Sorting the post An introduction to the Perforce Broker

Size: px
Start display at page:

Download "Sorting the post An introduction to the Perforce Broker"

Transcription

1 Sorting the post An introduction to the Perforce Broker Tony Smith Perforce Software 1 What is the Perforce Broker? Sits between the clients and the server Provides easy control of server workload Highly configurable Broker behaviour based on static rules Defined in configuration file External programs (filters) Administrator can specify whether: User can safely run specific commands. Commands can be safely redirected to another server. 2 1

2 Relationship to other Perforce Components Client Primary Client P4Broker Clients connect to P4Broker. Same local LAN as Perforce Server. Broker can connect to one or more replicas. Altserver Altserver Replica 3 Architectural Location Client Fast Proxy Slow P4Broker Fast LAN WAN LAN Proxy is close to the client Broker is close to the server 4 2

3 Command Execution Client sends command to broker Broker compares command with rule set Broker determines action PASS REJECT REDIRECT 5 Command Execution - PASS p4 opened -a P4 Client P4USER=kwirth P4Broker pass Replica 6 3

4 Command Execution - REJECT P4 Client P4USER=bob p4 opened -a P4Broker reject Replica 7 Command Execution - REDIRECT P4 Client P4USER=kwirth p4 changes -l P4Broker redirect Replica 8 4

5 Command Execution - Filter P4 Client P4USER=kwirth p4 changes PASS P4Broker filter Replica # Print PASS if "user: kwirth" found $Pass = 0; while (defined($line = <STDIN>)) { if ($line =~ "user: kwirth") {$Pass = 1 if ($Pass) {printf ("PASS") else {printf ("REJECT \"Rejected.\"") 9 Requirements or later server (after build ) or later client. 10 5

6 Command line options Usage: p4broker [options] where options are: -c <file> path to configuration file. -d run as a daemon (fork first,then run) -f run as single-threaded server -h print this message -q suppress startup messages -V print version and exit -v level debug modes Minimum options: p4broker -c p4broker.conf 11 P4BROKEROPTIONS Example: SET P4BROKEROPTIONS=-c C:\Broker\p4broker.conf Appends command line options. Command line becomes: p4broker Intended to be used when using P4Broker as a Windows service. 12 6

7 Configuration File Defines environment and rules. Only accessed at startup. P4Broker will not start if file contains syntax errors. P4Broker can create a template: p4broker C > p4broker.conf Need to customise template file. Three parts: Global Settings Alternate Server definitions Command handler definitions 13 Global Settings target = server1.perforce.com:1666; listen = 1667; directory = C:\perforce\p4-broker; logfile = broker.log; debug-level = server=1; admin-name = "Perforce Admins"; admin-phone = 999/911; admin- = admins@mydomain.com; 14 7

8 Alternate Servers P4Broker can redirect requests to an alternate server. Reduces the load on the primary (target) server. Alternate servers should be replicas of the target server. Use a tool such as P4Jrep to create alternate server. Use P4AUTH to centralise authentication. Redirecting commands can cause confusion. Users must allow for latency of replication process. Use with caution! 15 Alternate Servers Example altserver: replica1 { host = backupserver1.perforce.com; port = 1669; login = no; altserver: replica2 { host = backupserver2.perforce.com; port = 1669; login = no; 16 8

9 Command Handlers As many command handlers as needed. Compared in top to bottom order. Only first match is applied. Default behaviour forwards to target Perforce server. p4 login and p4 logout commands may not be caught by a handler 17 Command Handlers Example command: opened { flags = -a; user = kwirth; action = pass; command: opened { flags = -a; action = reject; message = "You are not Karl. You don't\n \t need to know that.\n"; 18 9

10 Command Handlers Syntax command: <pattern> { # Conditions for the command to meet flags = <required flags>; user = <required user>; workspace = <required client-workspace>; prog = <required client program>; version = <required version of client program>; # What to do with matching commands action = pass reject redirect filter ; # How to go about it message = <message>; # For action = reject destination = <altserver>; # For action = redirect execute = <filter program>;# For action = filter 19 Filter Programs Execute program specified in the execute parameter: command: changes { action = filter; execute = "perl filter.pl"; Defers decision to that program. Parameters sent to the stdin for the program. The program must read all input 20 10

