Linux Syslog Messages in IBM Director
|
|
- Ashlee Campbell
- 8 years ago
- Views:
Transcription
1 Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director Agent (Level-2 agent) to it s Director server in three (3) easy steps: 1. Create a FIFO (more about FIFOs later). 2. Configure the syslog daemon to send messages to the FIFO. 3. Write a script to read the FIFO and generate Director events. Easy, huh? If you re interested, just continue reading. Create a FIFO So what is a FIFO? A FIFO (for First In First Out) is also called a named pipe. Now if you ve worked with Linux or other Unix systems, you re quite familiar with pipes: ls /usr/sbin/ more The pipe ( ) takes the output of the first command ( ls /usr/sbin/ ) and pipes it to the second command ( more ). A FIFO merely takes this pipe concept and gives it a name. A FIFO appears in the file system although it does not take up space in the file system. You create a FIFO using the mkfifo command, specifying the location of the FIFO: mkfifo /opt/ibm/director/logwatch I chose the /opt/ibm/director directory since this FIFO is specifically for IBM Director, but you can put it anywhere. Configure syslog Telling the syslog daemon to send messages to the FIFO is pretty simple as well. Syslog is configured through the /etc/syslog.conf file. Each line tells syslog what to do with messages and consists of two entries, called selectors and actions. The selectors are made up of providers and priorities separated by a period (.). For example: mail.* means all mail messages, news.crit means critical news messages and *.warning means all warnings. Actions are basically regular files to record the message in, Linux consoles to post messages to, remote machines to notify or FIFOs to write to. (See the syslog.conf manpage for more details on configuring the syslog daemon.) To get the syslog daemon to send warning, critical and error messages to our new FIFO, simply add the following line to your /etc/syslog.conf and restart the daemon: *.warning;*.crit;*.err /opt/ibm/director/logwatch Event Handler script Now all we need is a script to forward these messages as IBM Director events. Here s a simple script to do just that: Web location of document ( 1
2 #!/bin/bash # logwatcher.sh # A simple script to generate IBM Director events from incoming messages true=0 while [ $true ]; do read line Genevent /TYPE:"Director.Linux.LogWatcher" /TEXT:"$line" done Figure 1 - logwatcher.sh script Now all this script does read input and generate an IBM Director event for each line. To use run the following command: logwatcher.sh < fifo Now every line written to the FIFO will be sent as an IBM Director event. A Better Mousetrap The one limitation in the above script is the fact that the severity of the event is not included in the Director event. Since the priority of the message is not included when syslog generates the message, the best way I ve thought to include severities in the messages is to use multiple FIFOs: prw-r--r-- 1 root root 0 Jul 4 16:16 logwatch.critical prw-r--r-- 1 root root 0 Jul 4 15:02 logwatch.fatal prw-r--r-- 1 root root 0 Jul 4 16:18 logwatch.harmless prw-r--r-- 1 root root 0 Jul 4 16:19 logwatch.minor prw-r--r-- 1 root root 0 Jul 4 16:06 logwatch.unknown prw-r--r-- 1 root root 0 Jul 7 09:46 logwatch.warning Figure 2 - Sample FIFOs I created a FIFO for each priority event I want to forward to Director. # LogWatcher FIFOs *.=info;*.=notice /opt/ibm/director/logwatch.info *.=warning /opt/ibm/director/logwatch.warning *.=err;*.=crit /opt/ibm/director/logwatch.critical *.=emerg /opt/ibm/director/logwatch.fatal Figure 3 - Sample syslog.conf entries I then created a script that you could tell which FIFO to listen to and generate Director events of the proper severity. Web location of document ( 2
