xsos – Summarize system information from sosreports

If you need to do your technical analysis based on sosreport you must to know a tool called xsos.

The requirement to run xsos is BASH version 4 or later, to install it just download and give it the right permission, like the following example.

$ sudo curl -Lo /usr/local/bin/xsos bit.ly/xsos-direct
$ sudo chmod +x /usr/local/bin/xsos

Now you can gather information about the current system or specific and sosreport uncompressedĀ folder to gather all information that is available.

Here are some useful options from xsos.

Usage: xsos [DISPLAY OPTIONS] [-6abokcmdtlerngisp] [SOSREPORT ROOT]
 or: xsos [DISPLAY OPTIONS] {--B|--C|--M|--D|--T|--L|--R|--N|--G|--I|--P FILE}...
 or: xsos [-?|-h|--help]
 or: xsos [-U|--update]

Display system info from localhost or extracted sosreport

Content options:
 -a, --all show everything
 -b, --bios show info from dmidecode
 -o, --os show hostname, distro, SELinux, kernel info, uptime, etc
 -k, --kdump inspect kdump configuration
 -c, --cpu show info from /proc/cpuinfo
 -m, --mem show info from /proc/meminfo
 -d, --disks show info from /proc/partitions + dm-multipath synopsis
 -t, --mpath show info from dm-multipath
 -l, --lspci show info from lspci
 -e, --ethtool show info from ethtool
 -r, --softirq show info from /proc/net/softnet_stat
 -n, --netdev show info from /proc/net/dev
 -g, --bonding show info from /proc/net/bonding
 -i, --ip show info from ip addr (BASH v4+ required)
 --net alias for: --lspci --ethtool --softirq --netdev --bonding --ip
 -s, --sysctl show important kernel sysctls
 -p, --ps inspect running processes via ps

 

 

If you want to gather information on an sosreport, follows the example.

$ xsos aczx998pinkle/
OS
 Hostname: aczx998pinkle
 Distro: [redhat-release] Red Hat Enterprise Linux Server release 5.5 (Carthage)
 [enterprise-release] Enterprise Linux Enterprise Linux Server release 5.5 (Carthage)
 RHN: serverURL=https://linux-update.oracle.com/XMLRPC
 Runlevel: N 3 (default 3)
 SELinux: permissive (default enforcing)
 Arch: mach=x86_64 cpu=x86_64 platform=x86_64
 Kernel:
 Booted kernel: 2.6.18-238.12.2.0.2.el5
 GRUB default: 2.6.18-238.12.2.0.2.el5
 Build version:
 Linux version 2.6.18-238.12.2.0.2.el5 (mockbuild@ca-build9.us.oracle.com) (gcc version 4.1.2
 20080704 (Red Hat 4.1.2-50)) #1 SMP Tue Jun 28 05:21:19 EDT 2011
 Booted kernel cmdline:
 root=/dev/md6 ro bootarea=c0d0 loglevel=7 panic=60 debug rhgb numa=off console=ttyS0,115200n8
 console=tty1 crashkernel=128M@16M bootfrom=CELLBOOT audit=1 processor.max_cstate=1 nomce
 GRUB default kernel cmdline:
 root=/dev/md6 ro bootarea=c0d0 loglevel=7 panic=60 debug rhgb numa=off console=ttyS0,115200n8
 console=tty1 crashkernel=128M@16M bootfrom=BOOT audit=1 processor.max_cstate=1 nomce
 Kernel taint-check: 536870912 512 64 16 1
 Technology Preview code is loaded
 Taint on warning
 Userspace-defined naughtiness
 System experienced a machine check exception
 Proprietary module has been loaded
 - - - - - - - - - - - - - - - - - - -
 Sys time: Mon Oct 29 10:55:02 CDT 2012
 Boot time: Sat Apr 28 03:29:56 CDT 2012 (1335583796)
 Uptime: 184 days, 12:25, 1 user
 LoadAvg: [24 CPU] 2.34 (10%), 1.27 (5%), 0.95 (4%)
 /proc/stat:
 procs_running: 4 procs_blocked: 1 processes: 248052571
 cpu: [Break-down of CPU time since boot]
 us 1%, ni 0%, sys 1%, idle 96%, iowait 2%, irq 0%, sftirq 0%, steal 0%

(Check this link to read more about xsos.)

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s