Beyond the Ordinary. mail2eventdb. handling for the Netways Event

Size: px
Start display at page:

Download "Beyond the Ordinary. mail2eventdb. handling for the Netways Event"

Transcription

1 Beyond the Ordinary mail2eventdb handling for the Netways Event

2 About me Martin Fürstenau Senior System Engineer at Oce Printing Systems, Poing lecturer adult education center IT and Unix experience over 20 years. Linux from first 1.x on, Nagios experince over 5 years Administration of mainframes, Unix/Linux, Windows, databases, datacenter automation, planning datacenters, network administration,e-learning, etc. Currently monitoring around 1500 hosts with nearly services from a single CentOS cluster. 2

3 Why the heck ?? Appliances often only send s Applications often can only send s Other monitoring applications should be integrated - easy with as a first step It is easy for developers to integrate notification - from a simple script to a highly sophisticated monster (coffee) application. is the standard for kind of low level notification 3

4 And why Netways eventdb?? Pro: First - it was the idea behind it: a single interface/plugin for events. Second - it was the idea behind it. Contra: Suboptimal documentation Due to its history (syslog handling) some misinformation/ not complete information in the docs. Some strange drawbacks in the plugin (check_eventdb.pl) 4

5 Decision Implement it as agent for Netways eventdb Some improvements (patches) for the web-frontend index.php (mainly separation of styles and logo) After having mail2eventdb ready I discovered that check_eventdb.pl had only implemented a very small subset of all the functions I expected useful. Therefore: Nearly complete rewrite of check_eventdb.pl 5

6 Design goals No temporary data should be stored on disc for analysis Textmails, MIME and Multipart-MIME should be processed Nested MIMEs should be unsupported due to the fact that it is unlikely that an alarm is part of a forwarded mail. HTML should be converted to flat text. German umlauts should be translated. A general conversion (ISO or UTF8 to 7-Bit Ascii or so) should not be implemented (too much effort). base64 coded messages (for example Microsoft MOM) should be decoded. 6

7 Why so complex? Normally, system messages will be sent as plain text But sometimes for example an application running on an AS400 or so is sending s to the admin And for example the responsible admin can add an address but cannot change the format. Or for some reasons MOM is also used but cannot contact your incident management system. However Nagios can do it. Or you have an application sending able to sent s but nothing else. In any case it can happen that you can add a receiver but you can't change anything else 7

8 Features (1) Accepts Internet mail (text), MIME and Multipart MIME messages (nested MIME not supported) Extracts sender, subject and content (text) Converts HTML in message content to text Converts base64 coded message content to text Converts german umlauts to ASCII but there is no general conversion (ISO or UTF8 to 7-Bit Ascii or so) Has an API to add filter scripts written in Perl or any other language to extract and reformat host and/or application from subject and/or content data from subject and/or content reformat/filter data and deliver the data back to the program 8

9 Features (2) Writes the reformatted/filtered data (host, errorcode, content) to the eventdb It is possible (but normally it should not be done) to modify facility and type/level in your filter Includes an option to store mails in a given directory (because you need some stored mails to develop your filter) Includes a testmode for testing filters while developing them. 9

10 How the agent works The agent receives the message from the mail program (postfix) via pipe. config files are used for test mode for production mode If necessary the message will be converted to plain text The message will be split into 3 parts: Sender Subject Content The relation between the sending host and the sender has been defined in the config file. The optional relation between the sending application and the sender has also been defined in the config file. 10

11 How the mail flows Postfix mail2eventdb Call Filter Filter EventDB Mailstore 11

12 Installation & Configuration - Basics mail2eventdb comes as a zipped tar file. It includes 3 subdirectories: conf bin filter 2 configuration files (test and production) are located in the conf directory. Sample filter skeletons are located in the filter directory 12

13 Installation & Configuration - Variables How many characters from the content will be written to the logfile in case of trouble BEWARE!! If empty the whole content will be written to logfile. $content_logsize = "250"; This is the default for the logfile. Can also be changed via commandline (switch -l). my $logfile_default = "/var/log/mail2eventdb/mail2eventdb.log"; Directory where configuration and filter are stored. my $m2edb_dir= "/etc/nagios/eventdb/mail2eventdb/"; Central configuration files my $m2edb_cfg = $m2edb_dir."conf/mail2eventdb.cfg"; my $m2edb_cfg_t = $m2edb_dir."conf/mail2eventdb_t.cfg"; The name of the directory where the filters reside my $filter_dir = $m2edb_dir."filter"; 13

14 Installation & Configuration - Variables Set the default filter. If empty no default filter will be used. my $filter_default = "default.fltr"; Set your databasename for eventdb here. my $eventdb = "eventdb"; Set your databasehost for eventdb here my $eventdb_host = "localhost"; Set your databaseuser for eventdb here my $eventdb_user = "eventdb"; Same for the database password my $eventdb_pass = "is-an-event"; 14