11 Filter Programs Input Format Example > p4 changes -m l //... command: changes clientprog: p4 clientversion: /NTX86/ clientprotocol: 61 apiprotocol: workspace: kwirth_proxy_ws user: kwirth clientip: proxyip: argcount: 4 Arg0: -m Arg1: 1000 Arg2: -l Arg3: // Filter Programs Expected Output One of the three following forms: REJECT <Message for user> REDIRECT <altserver name> PASS Other returned responses treated as REJECT 22 11

12 Broker output in p4 info The broker adds its details to the output of p4 info p4 info Broker address: localhost:1667 Broker version: P4BROKER/LINUX26X86_64/2007.3/ Support & Download P4Broker is currently unsupported. It s effectively a beta release Available on FTP site. Not available on downloads page

13 Troubleshooting Debug Levels server=1 Result of running each command written to log. server=3 Config file and filter debugging written to stdout. In configuration file debug-level = server=1; Note: value in configuration file overrides command line. 25 Q & A 26 13

Perforce Replication. The Definitive Guide. Sven Erik Knop Senior Consultant

Perforce Replication. The Definitive Guide. Sven Erik Knop Senior Consultant Perforce Replication The Definitive Guide Sven Erik Knop Senior Consultant SOME QUOTES Deutsch s Eight Fallacies of Distributed Computing: The network is reliable. Latency is zero. Bandwidth is infinite.

More information

Helix Versioning Engine Administrator Guide: Multi-Site Deployment

Helix Versioning Engine Administrator Guide: Multi-Site Deployment Helix Versioning Engine Administrator Guide: Multi-Site Deployment 2017.1 May 2017 Copyright 1999-2018Perforce Software. All rights reserved. Perforce Software and documentation is available from www.perforce.com.

More information

Admin Guide ( Unix System Administration )

Admin Guide ( Unix System Administration ) Admin Guide ( Unix System Administration ) ProFTPD Server Configuration ProFTPD is a secure and configurable FTP server, written for use on Unix and Unix-like operating systems. ProFTPD is modeled around

More information

CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.0) Network Programming using C

CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.0) Network Programming using C CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.0) Network Programming using C Overview This homework is due by 11:59:59 PM on Thursday, April 26, 2018.

More information

How to open ports in the DSL router firmware version 2.xx and above

How to open ports in the DSL router firmware version 2.xx and above How to open ports in the DSL router firmware version 2.xx and above This example shows how to open port 3389 (which is used by Remote Desktop service) in the DSL router running firmware version 2.xx or

More information

Verify Radius Server Connectivity with Test AAA Radius Command

Verify Radius Server Connectivity with Test AAA Radius Command Verify Connectivity with Test AAA Radius Command Contents Introduction Prerequisites Requirements Components Used Background Information How The Feature Works Command Syntax Scenario 1. Passed Authentication

More information

IPMA 7.0 Easy Setup Reference Guide

IPMA 7.0 Easy Setup Reference Guide IPMA 7.0 Easy Setup Reference Guide Cisco IP Manager Assistant 1 Agenda What is IPMA? Overview of IPMA Call Flow Step by Step Proxy Mode Setup Traces 2 IPMA IPMA is an application that allow managers and

More information

Administration Manual

Administration Manual Administration Manual SAP J2EE Engine 6.20 Contents About This Manual... 10 Target Audience and Prerequisites... 10 Structure... 10 Documentation Conventions... 11 Further Reading... 11 Administration

More information

CSC209: Software tools. Unix files and directories permissions utilities/commands Shell programming quoting wild cards files

CSC209: Software tools. Unix files and directories permissions utilities/commands Shell programming quoting wild cards files CSC209 Review CSC209: Software tools Unix files and directories permissions utilities/commands Shell programming quoting wild cards files ... and systems programming C basic syntax functions arrays structs

More information

CSC209: Software tools. Unix files and directories permissions utilities/commands Shell programming quoting wild cards files. Compiler vs.

