Monitoring Simplified.
|
|
- Carmel Shepherd
- 6 years ago
- Views:
Transcription
1 Monitoring Simplified
2 How many use NSClient++ NS-what did he wrong room!
3 How many like NSClient++?..pdh collection thread not running ERROR: Missing argument exception PdhCollectQueryData? failed: : : No data to return. Failed to query performance counters:..pdh collection thread not running ERROR: Missing argument exception PdhCollectQueryData? failed: : : No data to return. Failed to query performance counters:
4 CheckEventLog file=application file=system MaxWarn=1 MaxCrit=1 "filter=generated gt -2d AND severity NOT IN ('success', 'informational') AND source!= 'SideBySide'" truncate=800 unique descriptions "syntax=%severity%: %source%: %message% (%count%)" simple?
5 WTF?!?!
6 How many saw me last year? Boring Get started already!
7 dev not ops worked in ops a long time ago work with soa not, C/C++, nagios
8 NSClient++
9 linux and windows <0.4.0 Agent (Passive, Active, Realsince 2003? ( ) modular by design Open source not open core Highly extensible
10 0.4.1: xx 0.4.2: xx? 0.4.3: xx?
11 is stable
12 one-man-band no company no commercial version no paid time
13 Please Get your a** over here and play NOW! Some times I am busy
14 sponsoring! donations! support!
15 Thank you!
16
17 0.4.1 Sockets: ipv6, ssl (true) Modernized: NRPE, NSCA, check_nt New protocols: NRDP, check_mk, Graphite, syslog, smtp Real-time checks: eventlog, logfiles Simplified: Command line syntax
18 Secure monitoring
19 0.4.1 Build 90 ( xx) nsclient-full.ini Reload from script (re)added check_filesize (ie. Check_nt v FILESIZE) Encoding support for NRPE New option: scan-range for CheckEventLog Various minor bug fixes Build 96 ( xx) Reverted external script quoting issues (re)added check_fileage (ie. Check_nt v FILEAGE) Added support for binding to both ipv6 and ipv4 Various minor bug fixes Build 102 ( xx) PDH improvements Performance data: pass through Encoding support through out Various minor bug fixes and enhancements
20 0.4.2: The goals Modern Windows support Real-time monitoring Simplified monitoring Linux checks
21 0.4.2: The STATUS Modern Windows support Real-time monitoring Simplified monitoring Linux checks NSCP protocol Check_xxx clients
22 0.4.2: Some Examples Check_os_Version Check_process Check_pagefile NO MORE PDH Check_service Nrpe_client
23 0.4.3: The goals LINUX PACKAGES QUALITY IMPROVMENTS SCRIPTS AUTO DETECTION ADADIGIOS INTEGRATION?
24 Filters
25 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3
26 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3
27 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3
28 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3
29 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3
30 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3
31 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3
32 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3 ( )
33 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3 (source or level )
34 Core Load core1 5 core2 0 core3 0 core4 5 core5 0 core6 0 Total 2 load > 10
35 Name Size Foo.txt 5k Bar.txt 12k Log.txt 0 Test.txt 123 Foobar.txt 1k Testing.txt 2k Barfoo.txt 24k size > 10k
36 Name Size physical 8g commited 12g used > 80%
37 filter = (id NOT IN ('3', '4', '6', '11', '16', '23', '24', '27', '29', '36', '46', '47', '50', '56', '134', '142', '219', '267', '270', '1006', '1009', '1014', '1030', '1035', '1036', '1055', '1058', '1071', '1073', '1085', '1102', '1110', '1111', '1112', '1131', '1291', '1500', '3095', '5719', '5722', '5783', '5788', '5789', '6008', '7000', '7001', '7003', '7005', '7009', '7011', '7022', '7023', '7024', '7026', '7030', '7031', '7034', '7038', '7041', '9015', '9018', '9026', '9028', '10009', '10010', '10016', '10149', '12294', '15300', '15301', '24679', '36887', '36888', '40960', '40961', '45056') AND level IN ('error', 'warning')) OR (id IN ('3') AND source NOT IN ('FilterManager') AND level IN ('error', 'warning')) OR (id IN ('4') AND source NOT IN ('q57','l2nd') AND level IN ('error', 'warning')) OR (id IN ('6') AND source NOT IN ('Security-Kerberos') AND level IN ('error', 'warning')) OR (id IN ('11') AND source NOT IN ('Kerberos-Key-Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('16') AND source NOT IN ('WindowsUpdateClient') AND level IN ('error', 'warning')) OR (id IN ('23') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('24') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('27') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('29') AND source NOT IN ('Kerberos-Key-Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('36') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('46') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('47') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('50') AND source NOT IN ('TermDD','Time-Service') AND level IN ('error', 'warning')) OR (id IN ('56') AND source NOT IN ('TermDD') AND level IN ('error', 'warning')) OR (id IN ('134') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('142') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('219') AND source NOT IN ('Kernel-pnp') AND level IN ('error', 'warning')) OR (id IN ('267') AND source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('270') AND source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('1006') AND