Monitoring Simplified.

Size: px
Start display at page:

Download "Monitoring Simplified."

Transcription

1 Monitoring Simplified

2 How many use NSClient++ NS-what did he wrong room!

3 How many like NSClient++?..pdh collection thread not running ERROR: Missing argument exception PdhCollectQueryData? failed: : : No data to return. Failed to query performance counters:..pdh collection thread not running ERROR: Missing argument exception PdhCollectQueryData? failed: : : No data to return. Failed to query performance counters:

4 CheckEventLog file=application file=system MaxWarn=1 MaxCrit=1 "filter=generated gt -2d AND severity NOT IN ('success', 'informational') AND source!= 'SideBySide'" truncate=800 unique descriptions "syntax=%severity%: %source%: %message% (%count%)" simple?

5 WTF?!?!

6 How many saw me last year? Boring Get started already!

7 dev not ops worked in ops a long time ago work with soa not, C/C++, nagios

8 NSClient++

9 linux and windows <0.4.0 Agent (Passive, Active, Realsince 2003? ( ) modular by design Open source not open core Highly extensible

10 0.4.1: xx 0.4.2: xx? 0.4.3: xx?

11 is stable

12 one-man-band no company no commercial version no paid time

13 Please Get your a** over here and play NOW! Some times I am busy

14 sponsoring! donations! support!

15 Thank you!

16

17 0.4.1 Sockets: ipv6, ssl (true) Modernized: NRPE, NSCA, check_nt New protocols: NRDP, check_mk, Graphite, syslog, smtp Real-time checks: eventlog, logfiles Simplified: Command line syntax

18 Secure monitoring

19 0.4.1 Build 90 ( xx) nsclient-full.ini Reload from script (re)added check_filesize (ie. Check_nt v FILESIZE) Encoding support for NRPE New option: scan-range for CheckEventLog Various minor bug fixes Build 96 ( xx) Reverted external script quoting issues (re)added check_fileage (ie. Check_nt v FILEAGE) Added support for binding to both ipv6 and ipv4 Various minor bug fixes Build 102 ( xx) PDH improvements Performance data: pass through Encoding support through out Various minor bug fixes and enhancements

20 0.4.2: The goals Modern Windows support Real-time monitoring Simplified monitoring Linux checks

21 0.4.2: The STATUS Modern Windows support Real-time monitoring Simplified monitoring Linux checks NSCP protocol Check_xxx clients

22 0.4.2: Some Examples Check_os_Version Check_process Check_pagefile NO MORE PDH Check_service Nrpe_client

23 0.4.3: The goals LINUX PACKAGES QUALITY IMPROVMENTS SCRIPTS AUTO DETECTION ADADIGIOS INTEGRATION?

24 Filters

25 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3

26 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3

27 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3

28 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3

29 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3

30 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3

31 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3

32 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3 ( )

33 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3 (source or level )