CSC209: Software tools. Unix files and directories permissions utilities/commands Shell programming quoting wild cards files. Compiler vs. CSC209 Review CSC209: Software tools Unix files and directories permissions utilities/commands Shell programming quoting wild cards files... and systems programming C basic syntax functions arrays structs

More information

NetBrain Consultant Edition (CE)

NetBrain Consultant Edition (CE) NetBrain Consultant Edition (CE) Quick Start Guide NetBrain Technologies, Inc. 2004-2013. All rights reserved +1.800.605.7964 support@netbraintech.com www.netbraintech.com Contents 1. Introduction 1) Install

More information

Administration Manual

Administration Manual Administration Manual SAP J2EE Engine 6.20 Contents About This Manual...12 Target Audience and Prerequisites...12 Structure...12 Documentation Conventions...14 Further Reading...14 Administration Tools...15

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 14 This chapter describes how to configure system message logging on the Cisco MDS 9020 Fabric Switch. It includes the following sections: About System Message Logging, page 14-1 System Message

More information

CCNA 1 Chapter 11 V4.0 Answers

CCNA 1 Chapter 11 V4.0 Answers CCNA 1 Chapter 11 V4.0 Answers 1. Refer to the exhibit. What command will place the router into the correct mode to configure an appropriate interface to connect to a LAN? UBAMA# configure terminal UBAMA(config)#

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

CSC209 Review. Yeah! We made it!

CSC209 Review. Yeah! We made it! CSC209 Review Yeah! We made it! 1 CSC209: Software tools Unix files and directories permissions utilities/commands Shell programming quoting wild cards files 2 ... and C programming... C basic syntax functions

More information

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting.

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting. This chapter describes how to log system messages and use them for troubleshooting. About, page 1 Guidelines for, page 7 Configure, page 8 Monitoring the Logs, page 26 History for, page 29 About System

More information

Helix Versioning Engine Administrator Guide: Multi-Site Deployment

Helix Versioning Engine Administrator Guide: Multi-Site Deployment Helix Versioning Engine Administrator Guide: Multi-Site Deployment 2017.2 October 2017 Copyright 1999-2018 Perforce Software. All rights reserved. Perforce Software and documentation is available from

More information

NETWORK LAB 2 Configuring Switch Desktop

NETWORK LAB 2 Configuring Switch Desktop Configuring Switch 1. Select the switch tab and then add a switch from the list of switches we have to the workspace, we will choose (2950-24) switch. 2. Add a number of PCs next to the switch in order

More information

Who is Docker and how he can help us? Heino Talvik

Who is Docker and how he can help us? Heino Talvik Who is Docker and how he can help us? Heino Talvik heino.talvik@seb.ee heino.talvik@gmail.com What is Docker? Software guy view: Marriage of infrastucture and Source Code Management Hardware guy view:

More information

CHAPTER 2. Troubleshooting CGI Scripts

CHAPTER 2. Troubleshooting CGI Scripts CHAPTER 2 Troubleshooting CGI Scripts OVERVIEW Web servers and their CGI environment can be set up in a variety of ways. Chapter 1 covered the basics of the installation and configuration of scripts. However,

More information

stdin, stdout, stderr

stdin, stdout, stderr stdin, stdout, stderr stdout and stderr Many programs make output to "standard out" and "standard error" (e.g. the print command goes to standard out, error messages go to standard error). By default,

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

CSET 4150 Web System Administration (3 semester credit hours) IT Required

CSET 4150 Web System Administration (3 semester credit hours) IT Required CSET 4150 Web System Administration ( semester credit hours) CSET Elective IT Required Current Catalog Description: Installation and configuration of the web server operating systems (e.g., UNIX, Windows),

More information

CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.1) Sockets and Server Programming using C

CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.1) Sockets and Server Programming using C CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.1) Sockets and Server Programming using C Overview This homework is due by 11:59:59 PM on Monday, December

More information

Configure Easy Wireless Setup ISE 2.2

Configure Easy Wireless Setup ISE 2.2 Configure Easy Wireless Setup ISE 2.2 Contents Introduction Prerequisites Requirements Components Used Background Information Easy Wireless Feature Information Key Benefits Limitations Configure Step 1.