source NOT IN ('DNS Client Events','GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1009') AND source NOT IN ('picadm') AND level IN ('error', 'warning')) OR (id IN ('1014') AND source NOT IN ('DNS Client Events') AND level IN ('error', 'warning')) OR (id IN ('1030') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1035') AND source NOT IN ('TerminalServices-RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1036') AND source NOT IN ('TerminalServices-RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1055') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1058') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1071') AND source NOT IN ('TerminalServices-RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1073') AND source NOT IN ('USER32') AND level IN ('error', 'warning')) OR (id IN ('1085') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1102') AND source NOT IN ('SNMP') AND level IN ('error', 'warning')) OR (id IN ('1110') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1111') AND source NOT IN ('Server Agents') AND level IN ('error', 'warning')) OR (id IN ('1112') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1131') AND source NOT IN ('TerminalServices- RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1291') AND source NOT IN ('NIC-agents') AND level IN ('error', 'warning')) OR (id IN ('1500') AND source NOT IN ('SNMP') AND level IN ('error', 'warning')) OR (id IN ('3095') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5719') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5722') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5783') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5788') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5789') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('6008') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('7000') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7001') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7003') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7005') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7009') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7011') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7022') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7023') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7024') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7026') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7030') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7031') AND source NOT IN ('service control manager') AND strings not like 'citrix' AND level IN ('error', 'warning')) OR (id IN ('7034') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7038') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7041') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('9015') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN ('9018') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN ('9026') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN ('9028') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN ('10009') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning')) OR (id IN ('10010') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning')) OR (id IN ('10016') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning')) OR (id IN ('10149') AND source NOT IN ('WindowsRemoteManagement') AND level IN ('error', 'warning')) OR (id IN ('12294') AND source NOT IN ('Directory-Services-SAM') AND level IN ('error', 'warning')) OR (id IN ('15300') AND source NOT IN ('HTTPEVENT') AND level IN ('error', 'warning')) OR (id IN ('15301') AND source NOT IN ('HTTPEVENT') AND level IN ('error', 'warning')) OR (id IN ('24679') AND source NOT IN ('Cissesrv') AND level IN ('error', 'warning')) OR (id IN ('36887') AND source NOT IN ('Schannel') AND level IN ('error', 'warning')) OR (id IN ('36888') AND source NOT IN ('Schannel') AND level IN ('error', 'warning')) OR (id IN ('40960') AND source NOT IN ('LSASRV') AND level IN ('error', 'warning')) OR (id IN ('40961') AND source NOT IN ('LSASRV') AND level IN ('error', 'warning')) OR (id IN ('45056') AND source NOT IN ('LSASRV') AND level IN ('error', 'warning'))
38 Numbers, constants etc Key Safe Key Description = eq Equals!= ne Not equals > gt Greater than < lt Less than >= ge Greater or equal than <= le Less or equal than in ( <LIST OF VALUES>) In a given list not in ( ) Not in a given list
39 Strings Key Safe Key Description = eq Equals!= ne Not equals > gt Greater than < lt Less than >= ge Greater or equal than <= le Less or equal than in ( <LIST OF VALUES>) In a given list not in ( ) Not in a given list like Substring matching regexp Regular expression not like Opposite of like not regexp Opposite of regexp
40 All good things are three! warning filter RETURNED critical
41 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3
42 Display Custom strings Supports top- and detail-syntax
43 Display detail- top- ${source} ${list} Hello: s: App1, s: App1, s: App3
44 check_pagefile "filter=name = 'total check_uptime "warn=uptime > - "crit=uptime > - check_process process=explorer.exe "warn=working_set > 70m" "detail-syntax=${exe} ws:${working_set}, handles: ${handles}, user time:${user
45 Simple?
46 Let me guess This all seems Like a lot of typing!
47 Sensible defaults!
48 check_cpu Just works!