3 #!/usr/bin/perl # Logwatcher # Version 1.0 # # Written by Paul Engel my $fifo_root = "/opt/ibm/director/logwatch"; my $logfile = "/var/log/logwatcher"; my $pidfile = "/var/run/logwatcher.pid"; sub watcher { my $severity = shift; my $dir_sev = $severity; $dir_sev =~ s/^(.)/\u$1/; my $fifo = "${fifo_root.${severity"; defined(my $pid = fork) or die "Can't fork watcher process $severity: $!"; if ($pid){ return $pid else{ open STDERR, ">>$logfile"; open LOG, ">>$logfile"; select LOG; $ = 1; open FILE, "<$fifo" or die "Unable to open FIFO $fifo: $! "; while (1) { while (<FILE>) { chomp; my $date = `date`; chomp $date; print "\n"; print "---\> $date \<--- \n"; my $cmd = "Genevent /TYPE:\"Director.Linux.LogWatcher\" /TEXT:\"$_\" /SEV:$dir_sev >> $logfile"; system $cmd; print "====================================\n"; close FILE; close LOG; close STDERR; Web location of document ( 3
4 sub close_watchers { my $signal = shift; print "Shutting down watchers..."; kill unlink $signal; print " [done]\n"; defined(my $pid = fork) or die "Can't fork main daemon process: $!"; if ($pid){ open FILE, ">$pidfile" or die "Unable to open PID file $pidfile: $! "; print FILE "$pid\n"; close FILE; else{ print "Starting watchers..."; push (@pids, watcher('critical')); push (@pids, watcher('fatal')); push (@pids, watcher('harmless')); push (@pids, watcher('minor')); push (@pids, watcher('unknown')); push (@pids, watcher('warning')); print " [done]\n"; $SIG{HUP = \&close_watchers; $SIG{INT = \&close_watchers; $SIG{KILL = \&close_watchers; $SIG{TERM = \&close_watchers; $SIG{QUIT = \&close_watchers; waitpid($pids[$#pids],0); Figure 4 - logwatcher.pl script OK, so this is a little more complicated. First, I used Perl since I could get away from file redirection. Basically this script forks processes to watch each of the FIFOs listed. It then records the process ID (PID) of the controlling daemon. When that daemon is shut down (with a KILL or INT signal) it first shuts down all the child watchers. Also, events are written to the /var/log/logwatcher file including errors and successful message from the Genevent command. Starting the logwatcher To make life easier, I created an init script to start and stop Logwatcher. Save this in your /etc/init.d directory and you can simply use the following call to start Logwatcher: /etc/init.d/logwatcher start Web location of document ( 4
5 #!/bin/bash # Logwatcher init script # Version 1.0 # # Written by: Paul Engel pidfile="/var/run/logwatcher.pid" start() { stop() { if [ -e "$pidfile" ]; then echo "PID file found ($pidfile)!" echo Logwatcher may be running echo Startup Aborted! else echo "Starting LogWatcher " /opt/ibm/director/logwatcher.pl fi if [ -e "$pidfile" ];then echo Stopping LogWatcher kill `cat $pidfile` rm $pidfile else echo Logwatcher does not appear to be running. fi status() { if [ -e "$pidfile" ]; then echo "Logwatcher appears to be running (PID: `cat $pidfile`)" else echo "Logwatcher doesn't appear to be running" fi case "$1" in start) start;; stop) stop;; status) status;; restart) stop sleep 5 start ;; *) Web location of document ( 5
6 esac echo "usage: $0 {start stop restart" exit 1 ;; Figure 5 - logwatcher init script What you get Now events will start flowing to Director. They will look something like this: Figure 6 - Logwatcher event in Director Event Log You can treat these events like you would any other Director event. Enjoy. Web location of document ( 6
Syslog & xinetd. Stephen Pilon
Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and
More informationSetting Up the Site Licenses
XC LICENSE SERVER Setting Up the Site Licenses INTRODUCTION To complete the installation of an XC Site License, create an options file that includes the Host Name (computer s name) of each client machine.
More informationCisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
More information% & ' # ('$ %$)$ &*&& ) & *)+,-%. / 0--"1####$ % % # 2 (3 &,--%. # 6/4-7/*8,#071*!",7*%,+07+5 "!96+*%,+07+5 "!96+& (& * *% & & ; %&< & ###
!"$% && % & ' ('$ %$)$ &*&& ) & *)+,-%. / 0--"1$ % % 2 (3 &,--%. 45-4 & 6/4-7/*8/71*!"5+,"*%,+07+5 "!96+ 6/4-7/*8,071*!",7*%,+07+5 "!96+*%,+07+5 "!96+& 6/4-7/*8,071*!",7*%,+07+5 "!96+*%,+07+5 "!96+& :,
More informationDecision Support System to MODEM communications
Decision Support System to MODEM communications Guy Van Sanden gvsanden@sckcen.be Decision Support System to MODEM communications by Guy Van Sanden This document describes how to set up the dss2modem communications
More informationInstalling IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux By the OS4 Documentation Team Prepared by Roberto J Dohnert Copyright 2013, PC/OpenSystems LLC This whitepaper describes how
More informationConfiguring System Message Logging
This chapter describes how to configure system message logging on the Cisco Nexus 5000 Series switch and contains the following sections: Information About System Message Logging, page 1, page 2 Verifying
More informationSystem Administration
Performance Monitoring For a server, it is crucial to monitor the health of the machine You need not only real time data collection and presentation but offline statistical analysis as well Characteristics
More informationConfiguring LocalDirector Syslog
Configuring LocalDirector Syslog Document ID: 22178 LocalDirector is now End of Sale. Refer to the Cisco LocalDirector 400 Series bulletins for more information. Contents Introduction Before You Begin
More informationJob Scheduler Daemon Configuration Guide
Job Scheduler Daemon Configuration Guide A component of Mark Dickinsons Unix Job Scheduler This manual covers the server daemon component of Mark Dickinsons unix Job Scheduler. This manual is for version
More informationNetwork Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationSyslog Monitoring Feature Pack
AdventNet Web NMS Syslog Monitoring Feature Pack A dventnet, Inc. 5645 G ibraltar D rive Pleasanton, C A 94588 USA P ho ne: +1-925-924-9500 Fa x : +1-925-924-9600 Em ail:info@adventnet.com http://www.adventnet.com
More informationHands-On UNIX Exercise:
Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal
More informationNetwork Monitoring & Management Log Management
Network Monitoring & Management Log Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Syslog
More informationLinux logging and logfiles monitoring with swatch
Linux logging and logfiles monitoring with swatch, wire.less.dk edit: November 2009, Pacnog6 http://creativecommons.org/licenses/by-nc-sa/3.0/ 1 Agenda Linux logging The most important logs Swatch and
More informationEMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013 This technical note contains information on these topics: Executive summary... 2 Introduction...
More informationHigh Availability for Informatica Data Replication in a Cluster Environment
High Availability for Informatica Data Replication in a Cluster Environment 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic,
More informationHow to Handle a Few Hundred Million Extra Firewall Log Lines Per Day. Thanks to the Latest Virus or Worm. Jon Meek. Wyeth - Princeton, NJ
How to Handle a Few Hundred Million Extra Firewall Log Lines Per Day Thanks to the Latest Virus or Worm Jon Meek Wyeth - Princeton, NJ meekj 0x40 wyeth.com meekj 0x40 ieee.org 1 High Volume Syslog Traffic
More informationAN INTRODUCTION TO UNIX
AN INTRODUCTION TO UNIX Paul Johnson School of Mathematics September 24, 2010 OUTLINE 1 SHELL SCRIPTS Shells 2 COMMAND LINE Command Line Input/Output 3 JOBS Processes Job Control 4 NETWORKING Working From
More informationSSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
More informationCERT-In Indian Computer Emergency Response Team Handling Computer Security Incidents
CERT-In Indian Computer Emergency Response Team Handling Computer Security Incidents Implementation of Central Logging Server using syslog-ng Department of Information Technology Ministry of Communications
More informationRed Condor Syslog Server Configurations
Red Condor Syslog Server Configurations May 2008 2 Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail
More informationINASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
More informationConfiguring System Message Logging
CHAPTER 5 This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter includes the following sections: Information About System Message Logging, page 5-1 Licensing
More informationSecurity Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
More informationLab 2 : Basic File Server. Introduction
Lab 2 : Basic File Server Introduction In this lab, you will start your file system implementation by getting the following FUSE operations to work: CREATE/MKNOD, LOOKUP, and READDIR SETATTR, WRITE and
More informationIntroduction. dnotify
Introduction In a multi-user, multi-process operating system, files are continually being created, modified and deleted, often by apparently unrelated processes. This means that any software that needs
More informationNetwork Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationProject Iris. econtent Server Cluster Support: High Availability through Microsoft Cluster Service DocBase Version 4.2 12/13/2000
Project Iris Server Cluster Support: High Availability through Microsoft Cluster Service DocBase Version 4.2 12/13/2000 Page 1 of 11 1.0 Overview There are many ways in which the Server may be configured
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationMake a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
More informationSyslog Server. Eddie Aronovich. Tel-Aviv University. www.eu-egee.org. egee INFSO-RI-508833
Syslog Server Eddie Aronovich School of CS Tel-Aviv University www.eu-egee.org egee Table of context Motivation Possible attitudes Possible solutions & Implementations How good is our memory? Count the
More informationTopics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?