More information

GROWL Scripts and Web Services

GROWL Scripts and Web Services GROWL Scripts and Web Services Grid Technology Group E-Science Centre r.j.allan@dl.ac.uk GROWL Collaborative project (JISC VRE I programme) between CCLRC Daresbury Laboratory and the Universities of Cambridge

More information

Real-time Replication in the Real World. Richard E. Baum C. Thomas Tyler

Real-time Replication in the Real World. Richard E. Baum C. Thomas Tyler Real-time Replication in the Real World Richard E. Baum C. Thomas Tyler 2 Agenda Provide an overview of replication solutions Discuss relevant new 2009.2 features Review some real-world solutions 3 Terminology

More information

Microsoft SQL AlwaysOn and High Availability

Microsoft SQL AlwaysOn and High Availability Course 55153A: Microsoft SQL AlwaysOn and High Availability Course details Course Outline Module 1: Course Overview This module explains how the class will be structured and introduces course materials

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 6 Displaying

More information

Network setup and troubleshooting

Network setup and troubleshooting ACTi Knowledge Base Category: Application Note Sub-category: Application Model: All Firmware: All Software: NVR Published: 2009/12/21 Reviewed: 2010/06/10 Network setup and troubleshooting Contents Introduction

More information

Useful Unix Commands Cheat Sheet

Useful Unix Commands Cheat Sheet Useful Unix Commands Cheat Sheet The Chinese University of Hong Kong SIGSC Training (Fall 2016) FILE AND DIRECTORY pwd Return path to current directory. ls List directories and files here. ls dir List

More information

Unix Processes. What is a Process?

Unix Processes. What is a Process? Unix Processes Process -- program in execution shell spawns a process for each command and terminates it when the command completes Many processes all multiplexed to a single processor (or a small number

More information

NCM and LMS Co-residency Installation

NCM and LMS Co-residency Installation 2 CHAPTER This chapter describes the CiscoWorks NCM and LMS co-residency installation procedures on a Windows server and includes the following sections: Co-residency Installation Summary, page 2-1 Detailed

More information

Version 9 of the Icon Compiler. Ralph E. Griswold Department of Computer Science, The University of Arizona

Version 9 of the Icon Compiler. Ralph E. Griswold Department of Computer Science, The University of Arizona Version 9 of the Icon Compiler Ralph E. Griswold Department of Computer Science, The University of Arizona 1. Introduction There are two forms of the implementation of Icon, an interpreter and a compiler.

More information

Standard File Pointers

Standard File Pointers 1 Programming in C Standard File Pointers Assigned to console unless redirected Standard input = stdin Used by scan function Can be redirected: cmd < input-file Standard output = stdout Used by printf

More information

What s New in Fireware v12.3 WatchGuard Training

What s New in Fireware v12.3 WatchGuard Training What s New in Fireware v12.3 2 What s New in Fireware v12.3 Updates to Networking functionality: SD-WAN actions SD-WAN reporting enhancements NetFlow support Link monitor enhancements Centralized FireCluster

More information

Configure IOS-XE to display full show running-config for users with low Privilege Levels

Configure IOS-XE to display full show running-config for users with low Privilege Levels Configure IOS-XE to display full show running-config for users with low Privilege Levels Contents Introduction Prerequisites Requirements Components Used Configuration Problem Configuration Solution and

More information

BEAWebLogic Server. Node Manager Administrator s Guide

BEAWebLogic Server. Node Manager Administrator s Guide BEAWebLogic Server Node Manager Administrator s Guide Version 10.0 Revised: March 30, 2007 Contents 1. Introduction and Roadmap Document Scope and Audience.............................................

More information

JupyterHub Documentation

JupyterHub Documentation JupyterHub Documentation Release 0.4.0.dev Project Jupyter team January 30, 2016 User Documentation 1 Getting started with JupyterHub 3 2 Further reading 11 3 How JupyterHub works 13 4 Writing a custom

More information

Syslog and the Barracuda Web Security Gateway

Syslog and the Barracuda Web Security Gateway What is the Barracuda Syslog? The Barracuda Web Security Gateway generates syslog messages as a means of logging both changes to the web interface configuration and what happens to each traffic request

More information

How to Configure Guest Access with the Ticketing System

How to Configure Guest Access with the Ticketing System How to Configure Guest Access with the Ticketing System Set up a login or ticketing system to temporarily grant access to guest users. Ticketing admins assign guest tickets to the users. The user credentials

More information

Connecting CoovaAP 1.x with RADIUSdesk - Basic

Connecting CoovaAP 1.x with RADIUSdesk - Basic 2017/05/17 21:58 1/13 Connecting CoovaAP 1.x with RADIUSdesk - Basic Connecting CoovaAP 1.x with RADIUSdesk - Basic Introduction CoovaAP is a sub-project of Coova.org. It is custom firmware which can be