34 Core Load core1 5 core2 0 core3 0 core4 5 core5 0 core6 0 Total 2 load > 10

35 Name Size Foo.txt 5k Bar.txt 12k Log.txt 0 Test.txt 123 Foobar.txt 1k Testing.txt 2k Barfoo.txt 24k size > 10k

36 Name Size physical 8g commited 12g used > 80%

37 filter = (id NOT IN ('3', '4', '6', '11', '16', '23', '24', '27', '29', '36', '46', '47', '50', '56', '134', '142', '219', '267', '270', '1006', '1009', '1014', '1030', '1035', '1036', '1055', '1058', '1071', '1073', '1085', '1102', '1110', '1111', '1112', '1131', '1291', '1500', '3095', '5719', '5722', '5783', '5788', '5789', '6008', '7000', '7001', '7003', '7005', '7009', '7011', '7022', '7023', '7024', '7026', '7030', '7031', '7034', '7038', '7041', '9015', '9018', '9026', '9028', '10009', '10010', '10016', '10149', '12294', '15300', '15301', '24679', '36887', '36888', '40960', '40961', '45056') AND level IN ('error', 'warning')) OR (id IN ('3') AND source NOT IN ('FilterManager') AND level IN ('error', 'warning')) OR (id IN ('4') AND source NOT IN ('q57','l2nd') AND level IN ('error', 'warning')) OR (id IN ('6') AND source NOT IN ('Security-Kerberos') AND level IN ('error', 'warning')) OR (id IN ('11') AND source NOT IN ('Kerberos-Key-Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('16') AND source NOT IN ('WindowsUpdateClient') AND level IN ('error', 'warning')) OR (id IN ('23') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('24') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('27') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('29') AND source NOT IN ('Kerberos-Key-Distribution-Center') AND level IN ('error', 'warning')) OR (id IN ('36') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('46') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('47') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('50') AND source NOT IN ('TermDD','Time-Service') AND level IN ('error', 'warning')) OR (id IN ('56') AND source NOT IN ('TermDD') AND level IN ('error', 'warning')) OR (id IN ('134') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('142') AND source NOT IN ('Time-Service') AND level IN ('error', 'warning')) OR (id IN ('219') AND source NOT IN ('Kernel-pnp') AND level IN ('error', 'warning')) OR (id IN ('267') AND source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('270') AND source NOT IN ('Storage-agents') AND level IN ('error', 'warning')) OR (id IN ('1006') AND source NOT IN ('DNS Client Events','GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1009') AND source NOT IN ('picadm') AND level IN ('error', 'warning')) OR (id IN ('1014') AND source NOT IN ('DNS Client Events') AND level IN ('error', 'warning')) OR (id IN ('1030') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1035') AND source NOT IN ('TerminalServices-RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1036') AND source NOT IN ('TerminalServices-RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1055') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1058') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1071') AND source NOT IN ('TerminalServices-RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1073') AND source NOT IN ('USER32') AND level IN ('error', 'warning')) OR (id IN ('1085') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1102') AND source NOT IN ('SNMP') AND level IN ('error', 'warning')) OR (id IN ('1110') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1111') AND source NOT IN ('Server Agents') AND level IN ('error', 'warning')) OR (id IN ('1112') AND source NOT IN ('GroupPolicy') AND level IN ('error', 'warning')) OR (id IN ('1131') AND source NOT IN ('TerminalServices- RemoteConnectionManager') AND level IN ('error', 'warning')) OR (id IN ('1291') AND source NOT IN ('NIC-agents') AND level IN ('error', 'warning')) OR (id IN ('1500') AND source NOT IN ('SNMP') AND level IN ('error', 'warning')) OR (id IN ('3095') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5719') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5722') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5783') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5788') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('5789') AND source NOT IN ('Netlogon') AND level IN ('error', 'warning')) OR (id IN ('6008') AND source NOT IN ('Eventlog') AND level IN ('error', 'warning')) OR (id IN ('7000') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7001') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7003') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7005') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7009') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7011') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7022') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7023') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7024') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7026') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7030') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7031') AND source NOT IN ('service control manager') AND strings not like 'citrix' AND level IN ('error', 'warning')) OR (id IN ('7034') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7038') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('7041') AND source NOT IN ('service control manager') AND level IN ('error', 'warning')) OR (id IN ('9015') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN ('9018') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN ('9026') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN ('9028') AND source NOT IN ('Metaframe') AND level IN ('error', 'warning')) OR (id IN ('10009') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning')) OR (id IN ('10010') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning')) OR (id IN ('10016') AND source NOT IN ('DistributedCOM') AND level IN ('error', 'warning')) OR (id IN ('10149') AND source NOT IN ('WindowsRemoteManagement') AND level IN ('error', 'warning')) OR (id IN ('12294') AND source NOT IN ('Directory-Services-SAM') AND level IN ('error', 'warning')) OR (id IN ('15300') AND source NOT IN ('HTTPEVENT') AND level IN ('error', 'warning')) OR (id IN ('15301') AND source NOT IN ('HTTPEVENT') AND level IN ('error', 'warning')) OR (id IN ('24679') AND source NOT IN ('Cissesrv') AND level IN ('error', 'warning')) OR (id IN ('36887') AND source NOT IN ('Schannel') AND level IN ('error', 'warning')) OR (id IN ('36888') AND source NOT IN ('Schannel') AND level IN ('error', 'warning')) OR (id IN ('40960') AND source NOT IN ('LSASRV') AND level IN ('error', 'warning')) OR (id IN ('40961') AND source NOT IN ('LSASRV') AND level IN ('error', 'warning')) OR (id IN ('45056') AND source NOT IN ('LSASRV') AND level IN ('error', 'warning'))

38 Numbers, constants etc Key Safe Key Description = eq Equals!= ne Not equals > gt Greater than < lt Less than >= ge Greater or equal than <= le Less or equal than in ( <LIST OF VALUES>) In a given list not in ( ) Not in a given list

39 Strings Key Safe Key Description = eq Equals!= ne Not equals > gt Greater than < lt Less than >= ge Greater or equal than <= le Less or equal than in ( <LIST OF VALUES>) In a given list not in ( ) Not in a given list like Substring matching regexp Regular expression not like Opposite of like not regexp Opposite of regexp

40 All good things are three! warning filter RETURNED critical

41 Level Source Error Word Error Excel Info Word Warning Excel Error App1 Warning App1 Error App3

42 Display Custom strings Supports top- and detail-syntax

43 Display detail- top- ${source} ${list} Hello: s: App1, s: App1, s: App3

44 check_pagefile "filter=name = 'total check_uptime "warn=uptime > - "crit=uptime > - check_process process=explorer.exe "warn=working_set > 70m" "detail-syntax=${exe} ws:${working_set}, handles: ${handles}, user time:${user

45 Simple?

46 Let me guess This all seems Like a lot of typing!

47 Sensible defaults!

48 check_cpu Just works!