Topics CIT 470: Advanced Network and System Administration Logging 1. System logs 2. Logging policies 3. Finding logs 4. Syslog 5. Syslog servers 6. Log monitoring CIT 470: Advanced Network and System
More informationPetaLinux SDK User Guide. Application Development Guide
PetaLinux SDK User Guide Application Development Guide Notice of Disclaimer The information disclosed to you hereunder (the "Materials") is provided solely for the selection and use of Xilinx products.
More informationSecure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
More informationMONIT. UNIX Systems Management
MONIT UNIX Systems Management Introduction monit is a utility for managing and monitoring, processes, files, directories and devices on a Unix system. Monit conducts automatic maintenance and repair and
More informationSyslog (Centralized Logging and Analysis) Jason Healy, Director of Networks and Systems
Syslog (Centralized Logging and Analysis) Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Syslog (Centralized Logging and Analysis) 5 1.1 Introduction..............................
More informationInstrumentation for Linux Event Log Analysis
Instrumentation for Linux Event Log Analysis Rajarshi Das Linux Technology Center IBM India Software Lab rajarshi@in.ibm.com Hien Q Nguyen Linux Technology Center IBM Beaverton hien@us.ibm.com Abstract
More informationLinux Shell Script To Monitor Ftp Server Connection
Linux Shell Script To Monitor Ftp Server Connection Main goal of this script is to monitor ftp server. This script is example of how to use ftp command in bash shell. System administrator can use this
More informationVolume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
More informationWhite Paper. Fabasoft on Linux Cluster Support. Fabasoft Folio 2015 Update Rollup 2
White Paper Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered trade names and/or registered
More informationWeb Server Control, Monitoring, Upgrade, and Maintenance
,ch05.22279 Page 146 Thursday, November 18, 2004 12:36 PM Chapter CHAPTER 5i 5 Web Server Control, Monitoring, Upgrade, and Maintenance This chapter covers everything about administering a running mod_perl
More informationOutline. Review. Inter process communication Signals Fork Pipes FIFO. Spotlights
Outline Review Inter process communication Signals Fork Pipes FIFO Spotlights 1 6.087 Lecture 14 January 29, 2010 Review Inter process communication Signals Fork Pipes FIFO Spotlights 2 Review: multithreading
More informationCS 2112 Lab: Version Control
29 September 1 October, 2014 Version Control What is Version Control? You re emailing your project back and forth with your partner. An hour before the deadline, you and your partner both find different
More informationavast! for linux technical documentation
avast! for linux technical documentation Martin Tůma, tuma@avast.com June 4, 2014 Contents 1 Overview 1 2 Installation 2 3 Operation 3 4 Licensing 4 5 Virus definitions updates 4 6 AMaViS integration 4
More informationUsing SNMP with Content Gateway (not V-Series)
Using SNMP with Content Gateway (not V-Series) Topic 60035 / Updated: 9-May-2011 Applies To: Websense Web Security Gateway 7.6.x Websense Web Security Gateway Anywhere 7.6.x Websense Content Gateway 7.6.x
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationPrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication
PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication Introduction The following document describes how to install PrivateWire in high availability mode using
More informationLinux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
More informationGrid Engine 6. Troubleshooting. BioTeam Inc. info@bioteam.net
Grid Engine 6 Troubleshooting BioTeam Inc. info@bioteam.net Grid Engine Troubleshooting There are two core problem types Job Level Cluster seems OK, example scripts work fine Some user jobs/apps fail Cluster
More informationRedundant and Failover Network Monitoring This section describes a few scenarios for implementing redundant monitoring hosts an various types of network layouts. With redundant hosts, you can maintain
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration If you aren't measuring it, you aren't managing it. Service Monitoring Syslog and Log files Historical data Real-time monitoring Alerting Active monitoring systems
More informationUnix Scripts and Job Scheduling
Unix Scripts and Job Scheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Shell Scripts
More informationBasic C Shell. helpdesk@stat.rice.edu. 11th August 2003
Basic C Shell helpdesk@stat.rice.edu 11th August 2003 This is a very brief guide to how to use cshell to speed up your use of Unix commands. Googling C Shell Tutorial can lead you to more detailed information.