15 Installation & Configuration - Variables Facility used for eventdb. Not necessary to follow syslog conventions because the database is addressed directly. my $eventdb_facility = "mail2eventdb"; Default type for eventdb. Can be changed to your needs. But if you changed it modify index.php. my $eventdb_type = "mail"; 15

16 The configfiles [LogMail] # 0 means mail will not be stored (normal processing) # 1 means mail will be stored store_mail = 1 # BEWARE!! The mailstore should always contain the the absolute path. # Otherwise it may be that you have to search for your mailstore (or do you # know where your program is located when it is started from Postfix?) mail_store = /tmp/testmail # Please use ALWAYS lowercase letters for mail addresses even in the case the # address used in your mail to be analyzed uses uppercase letters. Otherwise # you will received a error message [Mail2Host] duck@localhost.something.de = fileserver1 duck@ducktales.something.de = fileserver2 root@ocalhost.something.de = mailserver1 [Mail2Appl] duck@localhost.something.de = main-erp-system 16

17 What is a filter? A filter will always be called from mail2eventdb Sender, Subject and Content are handed over Filtered values for error_host, program priority and other values including originial or modified message related to eventdb will be given back. The data given back from the filter is in an appropriate format to be inserted into the eventdb Filters are basically Perl programs. For those not able to write Perl programs there is a two step filter: The Perl program is calling a shell script (or whatever you prefer) via system call. Your script gives the data back to the Perl program. The Perl program gives the data back to mail2eventdb 17

18 Filter Names Filter names are built based on host and application names determined from the config files Example: Mailaddress belongs to host harry then the name of the file is harry.fltr If belongs also to application mainerp-system the name of the filter would be: harry_main-erp-system.fltr 18

19 Testmode You need 3 things for developing new filters Messages (Stored with store_mail = 1 in the config) mail2eventdb -t for testmode a config file for test How it is done: cat File_with_mail mail2eventdb -t The output will be displayed onto your monitor, not inserted into the database 19

20 Some words about some additions/modifications The web-frontend The web-frontend of Netways EventDB was enhanced by some small patches (included in the SVN) Some modifications are currently available separately from The logo is separated from the program code The styles have moved to a separate stylesheet This makes customizing easier. 20

21 And some words about a replacement - check_eventdb2.pl As mentioned earlier the original version was very limited. The code was cleaned up and enhanced/rewritten. New functions: - -r --regexp will treat message strings as regular expressions - -s --show shows the found messages in Nagios. Length of string can be set in $message_length and multiline output can be HTML style or Nagios 3 style. See $ml_show_msg. - --acknowledged will include acknowledged entries in the select statement - --version added to print program version - Values for priority can be added as single scalar (for example emerg) or as a comma separated list (for example emerg,alert,crit) 21

22 And some words about a replacement - check_eventdb2.pl More new functions - acting as eventhandler: In case of using check_eventdb as an event handler all three variables (--servicestate, --servicestatetype and --serviceoutput) nust be used together. Records found will be acknowledged. --servicestate Contains $SERVICESTATE$ from Nagios if started as eventhandler for acknowledging or deleting records/entries --servicestatetype Contains $SERVICESTATETYPE$ from Nagios if started as eventhandler for acknowledging records/ entries --serviceoutput Contains $SERVICEOUTPUT$ from Nagios if started as eventhandler for acknowledging or deleting records/entries. $SERVICESTATE$ MUST be OK or UP, $SERVICESTATETYPE$ MUST be hard and $SERVICEOUTPUT$ should contain the output of your "submit passive check result" together with the name of the operator (for example "problem fixed - D.Duck") 22

23 And some words about a replacement - check_eventdb2.pl More new functions: - variable matches removed. It was replaced by $rowcnt because we let not count the database. We count the rows received from the database. - --maxage Maximum age for records use for alerts - --recover The messagestring following this will cause a recovery. Wildcards are allowed. If -r is set the string will be interpreted as a regular expression. -H must been set. And the message containing the recovery string must be the latest. If there are alerts newer than the recovery string only this alerts are used. --recover_regexp Interpret recoverstring as regular expression (awk/sed style). Works only with --recover set. --recover_prio The messagestring following this will contain the priority for recovery -H must been set. --recover_prog This will contain a name of a program causing the recovery in case the recovery message is not sent by the program causing the error. -H must been set. 23

24 Where to find all the stuff? Netways EventDB: mail2evendb: check_eventdb2.pl: index.php: 24

25 And now? Please stay tuned while we play a little bit with it 25

26 The End Thanks for either your attention or not snoring Any questions - or buried by information? 26

Purpose. Target Audience. Prerequisites. What Is An Event Handler? Nagios XI. Introduction to Event Handlers

Purpose. Target Audience. Prerequisites. What Is An Event Handler? Nagios XI. Introduction to Event Handlers Purpose This document describes how to use event handlers in to take predefined actions when the hosts or services you are monitoring change state. Event handlers are used to automate processes taken when