49 Real time monitoring
50 Active monitoring! check_cpu check_mem check_uptime check_eventlog check_updates Monitoring Server (Nagios) Monitored Server (Windows)
51 Passive monitoring! check_cpu check_mem check_uptime check_eventlog check_updates Monitoring Server (Nagios) Monitored Server (Windows)
52 Real-time monitoring! Error detected in eventlog Everything is ok Monitoring Server (Nagios) Monitored Server (Windows)
53 Zero overhead log-file checks Composite checks Stateful monitoring Adaptive thresholds? Correlation CEP
54 But HOW ABOUT Graphing?
55 Two options: 1, store/fetch from cache 2, submit passively but not to Nagios!
56
57 Native Simple Secure Fast Light weight A work in progress
58 check_service computer= check_disk drive=\\ \c$ check_task_sched computer= check_wmi computer=
59 Light weight remote deployable agent Similar to psexec check_cpu check_memory check_process External scripts!
60 MONITORING SIMPLIFIED?
61 CheckEventLog file=application file=system MaxWarn=1 MaxCrit=1 "filter=generated gt -2d AND severity NOT IN ('success', 'informational') AND source!= 'SideBySide'" truncate=800 unique descriptions "syntax=%severity%: %source%: %message% (%count%)" simple?
62 check_eventlog simple?
63 THANK YOU!
64 Photo by Olga Berrios
65 Most images taken by me whilst visiting the INTREPID Information about NSClient++ facebook.com/nsclient Slides, and examples My Blog
Configuring Embedded Event Manager
CHAPTER 34 Unless otherwise noted, the term switch refers to a standalone switch or a switch stack. For complete syntax and usage information for the commands used in this chapter, see the Catalyst 3750
More informationConfiguring Embedded Event Manager
CHAPTER 30 This chapter describes how to use the embedded manager (EEM) to monitor and manage the Cisco ME 3400 Ethernet Access switch and how to configure it. The switch must be running the metro IP access
More informationNagios Snmp External Command Error With No Output (return Code 3)
Nagios Snmp External Command Error With No Output (return Code 3) Added value of custom variables to Object JSON output for hosts, services Fixed bug #583: Status Check Output of (No output on stdout)
More informationGovindaraj Rangan Technology Strategist Microsoft India
Govindaraj Rangan Technology Strategist Microsoft India Agenda Introduction to Windows Powershell Scripting with Windows Powershell Working with Objects (WMI, COM,.NET) Scripting Best Practices Agenda
More informationShell programming. Introduction to Operating Systems
Shell programming Introduction to Operating Systems Environment variables Predened variables $* all parameters $# number of parameters $? result of last command $$ process identier $i parameter number
More informationConfiguring the Embedded Event Manager
This chapter describes how to configure the Embedded Event Manager (EEM) to detect and handle critical events on Cisco NX-OS devices. This chapter includes the following sections: About EEM, page 1 Licensing
More informationScripting. More Shell Scripts. Adapted from Practical Unix and Programming Hunter College
Scripting More Shell Scripts Adapted from Practical Unix and Programming Hunter College Copyright 2006 2009 Stewart Weiss Back to shell scripts Now that you've learned a few commands and can edit files,
More informationA Big Step. Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers
A Big Step Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers Copyright 2006 2009 Stewart Weiss What a shell really does Here is the scoop on shells. A shell is a program
More informationbash Execution Control COMP2101 Winter 2019
bash Execution Control COMP2101 Winter 2019 Bash Execution Control Scripts commonly can evaluate situations and make simple decisions about actions to take Simple evaluations and actions can be accomplished
More informationScripting. Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers
Scripting Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers Adapted from Practical Unix and Programming Hunter College Copyright 2006 2009 Stewart Weiss What a shell
More informationPathologically Eclectic Rubbish Lister
Pathologically Eclectic Rubbish Lister 1 Perl Design Philosophy Author: Reuben Francis Cornel perl is an acronym for Practical Extraction and Report Language. But I guess the title is a rough translation
More informationShell Scripting. Todd Kelley CST8207 Todd Kelley 1
Shell Scripting Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 If we have a set of commands that we want to run on a regular basis, we could write a script A script acts as a Linux command,
More informationEECS2301. Special variables. $* and 3/14/2017. Linux/Unix part 2
