Beyond the Ordinary. mail2eventdb. handling for the Netways Event
|
|
- Derrick Maxwell
- 6 years ago
- Views:
Transcription
1 Beyond the Ordinary mail2eventdb handling for the Netways Event
2 About me Martin Fürstenau Senior System Engineer at Oce Printing Systems, Poing lecturer adult education center IT and Unix experience over 20 years. Linux from first 1.x on, Nagios experince over 5 years Administration of mainframes, Unix/Linux, Windows, databases, datacenter automation, planning datacenters, network administration,e-learning, etc. Currently monitoring around 1500 hosts with nearly services from a single CentOS cluster. 2
3 Why the heck ?? Appliances often only send s Applications often can only send s Other monitoring applications should be integrated - easy with as a first step It is easy for developers to integrate notification - from a simple script to a highly sophisticated monster (coffee) application. is the standard for kind of low level notification 3
4 And why Netways eventdb?? Pro: First - it was the idea behind it: a single interface/plugin for events. Second - it was the idea behind it. Contra: Suboptimal documentation Due to its history (syslog handling) some misinformation/ not complete information in the docs. Some strange drawbacks in the plugin (check_eventdb.pl) 4
5 Decision Implement it as agent for Netways eventdb Some improvements (patches) for the web-frontend index.php (mainly separation of styles and logo) After having mail2eventdb ready I discovered that check_eventdb.pl had only implemented a very small subset of all the functions I expected useful. Therefore: Nearly complete rewrite of check_eventdb.pl 5
6 Design goals No temporary data should be stored on disc for analysis Textmails, MIME and Multipart-MIME should be processed Nested MIMEs should be unsupported due to the fact that it is unlikely that an alarm is part of a forwarded mail. HTML should be converted to flat text. German umlauts should be translated. A general conversion (ISO or UTF8 to 7-Bit Ascii or so) should not be implemented (too much effort). base64 coded messages (for example Microsoft MOM) should be decoded. 6
7 Why so complex? Normally, system messages will be sent as plain text But sometimes for example an application running on an AS400 or so is sending s to the admin And for example the responsible admin can add an address but cannot change the format. Or for some reasons MOM is also used but cannot contact your incident management system. However Nagios can do it. Or you have an application sending able to sent s but nothing else. In any case it can happen that you can add a receiver but you can't change anything else 7
8 Features (1) Accepts Internet mail (text), MIME and Multipart MIME messages (nested MIME not supported) Extracts sender, subject and content (text) Converts HTML in message content to text Converts base64 coded message content to text Converts german umlauts to ASCII but there is no general conversion (ISO or UTF8 to 7-Bit Ascii or so) Has an API to add filter scripts written in Perl or any other language to extract and reformat host and/or application from subject and/or content data from subject and/or content reformat/filter data and deliver the data back to the program 8
9 Features (2) Writes the reformatted/filtered data (host, errorcode, content) to the eventdb It is possible (but normally it should not be done) to modify facility and type/level in your filter Includes an option to store mails in a given directory (because you need some stored mails to develop your filter) Includes a testmode for testing filters while developing them. 9
10 How the agent works The agent receives the message from the mail program (postfix) via pipe. config files are used for test mode for production mode If necessary the message will be converted to plain text The message will be split into 3 parts: Sender Subject Content The relation between the sending host and the sender has been defined in the config file. The optional relation between the sending application and the sender has also been defined in the config file. 10
11 How the mail flows Postfix mail2eventdb Call Filter Filter EventDB Mailstore 11
12 Installation & Configuration - Basics mail2eventdb comes as a zipped tar file. It includes 3 subdirectories: conf bin filter 2 configuration files (test and production) are located in the conf directory. Sample filter skeletons are located in the filter directory 12
13 Installation & Configuration - Variables How many characters from the content will be written to the logfile in case of trouble BEWARE!! If empty the whole content will be written to logfile. $content_logsize = "250"; This is the default for the logfile. Can also be changed via commandline (switch -l). my $logfile_default = "/var/log/mail2eventdb/mail2eventdb.log"; Directory where configuration and filter are stored. my $m2edb_dir= "/etc/nagios/eventdb/mail2eventdb/"; Central configuration files my $m2edb_cfg = $m2edb_dir."conf/mail2eventdb.cfg"; my $m2edb_cfg_t = $m2edb_dir."conf/mail2eventdb_t.cfg"; The name of the directory where the filters reside my $filter_dir = $m2edb_dir."filter"; 13
