2018/10/17 20:02 1/5 3 Zabbix Agent (UNIX, Standalone daemon)

Size: px
Start display at page:

Download "2018/10/17 20:02 1/5 3 Zabbix Agent (UNIX, Standalone daemon)"

Transcription

1 2018/10/17 20:02 1/5 3 Zabbix Agent (UNIX, Standalone daemon) 3 Zabbix Agent (UNIX, Standalone daemon) Zabbix UNIX agent daemon runs on a host being monitored. The agent provides host's performance and availability information for Zabbix Server. Zabbix agent processes items of type 'Zabbix agent' or 'Zabbix agent (active)'. Zabbix agent can be started by executing: shell> cd sbin shell>./zabbix_agentd Zabbix agent runs as a daemon process. Zabbix agent accepts the following command line parameters: -c --config <file> specify configuration file, default is /etc/zabbix/zabbix_agentd.conf -h --help give this help -V --version display version number -p --print print kwn items and exit -t --test <item key> test specified item and exit In order to get this help run: shell> zabbix_agentd -h Example of command line parameters: shell> zabbix_agentd -c /usr/local/etc/zabbix_agentd.conf shell> zabbix_agentd --help shell> zabbix_agentd --print shell> zabbix_agentd -t "system.cpu.load[all,avg1]" Configuration file The configuration file contains configuration parameters for zabbix_agentd. The file must exist and it should have read permissions for user 'zabbix'. Supported parameters: Sets an alias for parameter. It can be useful to substitute long and complex parameter name with a smaller and simpler one. Alias Starting from version Zabbix Agent will t start up in case incorrectly formatted Alias entry or duplicate Alias key is present in configuration file.

2 Last update: 2014/09/25 16:01 manual:processes:zabbix_agentd AllowRoot 0 BufferSend BufferSize DebugLevel DisableActive 0 DisablePassive 0 EnableRemoteCommands 0 Hostname Set by HostnameItem HostnameItem system.hostname Allow the agent to run as 'root'. If disabled and the agent is started by 'root', the agent will try to switch to user 'zabbix' instead. Has effect if started under a regular user. 0 - do t allow 1 - allow Do t keep data longer than N seconds in buffer. Maximum number of values in a memory buffer. The agent will send all collected data to Zabbix Server or Proxy if the buffer is full. Specifies debug level 0 - debug 1 - critical information 2 - error information 3 - warnings 4 - for debugging (produces lots of information) Disable active checks. The agent will work in passive mode listening for server. Disable passive checks. The agent will t listen on any TCP port. Only active checks will be processed. 0 - do t disable 1 - disable Whether remote commands from Zabbix server are allowed. 0 - t allowed 1 - allowed Unique, case sensitive hostname. Required for active checks and must match hostname as configured on the server. Allowed characters: alphanumeric, '.', ' ', '_' and '-'. Maximum length: 64 Item used for setting Hostname if it is undefined. Does t support UserParameters, performance counters or aliases, but does support system.run[] regardless of EnableRemoteCommands value. Igred if Hostname is set. Include This option is supported in version and higher. You may include individual files or all files in a directory in the configuration file. See special tes about limitations. Printed on 2018/10/17 20:02

3 2018/10/17 20:02 3/5 3 Zabbix Agent (UNIX, Standalone daemon) ListenIP ListenPort LogFileSize LogFile LogRemoteCommands 0 MaxLinesPerSecond List of comma delimited IP addresses that the agent should listen on. Multiple IP addresses are supported in version and higher. Agent will listen on this port for connections from the server. Maximum size of log file in MB. 0 - disable automatic log rotation. Name of log file. If t set, syslog is used. Enable logging of executed shell commands as warnings. 0 - disabled 1 - enabled PidFile /tmp/zabbix_agentd.pid Name of PID file. RefreshActiveChecks Server yes Maximum number of new lines the agent will send per second to Zabbix server or proxy processing 'log' and 'eventlog' active checks. The provided value will be overridden by the parameter 'maxlines', provided in 'log' or 'eventlog' item key. Note: Zabbix will process 4 times more new lines than set in MaxLinesPerSecond to seek the required string in log items. How often list of active checks is refreshed, in seconds. List of comma delimited IP addresses (or hostnames) of Zabbix servers. No spaces allowed. If ServerActive is t specified, the first entry is used for receiving list of and sending active checks. Note that hostnames must resolve hostname IP address and IP address hostname. If IPv6 support is enabled then ' ', ':: ', '::ffff: ' are treated equally.