More information

RISKMAN QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS

RISKMAN QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS Introduction This reference guide is aimed at RiskMan Administrators who will be responsible for maintaining your RiskMan system configuration and also to use some of the System Tools that are available

More information

RSA NetWitness Logs. Citrix Access Gateway Last Modified: Thursday, May 11, Event Source Log Configuration Guide

RSA NetWitness Logs. Citrix Access Gateway Last Modified: Thursday, May 11, Event Source Log Configuration Guide RSA NetWitness Logs Event Source Log Configuration Guide Citrix Access Gateway Last Modified: Thursday, May 11, 2017 Event Source Product Information: Vendor: Citrix Event Source: Access Gateway Versions:

More information

Monitoring a HPC Cluster with Nagios

Monitoring a HPC Cluster with Nagios Cluster with Scuola Internazionale Superiore di Studi Avanzati Trieste 2009-04-01 1 2009-04-03 1 Try again... Fail better. Outline 1 2 3 Installation for Monitoring @SISSA Cluster with What is? «R is a

More information

5/20/2007. Touring Essential Programs

5/20/2007. Touring Essential Programs Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.

More information

LiveVault. Agent Guide

LiveVault. Agent Guide LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about

More information

PHP by Pearson Education, Inc. All Rights Reserved.

PHP by Pearson Education, Inc. All Rights Reserved. PHP 1992-2012 by Pearson Education, Inc. All Client-side Languages User-agent (web browser) requests a web page JavaScript is executed on PC http request Can affect the Browser and the page itself http

More information

VHIMS QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS

VHIMS QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS Introduction VHIMS QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS This reference guide is aimed at VHIMS Administrators who will be responsible for maintaining your VHIMS system configuration and

More information

(Refer Slide Time: 01:12)

(Refer Slide Time: 01:12) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #22 PERL Part II We continue with our discussion on the Perl

More information

Installing Design Room ONE

Installing Design Room ONE Installing Design Room ONE Design Room ONE consists of two components: 1. The Design Room ONE web server This is a Node JS server which uses a Mongo database. 2. The Design Room ONE Integration plugin

More information

Configuring Your Account (40 points)

Configuring Your Account (40 points) This assignment assumes you have read Chapters 2, 3, 4 and 5 of Sobell. Some specific cross-references may also be given in the questions below. Part I Configuring Your Account (40 points) For this part

More information

Overview of the UNIX File System

Overview of the UNIX File System Overview of the UNIX File System Navigating and Viewing Directories Adapted from Practical Unix and Programming Hunter College Copyright 2006 Stewart Weiss The UNIX file system The most distinguishing

More information

Belle II - Git migration

Belle II - Git migration Belle II - Git migration Why git? Stash GIT service managed by DESY Powerful branching and merging capabilities Resolution of (JIRA) issues directly be map to branches and commits Feature freeze in pre-release

More information

Teamcenter 11.1 Systems Engineering and Requirements Management

Teamcenter 11.1 Systems Engineering and Requirements Management SIEMENS Teamcenter 11.1 Systems Engineering and Requirements Management Systems Architect/ Requirements Management Project Administrator's Manual REQ00002 U REQ00002 U Project Administrator's Manual 3

More information

Makefile Brief Reference

Makefile Brief Reference Makefile Brief Reference COMP 229, 346, 444, 5201 Revision 1.1 Date: July 31, 2003 1 Contents Intro Format Examples 2 Intro Makefiles in conjunction with the make utility (man make) provide a very convenient

More information

Icinga and Deutsche Welle

Icinga and Deutsche Welle Icinga and Deutsche Welle 21-03-12 FLOSS UK Bernd Erk INTRODUCTING NETWAYS NETWAYS Expertise OPEN SOURCE SYSTEMS MANAGEMENT OPEN SOURCE DATA CENTER Monitoring & Reporting Configuration Management Service

More information

Overview of the UNIX File System. Navigating and Viewing Directories

Overview of the UNIX File System. Navigating and Viewing Directories Overview of the UNIX File System Navigating and Viewing Directories Copyright 2006 Stewart Weiss The UNIX file system The most distinguishing characteristic of the UNIX file system is the nature of its

More information

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1 Linux Essentials Smith, Roderick W. ISBN-13: 9781118106792 Table of Contents Introduction xvii Chapter 1 Selecting an Operating System 1 What Is an OS? 1 What Is a Kernel? 1 What Else Identifies an OS?

More information

Nagios Snmp External Command Error With No Output (return Code 3)

Nagios Snmp External Command Error With No Output (return Code 3) Nagios Snmp External Command Error With No Output (return Code 3) Added value of custom variables to Object JSON output for hosts, services Fixed bug #583: Status Check Output of (No output on stdout)

More information

Read the relevant material in Sobell! If you want to follow along with the examples that follow, and you do, open a Linux terminal.

