what version of collectl is this?  I remember this was a recent problem and
can't tell if my fix (which just came out a couple of weeks ago) didn't
work or you're still running an older version.  From the release notes for
version 3.6.8:

if no hiRes::Time, fudge the value of $microInterval based on -i

in any event I'll bet you don't have hires time installed.  try collectl -v
and you should see something like:

collectl V3.6.8-1 (zlib:2.033,HiRes:1.972101)

while hires isn't required and collectl should work without it, you lose
accuracy so I'd recommend installing it and/or if you don't have the latest
version of collectl installed try installing it.

in any event please let me know what the resolution is so if I did break it
I can try to fix in the next release.

-mark


On Fri, Nov 1, 2013 at 2:02 PM, Frederik Ferner <
[email protected]> wrote:

> Hello list,
>
> we have a problem with collectl on one machine that we don't really
> understand. Basically, when trying to access disk subsystem information,
> we get an error - "collectl -s d -P -i0 -c1" gives this on one of our
> servers.
>
> waiting for 0 second sample...
> Use of uninitialized value $microInterval in division (/) at
> /usr/share/collectl/formatit.ph line 3246, <PROC> line 25.
> Illegal division by zero at /usr/share/collectl/formatit.ph line 3246,
> <PROC> line 25.
>
> Works fine for e.g. memory - "collectl -s m -P -i0 -c1" gives
>
> waiting for 0 second sample...
> #Date Time [MEM]Tot [MEM]Used [MEM]Free [MEM]Shared [MEM]Buf [MEM]Cached
> [MEM]Slab [MEM]Map [MEM]Anon [MEM]Commit [MEM]Locked [MEM]SwapTot
> [MEM]SwapUsed [MEM]SwapFree [MEM]SwapIn [MEM]SwapOut [MEM]Dirty
> [MEM]Clean [MEM]Laundry [MEM]Inactive [MEM]PageIn [MEM]PageOut
> [MEM]PageFaults [MEM]PageMajFaults [MEM]HugeTotal [MEM]HugeFree
> [MEM]HugeRsvd [MEM]SUnreclaim
> 20131101 17:55:27 65766688 9113912 56652776 0 327240 2147044 798344
> 75700 4636368 7189880 4203176 4194296 0 4194296 0 0 72 0 0 1306984 0 0
> 28 0 0 0 0 503500
>
> On all other hosts we've tried, no problems - it's just one machine.
> These include otherwise identical machines. Haven't yet managed to trace
> where this is coming from and what could be causing it. Any ideas what
> we should look for?
>
>
> --
> Frederik Ferner
> Senior Computer Systems Administrator   phone: +44 1235 77 8624
> Diamond Light Source Ltd.               mob:   +44 7917 08 5110
> (Apologies in advance for the lines below. Some bits are a legal
> requirement and I have no control over them.)
>
> --
> This e-mail and any attachments may contain confidential, copyright and or
> privileged material, and are for the use of the intended addressee only. If
> you are not the intended addressee or an authorised recipient of the
> addressee please notify us of receipt by returning the e-mail and do not
> use, copy, retain, distribute or disclose the information in or attached to
> the e-mail.
> Any opinions expressed within this e-mail are those of the individual and
> not necessarily of Diamond Light Source Ltd.
> Diamond Light Source Ltd. cannot guarantee that this e-mail or any
> attachments are free from viruses and we cannot accept liability for any
> damage which you may sustain as a result of software viruses which may be
> transmitted in or with the message.
> Diamond Light Source Limited (company no. 4375679). Registered in England
> and Wales with its registered office at Diamond House, Harwell Science and
> Innovation Campus, Didcot, Oxfordshire, OX11 0DE, United Kingdom
>
>
>
>
>
>
> ------------------------------------------------------------------------------
> Android is increasing in popularity, but the open development platform that
> developers love is also attractive to malware creators. Download this white
> paper to learn more about secure code signing practices that can help keep
> Android apps secure.
> http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
> _______________________________________________
> Collectl-interest mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/collectl-interest
>
------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
Collectl-interest mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/collectl-interest

Reply via email to