Robert S. Horrigan wrote:
> Does anyone have any recommendations on how to capture using DTrace?
> 
>>
>> Basically our client is tuning a Web Server 7 instance, and theApp team has 
>> asked the sys admin to
>> observe the Acceptor threads.  They want to see how many they have, how
>> many are active, what those are doing, and how many are left available.
>> I gave them the following Dtrace one-liners, and they said that it was 
>> close, but not what they
>> wanted.

maybe if they told what was missing from the information DTrace gave you, 
you'd be able to improve on the scripts?

>>
>>         ?dtrace -n 'fbt:ip:tcp_acceptor_hash_*:  / pid == <pid of jvm> /
>>         { 
>>          printf("\n%s[%d]\t %s \t %
>>         s",execname,pid,probefunc,probename);}'
>>         
>>         ?dtrace -n 'fbt:ip:tcp_acceptor_hash_*:  / pid == <pid of jvm> /
>>         { @num[probefunc] = count(); }'
>>         
>> I also said he maybe able to get some information of the TCP stack with 
>>
>>         ndd -get /dev/tcp tcp_acceptor_hash
>>
>> But the sys admin didn't think that info helped.

same applies here. "doesn't help" is an insufficient problem description, IMO.

Michael
-- 
Michael Schuster        http://blogs.sun.com/recursion
Recursion, n.: see 'Recursion'
_______________________________________________
dtrace-discuss mailing list
[email protected]

Reply via email to