Read the relevant material in Sobell! If you want to follow along with the examples that follow, and you do, open a Linux terminal. Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If

More information

Master Syndication Gateway V2. User's Manual. Copyright Bontrager Connection LLC

Master Syndication Gateway V2. User's Manual. Copyright Bontrager Connection LLC Master Syndication Gateway V2 User's Manual Copyright 2005-2006 Bontrager Connection LLC 1 Introduction This document is formatted for A4 printer paper. A version formatted for letter size printer paper

More information

Adobe Marketing Cloud Dataset Configuration

Adobe Marketing Cloud Dataset Configuration Adobe Marketing Cloud Dataset Configuration Contents Dataset Configuration...6 Understanding Dataset Construction...6 Log Processing...6 Transformation...7 Understanding Dataset Configuration...8 Required

More information

ExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition

ExpressCluster X SingleServerSafe 3.2 for Windows. Configuration Guide. 2/19/2014 1st Edition ExpressCluster X SingleServerSafe 3.2 for Windows Configuration Guide 2/19/2014 1st Edition Revision History Edition Revised Date Description First 2/19/2014 New manual Copyright NEC Corporation 2014.

More information

SLI Learning Search Connect For Magento 2

SLI Learning Search Connect For Magento 2 SLI Learning Search Connect For Magento 2 User Guide v1.2.2 The Learning Search Connect module integrates with SLI Systems Search and provides an outstanding level of search customizability. Contents 1.

More information

Configuring Web Server Devices

Configuring Web Server Devices CHAPTER 13 To use web logging with MARS, you need to configure the host, the webserver, and MARS. MARS can process up to 100 MB of web log data per receive from your host. Web logging is only supported

More information

2016 OPSWAT, Inc. All rights reserved. OPSWAT, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc.All other trademarks, trade names,

2016 OPSWAT, Inc. All rights reserved. OPSWAT, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc.All other trademarks, trade names, 2016 OPSWAT, Inc. All rights reserved. OPSWAT, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc.All other trademarks, trade names, service marks, service names, and images mentioned and/or

More information

Some Linux (Unix) Commands that might help you in ENSC351

Some Linux (Unix) Commands that might help you in ENSC351 Some Linux (Unix) Commands that might help you in ENSC351 First, like Windows, Linux and Unix (for our purposes, they are the basically the same) use a hierarchical directory structure. What would be called

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

Casabac Unicode Support

Casabac Unicode Support Unicode Support Unicode Support Full Unicode support was added into the GUI Server with build 25_20040105. Before ISO 8859-1 was used for encoding and decoding HTML pages and your system's default encoding

More information

Vesta Control Panel is a stack of software components which is roughly divided into two main layers as shown below in the architecture diagram.

Vesta Control Panel is a stack of software components which is roughly divided into two main layers as shown below in the architecture diagram. VESTA CONTROL PANEL While Vesta is arguably one of the most popular open source control panel, its history is actually quite short considering the timeline of control panels. It all started back in 2010

More information

CS 307: UNIX PROGRAMMING ENVIRONMENT FIND COMMAND

CS 307: UNIX PROGRAMMING ENVIRONMENT FIND COMMAND CS 307: UNIX PROGRAMMING ENVIRONMENT FIND COMMAND Prof. Michael J. Reale Fall 2014 Finding Files in a Directory Tree Suppose you want to find a file with a certain filename (or with a filename matching

More information

Introduction to Administration

Introduction to Administration Oracle Enterprise Manager Ops Center Administer Your Environment Using Oracle Enterprise Manager Ops Center 12c Release 3 (12.3.0.0.0) E59991-01 June 2015 This guide provides an end-to-end example for

More information

EVENT-DRIVEN PROGRAMMING

EVENT-DRIVEN PROGRAMMING LESSON 13 EVENT-DRIVEN PROGRAMMING This lesson shows how to package JavaScript code into self-defined functions. The code in a function is not executed until the function is called upon by name. This is

More information

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If

More information

Palisades School District PowerSchool Parent Portal Guide

Palisades School District PowerSchool Parent Portal Guide Palisades School District PowerSchool Parent Portal Guide Get Started To get started, you must create a parent account in the PowerSchool Parent Portal. Create a Parent Account Use this procedure to create

More information

RSA NetWitness Logs. Juniper Networks NetScreen-Security Manager Last Modified: Thursday, May 25, Event Source Log Configuration Guide

RSA NetWitness Logs. Juniper Networks NetScreen-Security Manager Last Modified: Thursday, May 25, Event Source Log Configuration Guide RSA NetWitness Logs Event Source Log Configuration Guide Juniper Networks NetScreen-Security Manager Last Modified: Thursday, May 25, 2017 Event Source Product Information: Vendor: Juniper Networks Event

More information

Migrating to WebGUI on VMWare

Migrating to WebGUI on VMWare Migrating to WebGUI on VMWare Presented by Jarrod Igou WebGUI User Conference September 2, 2010 1 What we ll talk about WebGUI and me. (Well, OK. Us.) Why did we migrate? Our solution a plan is formed

More information

Preprocessor Directives

Preprocessor Directives C++ By 6 EXAMPLE Preprocessor Directives As you might recall from Chapter 2, What Is a Program?, the C++ compiler routes your programs through a preprocessor before it compiles them. The preprocessor can

More information

XBMC. Ultimate Guide. HenryFord 3/31/2011. Feel free to share this document with everybody!