More informationUsing Secure4Audit in an IRIX 6.5 Environment
Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories...
More informationCHAPTER 7. E-Mailing with CGI
CHAPTER 7 E-Mailing with CGI OVERVIEW One of the most important tasks of any CGI program is ultimately to let someone know that something has happened. The most convenient way for users is to have this
More informationOpenMCU User Manual 1/17
OpenMCU User Manual OpenMCU User Manual 1/17 INDEX p. 1. INTRODUCTION...1 2. FEATURES...1 3. OPERATION...1 4. COMMAND LINE OPTIONS...1 5. MANAGEMENT INTERFACE...2 5.1. General...2 5.2. Parameters...2 5.3.
More informationEventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
More informationNTP and Syslog in Linux. Kevin Breit
NTP and Syslog in Linux Kevin Breit Network Time Protocol (NTP) Synchronizes computer time with highly accurate time services NTP Architecture Utilizes time server hierarchy. Each level is called a stratum.
More informationSTEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE
STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE Note : Command Lines are in red. Congratulations on following all 3 steps. This is the final step you need to do to get rid of the old
More informationGuardian Digital WebTool Firewall HOWTO. by Pete O Hara
Guardian Digital WebTool Firewall HOWTO by Pete O Hara Guardian Digital WebTool Firewall HOWTO by by Pete O Hara Revision History Revision $Revision: 1.1 $ $Date: 2006/01/03 17:25:17 $ Revised by: pjo
More informationLinux Deployment Guide. How to deploy Network Shutdown Module for Linux
Linux Deployment Guide How to deploy Network Shutdown Module for Linux 1 Contents 2 Introduction... 4 3 To Prepare your System for Install... 4 3.1 RedHat 5.9 i386 Command... 4 3.2 RedHat 5.9 x86_64 Command...