Warning: These notes are not complete, it is a Skelton that will be modified/add-to in the class. If you want to us them for studying, either attend the class or get the completed notes from someone who
More informationArgument 1 = A number (0, 1, 2, 3) that will be used as the exit code the script will exit with (this is how Nagios determines the status)
Nagios XI - Using Scripts / Plugins With NSClient++ Article Number: 58 Rating: Unrated Last Updated: Wed, Jul 19, 017 at 11:59 PM O ve r vie w This KB article explains how to use external scripts / plugins
More informationControl Structures. CIS 118 Intro to LINUX
Control Structures CIS 118 Intro to LINUX Basic Control Structures TEST The test utility, has many formats for evaluating expressions. For example, when given three arguments, will return the value true
More informationConfiguring the Embedded Event Manager
This chapter describes how to configure the Embedded Event Manager (EEM) to detect and handle critical events on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information,
More informationA shell can be used in one of two ways:
Shell Scripting 1 A shell can be used in one of two ways: A command interpreter, used interactively A programming language, to write shell scripts (your own custom commands) 2 If we have a set of commands
More informationConditional Control Structures. Dr.T.Logeswari
Conditional Control Structures Dr.T.Logeswari TEST COMMAND test expression Or [ expression ] Syntax Ex: a=5; b=10 test $a eq $b ; echo $? [ $a eq $b] ; echo $? 2 Unix Shell Programming - Forouzan 2 TEST
More informationShell Programming. Introduction to Linux. Peter Ruprecht Research CU Boulder
Introduction to Linux Shell Programming Peter Ruprecht peter.ruprecht@colorado.edu www.rc.colorado.edu Downloadable Materials Slides and examples available at https://github.com/researchcomputing/ Final_Tutorials/
More informationLoGA: Low-Overhead GPU Accounting Using Events
10th ACM International Systems and Storage Conference, (KIT) KIT The Research University in the Helmholtz Association www.kit.edu GPU Sharing GPUs increasingly popular in computing Not every application
More informationCSCI 211 UNIX Lab. Shell Programming. Dr. Jiang Li. Jiang Li, Ph.D. Department of Computer Science
CSCI 211 UNIX Lab Shell Programming Dr. Jiang Li Why Shell Scripting Saves a lot of typing A shell script can run many commands at once A shell script can repeatedly run commands Help avoid mistakes Once
More informationConfiguring Syslog. Prerequisites for Configuring Syslog. Information About Syslog. Enabling Syslog DETAILED STEPS
This document describes the Syslog feature and configuration steps to implement Syslog. Prerequisites for, page 1 Information About Syslog, page 1 Enabling Syslog, page 1 Clearing Syslog, page 3 Verifying
More informationHow to pimp high volume PHP websites. 27. September 2008, PHP conference Barcelona. By Jens Bierkandt
How to pimp high volume PHP websites 27. September 2008, PHP conference Barcelona By Jens Bierkandt 1 About me Jens Bierkandt Working with PHP since 2000 From Germany, living in Spain, speaking English
More informationAssignment 1: Plz Tell Me My Password
Assignment 1: Plz Tell Me My Password Part I Due: 11:59 pm, September 23, 2013 Part II Due : 11:59 pm, September 27, 2013 1 Introduction The objective of this assignment is to gain experience in: socket
More informationConfiguring Health Monitoring
CHAPTER1 This chapter describes how to configure health monitoring on the ACE to track the state of a server by sending out probes. Also referred to as out-of-band health monitoring, the ACE verifies the
More informationError Code 502 Proxy Error. The Requested
Error Code 502 Proxy Error. The Requested Resource Is In Use. (170) 170 lines (152 sloc) 14.822 kb else sys.error("can't register status code in non-standard region without additional information") "There
More informationArchitectural Flexibility
Architectural Flexibility Key to Successful Monitoring By Shamas Demoret 1st Edition Architectural Flexibility // 1 Introduction Part 1: Checking Individual Systems Active Checks Passive Checks Agent-based
More informationShell Start-up and Configuration Files
ULI101 Week 10 Lesson Overview Shell Start-up and Configuration Files Shell History Alias Statement Shell Variables Introduction to Shell Scripting Positional Parameters echo and read Commands if and test
More informationLog Command Reference
Event and Accounting Logs Log Command Reference Command Hierarchies Log Command Reference on page 439 Accounting Policy Commands on page 440 Custom Record Commands on page 441 File ID Commands on page