14 Installation & Configuration - Variables Set the default filter. If empty no default filter will be used. my $filter_default = "default.fltr"; Set your databasename for eventdb here. my $eventdb = "eventdb"; Set your databasehost for eventdb here my $eventdb_host = "localhost"; Set your databaseuser for eventdb here my $eventdb_user = "eventdb"; Same for the database password my $eventdb_pass = "is-an-event"; 14
15 Installation & Configuration - Variables Facility used for eventdb. Not necessary to follow syslog conventions because the database is addressed directly. my $eventdb_facility = "mail2eventdb"; Default type for eventdb. Can be changed to your needs. But if you changed it modify index.php. my $eventdb_type = "mail"; 15
16 The configfiles [LogMail] # 0 means mail will not be stored (normal processing) # 1 means mail will be stored store_mail = 1 # BEWARE!! The mailstore should always contain the the absolute path. # Otherwise it may be that you have to search for your mailstore (or do you # know where your program is located when it is started from Postfix?) mail_store = /tmp/testmail # Please use ALWAYS lowercase letters for mail addresses even in the case the # address used in your mail to be analyzed uses uppercase letters. Otherwise # you will received a error message [Mail2Host] duck@localhost.something.de = fileserver1 duck@ducktales.something.de = fileserver2 root@ocalhost.something.de = mailserver1 [Mail2Appl] duck@localhost.something.de = main-erp-system 16
17 What is a filter? A filter will always be called from mail2eventdb Sender, Subject and Content are handed over Filtered values for error_host, program priority and other values including originial or modified message related to eventdb will be given back. The data given back from the filter is in an appropriate format to be inserted into the eventdb Filters are basically Perl programs. For those not able to write Perl programs there is a two step filter: The Perl program is calling a shell script (or whatever you prefer) via system call. Your script gives the data back to the Perl program. The Perl program gives the data back to mail2eventdb 17
18 Filter Names Filter names are built based on host and application names determined from the config files Example: Mailaddress belongs to host harry then the name of the file is harry.fltr If belongs also to application mainerp-system the name of the filter would be: harry_main-erp-system.fltr 18
19 Testmode You need 3 things for developing new filters Messages (Stored with store_mail = 1 in the config) mail2eventdb -t for testmode a config file for test How it is done: cat File_with_mail mail2eventdb -t The output will be displayed onto your monitor, not inserted into the database 19
20 Some words about some additions/modifications The web-frontend The web-frontend of Netways EventDB was enhanced by some small patches (included in the SVN) Some modifications are currently available separately from The logo is separated from the program code The styles have moved to a separate stylesheet This makes customizing easier. 20
21 And some words about a replacement - check_eventdb2.pl As mentioned earlier the original version was very limited. The code was cleaned up and enhanced/rewritten. New functions: - -r --regexp will treat message strings as regular expressions - -s --show shows the found messages in Nagios. Length of string can be set in $message_length and multiline output can be HTML style or Nagios 3 style. See $ml_show_msg. - --acknowledged will include acknowledged entries in the select statement - --version added to print program version - Values for priority can be added as single scalar (for example emerg) or as a comma separated list (for example emerg,alert,crit) 21
22 And some words about a replacement - check_eventdb2.pl More new functions - acting as eventhandler: In case of using check_eventdb as an event handler all three variables (--servicestate, --servicestatetype and --serviceoutput) nust be used together. Records found will be acknowledged. --servicestate Contains $SERVICESTATE$ from Nagios if started as eventhandler for acknowledging or deleting records/entries --servicestatetype Contains $SERVICESTATETYPE$ from Nagios if started as eventhandler for acknowledging records/ entries --serviceoutput Contains $SERVICEOUTPUT$ from Nagios if started as eventhandler for acknowledging or deleting records/entries. $SERVICESTATE$ MUST be OK or UP, $SERVICESTATETYPE$ MUST be hard and $SERVICEOUTPUT$ should contain the output of your "submit passive check result" together with the name of the operator (for example "problem fixed - D.Duck") 22
23 And some words about a replacement - check_eventdb2.pl More new functions: - variable matches removed. It was replaced by $rowcnt because we let not count the database. We count the rows received from the database. - --maxage Maximum age for records use for alerts - --recover The messagestring following this will cause a recovery. Wildcards are allowed. If -r is set the string will be interpreted as a regular expression. -H must been set. And the message containing the recovery string must be the latest. If there are alerts newer than the recovery string only this alerts are used. --recover_regexp Interpret recoverstring as regular expression (awk/sed style). Works only with --recover set. --recover_prio The messagestring following this will contain the priority for recovery -H must been set. --recover_prog This will contain a name of a program causing the recovery in case the recovery message is not sent by the program causing the error. -H must been set. 23