More informationTitle: Documentation for the Pi-UPS-Monitor-App
Title: Documentation for the Pi-UPS-Monitor-App Version: 0.01 Date: 09.01.14 Table of Content 1. PURPOSE, OR WHAT PIUSVMONITOR DOES...3 2. PACKAGE CONTENTS...4 3. INSTALLATION...5 4. USAGE...6 5. CONSOLE
More informationEnterprise Content Management System Monitor. Server Debugging Guide. 20.09.2013 CENIT AG Bettighofer, Stefan
Enterprise Content Management System Monitor Server Debugging Guide 20.09.2013 CENIT AG Bettighofer, Stefan 1 Table of Contents 1 Table of Contents... 2 2 Overview... 3 3 The Server Status View... 3 4
More informationCentralized. Centralized Logging. Logging Into A. SQL Database. by Adam Tauno Williams (awilliam@whitemice.org)
Centralized Logging Logging Into A Centralized SQL Database by Adam Tauno Williams (awilliam@whitemice.org) Copyright 2006 Adam Tauno Williams (awilliam@whitemice.org) Permission is granted to copy, distribute
More informationCrontabFile Converter
JobScheduler - Job Execution and Scheduling System CrontabFile Converter Users Manual July 2014 July 2014 CrontabFile Converter page: 1 CrontabFile Converter - Contact Information Contact Information Software-
More informationHow To Run A Powergen On A Network With Nagios (Networking) On A Microsoft Powergen 2.5.2 (Netware) On Your Computer Or Network With A Network (Network) On An Ipnet (
Mod-Gearman Distributed Monitoring based on the Gearman Framework Sven Nierlein 18.10.2012 Consol http://www.consol.de/open-source-monitoring/ 2 Introduction Common Scenarios Installation Configuration
More informationAdministration of Soft IOCs under Linux
Administration of Soft IOCs under Linux Ralph Lange (BESSY) Objectives BESSY II is still on R 3.13.9 The MLS Control System (based on 3.14) uses soft (host based) IOCs in production for the first time
More informationHow ToWrite a UNIX Daemon
How ToWrite a UNIX Daemon Dave Lennert Hewlett-Packard Company ABSTRACT On UNIX systems users can easily write daemon programs that perform repetitive tasks in an unnoticed way. However, because daemon
More informationSecurity Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
More informationEnterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer
Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3 2014-11-05 CENIT AG Author: Stefan Bettighofer 1 Table of Contents 1 Table of Contents... 2 2 Overview... 3 3 Definitions...
More informationCommand Line Crash Course For Unix
Command Line Crash Course For Unix Controlling Your Computer From The Terminal Zed A. Shaw December 2011 Introduction How To Use This Course You cannot learn to do this from videos alone. You can learn
More informationIBM Redistribute Big SQL v4.x Storage Paths IBM. Redistribute Big SQL v4.x Storage Paths
Redistribute Big SQL v4.x Storage Paths THE GOAL The Big SQL temporary tablespace is used during high volume queries to spill sorts or intermediate data to disk. To improve I/O performance for these queries,
More informationLecture 25 Systems Programming Process Control
Lecture 25 Systems Programming Process Control A process is defined as an instance of a program that is currently running. A uni processor system or single core system can still execute multiple processes
More informationIBM Pure Application Create Custom Virtual Image Guide - Part 1 Virtual Image by extending
PERFICIENT IBM Pure Application Create Custom Virtual Image Guide - Part 1 Virtual Image by extending How to guide on Virtual Image creation for Pure Application Technical Architect: Chuck Misuraca Change
More informationsyslog - centralized logging
syslog - centralized logging David Morgan A logging system Conforming programs emit categorized messages Messages are candidates for logging syslog handles the logging performed by syslogd per /etc/syslog.conf
More informationimhosted Web Hosting Knowledge Base
imhosted Web Hosting Knowledge Base CGI, Perl, Sendmail Category Contents CGI, Perl, Sendmail 1 What directory do I upload my CGI scripts to? 1 What is CGI? 1 What is Perl? 1 Do you allow CGI to run on
More informationAdvanced Bash Scripting. Joshua Malone (jmalone@ubergeeks.com)
Advanced Bash Scripting Joshua Malone (jmalone@ubergeeks.com) Why script in bash? You re probably already using it Great at managing external programs Powerful scripting language Portable and version-stable
More informationSetting Up VNC, SSH Tunnels, and RDP
Setting Up VNC, SSH Tunnels, and RDP Thomas Pepler April 25, 2016 If you have suggestions for improving this document, please email them to: tpepler@doe.carleton.ca Contents 1 Connecting to DOE Linux Machines
More informationHow To Install An Openerp Server On A Cdx (Amd64) Or Ipa (Amd) Or Ds (Amd86) On A Linux Computer
Open ERP Server Installation These instructions are not to replace the Openerp Project instructions. I made these instructions for those of you who are newbies to linux (just like me) and just want to
More informationLoad Balancing Microsoft AD FS. Deployment Guide
Load Balancing Microsoft AD FS Deployment Guide rev. 1.1.1 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software
More informationHadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Part: 1 Exploring Hadoop Distributed File System An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government
More informationInformation Systems Application Administration Manual Request Tracker
Information Systems Application Administration Manual Request Tracker Abstract : Describes all administration- and operationsrelated information for the DigitalGlobe implementation of Request Tracker V3.