More information

ioncube Loader 10 User Guide

ioncube Loader 10 User Guide ioncube Loader 10 User Guide This document describes the available php.ini configuration options of the ioncube Loader that relate to processing of PHP encoded files, and also the ioncube24 service. It

More information

Chapter 1 - Introduction. September 8, 2016

Chapter 1 - Introduction. September 8, 2016 Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help

More information

Git Fusion Guide July 2015 Update

Git Fusion Guide July 2015 Update Git Fusion Guide 2015.2 July 2015 Update Git Fusion Guide 2015.2 July 2015 Update Copyright 1999-2015 Perforce Software. All rights reserved. Perforce software and documentation is available from http://www.perforce.com/.

More information

SecureAuth IdP Realm Guide

SecureAuth IdP Realm Guide SecureAuth IdP Realm Guide What is a Realm? A realm is a configured workflow that leads end-users to a target resource (application, IdM page, certificate enrollment page, etc.). Each SecureAuth IdP realm

More information

MiCloud. Copyright Mitel Communications AB

MiCloud. Copyright Mitel Communications AB MiCloud Copyright 2004-2015 Mitel Communications AB Table of Contents 1. Search... 4 2. Administration Home... 5 3. Service Administration... 5 3.1. General Service Configuration Information... 5 3.1.1.

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M.

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M. aaa max-sessions aaa max-sessions To set the maximum number of simultaneous authentication, authorization, and accounting (AAA) connections permitted for a user, use the aaa max-sessions command in global

More information

Before Installing Broadband Access Center

Before Installing Broadband Access Center CHAPTER 2 This chapter describes the requirements and dependencies for installing Cisco BAC successfully. This chapter describes: BAC Components, page 2-1 Installation and Startup Process, page 2-2 Database

More information

Advanced option settings on the command line. Set the interface and ports for the OpenVPN daemons

Advanced option settings on the command line. Set the interface and ports for the OpenVPN daemons Advanced option settings on the command line docs.openvpn.net/command-line/advanced-option-settings-on-the-command-line Set the interface and ports for the OpenVPN daemons In the Admin UI under Server

More information

Deploying the BIG-IP System v11 with Microsoft SharePoint 2010 and 2013

Deploying the BIG-IP System v11 with Microsoft SharePoint 2010 and 2013 Deployment Guide Document version 3.7 What's inside: 2 What is F5 iapp? 2 Prerequisites and configuration notes 4 Configuration example 5 Preparation Worksheet 6 Configuring SharePoint Alternate Access

More information

Table of Contents. Installing the AD FS Running the PowerShell Script 16. Troubleshooting log in issues 19

Table of Contents. Installing the AD FS Running the PowerShell Script 16. Troubleshooting log in issues 19 ZOHOCORP Installing and configuring AD FS 2.0 to work with ManageEngine SDP On-Demand Step by Step Guide ManageEngine On-Demand 3/21/2012 Table of Contents Installing the AD FS 2.0 2 Running the PowerShell

More information

Relay Proxy User Guide

Relay Proxy User Guide Relay Proxy User Guide DBL Technology Company Limited www.dbltek.com sales@dbltek.com support@dbltek.com 2016/5/30 Relay Proxy Relay Proxy is a server software developed by DBL Technology. Its main purposed

More information

Some Useful Options. Code Sample: MySQLMonitor/Demos/Create-DB.bat

Some Useful Options. Code Sample: MySQLMonitor/Demos/Create-DB.bat The command interpreter - mysql allows for interactive execution of SQL commands and for many routine and administrative tasks. At the launch of mysql, numerous options can be specified to manage formatting,

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name : LINUX PROGRAMMING Course Code : A70511 Class : IV B.