24 Where to find all the stuff? Netways EventDB: mail2evendb: check_eventdb2.pl: index.php: 24
25 And now? Please stay tuned while we play a little bit with it 25
26 The End Thanks for either your attention or not snoring Any questions - or buried by information? 26
Purpose. Target Audience. Prerequisites. What Is An Event Handler? Nagios XI. Introduction to Event Handlers
Purpose This document describes how to use event handlers in to take predefined actions when the hosts or services you are monitoring change state. Event handlers are used to automate processes taken when
More informationRISKMAN QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS
Introduction This reference guide is aimed at RiskMan Administrators who will be responsible for maintaining your RiskMan system configuration and also to use some of the System Tools that are available
More informationRSA NetWitness Logs. Citrix Access Gateway Last Modified: Thursday, May 11, Event Source Log Configuration Guide
RSA NetWitness Logs Event Source Log Configuration Guide Citrix Access Gateway Last Modified: Thursday, May 11, 2017 Event Source Product Information: Vendor: Citrix Event Source: Access Gateway Versions:
More informationMonitoring a HPC Cluster with Nagios
Cluster with Scuola Internazionale Superiore di Studi Avanzati Trieste 2009-04-01 1 2009-04-03 1 Try again... Fail better. Outline 1 2 3 Installation for Monitoring @SISSA Cluster with What is? «R is a
More information5/20/2007. Touring Essential Programs
Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.
More informationLiveVault. Agent Guide
LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about
More informationPHP by Pearson Education, Inc. All Rights Reserved.
PHP 1992-2012 by Pearson Education, Inc. All Client-side Languages User-agent (web browser) requests a web page JavaScript is executed on PC http request Can affect the Browser and the page itself http
More informationVHIMS QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS
Introduction VHIMS QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS This reference guide is aimed at VHIMS Administrators who will be responsible for maintaining your VHIMS system configuration and
More information(Refer Slide Time: 01:12)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #22 PERL Part II We continue with our discussion on the Perl
More informationInstalling Design Room ONE
Installing Design Room ONE Design Room ONE consists of two components: 1. The Design Room ONE web server This is a Node JS server which uses a Mongo database. 2. The Design Room ONE Integration plugin
More informationConfiguring Your Account (40 points)
This assignment assumes you have read Chapters 2, 3, 4 and 5 of Sobell. Some specific cross-references may also be given in the questions below. Part I Configuring Your Account (40 points) For this part
More informationOverview of the UNIX File System
Overview of the UNIX File System Navigating and Viewing Directories Adapted from Practical Unix and Programming Hunter College Copyright 2006 Stewart Weiss The UNIX file system The most distinguishing
More informationBelle II - Git migration
Belle II - Git migration Why git? Stash GIT service managed by DESY Powerful branching and merging capabilities Resolution of (JIRA) issues directly be map to branches and commits Feature freeze in pre-release
More informationTeamcenter 11.1 Systems Engineering and Requirements Management
SIEMENS Teamcenter 11.1 Systems Engineering and Requirements Management Systems Architect/ Requirements Management Project Administrator's Manual REQ00002 U REQ00002 U Project Administrator's Manual 3
More informationMakefile Brief Reference
Makefile Brief Reference COMP 229, 346, 444, 5201 Revision 1.1 Date: July 31, 2003 1 Contents Intro Format Examples 2 Intro Makefiles in conjunction with the make utility (man make) provide a very convenient
More informationIcinga and Deutsche Welle
Icinga and Deutsche Welle 21-03-12 FLOSS UK Bernd Erk INTRODUCTING NETWAYS NETWAYS Expertise OPEN SOURCE SYSTEMS MANAGEMENT OPEN SOURCE DATA CENTER Monitoring & Reporting Configuration Management Service
More informationOverview of the UNIX File System. Navigating and Viewing Directories
Overview of the UNIX File System Navigating and Viewing Directories Copyright 2006 Stewart Weiss The UNIX file system The most distinguishing characteristic of the UNIX file system is the nature of its
More informationLinux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1
Linux Essentials Smith, Roderick W. ISBN-13: 9781118106792 Table of Contents Introduction xvii Chapter 1 Selecting an Operating System 1 What Is an OS? 1 What Is a Kernel? 1 What Else Identifies an OS?