More informationDetermine the process of extracting monitoring information in Sun ONE Application Server
Table of Contents AboutMonitoring1 Sun ONE Application Server 7 Statistics 2 What Can Be Monitored? 2 Extracting Monitored Information. 3 SNMPMonitoring..3 Quality of Service 4 Setting QoS Parameters..
More informationHow to build secure Apache Tomcat deployments with RPM.
How to build secure Apache Tomcat deployments with RPM. My security experiences really tie into everyday work. A colleague called me from my last gig and asked how to build a RedHat Package Manager (RPM)
More informationLinux Audit Quick Start SUSE Linux Enterprise 10 SP1
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1 NOVELL QUICK START CARD Linux audit allows you to comprehensively log and track any access to files, directories, or resources of your system and trace
More informationHow to Push CDR Files from Asterisk to SDReporter. September 27, 2013
How to Push CDR Files from Asterisk to SDReporter September 27, 2013 Table of Contents Revision History... 3 1 Introduction... 4 2 Build Asterisk... 4 3 Configure Asterisk... 4 3.1 Load CDR Modules...
More informationDS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x
DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version
More informationCPSC 2800 Linux Hands-on Lab #7 on Linux Utilities. Project 7-1
CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities Project 7-1 In this project you use the df command to determine usage of the file systems on your hard drive. Log into user account for this and the following
More informationINSTALL ZENTYAL SERVER
GUIDE FOR Zentyal Server is a small business server based on Ubuntu s LTS server version 10.04 and the ebox platform. It also has the LXDE desktop installed with Firefox web browser and PCMAN File manager.
More informationLinux Crontab: 15 Awesome Cron Job Examples
Linux Crontab: 15 Awesome Cron Job Examples < An experienced Linux sysadmin knows the importance of running the routine maintenance jobs in the background automatically. Linux Cron utility is an effective
More informationNagios in High Availability Environments
Nagios in High Availability Environments Introduction Nagios is a versatile and functional network management tool with a GUI (graphic user interface) comparable to other commercial tools. It s free software,
More informationVPS Remote Computing. Connecting to a Windows Server for the first time. 1 Your Server has been installed. 2 Finding the login details for your Server
Connecting to a Windows Server for the first time This document will take you through the process of connecting to a Windows Virtual server for the first time. To connect to your server you need to find
More informationSetting for component replacement alert for PRIMEQUEST
Setting for component replacement alert for PRIMEQUEST 2014/06 FUJITSU LIMITED This manual describes the method of preliminary for the and the of the including components which life is determined (such
More informationSpectrum Technology Platform. Version 9.0. Spectrum Spatial Administration Guide
Spectrum Technology Platform Version 9.0 Spectrum Spatial Administration Guide Contents Chapter 1: Introduction...7 Welcome and Overview...8 Chapter 2: Configuring Your System...9 Changing the Default
More informationSETTING UP RASPBERRY PI FOR TOPPY FTP ACCESS. (Draft 5)
SETTING UP RASPBERRY PI FOR TOPPY FTP ACCESS (Draft 5) 1 INTRODUCTION These notes describe how I set up my Raspberry Pi to allow FTP connection to a Toppy. Text in blue indicates Linux commands or file
More informationHow To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint
StoreGrid Linux Server Installation Guide Before installing StoreGrid as Backup Server (or) Replication Server in your machine, you should install MySQL Server in your machine (or) in any other dedicated
More informationLOCKSS on LINUX. Network Data Transition 02/17/2011
LOCKSS on LINUX Network Data Transition 02/17/2011 1 Table of Contents Overview... 3 Prerequisites... 4 Network Transition Checklist... 5 Network Setup... 7 Test the Network Setup... 9 Create Transfer
More informationDevice Integration: Checkpoint Firewall-1
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationAvira Update Manager User Manual
Avira Update Manager User Manual Table of contents Table of contents 1. Product information........................................... 4 1.1 Functionality................................................................
More information