XBMC. Ultimate Guide. HenryFord 3/31/2011. Feel free to share this document with everybody! XBMC Ultimate Guide HenryFord 3/31/2011 Feel free to share this document with everybody! Contents Introduction... 2 XBMC... 3 Download and Install XBMC... 3 Setup the Sources... 3 Additional Settings...

More information

Laboratory Assignment #3. Extending scull, a char pseudo-device

Laboratory Assignment #3. Extending scull, a char pseudo-device Laboratory Assignment #3 Extending scull, a char pseudo-device Value: (See the Grading section of the Syllabus.) Due Date and Time: (See the Course Calendar.) Summary: This is your first exercise that

More information

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016 Linux Systems Security Logging and Network Monitoring NETS1028 Fall 2016 Monitoring Monitoring can take many forms, from passive periodic inspection to realtime intrusion detection For this unit, we will

More information

Intrusion Detection and Prevention Release Notes

Intrusion Detection and Prevention Release Notes Intrusion Detection and Prevention Release Notes Release 4.1r3 December 2008 Contents 1. Version Summary on page 2 2. New Features and Enhancements on page 2 3. Changes to Default Behavior on page 2 4.

More information

Dynamic Documents. Kent State University Dept. of Math & Computer Science. CS 4/55231 Internet Engineering. What is a Script?

Dynamic Documents. Kent State University Dept. of Math & Computer Science. CS 4/55231 Internet Engineering. What is a Script? CS 4/55231 Internet Engineering Kent State University Dept. of Math & Computer Science LECT-12 Dynamic Documents 1 2 Why Dynamic Documents are needed? There are many situations when customization of the

More information

RSA NetWitness Platform

RSA NetWitness Platform RSA NetWitness Platform Event Source Log Configuration Guide Check Point Security Suite, IPS-1 Last Modified: Wednesday, May 9, 2018 Event Source Product Information: Vendor: Check Point Event Source:

More information

3. When you process a largest recent earthquake query, you should print out:

3. When you process a largest recent earthquake query, you should print out: CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #1 Due Wednesday, September 18 @ 11:00 PM for 100 points Due Tuesday, September 17 @ 11:00 PM for 10 point bonus Updated: 9/11/2013 Assignment: This is the first

More information

(Refer Slide Time: 01:40)

(Refer Slide Time: 01:40) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #25 Javascript Part I Today will be talking about a language

More information

CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #2 Due Tuesday, October 11:00 PM for 100 points Due Monday, October 11:00 PM for 10 point bonus

CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #2 Due Tuesday, October 11:00 PM for 100 points Due Monday, October 11:00 PM for 10 point bonus CS3114 (Fall 2013) PROGRAMMING ASSIGNMENT #2 Due Tuesday, October 15 @ 11:00 PM for 100 points Due Monday, October 14 @ 11:00 PM for 10 point bonus Updated: 10/10/2013 Assignment: This project continues

More information

About the Tutorial. Audience. Prerequisites. Copyright & Disclaimer. WordPress

About the Tutorial. Audience. Prerequisites. Copyright & Disclaimer. WordPress About the Tutorial WordPress is an open source Content Management System (CMS), which allows the users to build dynamic websites and blog. WordPress is the most popular blogging system on the web and allows

More information

File Systems. File Systems. G53OPS: Operating Systems. File Systems. File Systems 11/27/2008. Why Use Files? Graham Kendall. Two Views of File System

File Systems. File Systems. G53OPS: Operating Systems. File Systems. File Systems 11/27/2008. Why Use Files? Graham Kendall. Two Views of File System Why Use s? Introduction Graham Kendall It allows data to be stored between processes It allows us to store large volumes of data Allows more than one process to access the data at the same time 27 Nov

More information

Chapter 1 - Introduction. September 8, 2016

Chapter 1 - Introduction. September 8, 2016 Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help

More information

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Trend Micro InterScan Messaging Security Suite Last Modified: Tuesday, April 25, 2017 Event Source Product Information: Vendor: Trend Micro Event

More information

CLIENT SERVER ARCHITECTURE:

CLIENT SERVER ARCHITECTURE: CLIENT SERVER ARCHITECTURE: Client-Server architecture is an architectural deployment style that describe the separation of functionality into layers with each segment being a tier that can be located