4 Last update: 2014/09/25 16:01 manual:processes:zabbix_agentd ServerActive ServerPort SourceIP StartAgents Timeout UnsafeUserParameters 0,1 0 UserParameter List of comma delimited IP:port (or hostname:port) pairs of Zabbix servers for active checks. No spaces allowed. If ServerActive is specified, first host in the Server option is t used for active checks, only for passive checks. If the port is t specified, ServerPort port is used for that host. If ServerPort is t specified, default port is used. IPv6 addresses must be enclosed in square brackets if port for that host is specified. If port is t specified, square brackets for IPv6 addresses are optional. This option is supported in version and higher. Server port for retrieving list of and sending active checks. Source IP address for outgoing connections. Number of pre-forked instances of zabbix_agentd that process passive checks. The upper limit used to be 16 before version Spend more than Timeout seconds on processing Allow all characters to be passed in arguments to user-defined parameters. Supported since Zabbix User-defined parameter to monitor. There can be several user-defined parameters. Format: UserParameter=<key>,<shell command> Note that shell command must t return empty string or EOL only. Example: UserParameter=system.test,who wc -l Starting from version Zabbix Agent will t start up in case incorrectly formatted UserParameter entry or duplicate UserParameter key is present in configuration file. Starting from version Zabbix agent daemon will t start up if invalid (t following parameter=value tation) or unkwn parameter entry is present in configuration file. Printed on 2018/10/17 20:02

5 2018/10/17 20:02 5/5 3 Zabbix Agent (UNIX, Standalone daemon) Zabbix supports configuration files only in UTF-8 encoding without BOM. From: - Zabbix Documentation 1.8 Permanent link: Last update: 2014/09/25 16:01

5 Zabbix Agent (Windows)

5 Zabbix Agent (Windows) 2017/10/17 09:19 1/5 5 Zabbix Agent (Windows) 5 Zabbix Agent (Windows) Installation Installation is very simple and includes 3 steps: Step 1 Create configuration file. Create configuration file c:/zabbix_agentd.conf

More information

ffproxy (8) FreeBSD System Manager s Manual ffproxy (8)

ffproxy (8) FreeBSD System Manager s Manual ffproxy (8) NAME ffproxy filtering HTTP/HTTPS proxy server SYNOPSIS ffproxy [ p port] [ c ip hostname] [ C ip hostname] [ l childs] [ u uid user g gid group] [ r dir] [ D datadir] [ x proxyip proxyhost X proxyport]

More information

Admin Guide ( Unix System Administration )

Admin Guide ( Unix System Administration ) Admin Guide ( Unix System Administration ) ProFTPD Server Configuration ProFTPD is a secure and configurable FTP server, written for use on Unix and Unix-like operating systems. ProFTPD is modeled around

More information

4 Installation from sources

4 Installation from sources 2018/07/18 21:35 1/11 4 Installation from sources 4 Installation from sources You can get the very latest version of Zabbix by compiling it from the sources. A step-by-step tutorial for installing Zabbix

More information

3 Installation from sources

3 Installation from sources 2018/02/14 10:00 1/11 3 Installation from sources 3 Installation from sources You can get the very latest version of Zabbix by compiling it from the sources. A step-by-step tutorial for installing Zabbix

More information

4 Installation from sources

4 Installation from sources 2018/07/12 20:48 1/10 4 Installation from sources 4 Installation from sources Overview You can get the very latest version of Zabbix by compiling it from the sources. A step-by-step tutorial for installing