More informationNagios Snmp External Command Error With No Output (return Code 3)
Nagios Snmp External Command Error With No Output (return Code 3) Added value of custom variables to Object JSON output for hosts, services Fixed bug #583: Status Check Output of (No output on stdout)
More informationRead the relevant material in Sobell! If you want to follow along with the examples that follow, and you do, open a Linux terminal.
Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If
More informationMaster Syndication Gateway V2. User's Manual. Copyright Bontrager Connection LLC
Master Syndication Gateway V2 User's Manual Copyright 2005-2006 Bontrager Connection LLC 1 Introduction This document is formatted for A4 printer paper. A version formatted for letter size printer paper
More informationAdobe Marketing Cloud Dataset Configuration
Adobe Marketing Cloud Dataset Configuration Contents Dataset Configuration...6 Understanding Dataset Construction...6 Log Processing...6 Transformation...7 Understanding Dataset Configuration...8 Required
More informationExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition
ExpressCluster X SingleServerSafe 3.2 for Windows Configuration Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description First 2/19/2014 New manual Copyright NEC Corporation 2014.
More informationSLI Learning Search Connect For Magento 2
SLI Learning Search Connect For Magento 2 User Guide v1.2.2 The Learning Search Connect module integrates with SLI Systems Search and provides an outstanding level of search customizability. Contents 1.
More informationConfiguring Web Server Devices
CHAPTER 13 To use web logging with MARS, you need to configure the host, the webserver, and MARS. MARS can process up to 100 MB of web log data per receive from your host. Web logging is only supported
More information2016 OPSWAT, Inc. All rights reserved. OPSWAT, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc.All other trademarks, trade names,
2016 OPSWAT, Inc. All rights reserved. OPSWAT, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc.All other trademarks, trade names, service marks, service names, and images mentioned and/or
More informationSome Linux (Unix) Commands that might help you in ENSC351
Some Linux (Unix) Commands that might help you in ENSC351 First, like Windows, Linux and Unix (for our purposes, they are the basically the same) use a hierarchical directory structure. What would be called
More informationCST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB
Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs
More informationCasabac Unicode Support
Unicode Support Unicode Support Full Unicode support was added into the GUI Server with build 25_20040105. Before ISO 8859-1 was used for encoding and decoding HTML pages and your system's default encoding
More informationVesta Control Panel is a stack of software components which is roughly divided into two main layers as shown below in the architecture diagram.
VESTA CONTROL PANEL While Vesta is arguably one of the most popular open source control panel, its history is actually quite short considering the timeline of control panels. It all started back in 2010
More informationCS 307: UNIX PROGRAMMING ENVIRONMENT FIND COMMAND
CS 307: UNIX PROGRAMMING ENVIRONMENT FIND COMMAND Prof. Michael J. Reale Fall 2014 Finding Files in a Directory Tree Suppose you want to find a file with a certain filename (or with a filename matching
More informationIntroduction to Administration
Oracle Enterprise Manager Ops Center Administer Your Environment Using Oracle Enterprise Manager Ops Center 12c Release 3 (12.3.0.0.0) E59991-01 June 2015 This guide provides an end-to-end example for
More informationEVENT-DRIVEN PROGRAMMING
LESSON 13 EVENT-DRIVEN PROGRAMMING This lesson shows how to package JavaScript code into self-defined functions. The code in a function is not executed until the function is called upon by name. This is
More informationFirst of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.
Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If
More informationPalisades School District PowerSchool Parent Portal Guide
Palisades School District PowerSchool Parent Portal Guide Get Started To get started, you must create a parent account in the PowerSchool Parent Portal. Create a Parent Account Use this procedure to create
More informationRSA NetWitness Logs. Juniper Networks NetScreen-Security Manager Last Modified: Thursday, May 25, Event Source Log Configuration Guide
RSA NetWitness Logs Event Source Log Configuration Guide Juniper Networks NetScreen-Security Manager Last Modified: Thursday, May 25, 2017 Event Source Product Information: Vendor: Juniper Networks Event
More informationMigrating to WebGUI on VMWare
Migrating to WebGUI on VMWare Presented by Jarrod Igou WebGUI User Conference September 2, 2010 1 What we ll talk about WebGUI and me. (Well, OK. Us.) Why did we migrate? Our solution a plan is formed
More informationPreprocessor Directives
C++ By 6 EXAMPLE Preprocessor Directives As you might recall from Chapter 2, What Is a Program?, the C++ compiler routes your programs through a preprocessor before it compiles them. The preprocessor can
More informationXBMC. Ultimate Guide. HenryFord 3/31/2011. Feel free to share this document with everybody!
XBMC Ultimate Guide HenryFord 3/31/2011 Feel free to share this document with everybody! Contents Introduction... 2 XBMC... 3 Download and Install XBMC... 3 Setup the Sources... 3 Additional Settings...
More informationLaboratory Assignment #3. Extending scull, a char pseudo-device
Laboratory Assignment #3 Extending scull, a char pseudo-device Value: (See the Grading section of the Syllabus.) Due Date and Time: (See the Course Calendar.) Summary: This is your first exercise that
More informationLinux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016
Linux Systems Security Logging and Network Monitoring NETS1028 Fall 2016 Monitoring Monitoring can take many forms, from passive periodic inspection to realtime intrusion detection For this unit, we will
More informationIntrusion Detection and Prevention Release Notes
Intrusion Detection and Prevention Release Notes Release 4.1r3 December 2008 Contents 1. Version Summary on page 2 2. New Features and Enhancements on page 2 3. Changes to Default Behavior on page 2 4.
More informationDynamic Documents. Kent State University Dept. of Math & Computer Science. CS 4/55231 Internet Engineering. What is a Script?
CS 4/55231 Internet Engineering Kent State University Dept. of Math & Computer Science LECT-12 Dynamic Documents 1 2 Why Dynamic Documents are needed? There are many situations when customization of the
More informationRSA NetWitness Platform
RSA NetWitness Platform Event Source Log Configuration Guide Check Point Security Suite, IPS-1 Last Modified: Wednesday, May 9, 2018 Event Source Product Information: Vendor: Check Point Event Source:
More information3. When you process a largest recent earthquake query, you should print out:
CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #1 Due Wednesday, September 18 @ 11:00 PM for 100 points Due Tuesday, September 17 @ 11:00 PM for 10 point bonus Updated: 9/11/2013 Assignment: This is the first
More information(Refer Slide Time: 01:40)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #25 Javascript Part I Today will be talking about a language
More informationCS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #2 Due Tuesday, October 11:00 PM for 100 points Due Monday, October 11:00 PM for 10 point bonus
CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #2 Due Tuesday, October 15 @ 11:00 PM for 100 points Due Monday, October 14 @ 11:00 PM for 10 point bonus Updated: 10/10/2013 Assignment: This project continues
More informationAbout the Tutorial. Audience. Prerequisites. Copyright & Disclaimer. WordPress
About the Tutorial WordPress is an open source Content Management System (CMS), which allows the users to build dynamic websites and blog. WordPress is the most popular blogging system on the web and allows
More informationFile Systems. File Systems. G53OPS: Operating Systems. File Systems. File Systems 11/27/2008. Why Use Files? Graham Kendall. Two Views of File System