More information

InterActive SyslogViewer Adiscon GmbH

InterActive SyslogViewer Adiscon GmbH InterActive SyslogViewer I InterActive SyslogViewer Table of Contents Part I About InterActive SyslogViewer 1 1 Features... 1 2 Requirements... 1 Part II Options & Configuration 1 1 Launching... InterActive

More information

Lesson 5C MyClass Methods. By John B. Owen All rights reserved 2011, revised 2014

Lesson 5C MyClass Methods. By John B. Owen All rights reserved 2011, revised 2014 Lesson 5C MyClass Methods By John B. Owen All rights reserved 2011, revised 2014 Table of Contents Objectives Defining your own class Defining and calling a static method Method structure String return

More information

InsightConnector Version 1.0

InsightConnector Version 1.0 InsightConnector Version 1.0 2002 Bynari Inc. All Rights Reserved Table of Contents Table of Contents... 2 Executive Summary... 3 Examination of the Insight Messaging Solution... 3 Exchange or Outlook?...

More information

CURRENT STATE OF ICINGA

CURRENT STATE OF ICINGA FlossUK 2014 Brighton 20th March - TEAM ICINGA CURRENT STATE OF ICINGA WWW.ICINGA.ORG Agenda Introduction Tools & Platform Icinga project update New in Icinga 1.x Icinga 2 Icinga Web 2 What s next Questions

More information

BEIMSWeb Administrator Training Manual

BEIMSWeb Administrator Training Manual Administrator Training Manual Mercury Computer Systems (Aust) Pty Ltd Level 3, 271 William Street, Melbourne VIC 3000 ABN: 75 632 408 132 Tel: +61 3 9602 2255 Fax: +61 3 9602 2595 support@beims.com www.beims.com

More information

Write for your audience

Write for your audience Comments Write for your audience Program documentation is for programmers, not end users There are two groups of programmers, and they need different kinds of documentation Some programmers need to use

More information

A manual for understanding and using the Impex Control Center. SYSCTL AB - version 1.5

A manual for understanding and using the Impex Control Center. SYSCTL AB - version 1.5 A manual for understanding and using the Impex Control Center SYSCTL AB - version 1.5 CONTENTS Contents Introduction 4 History....................................................... 4 Components.....................................................

More information

Linux desktop app guide Documentation. Thomas Kluyver & contributors

Linux desktop app guide Documentation. Thomas Kluyver & contributors Linux desktop app guide Documentation Thomas Kluyver & contributors Dec 13, 2018 Contents: 1 User Interface options 3 1.1 Desktop style: GTK or Qt........................................ 3 1.2 Web tech:

More information

Message Triage with Perl

Message Triage with Perl Message Triage with Perl by JP Vossen In the course of administering and monitoring any computing environment, you will receive many system-generated messages about many events. How do you determine which

More information

Installing Design Room ONE

Installing Design Room ONE Installing Design Room ONE Design Room ONE consists of two components: 1. The Design Room ONE web server This is a Node JS server which uses a Mongo database. 2. The Design Room ONE Integration plugin

More information

RSA NetWitness Logs. EMC Isilon. Event Source Log Configuration Guide. Last Modified: Tuesday, October 31, 2017

RSA NetWitness Logs. EMC Isilon. Event Source Log Configuration Guide. Last Modified: Tuesday, October 31, 2017 RSA NetWitness Logs Event Source Log Configuration Guide EMC Isilon Last Modified: Tuesday, October 31, 2017 Event Source Product Information: Vendor: EMC Event Source: Isilon Versions: 6.5.3.32, 6.5.5.7,

More information

Helpdesk. Features. Module Configuration 1/49. On - October 14, 2015

Helpdesk. Features. Module Configuration 1/49. On - October 14, 2015 Helpdesk webkul.com/blog/magento-helpdesk/ On - October 14, 2015 Helpdesk module provides the support to their customers. It is a software suite that enables customer support to receive, process, and respond

More information

Using vrealize Log Insight. 08-SEP-2017 vrealize Log Insight 4.5

Using vrealize Log Insight. 08-SEP-2017 vrealize Log Insight 4.5 08-SEP-2017 vrealize Log Insight 4.5 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates.

More information

NTP Software VFM Administration Web Site

NTP Software VFM Administration Web Site NTP Software VFM Administration Web Site User Manual Version 7.1 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective. Upon completion of

More information

Using an SMS Server to Provide a Robust Alerting Service for Nagios. How to implement a Nagios-to-SMS service.

