- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: HP supported tool to map bound sockets to the ...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-22-2001 12:17 PM
05-22-2001 12:17 PM
I need an HP supported tool that maps bound sockets to the calling process. In other words, if I do a netstat -anf inet and see that port 419 is listening/open, I want to know which process (ie from ps -ef) is listening on that port. There is a tool called lsof that does this, but as far as I know it's not officially supported by HP. Unfortunately in my corporate environment, I can only use tools officially supported by HP.
In Solaris you can use the proc tools to see if a process has any sockets associated with it. Is there something like this for HP-UX or another way that I don't know of?
Any suggestions would be appreciated!
Thanks,
<> Jim
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-22-2001 12:28 PM
05-22-2001 12:28 PM
Re: HP supported tool to map bound sockets to the invoking process
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-22-2001 12:32 PM
05-22-2001 12:32 PM
Re: HP supported tool to map bound sockets to the invoking process
lsof is the third party tool which tell what port is bound to which process . Compiled binaries are avialable at ftp://vic.cc.purdue.edu/pub/tools/unix/lsof
for both 32 bit and 64 bits which work , incase you have troubleuntar it let me know I will forward you the same.
Manoj Srivastava
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-22-2001 12:35 PM
05-22-2001 12:35 PM
Re: HP supported tool to map bound sockets to the invoking process
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-23-2001 09:33 AM
05-23-2001 09:33 AM
Re: HP supported tool to map bound sockets to the invoking process
meantime, you might be able to use glance to walk all the processes looking at their open files. from time to time, glance shows more than just "tcp" and the control block address
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-23-2001 10:23 AM
05-23-2001 10:23 AM
SolutionYou can use Glance as follows:
1. Save the following to a file (I'll call it sock.syntax) in your current directory:
PRINT gbl_system_id, " ", gbl_stattime, " "
PRINT "--------------------------------------------------"
PRINT "Process Name PID SOCKET"
PRINT " -------------------------------------------------"
PROCESS LOOP
{
PROC_FILE LOOP
{
if proc_file_type == "socket" then
PRINT proc_proc_name|12, " ", proc_proc_id, " ",
proc_file_name, " "
}
}
2. Run:
glance -adviser_only -syntax sock.syntax -j60 | tee sockets.list
You can also modify the syntax file to specify any of the following types of open files:
block Block special device
chr Character device
dir Directory
fifo FIFO
file Simple file
link Symbolic File link
network Network channel device
other An unknown file type
pipe Named pipe (FIFO)
reg Regular file
socket Socket
streams Streams
HTH