Why Use s? Introduction Graham Kendall It allows data to be stored between processes It allows us to store large volumes of data Allows more than one process to access the data at the same time 27 Nov
More informationChapter 1 - Introduction. September 8, 2016
Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help
More informationRSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Trend Micro InterScan Messaging Security Suite Last Modified: Tuesday, April 25, 2017 Event Source Product Information: Vendor: Trend Micro Event
More informationCLIENT SERVER ARCHITECTURE:
CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located
More informationInterActive SyslogViewer Adiscon GmbH
InterActive SyslogViewer I InterActive SyslogViewer Table of Contents Part I About InterActive SyslogViewer 1 1 Features... 1 2 Requirements... 1 Part II Options & Configuration 1 1 Launching... InterActive
More informationLesson 5C MyClass Methods. By John B. Owen All rights reserved 2011, revised 2014
Lesson 5C MyClass Methods By John B. Owen All rights reserved 2011, revised 2014 Table of Contents Objectives Defining your own class Defining and calling a static method Method structure String return
More informationInsightConnector Version 1.0
InsightConnector Version 1.0 2002 Bynari Inc. All Rights Reserved Table of Contents Table of Contents... 2 Executive Summary... 3 Examination of the Insight Messaging Solution... 3 Exchange or Outlook?...
More informationCURRENT STATE OF ICINGA
FlossUK 2014 Brighton 20th March - TEAM ICINGA CURRENT STATE OF ICINGA WWW.ICINGA.ORG Agenda Introduction Tools & Platform Icinga project update New in Icinga 1.x Icinga 2 Icinga Web 2 What s next Questions
More informationBEIMSWeb Administrator Training Manual
Administrator Training Manual Mercury Computer Systems (Aust) Pty Ltd Level 3, 271 William Street, Melbourne VIC 3000 ABN: 75 632 408 132 Tel: +61 3 9602 2255 Fax: +61 3 9602 2595 support@beims.com www.beims.com
More informationWrite for your audience
Comments Write for your audience Program documentation is for programmers, not end users There are two groups of programmers, and they need different kinds of documentation Some programmers need to use
More informationA manual for understanding and using the Impex Control Center. SYSCTL AB - version 1.5
A manual for understanding and using the Impex Control Center SYSCTL AB - version 1.5 CONTENTS Contents Introduction 4 History....................................................... 4 Components.....................................................
More informationLinux desktop app guide Documentation. Thomas Kluyver & contributors
Linux desktop app guide Documentation Thomas Kluyver & contributors Dec 13, 2018 Contents: 1 User Interface options 3 1.1 Desktop style: GTK or Qt........................................ 3 1.2 Web tech:
More informationMessage Triage with Perl
Message Triage with Perl by JP Vossen In the course of administering and monitoring any computing environment, you will receive many system-generated messages about many events. How do you determine which
More informationInstalling Design Room ONE
Installing Design Room ONE Design Room ONE consists of two components: 1. The Design Room ONE web server This is a Node JS server which uses a Mongo database. 2. The Design Room ONE Integration plugin
More informationRSA NetWitness Logs. EMC Isilon. Event Source Log Configuration Guide. Last Modified: Tuesday, October 31, 2017
RSA NetWitness Logs Event Source Log Configuration Guide EMC Isilon Last Modified: Tuesday, October 31, 2017 Event Source Product Information: Vendor: EMC Event Source: Isilon Versions: 6.5.3.32, 6.5.5.7,
More informationHelpdesk. Features. Module Configuration 1/49. On - October 14, 2015
Helpdesk webkul.com/blog/magento-helpdesk/ On - October 14, 2015 Helpdesk module provides the support to their customers. It is a software suite that enables customer support to receive, process, and respond
More informationUsing vrealize Log Insight. 08-SEP-2017 vrealize Log Insight 4.5
08-SEP-2017 vrealize Log Insight 4.5 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates.
More informationNTP Software VFM Administration Web Site
NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of
More informationUsing an SMS Server to Provide a Robust Alerting Service for Nagios. How to implement a Nagios-to-SMS service.