More information

9 Notes on selecting processes in proc.mem and proc.num items

9 Notes on selecting processes in proc.mem and proc.num items 208/07/04 3:26 /5 9 Notes on selecting processes in proc.mem and proc.num items 9 Notes on selecting processes in proc.mem and proc.num items Processes modifying their commandline Some programs use modifying

More information

3 Installation from sources

3 Installation from sources 2019/02/02 03:16 1/11 3 Installation from sources 3 Installation from sources You can get the very latest version of Zabbix by compiling it from the sources. A step-by-step tutorial for installing Zabbix

More information

rowan(1) RoWAN manual page rowan(1)

rowan(1) RoWAN manual page rowan(1) rowan(1) RoWAN manual page rowan(1) NAME RoWAN is a network-stream relay (server) over Wide Area Network. DESCRIPTION RoWAN relays video streams from both local and remote sources to local multicast/unicast

More information

Version ZABBIX Reference Manual ZABBIX. Revision: Copyright by Alexei Vladishev

Version ZABBIX Reference Manual ZABBIX. Revision: Copyright by Alexei Vladishev Version 1.00 ZABBIX Reference Manual Revision: 1.00-0009 ZABBIX Copyright by Alexei Vladishev 1 Table of Contents 2 REVISION HISTORY...5 3 DISTRIBUTION LIST...6 4 INTRODUCTION...7 5 DOCUMENT CONVENTIONS...8

More information

MIXMINIOND.CONF (5) System File Formats Manual MIXMINIOND.CONF (5)

MIXMINIOND.CONF (5) System File Formats Manual MIXMINIOND.CONF (5) NAME mixminiond.conf Mixminion server configuration file SYNOPSIS $HOME/mixminiond.conf $HOME/etc/mixminiond.conf /etc/mixminiond.conf /etc/mixminion/mixminiond.conf DESCRIPTION mixminiond reads its configuration

More information

Release Notes for Snare Linux Agent Release Notes for Snare for Linux

Release Notes for Snare Linux Agent Release Notes for Snare for Linux Release Notes for Snare for Linux InterSect Alliance International Pty Ltd Page 1 of 17 About this document This document provides release notes for the Snare Enterprise Agent for Linux. InterSect Alliance

More information

Centerity Monitor. Technical Guide: Syslog Configuration VERSION 4

Centerity Monitor. Technical Guide: Syslog Configuration VERSION 4 Centerity Monitor Technical Guide: Syslog Configuration VERSION 4 Forwarding Syslog Messages to Centerity Server 2 Forwarding Syslog Messages to Centerity Server Syslog messages can be monitored by Centerity

More information

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,

More information

ovsdb server(1) Open vswitch Manual ovsdb server(1)

ovsdb server(1) Open vswitch Manual ovsdb server(1) NAME ovsdb server Open vswitch database server SYNOPSIS ovsdb server [database]... [ remote=remote]... [ run=command] Daemon options: [ pidfile[=pidfile]] [ overwrite pidfile] [ detach] [ no chdir] Service

More information

Kea Messages Manual. Kea Messages Manual

Kea Messages Manual. Kea Messages Manual Kea Messages Manual i Kea Messages Manual Kea Messages Manual ii Copyright 2011-2015 Internet Systems Consortium, Inc. Kea Messages Manual iii Contents 1 Introduction 1 2 Kea Log Messages 2 2.1 ALLOC Module....................................................

More information

Micro Focus Security ArcSight Connectors. SmartConnector for Microsoft IIS Multiple Site File. Configuration Guide

Micro Focus Security ArcSight Connectors. SmartConnector for Microsoft IIS Multiple Site File. Configuration Guide Micro Focus Security ArcSight Connectors SmartConnector for Microsoft IIS Multiple Site File Configuration Guide June, 2018 Configuration Guide SmartConnector for Microsoft IIS Multiple Site File June,

More information

2018/10/16 04:56 1/10 9 WEB Monitoring

2018/10/16 04:56 1/10 9 WEB Monitoring 2018/10/16 04:56 1/10 9 WEB Monitoring 9 WEB Monitoring 1 Goals Zabbix WEB Monitoring support is developed with the following goals: Performance monitoring of WEB applications Availability monitoring of

More information

Copyright(C) NEC Corporation All rights reserved.