Using an SMS Server to Provide a Robust Alerting Service for Nagios. How to implement a Nagios-to-SMS service. Using an SMS Server to Provide a Robust Alerting Service for Nagios How to implement a Nagios-to-SMS service. ERIC PEARCE I m a big fan of the Nagios network monitoring system and rely on it to tell me

More information

NetApp Element Plug-in for vcenter Server User Guide

NetApp Element Plug-in for vcenter Server User Guide NetApp Element Plug-in for vcenter Server User Guide Version 4.2 November 2018 215-13259_A0 doccomments@netapp.com Table of Contents 3 Contents About this guide... 8 vcenter Plug-in overview... 9 Network

More information

How To Use The Actions Component

How To Use The Actions Component Purpose This document describes how to configure the Actions Component within. This includes the custom URLs, linux shell/script, macro, and PHP code evaluation portions of the component. The Actions Component

More information

Configuring Antivirus Devices

Configuring Antivirus Devices CHAPTER 9 Revised: November 11, 2007 Antivirus (AV) devices provide detection and prevention against known viruses and anomalies. This chapter describes how to configure and add the following devices and

More information

CPS221 Lecture: Operating System Protection

CPS221 Lecture: Operating System Protection Objectives CPS221 Lecture: Operating System Protection last revised 9/5/12 1. To explain the use of two CPU modes as the basis for protecting privileged instructions and memory 2. To introduce basic protection

More information

Deploying Cisco Nexus Data Broker

Deploying Cisco Nexus Data Broker This chapter contains the following sections: Installing Cisco Nexus Data Broker, page 1 Installing Cisco Nexus Data Broker Installing or Upgrading the Cisco Nexus Data Broker Software Important There

More information

Using the Offline Diagnostic Monitor Menu

Using the Offline Diagnostic Monitor Menu APPENDIX B Using the Offline Diagnostic Monitor Menu During the boot process, you can access the Offline Diagnostic Monitor (Offline DM) Main menu. The Offline DM Main menu allows you to perform the following

More information

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

Intrusion Detection and Prevention IDP 4.1r4 Release Notes Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2

More information

5/10/2009. Introduction. The light-saber is a Jedi s weapon not as clumsy or random as a blaster.

5/10/2009. Introduction. The light-saber is a Jedi s weapon not as clumsy or random as a blaster. The Hacking Protocols and The Hackers Sword The light-saber is a Jedi s weapon not as clumsy or random as a blaster. Obi-Wan Kenobi, Star Wars: Episode IV Slide 2 Introduction Why are firewalls basically

More information

Lecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing

Lecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing Lecture Overview IN5290 Ethical Hacking Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing Summary - how web sites work HTTP protocol Client side server side actions Accessing

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Getting Started Guide

Getting Started Guide IBM Support Assistant Data Collector Tool for IBM Case Manager Version 5.2.0.x Getting Started Guide Version 1 Release 1.0 September 2013 Table of Contents Introduction 3 Overview 3 Tool Installation3

More information

A control expression must evaluate to a value that can be interpreted as true or false.

A control expression must evaluate to a value that can be interpreted as true or false. Control Statements Control Expressions A control expression must evaluate to a value that can be interpreted as true or false. How a control statement behaves depends on the value of its control expression.

More information

Part III. Shell Config. Tobias Neckel: Scripting with Bash and Python Compact Max-Planck, February 16-26,

Part III. Shell Config. Tobias Neckel: Scripting with Bash and Python Compact Max-Planck, February 16-26, Part III Shell Config Compact Course @ Max-Planck, February 16-26, 2015 33 Special Directories. current directory.. parent directory ~ own home directory ~user home directory of user ~- previous directory

More information

EDGE Tutorial and Sample Project Overview

EDGE Tutorial and Sample Project Overview EDGE Tutorial and Sample Project Overview RIT-KGCOE Multidisciplinary Senior Design Outline: In this session, you will See a brief EDGE overview See some sample projects, good and bad Visit your team s

More information

Do not start the test until instructed to do so!

Do not start the test until instructed to do so! Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted one-page formula sheet. No calculators or other electronic devices

More information

RSA NetWitness Logs. Airtight Management Console. Event Source Log Configuration Guide. Last Modified: Thursday, May 04, 2017

RSA NetWitness Logs. Airtight Management Console. Event Source Log Configuration Guide. Last Modified: Thursday, May 04, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Airtight Management Console Last Modified: Thursday, May 04, 2017 Event Source Product Information: Vendor: AirTight Event Source: Airtight Management

More information

Introduction. Installation. Version 2 Installation & User Guide. In the following steps you will:

Introduction. Installation. Version 2 Installation & User Guide. In the following steps you will: Introduction Hello and welcome to RedCart TM online proofing and order management! We appreciate your decision to implement RedCart for your online proofing and order management business needs. This guide

More information

Physics REU Unix Tutorial

Physics REU Unix Tutorial Physics REU Unix Tutorial What is unix? Unix is an operating system. In simple terms, its the set of programs that makes a computer work. It can be broken down into three parts. (1) kernel: The component

More information

Recipe #4: Getting Entries

Recipe #4: Getting Entries Recipe 4: Getting Entries The Problem You re relatively new to Perl and completely new to ARSperl and you want to know how to create scripts that retrieve request data from a Remedy form. You've read the