More information

Day 1 : August (Thursday) An overview of Globus Toolkit 2.4

Day 1 : August (Thursday) An overview of Globus Toolkit 2.4 An Overview of Grid Computing Workshop Day 1 : August 05 2004 (Thursday) An overview of Globus Toolkit 2.4 By CDAC Experts Contact :vcvrao@cdacindia.com; betatest@cdacindia.com URL : http://www.cs.umn.edu/~vcvrao

More information

Processes. What s s a process? process? A dynamically executing instance of a program. David Morgan

Processes. What s s a process? process? A dynamically executing instance of a program. David Morgan Processes David Morgan What s s a process? process? A dynamically executing instance of a program 1 Constituents of a process its code data various attributes OS needs to manage it OS keeps track of all

More information

IT441. Network Services Administration. Perl: File Handles

IT441. Network Services Administration. Perl: File Handles IT441 Network Services Administration Perl: File Handles Comment Blocks Perl normally treats lines beginning with a # as a comment. Get in the habit of including comments with your code. Put a comment

More information

U2 DBTools. Web Services Developer. Version April 2013 DBT-3205-ALL-DG-01

U2 DBTools. Web Services Developer. Version April 2013 DBT-3205-ALL-DG-01 U2 DBTools Web Services Developer Version 3.20.5 April 2013 DBT-3205-ALL-DG-01 Notices Edition Publication date: April 2013 Book number: DBT-3205-ALL-DG-01 Product version: Web Services Developer V3.20.5

More information

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER 4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information

More information

Review of Fundamentals

Review of Fundamentals Review of Fundamentals 1 The shell vi General shell review 2 http://teaching.idallen.com/cst8207/14f/notes/120_shell_basics.html The shell is a program that is executed for us automatically when we log

More information

AMQP Messaging Broker (Implemented in C++)

AMQP Messaging Broker (Implemented in C++) AMQP (Implemented in C++) AMQP (Implemented in C++) Table of Contents Introduction... vii 1. Running the AMQP... 1 1.1. Running a Qpid C++ Broker... 1 1.1.1. Building the C++ Broker and Client Libraries...

More information

ASD:Suite - Code Generation 2013 Verum 1

ASD:Suite - Code Generation 2013 Verum 1 ASD:Suite - Code Generation 2013 Verum 1 The generated ASD component in code is actually the component factory. This component factory is used to generate component instances. ASD component creation is

More information

Open the RocketDocs Viewer

Open the RocketDocs Viewer Open the RocketDocs Viewer Table of Contents Opening the Viewer... 1 Troubleshooting... 3 Message: No document is open to perform the operation... 3 No message or error but the document doesn t display

More information

UCx Feature Guide for Infinity phones

UCx Feature Guide for Infinity phones UCx Feature Guide for Infinity phones Date: 23 August 2018 Version: 1.4 System: UCx Release: 6.0 Phone models: E-MetroTel will provide support for the following Infinity IP phones, as long as the phones

More information

Configuring Cisco IOS CNS Agents

Configuring Cisco IOS CNS Agents CHAPTER 4 This chapter describes how to configure the Cisco IOS CNS agents on the Catalyst 2960 switch. Note For complete configuration information for the Cisco Configuration Engine, see this URL on Cisco.com

More information

Configuring MLD Snooping

Configuring MLD Snooping This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 5 Displaying

More information

Setting Up Initial System Configuration

Setting Up Initial System Configuration Default System Configuration on the Cisco ENCS, page 2 Default System Configuration on the Cisco UCS C220 M4 Server, page 3 Default System Configuration on the Cisco UCS E-Series Servers, page 4 Changing

More information

Cross-platform daemonization tools.

Cross-platform daemonization tools. Cross-platform daemonization tools. Release 0.1.0 Muterra, Inc Sep 14, 2017 Contents 1 What is Daemoniker? 1 1.1 Installing................................................. 1 1.2 Example usage..............................................

More information

IPitomy IP PBX Server: Cyberdata VoIP V2 Ceiling Speaker Configuration Guide

IPitomy IP PBX Server: Cyberdata VoIP V2 Ceiling Speaker Configuration Guide IPitomy IP PBX Server: Cyberdata VoIP V2 Ceiling Speaker Configuration Guide Document Part #930337A CyberData Corporation 2555 Garden Road Monterey, CA 93940 (831) 373-2601 www.cyberdata.net 1 1.0 Instructions

More information

DIALUP ISP Connection in NetWare 4.x, 5.x and BorderManager.

DIALUP ISP Connection in NetWare 4.x, 5.x and BorderManager. DIALUP ISP Connection in NetWare 4.x, 5.x and BorderManager. Beta version 1.0, Friday, March 09, 2001 Craig Johnson As long as you have the MPR (multi-protocol router) modules installed for NetWare (comes

More information

3. In the upper left hand corner, click the Barracuda logo ( ) then click Settings 4. Select the check box for SPoE as default.