Copyright(C) NEC Corporation All rights reserved. MasterScope MISSION CRITICAL OPERATIONS /SystemManager/Application Navigator Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT Copyright(C) NEC Corporation 2015.

More information

2018/03/23 00:39 1/10 8. Web monitoring. To perform web monitoring Zabbix server must be initially configured with curl (libcurl) support.

2018/03/23 00:39 1/10 8. Web monitoring. To perform web monitoring Zabbix server must be initially configured with curl (libcurl) support. 2018/03/23 00:39 1/10 8. Web monitoring 8. Web monitoring Overview With Zabbix you can check several availability aspects of web sites. To perform web monitoring Zabbix server must be initially configured

More information

External Alerting with Alert Responses

External Alerting with Alert Responses The following topics describe how to send external event alerts from the Firepower Management Center using alert responses: Firepower Management Center Alert Responses, page 1 Creating an SNMP Alert Response,

More information

Call-in Agent Configuration 9

Call-in Agent Configuration 9 Call-in Agent Configuration 9 9.1 Overview of the Call-in Agent The Call-in Agent enables users to access OPC data over the phone. The Call-in Agent configuration sets up the voice and key entries and

More information

Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT. Copyright(C) NEC Corporation All rights reserved.

Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT. Copyright(C) NEC Corporation All rights reserved. Command Reference (Help differences) TopologyCmd LIST TopologyCmd IMPORT TopologyCmd EXPORT Copyright(C) NEC Corporation 2017. All rights reserved. Edition Chapter/Section Details First Edition - - Revision

More information

Configuring System Message Logging

Configuring System Message Logging This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter contains the following sections: About System Message Logging, page 1 Licensing Requirements for System

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

Internet Architecture. Web Programming - 2 (Ref: Chapter 2) IP Software. IP Addressing. TCP/IP Basics. Client Server Basics. URL and MIME Types HTTP

Internet Architecture. Web Programming - 2 (Ref: Chapter 2) IP Software. IP Addressing. TCP/IP Basics. Client Server Basics. URL and MIME Types HTTP Web Programming - 2 (Ref: Chapter 2) TCP/IP Basics Internet Architecture Client Server Basics URL and MIME Types HTTP Routers interconnect the network TCP/IP software provides illusion of a single network

More information

VCOM for i5, OpenVMS, Windows & Unix. Release Notes May 2013

VCOM for i5, OpenVMS, Windows & Unix. Release Notes May 2013 VCOM 5.5.2 for i5, OpenVMS, Windows & Unix Release Notes May 2013 Please read the following Release Notes before installation and have also a check in http://techserv.verimation.se for last minutes information.

More information

RSYSLOGD(8) Linux System Administration RSYSLOGD(8)

RSYSLOGD(8) Linux System Administration RSYSLOGD(8) NAME rsyslogd reliable and extended syslogd SYNOPSIS rsyslogd [ 4 ][ 6 ][ A ][ d ][ D ][ f config file ] [ i pid file ][ l hostlist ][ n ][ N level ] [ q ][ Q ][ s domainlist ][ u userlevel ][ v ][ w ][

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for HPE c7000 Virtual Connect Module Syslog Configuration Guide October 17, 2017 SmartConnector for HPE c7000 Virtual Connect Module Syslog October 17, 2017

More information

Configuring System Message Logging

Configuring System Message Logging This chapter contains the following sections: Information About System Message Logging, page 1 Licensing Requirements for System Message Logging, page 2 Guidelines and Limitations for System Message Logging,

More information

P:\filebeat.yml 18 October :55

P:\filebeat.yml 18 October :55 ######################## Filebeat Configuration ############################ # This file is a full configuration example documenting all non-deprecated # options in comments. For a shorter configuration