More information

CIM_HT021 Alarm Cast Configuration using SMTP ( ) Proficy CIMPLICITY HMI/SCADA

CIM_HT021 Alarm Cast Configuration using SMTP ( ) Proficy CIMPLICITY HMI/SCADA CIM_HT021 Alarm Cast Configuration using SMTP (E-Mail) Proficy CIMPLICITY HMI/SCADA Overview The purpose of this document is to explain the proper configuration of CIMPLICITY when using Alarm Cast to send

More information

USQ/CSC2406 Web Publishing

USQ/CSC2406 Web Publishing USQ/CSC2406 Web Publishing Lecture 4: HTML Forms, Server & CGI Scripts Tralvex (Rex) Yeap 19 December 2002 Outline Quick Review on Lecture 3 Topic 7: HTML Forms Topic 8: Server & CGI Scripts Class Activity

More information

DAB/MOT Data Carousel Support Library Linux Server Implementation

DAB/MOT Data Carousel Support Library Linux Server Implementation DAB/MOT Data Carousel Support Library Linux Server Implementation D. Knox 98-0003-003/1.0 28th Apr 1990 ENSIGMA Ltd Turing House Station Road Chepstow GWENT NP6 5PB Ensigma Ltd. Page 2 of 31 Distribution

More information

Web Mail Check v 1.0

Web Mail Check v 1.0 Web Mail Check v 1.0 TABLE OF CONTENTS LAUNCHING WEB MAIL CHECK... 3 HOME PAGE... 4 LOG IN... 4 LANGUAGE... 5 DIRECTIONS... 5 READING MESSAGES... 8 HEADERS... 10 PRINTER FRIENDLY VERSION... 11 REPLYING

More information

Connecting TM1 to Various Third- Party Data Sources

Connecting TM1 to Various Third- Party Data Sources Tip or Technique Connecting TM1 to Various Third- Party Data Sources Product(s): TM1 Area of Interest: Development Connecting TM1 to Various Third-Party Data Sources 2 Copyright Copyright 2008 Cognos ULC

More information

SiteScope Adapter for HP OpenView Operations

SiteScope Adapter for HP OpenView Operations SiteScope Adapter for HP OpenView Operations for the UNIX and Windows Operating System Software Version: 1.00, 1.01 User s Guide Document Release Date: 24 November 2009 Software Release Date: December

More information

FCS Documentation. Release 1.0 AGH-GLK

FCS Documentation. Release 1.0 AGH-GLK FCS Documentation Release 1.0 AGH-GLK November 06, 2014 Contents 1 Quickstart 3 2 FCS basics 5 2.1 Registration................................................ 5 2.2 Main page................................................

More information

Tectia Client/Server 6.3 (Windows) Quick Start Guide

Tectia Client/Server 6.3 (Windows) Quick Start Guide Tectia Client/Server 6.3 (Windows) Quick Start Guide 30 March 2016 Tectia Client/Server 6.3 (Windows): Quick Start Guide 30 March 2016 Copyright This software and documentation are protected by international

More information

${Unix_Tools} exercises and solution notes

${Unix_Tools} exercises and solution notes ${Unix_Tools exercises and solution notes Markus Kuhn Computer Science Tripos Part IB The shell Exercise : Write a shell command line that appends :/usr/xr6/man to the end of the environment variable $MANPATH.

More information

Programming Standards: You must conform to good programming/documentation standards. Some specifics:

Programming Standards: You must conform to good programming/documentation standards. Some specifics: CS3114 (Spring 2011) PROGRAMMING ASSIGNMENT #3 Due Thursday, April 7 @ 11:00 PM for 100 points Early bonus date: Wednesday, April 6 @ 11:00 PM for a 10 point bonus Initial Schedule due Thursday, March

More information

Using vrealize Log Insight. Update 1 Modified on 03 SEP 2017 vrealize Log Insight 4.0

Using vrealize Log Insight. Update 1 Modified on 03 SEP 2017 vrealize Log Insight 4.0 Using vrealize Log Insight Update 1 Modified on 03 SEP 2017 vrealize Log Insight 4.0 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

PowerSchool 7.x Student Information System

PowerSchool 7.x Student Information System PowerSchool 7.x Student Information System Released May 2012 Document Owner: Documentation Services This edition applies to Release 7.2 of the PowerSchool software and to all subsequent releases and modifications

More information

Manual Script Windows Batch For Loop Files In A Directory

Manual Script Windows Batch For Loop Files In A Directory Manual Script Windows Batch For Loop Files In A Directory If I run the batch file manually from the command prompt, it works fine. think it is (it refers to the current directory, which is not necessarily

More information

BMC FootPrints 12 Integration with Remote Support

BMC FootPrints 12 Integration with Remote Support BMC FootPrints 12 Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are

More information