3. In the upper left hand corner, click the Barracuda logo ( ) then click Settings 4. Select the check box for SPoE as default. Week 1 Lab Lab 1: Connect to the Barracuda network. 1. Download the Barracuda NG Firewall Admin 5.4 2. Launch NG Admin 3. In the upper left hand corner, click the Barracuda logo ( ) then click Settings

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad -500 043 COMPUTER SCIENCE AND ENGINEERING TUTORIAL QUESTION BANK Course Name : LINUX PROGRAMMING Course Code : A70511 (R15) Class

More information

Configuring Cache Services Using the Web Cache Communication Protocol

Configuring Cache Services Using the Web Cache Communication Protocol Configuring Cache Services Using the Web Cache Communication Protocol Finding Feature Information, page 1 Prerequisites for WCCP, page 1 Restrictions for WCCP, page 2 Information About WCCP, page 3 How

More information

To obtain the current global trace mask, call meitraceget(...). To modify the global trace mask, call meitraceset(...).

To obtain the current global trace mask, call meitraceget(...). To modify the global trace mask, call meitraceset(...). Trace Objects Trace Objects Introduction Use the Trace module to selectively produce trace output on a global and/or per-object basis for your application. You can specify the types of trace output when

More information

User guide. MiCloud Office user web

User guide. MiCloud Office user web User guide MiCloud Office user web User guide: MiCloud Office user web Copyright 2004-2014 Mitel Communications AB Revision: 4.3.4520 User guide Table of Contents 1. MiCloud overview... 1 1.1. Home...

More information

Configuring LDAP. Finding Feature Information

Configuring LDAP. Finding Feature Information This chapter describes how to configure the Lightweight Directory Access Protocol (LDAP) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information

More information

IBM Rational Quality Manager 4.0. eggplant Adapter Installation Guide

IBM Rational Quality Manager 4.0. eggplant Adapter Installation Guide IBM Rational Quality Manager 4.0 eggplant Adapter Installation Guide Two components are required to run the eggplant Adaptor for IBM Rational Quality Manager The eggplant Plug-In must be installed on the

More information

Microsoft SQL AlwaysOn and High Availability

Microsoft SQL AlwaysOn and High Availability Microsoft SQL AlwaysOn and High Availability 55153; 2 Days, Instructor-led Course Description This two-day instructor-led course is designed for database administrators to familiarize them with the concepts

More information

IGMP Snooping for IPv4 Multicast Traffic

IGMP Snooping for IPv4 Multicast Traffic 40 CHAPTER Prerequisites for IGMP Snooping, page 40-1 Restrictions for IGMP Snooping, page 40-1 Information About IGMP Snooping, page 40-2 Default Settings for IGMP Snooping, page 40-8 How to Configure

More information

P4EXP Help January 2018

P4EXP Help January 2018 P4EXP Help 2018.1 January 2018 Copyright 1999-2018 Perforce Software. All rights reserved. Perforce Software and documentation is available from www.perforce.com. You can download and use Perforce programs,

More information

Concurrent Programming. Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University

Concurrent Programming. Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University Concurrent Programming Copyright 2017 by Robert M. Dondero, Ph.D. Princeton University 1 Objectives You will learn/review: What a process is How to fork and wait for processes What a thread is How to spawn

More information

Git Fusion Guide February 2016 Update

Git Fusion Guide February 2016 Update Git Fusion Guide 2016.1 February 2016 Update Git Fusion Guide 2016.1 February 2016 Update Copyright 1999-2016 Perforce Software. All rights reserved. Perforce software and documentation is available from

More information

Last class: Today: Thread Background. Thread Systems

Last class: Today: Thread Background. Thread Systems 1 Last class: Thread Background Today: Thread Systems 2 Threading Systems 3 What kind of problems would you solve with threads? Imagine you are building a web server You could allocate a pool of threads,

More information

Review of Fundamentals. Todd Kelley CST8207 Todd Kelley 1

Review of Fundamentals. Todd Kelley CST8207 Todd Kelley 1 Review of Fundamentals Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 GPL the shell SSH (secure shell) the Course Linux Server RTFM vi general shell review 2 These notes are available on

More information

Exporting Phones. Using Phone Export CHAPTER

Exporting Phones. Using Phone Export CHAPTER CHAPTER 9 You can use the export utility to merge records from multiple Cisco Unified Communications Manager servers onto one Cisco Unified Communications Manager server. Use this procedure to move records

More information

VMISFT-RFM2G. Drivers for Windows NT, 2000, 2003 Server and XP Operating Systems Installation Guide Document Number # Rev.