More information

Configuring Syslog. Prerequisites for Configuring Syslog. Information About Syslog

Configuring Syslog. Prerequisites for Configuring Syslog. Information About Syslog This document describes the Syslog feature and configuration steps to implement Syslog. Prerequisites for, page 1 Information About Syslog, page 1 Enabling Syslog, page 2 Clearing Syslog, page 3 Verifying

More information

Configuring Syslog. Prerequisites for Configuring Syslog. Information About Syslog. Enabling Syslog DETAILED STEPS

Configuring Syslog. Prerequisites for Configuring Syslog. Information About Syslog. Enabling Syslog DETAILED STEPS This document describes the Syslog feature and configuration steps to implement Syslog. Prerequisites for, page 1 Information About Syslog, page 1 Enabling Syslog, page 1 Clearing Syslog, page 3 Verifying

More information

Using the Command-Line Interface

Using the Command-Line Interface This chapter describes how to use the CLI on the Cisco ASA. The CLI uses similar syntax and other conventions to the Cisco IOS CLI, but the ASA operating system is not a version of Cisco IOS software.

More information

Scratchbox Remote Shell

Scratchbox Remote Shell Scratchbox Remote Shell Timo Savola tsavola@movial.fi Scratchbox Remote Shell by Timo Savola Copyright 2004, 2005 Nokia Revision history Version: Author: Description: 2005-02-08 Savola Based on Device

More information

simplevisor Documentation

simplevisor Documentation simplevisor Documentation Release 1.2 Massimo Paladin June 27, 2016 Contents 1 Main Features 1 2 Installation 3 3 Configuration 5 4 simplevisor command 9 5 simplevisor-control command 13 6 Supervisor

More information

Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p.

Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. 2 Conventions Used in This Book p. 2 Introduction to UNIX p. 5 An Overview

More information

Chapter 1 - Introduction. September 8, 2016

Chapter 1 - Introduction. September 8, 2016 Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help

More information

Kea Messages Manual. Kea Messages Manual

Kea Messages Manual. Kea Messages Manual Kea Messages Manual i Kea Messages Manual Kea Messages Manual ii Copyright 2011-2018 Internet Systems Consortium, Inc. ("ISC") Kea Messages Manual iii Contents 1 Introduction 1 2 Kea Log Messages 2 2.1

More information

Using the Command-Line Interface

Using the Command-Line Interface CHAPTER 1 The command-line interface (CLI) is a line-oriented user interface that has a set of commands for configuring, managing, and monitoring the CSS. To help you use these commands, this chapter provides

More information

Paranoid Penguin rsync, Part I

Paranoid Penguin rsync, Part I Paranoid Penguin rsync, Part I rsync makes efficient use of the network by only transferring the parts of files that are different from one host to the next. Here's how to use it securely. by Mick Bauer

More information

Configuring System Message Logs

Configuring System Message Logs Information About, on page 1 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12 Configuration Examples for System Message Logs, on page 12 Additional

More information

Install and Configure the TS Agent

Install and Configure the TS Agent Install the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install the TS Agent Before You Begin Confirm that the

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for Barracuda Firewall NG F- Series Syslog Configuration Guide October 17, 2017 Configuration Guide SmartConnector for Barracuda Firewall NG F-Series Syslog

More information

NODE.JS - NET MODULE

NODE.JS - NET MODULE NODE.JS - NET MODULE http://www.tutorialspoint.com/nodejs/nodejs_net_module.htm Copyright tutorialspoint.com Node.js net module is used to create both servers and clients. This module provides an aynchronous

More information

ovn-controller(8) Open vswitch Manual ovn-controller(8)

ovn-controller(8) Open vswitch Manual ovn-controller(8) NAME ovn-controller Open Virtual Network local controller SYNOPSIS ovn controller [options] [ovs-database] DESCRIPTION ovn controller is the local controller daemon for OVN, the Open Virtual Network. It

More information

Shell Start-up and Configuration Files

Shell Start-up and Configuration Files ULI101 Week 10 Lesson Overview Shell Start-up and Configuration Files Shell History Alias Statement Shell Variables Introduction to Shell Scripting Positional Parameters echo and read Commands if and test

More information

Install and Configure the TS Agent

Install and Configure the TS Agent Install or Upgrade the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install or Upgrade the TS Agent Before You Begin

More information

McGill University School of Computer Science Sable Research Group. *J Installation. Bruno Dufour. July 5, w w w. s a b l e. m c g i l l.