More informationUnit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus
Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:
More informationMonitoring (and) IPv6
>> 1/26 Monitoring (and) IPv6 Dipl. Inform. October 28, 2009 Open Source Monitoring Conference Nürnberg, Germany >> 2/26 Introduction IPv6
More informationOK: {C: 68% free / 99.51GB total} 'C: free'= g; ; ;0; 'C: free %'=68%;20;10;0;100
Disk Space Checks Article Number: 770 Rating: Unrated Last Updated: Mon, Nov 13, 2017 at 6:27 PM Dis k S pa c e C he c ks Disk space checks vary depending on the following factors: Disk Free Space - Percentage
More informationEECS 470 Lab 5. Linux Shell Scripting. Friday, 1 st February, 2018
EECS 470 Lab 5 Linux Shell Scripting Department of Electrical Engineering and Computer Science College of Engineering University of Michigan Friday, 1 st February, 2018 (University of Michigan) Lab 5:
More informationSHELL SCRIPT BASIC. UNIX Programming 2014 Fall by Euiseong Seo
SHELL SCRIPT BASIC UNIX Programming 2014 Fall by Euiseong Seo Shell Script Interactive shell sequentially executes a series of commands Some tasks are repetitive and automatable They are what programs
More informationAntonio Sgro, Agent Architect for SAPM John Alvord, L2 Support IBM Tivoli Monitoring
ITM v6.x Situations November,2012 Antonio Sgro, Agent Architect for SAPM John Alvord, L2 Support Introduction and Agenda Situation Architecture Situation Definition Situation Best Practices Q&A 2 Situation
More informationShell Programming (bash)
Shell Programming Shell Programming (bash) Commands run from a file in a subshell A great way to automate a repeated sequence of commands. File starts with #!/bin/bash absolute path to the shell program
More informationTitle:[ Variables Comparison Operators If Else Statements ]
[Color Codes] Environmental Variables: PATH What is path? PATH=$PATH:/MyFolder/YourStuff?Scripts ENV HOME PWD SHELL PS1 EDITOR Showing default text editor #!/bin/bash a=375 hello=$a #No space permitted
More informationBasic Data & Dynamic Query
Working with data in ERP-ONE ERP-ONE provides a couple of ways to easily create or modify groupings of data Importing and Exporting using Excel Dynamic Query Working with data in ERP-ONE In order to work
More informationSTREAM Integrated Risk Manager Multi-user Deployment Options
Multi-user Deployment Options Contents Multi-User Edition: can be accessed using a Web Browser can be accessed from an iphone or ipad (free app in App Store), and a range of other platforms and mobile
More informationDiskBoss DATA MANAGEMENT
DiskBoss DATA MANAGEMENT Disk Change Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one to
More informationSHELL SCRIPT BASIC. UNIX Programming 2015 Fall by Euiseong Seo
SHELL SCRIPT BASIC UNIX Programming 2015 Fall by Euiseong Seo Shell Script! Interactive shell sequentially executes a series of commands! Some tasks are repetitive and automatable! They are what programs
More informationPass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS
Pass4sure.500-285.42q Number: 500-285 Passing Score: 800 Time Limit: 120 min File Version: 6.1 Cisco 500-285 Securing Cisco Networks with Sourcefire IPS I'm quite happy to announce that I passed 500-285
More informationState of the Nagios Plugins. Ton Voon October 2007
State of the Nagios Plugins Ton Voon October 2007 Statistics New team members Thomas Guyot-Sionnest Holger Weiss Matthias Eble Contributors For 1.4.4 release: 200 contributors For 1.4.10 release: 228 =
More informationDrupal Command Line Instructions Windows 7 List All >>>CLICK HERE<<<
Drupal Command Line Instructions Windows 7 List All Drush is a command-line interface for Drupal that provides a wide set of utilities for administering and drush @pantheon.drupal-7-sandbox.dev status
More information"Charting the Course... RHCE Rapid Track Course. Course Summary
Course Summary Description This course is carefully designed to match the topics found in the Red Hat RH299 exam prep course but also features the added benefit of an entire extra day of comprehensive
More informationMore Scripting and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1
More Scripting and Regular Expressions Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 Regular Expression Summary Regular Expression Examples Shell Scripting 2 Do not confuse filename globbing
More informationLinux Clusters Institute: Monitoring
Linux Clusters Institute: Monitoring Nathan Rini -- National Center for Atmospheric Research (NCAR) nate@ucar.edu Kyle Hutson System Administrator for Kansas State University kylehutson@ksu.edu Why monitor?
