[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

186.0. "DECnet FAL Monitor" by WEO73A::FSERV () Mon Dec 30 1985 08:18

Hi From New Zealnd .

Can Anyone tell me how i can monitor what fal is actually doing when used
via Decnet ie what files are opened etc 

Iam told that this can be included with the netserver.log file created when
the remote request is processed .


			Any Ideas 
				 Richard S.
T.RTitleUserPersonal
Name
DateLines
186.1SUBSYS::LAWLERMon Dec 30 1985 13:575
Try doing a SHO DEV/File on various disks and see if there are
any files opened by FAL_XXXX.  (I think this should work...)

                                  al

186.2HARE::BUTENHOFMon Dec 30 1985 14:128
        I think what you want is FAL$LOG---define it /SYSTEM.  Defining
        it to a value of "1" will log the files actually opened.
        Defining other bits will increase the logging (you can make
        it dump every record it transfers, I think, plus bookkeeping
        info, although I don't recall the values).  And yes, any
        output will be in NETSERVER.LOG.
        
        	/dave
186.3TOOLS::STANTue Dec 31 1985 02:221
WHAT/FILES is also useful.
186.4SWORD::HALPINTue Dec 31 1985 18:1833
The following info is extracted from BULOVA""::SYS$NOTES:DECNETVMS.NOT
Note 21.5

-------------------------------------------------------------------------
     File Access Listener (FAL) logging:

     FAL$LOG logical name with equivalence string of X or X_Y where:

     1.  X is a hexadecimal bit mask as follows:
          Bit 0 set enables logging of file name.
          Bit 1 set enables generation of throughput statistics.
          Bit 2 set enables logging of DAP messages.
          Bit 3 set enables logging of xmit and recv AST completions.
          Bit 4 set enables logging of xmit and recv QIO requests.
          Bit 5 is reserved.
          Bit 6 set disables DAP message blocking.
          Bit 7 set disables DAP CRC error checking.
          Bits 8-31 are reserved.

     2.  Y is a  hexadecimal  number  of  bytes  per  DAP  message  to
         display.

     Example Definitions:
          $ Define FAL$LOG 1
          $ Define FAL$LOG DF
          $ Define FAL$LOG 5_50

     Note that options 2,3, and 4 degrade performance.




				Jim Halpin