McGill University School of Computer Science Sable Research Group. *J Installation. Bruno Dufour. July 5, w w w. s a b l e. m c g i l l. McGill University School of Computer Science Sable Research Group *J Installation Bruno Dufour July 5, 2004 w w w. s a b l e. m c g i l l. c a *J is a toolkit which allows to dynamically create event traces

More information

VERTIV. Avocent ACS8xxx Advanced Console System Release Notes VERSION 2.4.2, AUGUST 24, Release Notes Section Outline. 1 Update Instructions

VERTIV. Avocent ACS8xxx Advanced Console System Release Notes VERSION 2.4.2, AUGUST 24, Release Notes Section Outline. 1 Update Instructions VERTIV Avocent ACS8xxx Advanced Console System Release Notes VERSION 2.4.2, AUGUST 24, 2018 Release Notes Section Outline 1 Update Instructions 2 Appliance Firmware Version Information 3 Local Client Requirements

More information

Configuring System Message Logs

Configuring System Message Logs Restrictions for, page 1 Information About, page 1 How to Configure System Message Logs, page 4 Monitoring and Maintaining System Message Logs, page 13 Configuration Examples for System Message Logs, page

More information

DENICOMP SYSTEMS Copyright? 2003 Denicomp Systems All rights reserved.

DENICOMP SYSTEMS Copyright? 2003 Denicomp Systems All rights reserved. Copyright? 2003 Denicomp Systems All rights reserved. Table of Contents INTRODUCTION TO WINSOCK RSHD/NT...1 REQUIREMENTS...1 SECURITY A WARNING...1 WINSOCK RSHD/NT INSTALLATION...2 INSTALLING FROM A CD

More information

Registering Cisco Unity Express Endpoints to Cisco Unified Messaging Gateway 1.0

Registering Cisco Unity Express Endpoints to Cisco Unified Messaging Gateway 1.0 Registering Cisco Unity Express Endpoints to Cisco Unified Messaging Gateway 1.0 Revised: April 3, 2008 This section concerns Cisco Unity Express endpoints, covering principally the new commands in Cisco

More information

Cisco Terminal Services (TS) Agent Guide, Version 1.0

Cisco Terminal Services (TS) Agent Guide, Version 1.0 First Published: 2016-08-29 Last Modified: 2018-01-30 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Cisco Terminal Services (TS) Agent Guide, Version 1.1

Cisco Terminal Services (TS) Agent Guide, Version 1.1 First Published: 2017-05-03 Last Modified: 2017-12-19 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Modifying IPM Components

Modifying IPM Components CHAPTER 4 This chapter provides information on modifying IPM components. IPM components include collectors, source routers, target devices, and operations. Information is provided on viewing, updating,

More information

Cisco Terminal Services (TS) Agent Guide, Version 1.1

Cisco Terminal Services (TS) Agent Guide, Version 1.1 First Published: 2017-05-03 Last Modified: 2017-10-13 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

Log Management. Configuring Syslog

Log Management. Configuring Syslog Table of Contents Log Management 1 Configuring Syslog 1 Configuring User Logging 3 Configuring Flow Logging 3 Session Logging 6 Session Logging Overview 6 Configuring a Session Logging Policy 7 Setting

More information

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER 4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information

More information

User and System Administration

User and System Administration CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical

More information

Configuring System Message Logs

Configuring System Message Logs Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2 How to Configure System Message Logs, page 5 Monitoring and Maintaining System Message Logs, page 13 Configuration

More information

IPv6 for Cisco IOS Software, File 3 of 3: Commands

IPv6 for Cisco IOS Software, File 3 of 3: Commands IPv6 for Cisco IOS Software, File 3 of 3: Commands This document contains new and revised commands for the Cisco implementation of IP version 6 (IPv6) in the Cisco IOS software. All other commands used

More information

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting.

