25

Image 25
Contents Maintenance Guide Secure Services Gateway SSGin support of the Secure Access and Control Offer SAC R3.0 19-300174 Issue 6 AugustEmail totalware@gwsmail.com 2005 Avaya Inc. All Rights ReservedChapter 2 Hardware Upgrade and Maintenance Chapter 1 Maintenance OverviewChapter 5 Operating System Recovery Chapter 3 Server Initialization and ShutdownIndex Chapter 6 SSG Configuration Backup and RestoreContents 4 Secure Services Gateway SSG Maintenance GuideChapter contents Chapter 1 Maintenance OverviewOverview Overview Related resources Linux operating system manualsRelated resources ContentTable 1 Related Resources Document Title2 of Table 1 Related Resources continued3. Under the column Support Resources, go to Documentation Linux operating system manualsInstallation guidelines Chapter 2 Hardware Upgrade and MaintenanceInstallation guidelines Removing the cover of the x305 IBM server In this chapterHandling static sensitive devices System reliability guidelinesGeneral safety guidelines Replacing the hard drive in an x305 IBM server Replacing the hard driveReplacing the hard drive in an x306 IBM server Task Tasks to replace the hard driveDescription 4 Replace the hard drive. x305 see Replacing the hard drive in anRead General safety guidelines and Handling static sensitive devices 3. Installing the new hard drive in the x305 IBM serverReplacing the hard drive in an x305 IBM server Removing the cover of the x305 IBM serverFigure 1 Captive screws on cover Figure 2 Removing and replacing the drive cage Removing the hard drive from the x305 IBM serverReplacing the cover of the x305 IBM server Installing the new hard drive in the x305 IBM serverFigure 3 Removing and installing the hard drive 2. Installing the new hard drive in the x306 IBM serverReplacing the hard drive in an x306 IBM server Removing the hard drive from the x306 IBM serverReplacing the x305 IBM server’s RSA Installing the new hard drive in the x306 IBM server20 Secure Services Gateway SSG Maintenance Guide Replacing the server’s dual NICServer initialization Chapter 3 Server Initialization and ShutdownServer initialization System shutdown System shutdown Gathering system information Chapter 4 Operating System MonitoringMonitoring system processes Gathering system information Monitoring system processesMemory usage Table 3 Interactive Commands Command DescriptionVirtual memory File systemsSpace used by files in a directory Additional resources Hardware/software problems Chapter 5 Operating System RecoveryRoot password Hardware/software problems Booting into single-user modelinux rescue Booting into rescue modechroot /mnt/sysimage sh-2.05b#mount -t ext3 /dev/hda5 /foo fdisk -l oneBooting into single-user mode Booting into emergency mode 32 Secure Services Gateway SSG Maintenance Guide Backing up the SSG configuration Chapter 6 SSG Configuration Backup and RestoreBacking up the SSG configuration Restoring the SSG configuration SSG Configuration Backup and Restore Figure 4 Edit Backup Scheduler Configuration Page34 Secure Services Gateway SSG Maintenance Guide 6. Click Save Changes pgrestore -v -p 6543 -d avssgdb -a -Ft --no-owner dbdumpfilename.tar Restoring the SSG configurationa. mkdir tempdir b. cd tempdir c. tar zfx ~/SSG-Product Id-Date-Time.tgzIndex Index38 Secure Services Gateway SSG Maintenance Guide