VMISFT-RFM2G. Drivers for Windows NT, 2000, 2003 Server and XP Operating Systems Installation Guide Document Number # Rev. GE Fanuc Automation VMISFT-RFM2G Drivers for Windows NT, 2000, 2003 Server and XP Operating Systems Installation Guide Document Number # 520-000447-940 Rev. B FANUC Parts Table of Contents Chapter 1 -

More information

#include /opt/cscocnsie/templates/ethernet_setup.cfgtpl. Now, you could centralize all the administration for Ethernet configuration in one file.

#include /opt/cscocnsie/templates/ethernet_setup.cfgtpl. Now, you could centralize all the administration for Ethernet configuration in one file. CHAPTER 12 When creating a template, it is possible to specify variables that will be contextually substituted. Many of these variables are available in the drop-down menu in the Template Editor (see Figure

More information

Oracle WebLogic Server

Oracle WebLogic Server Oracle WebLogic Server Configuring Log Files and Filtering Log Messages 10g Release 3 (10.3) July 2008 Oracle WebLogic Server Configuring Log Files and Filtering Log Messages, 10g Release 3 (10.3) Copyright

More information

Licensing the Application CHAPTER

Licensing the Application CHAPTER CHAPTER 5 Licensing Application, Configuring E-mail, Cisco.com, Proxy Settings, RCP, SCP Settings, Security, Backup, Authentication Settings and Idle Timeout Settings, Browser and Server Security Mode

More information

SQL 2012 Installation

SQL 2012 Installation This document will go through a basic SQL Server 2012 installation. For installation requirements, support and download information please visit the following Microsoft websites. Before you start, you

More information

Scratchbox Remote Shell

Scratchbox Remote Shell Scratchbox Remote Shell Timo Savola tsavola@movial.fi Scratchbox Remote Shell by Timo Savola Copyright 2004, 2005 Nokia Revision history Version: Author: Description: 2005-02-08 Savola Based on Device

More information

Perforce System Administrator s Guide

Perforce System Administrator s Guide Perforce 2012.2 System Administrator s Guide October 2012 This manual copyright 1997-2012 Perforce Software. All rights reserved. Perforce software and documentation is available from http://www.perforce.com.

More information

Oracle WebLogic Server

Oracle WebLogic Server Oracle WebLogic Server Node Manager Administrator s Guide 10g Release 3 (10.3) August 2008 Oracle WebLogic Server Node Manager Administrator s Guide, 10g Release 3 (10.3) Copyright 2007, 2008, Oracle and/or

More information

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION Gabriella Davis The Turtle Partnership In This Session Review possible use cases for multiple directories Understand security implications

More information

What s New (v4.0 to v5.0) Thinware vbackup 5.0.0

What s New (v4.0 to v5.0) Thinware vbackup 5.0.0 What s New (v4.0 to v5.0) Thinware vbackup 5.0.0 Thinware vbackup version 5.0 has many new features. This document will simply cover the highpoints on what s new mostly for the purpose of helping you understand

More information

SignArchive 2.5. User Manual SOFTPRO GmbH, All rights reserved. Version 0.4

SignArchive 2.5. User Manual SOFTPRO GmbH, All rights reserved. Version 0.4 SignArchive 2.5 User Manual. 2008 SOFTPRO GmbH, All rights reserved Version 0.4 Date: August 5, 2008 Date: August 5, 2008 Content 1 OVERVIEW...4 2 INSTALLATION...5 2.1 SIGNARCHIVE SERVER...5 2.1.1 Upgrade

More information

CSCI 2132 Software Development. Lecture 5: File Permissions

CSCI 2132 Software Development. Lecture 5: File Permissions CSCI 2132 Software Development Lecture 5: File Permissions Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 14-Sep-2018 (5) CSCI 2132 1 Files and Directories Pathnames Previous

More information