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting. This chapter describes how to log system messages and use them for troubleshooting. About, page 1 Guidelines for, page 7 Configure, page 8 Monitoring the Logs, page 26 History for, page 29 About System

More information

SNMP.CONF(5) Net-SNMP SNMP.CONF(5)

SNMP.CONF(5) Net-SNMP SNMP.CONF(5) NAME snmp.conf - configuration files for the Net-SNMP applications DESCRIPTION Applications built using the Net-SNMP libraries typically use one or more configuration files to control various aspects of

More information

5/8/2012. Exploring Utilities Chapter 5

5/8/2012. Exploring Utilities Chapter 5 Exploring Utilities Chapter 5 Examining the contents of files. Working with the cut and paste feature. Formatting output with the column utility. Searching for lines containing a target string with grep.

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.4 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

LCE Splunk Client 4.6 User Manual. Last Revised: March 27, 2018

LCE Splunk Client 4.6 User Manual. Last Revised: March 27, 2018 LCE Splunk Client 4.6 User Manual Last Revised: March 27, 2018 Table of Contents Getting Started with the LCE Splunk Client 3 Standards and Conventions 4 Install, Configure, and Remove 5 Download an LCE

More information

Configuring System Message Logs

Configuring System Message Logs Finding Feature Information, on page 1 Restrictions for, on page 1 Information About, on page 2 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12

More information

DHCP Server RADIUS Proxy

DHCP Server RADIUS Proxy The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies

More information

Review of Fundamentals

Review of Fundamentals Review of Fundamentals 1 The shell vi General shell review 2 http://teaching.idallen.com/cst8207/14f/notes/120_shell_basics.html The shell is a program that is executed for us automatically when we log

More information

cc: On-Demand Install and User Guide, Version 4.5 R2

cc: On-Demand Install and User Guide, Version 4.5 R2 cc: On-Demand Install and User Guide, Version 4.5 R2 March 2012 Reference Guide www.callcopy.com Security Classification: CallCopy Confidential Distribution: Approved internal CallCopy staff only and licensed

More information

Web Services Management Agent Configuration Guide, Cisco IOS XE Release 3S

Web Services Management Agent Configuration Guide, Cisco IOS XE Release 3S Web Services Management Agent Configuration Guide, Cisco IOS XE Release 3S First Published: March 29, 2013 Last Modified: March 29, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

The Directory Schema Is Not Accessible Because An Invalid Directory Pathname Was Passed

The Directory Schema Is Not Accessible Because An Invalid Directory Pathname Was Passed The Directory Schema Is Not Accessible Because An Invalid Directory Pathname Was Passed The directory schema is not accessible because: An invalid directory pathname was passed. For this reason, the New

More information

Arm Licence Server User Guide. Version 18.0

Arm Licence Server User Guide. Version 18.0 Arm Licence Server User Guide Version 18.0 Contents Contents 1 1 Introduction 2 1.1 Online resources...................................... 2 1.2 Obtaining help....................................... 2

More information

FTP Service Reference

FTP Service Reference IceWarp Unified Communications Reference Version 11.4 Published on 2/9/2016 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...

More information

PageScope Net Care Device Manager Ver. 2.0 User s Guide

PageScope Net Care Device Manager Ver. 2.0 User s Guide PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from, Release 5.5 or later to Cisco ISE, Release 2.3., page 1 Supported Data Objects for

More information

Configuring DNS. Finding Feature Information

Configuring DNS. Finding Feature Information The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.3., on page 1 Supported

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Configuring Security Features on an External AAA Server

Configuring Security Features on an External AAA Server CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Principles of Bioinformatics. BIO540/STA569/CSI660 Fall 2010

Principles of Bioinformatics. BIO540/STA569/CSI660 Fall 2010 Principles of Bioinformatics BIO540/STA569/CSI660 Fall 2010 Lecture Five Practical Computing Skills Emphasis This time it s concrete, not abstract. Fall 2010 BIO540/STA569/CSI660 3 Administrivia Monday

More information

IM and Presence Service Network Setup

IM and Presence Service Network Setup Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management

More information

Industrial Data Forwarder for Splunk Kepware, Inc.