More informationE through event manager Commands
, page 1 1 event application event application To specify the event criteria for an Embedded Event Manager (EEM) applet that is run on the basis of an event raised through the EEM Event Publish application
More informationCross-realm trusts with FreeIPA v3
Cross-realm trusts with FreeIPA v3 Alexander Bokovoy, Andreas Scheider Alexander Bokovoy about:me Member of Samba Team since 2003 Principal Software Engineer, Red Hat FreeIPA project Andreas Schneider
More informationCisco IMC Plugin and Addon Release User Guide For Nagios Core
Cisco IMC Plugin and Addon Release 0.9.3 - User Guide For Nagios Core October 8, 2015 Table of Content 1. OVERVIEW... 1 1.1 ACRONYMS AND ABBREVIATIONS... 1 1.2 SYSTEM REQUIREMENTS... 1 2. INSTALLING THE
More informationDatacom Systems Inc. 9 Adler Dr. East Syracuse, NY Phone: Support:
Datacom Systems Inc. 9 Adler Dr. East Syracuse, NY 13057 Phone: +1-315-463-9541 Support: www.datacomsystems.com Release Notes Firmware for: VS-1012-F, VS-1012-F-1pwr, VS-1024-F, VS-1112-F, VS-1124-F, VS-1212-F,
More informationMcAfee Network Security Platform 9.1
9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationUnder What Circumstances Would You Want. Manually Resolve Conflicts In Ms Project
Under What Circumstances Would You Want To Manually Resolve Conflicts In Ms Project You control when you want to accept changes from other developers by Note: In order for Microsoft Project to interact
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationPROVIDING YOU LOG INFRASTRUCTURE LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE
PROVIDING YOU LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE LOG INFRASTRUCTURE 01 ENTERPRISE EDITION NXLOG KEY FEATURES: DO YOU NEED TO COLLECT LOG DATA OF YOUR EVENTS? NXLOG ENTERPRISE
More informationPlugin Monitoring for GLPI
Plugin Monitoring for GLPI Introduction 2 TOC 3 Contents Preface: Introduction...v Goals of this project... v Why is it revolutionnary?...v Links...v Internet site...v IRC-Channel...v Terms used in this
More information20.5. urllib Open arbitrary resources by URL
1 of 9 01/25/2012 11:19 AM 20.5. urllib Open arbitrary resources by URL Note: The urllib module has been split into parts and renamed in Python 3.0 to urllib.request, urllib.parse, and urllib.error. The
More informationStonesoft Management Center. Release Notes Revision A
Stonesoft Management Center Release Notes 5.10.2 Revision A Table of contents 1 About this release...3 System requirements... 3 Build version...4 Compatibility... 5 2 New features...6 3 Enhancements...
More informationFlow-Based Network Monitoring using nprobe and ntopng
Flow-Based Network Monitoring using nprobe and ntopng Simone Mainardi, PhD @simonemainardi mainardi@ntop.org Agenda About ntop Flow-based network monitoring, beyond SNMP nprobe: NetFlow/IPFIX/sFlow probe
More informationLinux Clusters Institute: Monitoring. Zhongtao Zhang, System Administrator, Holland Computing Center, University of Nebraska-Lincoln
Linux Clusters Institute: Monitoring Zhongtao Zhang, System Administrator, Holland Computing Center, University of Nebraska-Lincoln Why monitor? 2 Service Level Agreement (SLA) Which services must be provided
More informationCSCI-GA Scripting Languages
CSCI-GA.3033.003 Scripting Languages 6/7/2012 Textual data processing (Perl) CS 5142 Cornell University 9/7/13 1 Administrative Announcements Homework 2 due Friday at 6pm. First prelim 9/27, Review on
More informationSystem Monitor Driver PTC Inc. All Rights Reserved.