Using an SMS Server to Provide a Robust Alerting Service for Nagios How to implement a Nagios-to-SMS service. ERIC PEARCE I m a big fan of the Nagios network monitoring system and rely on it to tell me
More informationNetApp Element Plug-in for vcenter Server User Guide
NetApp Element Plug-in for vcenter Server User Guide Version 4.2 November 2018 215-13259_A0 doccomments@netapp.com Table of Contents 3 Contents About this guide... 8 vcenter Plug-in overview... 9 Network
More informationHow To Use The Actions Component
Purpose This document describes how to configure the Actions Component within. This includes the custom URLs, linux shell/script, macro, and PHP code evaluation portions of the component. The Actions Component
More informationConfiguring Antivirus Devices
CHAPTER 9 Revised: November 11, 2007 Antivirus (AV) devices provide detection and prevention against known viruses and anomalies. This chapter describes how to configure and add the following devices and
More informationCPS221 Lecture: Operating System Protection
Objectives CPS221 Lecture: Operating System Protection last revised 9/5/12 1. To explain the use of two CPU modes as the basis for protecting privileged instructions and memory 2. To introduce basic protection
More informationDeploying Cisco Nexus Data Broker
This chapter contains the following sections: Installing Cisco Nexus Data Broker, page 1 Installing Cisco Nexus Data Broker Installing or Upgrading the Cisco Nexus Data Broker Software Important There
More informationUsing the Offline Diagnostic Monitor Menu
APPENDIX B Using the Offline Diagnostic Monitor Menu During the boot process, you can access the Offline Diagnostic Monitor (Offline DM) Main menu. The Offline DM Main menu allows you to perform the following
More informationIntrusion Detection and Prevention IDP 4.1r4 Release Notes
Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2
More information5/10/2009. Introduction. The light-saber is a Jedi s weapon not as clumsy or random as a blaster.
The Hacking Protocols and The Hackers Sword The light-saber is a Jedi s weapon not as clumsy or random as a blaster. Obi-Wan Kenobi, Star Wars: Episode IV Slide 2 Introduction Why are firewalls basically
More informationLecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing
Lecture Overview IN5290 Ethical Hacking Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing Summary - how web sites work HTTP protocol Client side server side actions Accessing
More informationIntroduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines
Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical
More informationGetting Started Guide
IBM Support Assistant Data Collector Tool for IBM Case Manager Version 5.2.0.x Getting Started Guide Version 1 Release 1.0 September 2013 Table of Contents Introduction 3 Overview 3 Tool Installation3
More informationA control expression must evaluate to a value that can be interpreted as true or false.
Control Statements Control Expressions A control expression must evaluate to a value that can be interpreted as true or false. How a control statement behaves depends on the value of its control expression.
More informationPart III. Shell Config. Tobias Neckel: Scripting with Bash and Python Compact Max-Planck, February 16-26,
Part III Shell Config Compact Course @ Max-Planck, February 16-26, 2015 33 Special Directories. current directory.. parent directory ~ own home directory ~user home directory of user ~- previous directory
More informationEDGE Tutorial and Sample Project Overview
EDGE Tutorial and Sample Project Overview RIT-KGCOE Multidisciplinary Senior Design Outline: In this session, you will See a brief EDGE overview See some sample projects, good and bad Visit your team s
More informationDo not start the test until instructed to do so!
Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices
More informationRSA NetWitness Logs. Airtight Management Console. Event Source Log Configuration Guide. Last Modified: Thursday, May 04, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Airtight Management Console Last Modified: Thursday, May 04, 2017 Event Source Product Information: Vendor: AirTight Event Source: Airtight Management
More informationIntroduction. Installation. Version 2 Installation & User Guide. In the following steps you will:
Introduction Hello and welcome to RedCart TM online proofing and order management! We appreciate your decision to implement RedCart for your online proofing and order management business needs. This guide
More informationPhysics REU Unix Tutorial
Physics REU Unix Tutorial What is unix? Unix is an operating system. In simple terms, its the set of programs that makes a computer work. It can be broken down into three parts. (1) kernel: The component
More informationRecipe #4: Getting Entries
Recipe 4: Getting Entries The Problem You re relatively new to Perl and completely new to ARSperl and you want to know how to create scripts that retrieve request data from a Remedy form. You've read the
More informationCIM_HT021 Alarm Cast Configuration using SMTP ( ) Proficy CIMPLICITY HMI/SCADA
CIM_HT021 Alarm Cast Configuration using SMTP (E-Mail) Proficy CIMPLICITY HMI/SCADA Overview The purpose of this document is to explain the proper configuration of CIMPLICITY when using Alarm Cast to send
More informationUSQ/CSC2406 Web Publishing
USQ/CSC2406 Web Publishing Lecture 4: HTML Forms, Server & CGI Scripts Tralvex (Rex) Yeap 19 December 2002 Outline Quick Review on Lecture 3 Topic 7: HTML Forms Topic 8: Server & CGI Scripts Class Activity
More informationDAB/MOT Data Carousel Support Library Linux Server Implementation
DAB/MOT Data Carousel Support Library Linux Server Implementation D. Knox 98-0003-003/1.0 28th Apr 1990 ENSIGMA Ltd Turing House Station Road Chepstow GWENT NP6 5PB Ensigma Ltd. Page 2 of 31 Distribution
More informationWeb Mail Check v 1.0
Web Mail Check v 1.0 TABLE OF CONTENTS LAUNCHING WEB MAIL CHECK... 3 HOME PAGE... 4 LOG IN... 4 LANGUAGE... 5 DIRECTIONS... 5 READING MESSAGES... 8 HEADERS... 10 PRINTER FRIENDLY VERSION... 11 REPLYING
More informationConnecting TM1 to Various Third- Party Data Sources
Tip or Technique Connecting TM1 to Various Third- Party Data Sources Product(s): TM1 Area of Interest: Development Connecting TM1 to Various Third-Party Data Sources 2 Copyright Copyright 2008 Cognos ULC
More informationSiteScope Adapter for HP OpenView Operations
SiteScope Adapter for HP OpenView Operations for the UNIX and Windows Operating System Software Version: 1.00, 1.01 User s Guide Document Release Date: 24 November 2009 Software Release Date: December
More informationFCS Documentation. Release 1.0 AGH-GLK
FCS Documentation Release 1.0 AGH-GLK November 06, 2014 Contents 1 Quickstart 3 2 FCS basics 5 2.1 Registration................................................ 5 2.2 Main page................................................
More informationTectia Client/Server 6.3 (Windows) Quick Start Guide
Tectia Client/Server 6.3 (Windows) Quick Start Guide 30 March 2016 Tectia Client/Server 6.3 (Windows): Quick Start Guide 30 March 2016 Copyright This software and documentation are protected by international
More information${Unix_Tools} exercises and solution notes
${Unix_Tools exercises and solution notes Markus Kuhn Computer Science Tripos Part IB The shell Exercise : Write a shell command line that appends :/usr/xr6/man to the end of the environment variable $MANPATH.
More informationProgramming Standards: You must conform to good programming/documentation standards. Some specifics:
CS3114 (Spring 2011) PROGRAMMING ASSIGNMENT #3 Due Thursday, April 7 @ 11:00 PM for 100 points Early bonus date: Wednesday, April 6 @ 11:00 PM for a 10 point bonus Initial Schedule due Thursday, March
More informationUsing vrealize Log Insight. Update 1 Modified on 03 SEP 2017 vrealize Log Insight 4.0
Using vrealize Log Insight Update 1 Modified on 03 SEP 2017 vrealize Log Insight 4.0 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationPowerSchool 7.x Student Information System
PowerSchool 7.x Student Information System Released May 2012 Document Owner: Documentation Services This edition applies to Release 7.2 of the PowerSchool software and to all subsequent releases and modifications
More informationManual Script Windows Batch For Loop Files In A Directory
Manual Script Windows Batch For Loop Files In A Directory If I run the batch file manually from the command prompt, it works fine. think it is (it refers to the current directory, which is not necessarily
More informationBMC FootPrints 12 Integration with Remote Support
BMC FootPrints 12 Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are
More information