Industrial Data Forwarder for Splunk Kepware, Inc. Industrial Data Forwarder for Splunk 2016 Kepware, Inc. Industrial Data Forwarder for Splunk 2 Table of Contents Table of Contents 2 Industrial Data Forwarder for Splunk 3 Overview 3 User Interface 4 Quick

More information

Configuring WMT Streaming Media Services on Standalone Content Engines

Configuring WMT Streaming Media Services on Standalone Content Engines CHAPTER 9 Configuring WMT Streaming Media Services on Standalone Content Engines This chapter provides an overview of the Windows Media Technologies (WMT) streaming and caching services, and describes

More information

Troubleshooting Cisco Prime Access Registrar

Troubleshooting Cisco Prime Access Registrar CHAPTER 28 This chapter provides information about techniques used when troubleshooting Cisco Access Registrar (Prime Access Registrar) and highlights common problems. This chapter contains the following

More information

Using Debug Commands

Using Debug Commands Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using the debug?

More information

Configuring MiServer MiServer 3.0

Configuring MiServer MiServer 3.0 Overview This document describes how to configure MiServer 3.0. MiServer's Configuration Architecture MiServer uses a 2-tiered configuration system one at the server level and one at the MiSite 1 level.

More information

Cisco Terminal Services (TS) Agent Guide, Version 1.2

Cisco Terminal Services (TS) Agent Guide, Version 1.2 First Published: 2018-01-30 Last Modified: 2018-01-30 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

HTTPS--HTTP Server and Client with SSL 3.0

HTTPS--HTTP Server and Client with SSL 3.0 The feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS XE software. SSL provides server authentication, encryption, and message

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name : LINUX PROGRAMMING Course Code : ACS010 Class : III

More information

Agent Teamwork Research Assistant. Progress Report. Prepared by Solomon Lane

Agent Teamwork Research Assistant. Progress Report. Prepared by Solomon Lane Agent Teamwork Research Assistant Progress Report Prepared by Solomon Lane December 2006 Introduction... 3 Environment Overview... 3 Globus Grid...3 PBS Clusters... 3 Grid/Cluster Integration... 4 MPICH-G2...

More information

Working with CPS Utilities

Working with CPS Utilities Policy Tracing and Execution Analyzer, page 1 Network Cutter Utility, page 5 Policy Builder Configuration Reporter, page 6 CRD Generator Conversion Tool, page 7 Policy Builder Configuration Converter Conversion

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for HPE H3C Syslog Configuration Guide October 17, 2017 Configuration Guide SmartConnector for HPE H3C Syslog October 17, 2017 Copyright 2012 2017 Hewlett

More information

PASSPORTAL PLUGIN DOCUMENTATION

PASSPORTAL PLUGIN DOCUMENTATION Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal

More information

12. Regular expressions

12. Regular expressions 2017/12/18 14:49 1/5 12. Regular expressions 12. Regular expressions Overview Perl Compatible Regular s (PCRE) are ed in Zabbix. There are two ways of using regular expressions in Zabbix: manually entering

More information

Configuring the Cisco IOS Software Activation Feature

Configuring the Cisco IOS Software Activation Feature Configuring the Cisco IOS Software Activation Feature This document describes the tasks used to activate software by using the Cisco IOS Software Activation feature, license keys, and Cisco EXEC commands.

More information

Using the aregcmd Commands

Using the aregcmd Commands CHAPTER 2 This chapter describes how to use each of the aregcmd commands. The Cisco Access Registrar aregcmd command is a command-line based configuration tool. It allows you to set any Cisco Access Registrar

More information