qiaozb
作者qiaozb·2007-11-10 23:05
售后技术支持·浪潮商用机器有限公司

How can I find the AIX PID associated with open network connections?

字数 4814阅读 3480评论 0赞 0

How can I find the AIX PID associated with open network connections?

This can be done quite easily with a small shell scrīpt and the utility 'lsof'. This utility can be obtained from the Linux Toolkit for AIX CD, The AIX toolbox for Linux on the web at http://www.ibm.com/servers/aix/products/aixos/linux/ , or from ftp://vic.cc.purdue.edu/pub/

With this utility you can get process information for any open file and the ports are treated by UNIX as open files. To look at the process information for say port

    lsof -i | grep 5901
    Xvnc 33152 jwtesch 6u IPv4 0x7006d1f0 0t0 TCP *:5901 (LISTEN)
This can be useful if you find a port with a lot of network traffic that may be hurting the performance, but don't know the process that is using the port.

For a complete list of all the processes that are using the network you can use the following scrīpt.

Shell scrīpt source

#!/bin/ksh
#scrīpt title=/tmp/port-process.ksh
netstat -a|grep LISTEN|awk '{print $4}'>/tmp/port.list
for PORT in `cat /tmp/port.list`
do
/usr/sbin/lsof -i | grep $PORT
done
echo "scrīpt exection $0 completed"

Sample Output

    inetd     12540    root   11u  IPv4 0x701ef9f0      0t0  TCP *:daytime (LISTEN)
    inetd 12540 root 14u IPv4 0x701e8400 0t0 UDP *:daytime
    inetd 12540 root 4u IPv6 0x7006e9f0 0t0 TCP *:ftp (LISTEN)
    sshd 10944 root 3u IPv4 0x7006ddf0 0t0 TCP *:ssh (LISTEN)
    inetd 12540 root 5u IPv6 0x701ecdf0 0t0 TCP *:telnet (LISTEN)
    sendmail 33648 root 9u IPv4 0x704159f0 0t0 TCP *:smtp (LISTEN)
    inetd 12540 root 12u IPv4 0x701ef5f0 0t0 TCP *:time (LISTEN)
    inetd 12540 root 15u IPv4 0x701e8700 0t0 UDP *:time
    httpd 9322 nobody 16u IPv4 0x703535f0 0t0 TCP *:www (LISTEN)
    httpd 11100 root 16u IPv4 0x703535f0 0t0 TCP *:www (LISTEN)
    snmpdv3ne 16336 root 10u IPv4 0x7006e5f0 0t0 TCP *:smux (LISTEN)
    db2sysc 20648 ldapdb2 48u IPv4 0x702f15f0 0t0 TCP *:ldapdb2svc (LISTEN)
    slapd 37666 ldap 19u IPv4 0x702b5df0 0t0 TCP *:ldap (LISTEN)
    inetd 12540 root 8u IPv6 0x701ec1f0 0t0 TCP *:login (LISTEN)
    inetd 12540 root 6u IPv6 0x701ec9f0 0t0 TCP *:shell (LISTEN)
    lpd 5700 root 3u IPv4 0x702cadf0 0t0 TCP *:printer (LISTEN)
    inetd 12540 root 9u IPv4 0x701efdf0 0t0 TCP *:klogin (LISTEN)
    inetd 12540 root 7u IPv4 0x701ec5f0 0t0 TCP *:kshell (LISTEN)
    rmcd 18598 root 10u IPv4 0x702ca9f0 0t0 TCP *:rmc (LISTEN)
    writesrv 8858 root 3u IPv4 0x702675f0 0t0 TCP *:writesrv (LISTEN)
    httpdlite 17808 imnadm 3u IPv4 0x702671f0 0t0 TCP loopback:49213 (LISTEN)
    httpd 9322 nobody 4u IPv4 0x703389f0 0t2966 TCP loopback:1022->loopback:995 (ESTABLISHED)
    secldapcl 24342 root 3u IPv4 0x70324df0 0t0 TCP loopback:995 (LISTEN)
    secldapcl 24342 root 12u IPv4 0x7032a5f0 0t3106 TCP loopback:995->loopback:1023 (ESTABLISHED)
    httpd 33496 nobody 4u IPv4 0x703389f0 0t2966 TCP loopback:1022->loopback:995 (ESTABLISHED)
    sendmail 33648 root 5u IPv4 0x702d21f0 0t52 TCP loopback:1016->loopback:995 (ESTABLISHED)
    ksh 35098 root 6u IPv4 0x7035f5f0 0t2966 TCP loopback:1021->loopback:995 (ESTABLISHED)
    sshd 42418 jwtesch 3u IPv4 0x7031ddf0 0t3106 TCP loopback:1023->loopback:995 (ESTABLISHED)
    httpd 42912 nobody 4u IPv4 0x703389f0 0t2966 TCP loopback:1022->loopback:995 (ESTABLISHED)
    Xvnc 33152 jwtesch 7u IPv4 0x703f69f0 0t0 TCP *:5801 (LISTEN)
    Xvnc 33152 jwtesch 6u IPv4 0x7006d1f0 0t0 TCP *:5901 (LISTEN)
    X 2950 root 8u IPv4 0x70075df0 0t0 TCP *:6000 (LISTEN)
    Xvnc 33152 jwtesch 4u IPv4 0x702899f0 0t0 TCP *:6001 (LISTEN)
    inetd 12540 root 16u IPv4 0x701ef1f0 0t0 TCP *:dtspc (LISTEN)
    X 2950 root 6u IPv4 0x701eadf0 0t0 TCP *:32768 (LISTEN)
    dtlogin 3188 root 6u IPv4 0x701eadf0 0t0 TCP *:32768 (LISTEN)
    inetd 12540 root 19u IPv4 0x701ee9f0 0t0 TCP *:32769 (LISTEN)
    rpc.ttdbs 29676 root 0u IPv4 0x701ee9f0 0t0 TCP *:32769 (LISTEN)
    snmpdv3ne 16336 root 8u IPv4 0x7006edf0 0t0 TCP *:32770 (LISTEN)
    inetd 12540 root 18u IPv4 0x701f4e00 0t0 UDP *:32776
    ttsession 28176 jwtesch 5u IPv4 0x702f95f0 0t0 TCP *:32796 (LISTEN)
    dtsession 7874 jwtesch 11u IPv4 0x703f31f0 0t0 TCP *:32800 (LISTEN)
    dtwm 29930 jwtesch 11u IPv4 0x703ea5f0 0t0 TCP *:32803 (LISTEN)
    dtexec 34864 jwtesch 5u IPv4 0x703f79f0 0t0 TCP *:32964 (LISTEN)
    inetd 12540 root 17u IPv4 0x701eedf0 0t0 TCP *:wsmserver (LISTEN)
    scrīpt exection portproc.sh completed



如果觉得我的文章对您有用,请点赞。您的支持将鼓励我继续创作!

0

添加新评论0 条评论

Ctrl+Enter 发表

作者其他文章

  • 小气之人即可恨又可怜!
    评论 0 · 赞 0
  • 转(SSA电池更换!)
    评论 0 · 赞 0
  • AIX的启动的过程
    评论 0 · 赞 0
  • 生活
    评论 0 · 赞 0
  • P670电源故障处理!
    评论 1 · 赞 0
  • X社区推广