2017 PTC Inc. All Rights Reserved. 2 Table of Contents System Monitor Driver 1 Table of Contents 2 System Monitor Driver 3 Overview 3 Setup 4 Channel Properties General 4 Channel Properties Write Optimizations
More informationNMI End-to-End Diagnostic Advisory Group BoF. Spring 2004 Internet2 Member Meeting
NMI End-to-End Diagnostic Advisory Group BoF Spring 2004 Internet2 Member Meeting Progress Report Outline Review of goals Problem analysis from the perspective of the user Survey Architecture Event data
More informationCS Unix Tools & Scripting
Cornell University, Spring 2014 1 February 24, 2014 1 Slides evolved from previous versions by Hussam Abu-Libdeh and David Slater A note on awk for (item in array) The order in which items are returned
More information1 sur 5 11/09/ :22
[WARNING! + GUIDE] Backup and Restore IMEI / Galaxy S3... 1 sur 5 11/09/01 08: 5,797,601 MEMBERS,71 NOW ONLINE Remember Me? Forgot your password? > Samsung Galaxy S III I9300, I9305 > Galaxy S III I9305
More informationMonitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker
Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Publication Date: June 12, 2012 Abstract EventTracker allows you to effectively manage your systems and provides operational efficiencies
More informationLab 4: Shell scripting
Lab 4: Shell scripting Comp Sci 1585 Data Structures Lab: Tools Computer Scientists Outline 1 2 3 4 5 6 What is shell scripting good? are the duct tape and bailing wire of computer programming. You can
More informationHank Janssen GPM OSSL 2007
Hank Janssen GPM OSSL 2007 hjanssen@microsoft.com http://port25.technet.com Technology Understanding Innovation Change Agent Interoperability Cultural Understanding Technology Research Deep Unix & Linux
More informationHow to run stable benchmarks
How to run stable benchmarks FOSDEM 2017, Brussels Victor Stinner victor.stinner@gmail.com BINARY_ADD optim In 2014, int+int optimization proposed: 14 patches, many authors Is is faster? Is it worth it?
More informationVARONIS DATALERT APP FOR IBM QRADAR
VARONIS DATALERT APP FOR IBM QRADAR Integration Guide Publishing Information Software version 0 Document version 1 Publication date October 9, 2018 Copyright 2005-2018 Varonis Systems Inc. All rights reserved.
More informationSecurity, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: Security Requirements Security Requirements, on
More informationPreview. Review. The test, or [, command. Conditions. The test, or [, command (String Comparison) The test, or [, command (String Comparison) 2/5/2019
Review Shell Scripts How to make executable How to change mode Shell Syntax Variables Quoting Environment Variables Parameter Variables Preview Conditions The test, or [ Command if statement if--if statement
More informationAssignment 3, Due October 4
Assignment 3, Due October 4 1 Summary This assignment gives you practice with writing shell scripts. Shell scripting is also known as bash programming. Your shell is bash, and when you write a shell script
More informationNagios XI Monitoring Windows Event Logs With NagEventLog
The Industry Standard in IT Infrastructure Monitoring Purpose This document describes how to monitor Windows event logs using Nagios XI and the NagEventLog addon. Target Audience This document is intended
More informationManual Update Java 7 25 Mac 32 Bit
Manual Update Java 7 25 Mac 32 Bit Java SE 8 Update 20: Everything you need to run Java applications and Operating Systems: Linux, Mac OS X, Windows 7 (32 bit), Windows 7 (64 bit). For more information,
More informationFreeBSD Jails vs. Solaris Zones
FreeBSD Jails vs. Solaris Zones (and OpenSolaris) James O Gorman james@netinertia.co.uk Introduction FreeBSD user since 4.4-RELEASE Started using Solaris ~3.5 years ago Using jails for website hosting
More informationevent mat through R Commands
, page 1 1 event mat event mat To publish an event when a mac-address is learned in the mac-address-table, use the event matcommand in applet configuration mode. To disable the publishing of events, use
More informationAdding your IMAP Mail Account in Outlook 2013 on Windows
Adding your IMAP Mail Account in Outlook 2013 on Windows Replace example.co.za with your domain name as it was sent to you by Visualize IT 1. Launch Outlook 2. Select File on the top left menu bar 3. Select
More informationCentreon DSM Documentation
Centreon DSM Documentation Release 2.1.0 Centreon March 22, 2016 Contents i ii Centreon is an Open Source software package that lets you supervise all the infrastructures and applications comprising your
More informationDell Smart Plug-in Version 4.1 For HP Operations Manager 9.0 For Microsoft Windows User's Guide
Dell Smart Plug-in Version 4.1 For HP Operations Manager 9.0 For Microsoft Windows User's Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use
More informationShell Script Example. Here is a hello world shell script: $ ls -l -rwxr-xr-x 1 horner 48 Feb 19 11:50 hello* $ cat hello #!/bin/sh
Shell Programming Shells A shell can be used in one of two ways: A command interpreter, used interactively A programming language, to write shell scripts (your own custom commands) Shell Scripts A shell
More informationManual Update Java 7 25 Mac Windows Xp
Manual Update Java 7 25 Mac Windows Xp This release will be the last Oracle JDK 7 publicly available update. JavaFX SDK is now included in JDK 7 for Windows, Mac OS X, and Linux x86/x64. 5.3.1 Java Control
More informationImplementing Performance Management
Performance management (PM) on the Cisco IOS XR Software provides a framework to perform these tasks: Collect and export PM statistics to a TFTP server for data storage and retrieval Monitor the system
More informationShells & Shell Programming (Part B)
Shells & Shell Programming (Part B) Software Tools EECS2031 Winter 2018 Manos Papagelis Thanks to Karen Reid and Alan J Rosenthal for material in these slides CONTROL STATEMENTS 2 Control Statements Conditional
More informationManually Merge Hyper-v Snapshots Back Into One Vhd
Manually Merge Hyper-v Snapshots Back Into One Vhd The snapshots that Hyper-V typically creates are of the Standard type. and then Hyper-V merges the checkpoint back into the primary.vhd file and deletes
More informationShell Programming (Part 2)
i i Systems and Internet Infrastructure Security Institute for Networking and Security Research Department of Computer Science and Engineering Pennsylvania State University, University Park, PA Shell Programming
More informationComputer Systems and -architecture
Computer Systems and -architecture Project 5: Datapath 1 Ba INF 2018-2019 Brent van Bladel brent.vanbladel@uantwerpen.be Don t hesitate to contact the teaching assistant of this course. M.G.305 or by e-mail.
More informationWriting ARM Assembly. Steven R. Bagley
Writing ARM Assembly Steven R. Bagley Hello World B main hello DEFB Hello World\n\0 goodbye DEFB Goodbye Universe\n\0 ALIGN main ADR R0, hello ; put address of hello string in R0 SWI 3 ; print it out ADR
More information5 Zabbix Agent (Windows)
2017/10/17 09:19 1/5 5 Zabbix Agent (Windows) 5 Zabbix Agent (Windows) Installation Installation is very simple and includes 3 steps: Step 1 Create configuration file. Create configuration file c:/zabbix_agentd.conf
More informationError While Opening Connection - Ldap Error Code 49 - Invalid Credentials
Error While Opening Connection - Ldap Error Code 49 - Invalid Credentials AuthenticationException: (LDAP: error code 49-80090308: LdapErr: invalid credentials new user directory with the original configuration
More informationDfs Replication Schema Version 30 Not Supported
Dfs Replication Schema Version 30 Not Supported Direct a Distributed File System (DFS) client to the server that is hosting the requested The KCC does not use Lightweight Directory Access Protocol (LDAP).
More informationBranching and Merging
Branching and Merging SWEN-261 Introduction to Software Engineering Department of Software Engineering Rochester Institute of Technology Version control branching supports the ability to manage software
More informationHow To Monitor Apache Cassandra Distributed Databases
Purpose This document describes how to configure to monitor Apache Cassandra distributed database implementations in order to ensure that data, as well as the hardware housing it, is operating properly.
More informationECE571: Advanced Microprocessor Design Final Project Spring Officially Due: Friday, 4 May 2018 (Last day of Classes)
Overview: ECE571: Advanced Microprocessor Design Final Project Spring 2018 Officially Due: Friday, 4 May 2018 (Last day of Classes) Design a project that explores the power, energy, and/or performance
More informationThe Modern Mainframe At the Heart of Your Business
The Modern Mainframe At the Heart of Your Business IT Service Management Service Oriented Finance Needs to Satisfy Service Levels For Their Critical Applications I must make sure to meet my service levels.
More informationSystem Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices:
The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices: Introduction to, page 2 Appliance Information, page 5 Custom HTTPS Certificates,
More informationMonitoring Agent for SAP Applications Fix pack 11. Reference IBM
Monitoring Agent for SAP Applications 7.1.1 Fix pack 11 Reference IBM Monitoring Agent for SAP Applications 7.1.1 Fix pack 11 Reference IBM Note Before using this information and the product it supports,
More informationImplementing Performance Management
Performance management (PM) on the Cisco IOS XR Software provides a framework to perform these tasks: Collect and export PM statistics to a TFTP server for data storage and retrieval Monitor the system
More informationIceWarp to IceWarp Migration Guide
IceWarp Unified Communications IceWarp to IceWarp Migration Guide Version 12.0 IceWarp to IceWarp Migration Guide 2 Contents IceWarp to IceWarp Migration Guide... 4 Used Terminology... 4 Brief Introduction...
More informationPlugin Monitoring for GLPI
Plugin Monitoring for GLPI Introduction 2 TOC 3 Contents Preface: Introduction...v Goals of this project... v Why is it revolutionary?...v Links...v Internet site...v IRC-Channel...vi Terms used in this
More information