49 Real time monitoring

50 Active monitoring! check_cpu check_mem check_uptime check_eventlog check_updates Monitoring Server (Nagios) Monitored Server (Windows)

51 Passive monitoring! check_cpu check_mem check_uptime check_eventlog check_updates Monitoring Server (Nagios) Monitored Server (Windows)

52 Real-time monitoring! Error detected in eventlog Everything is ok Monitoring Server (Nagios) Monitored Server (Windows)

53 Zero overhead log-file checks Composite checks Stateful monitoring Adaptive thresholds? Correlation CEP

54 But HOW ABOUT Graphing?

55 Two options: 1, store/fetch from cache 2, submit passively but not to Nagios!

56

57 Native Simple Secure Fast Light weight A work in progress

58 check_service computer= check_disk drive=\\ \c$ check_task_sched computer= check_wmi computer=

59 Light weight remote deployable agent Similar to psexec check_cpu check_memory check_process External scripts!

60 MONITORING SIMPLIFIED?

61 CheckEventLog file=application file=system MaxWarn=1 MaxCrit=1 "filter=generated gt -2d AND severity NOT IN ('success', 'informational') AND source!= 'SideBySide'" truncate=800 unique descriptions "syntax=%severity%: %source%: %message% (%count%)" simple?

62 check_eventlog simple?

63 THANK YOU!

64 Photo by Olga Berrios

65 Most images taken by me whilst visiting the INTREPID Information about NSClient++ facebook.com/nsclient Slides, and examples My Blog

Configuring Embedded Event Manager

Configuring Embedded Event Manager CHAPTER 34 Unless otherwise noted, the term switch refers to a standalone switch or a switch stack. For complete syntax and usage information for the commands used in this chapter, see the Catalyst 3750

More information

Configuring Embedded Event Manager

Configuring Embedded Event Manager CHAPTER 30 This chapter describes how to use the embedded manager (EEM) to monitor and manage the Cisco ME 3400 Ethernet Access switch and how to configure it. The switch must be running the metro IP access

More information

Nagios Snmp External Command Error With No Output (return Code 3)

Nagios Snmp External Command Error With No Output (return Code 3) Nagios Snmp External Command Error With No Output (return Code 3) Added value of custom variables to Object JSON output for hosts, services Fixed bug #583: Status Check Output of (No output on stdout)

More information

Govindaraj Rangan Technology Strategist Microsoft India

Govindaraj Rangan Technology Strategist Microsoft India Govindaraj Rangan Technology Strategist Microsoft India Agenda Introduction to Windows Powershell Scripting with Windows Powershell Working with Objects (WMI, COM,.NET) Scripting Best Practices Agenda

More information

Shell programming. Introduction to Operating Systems

Shell programming. Introduction to Operating Systems Shell programming Introduction to Operating Systems Environment variables Predened variables $* all parameters $# number of parameters $? result of last command $$ process identier $i parameter number

More information

Configuring the Embedded Event Manager

Configuring the Embedded Event Manager This chapter describes how to configure the Embedded Event Manager (EEM) to detect and handle critical events on Cisco NX-OS devices. This chapter includes the following sections: About EEM, page 1 Licensing

More information

Scripting. More Shell Scripts. Adapted from Practical Unix and Programming Hunter College

Scripting. More Shell Scripts. Adapted from Practical Unix and Programming Hunter College Scripting More Shell Scripts Adapted from Practical Unix and Programming Hunter College Copyright 2006 2009 Stewart Weiss Back to shell scripts Now that you've learned a few commands and can edit files,

More information

A Big Step. Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers

A Big Step. Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers A Big Step Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers Copyright 2006 2009 Stewart Weiss What a shell really does Here is the scoop on shells. A shell is a program

More information

bash Execution Control COMP2101 Winter 2019

bash Execution Control COMP2101 Winter 2019 bash Execution Control COMP2101 Winter 2019 Bash Execution Control Scripts commonly can evaluate situations and make simple decisions about actions to take Simple evaluations and actions can be accomplished

More information

Scripting. Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers

Scripting. Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers Scripting Shell Scripts, I/O Redirection, Ownership and Permission Concepts, and Binary Numbers Adapted from Practical Unix and Programming Hunter College Copyright 2006 2009 Stewart Weiss What a shell

More information

Pathologically Eclectic Rubbish Lister

Pathologically Eclectic Rubbish Lister Pathologically Eclectic Rubbish Lister 1 Perl Design Philosophy Author: Reuben Francis Cornel perl is an acronym for Practical Extraction and Report Language. But I guess the title is a rough translation

More information

Shell Scripting. Todd Kelley CST8207 Todd Kelley 1

Shell Scripting. Todd Kelley CST8207 Todd Kelley 1 Shell Scripting Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 If we have a set of commands that we want to run on a regular basis, we could write a script A script acts as a Linux command,

More information

EECS2301. Special variables. $* and 3/14/2017. Linux/Unix part 2

EECS2301. Special variables. $* and 3/14/2017. Linux/Unix part 2 Warning: These notes are not complete, it is a Skelton that will be modified/add-to in the class. If you want to us them for studying, either attend the class or get the completed notes from someone who

More information

Argument 1 = A number (0, 1, 2, 3) that will be used as the exit code the script will exit with (this is how Nagios determines the status)

Argument 1 = A number (0, 1, 2, 3) that will be used as the exit code the script will exit with (this is how Nagios determines the status) Nagios XI - Using Scripts / Plugins With NSClient++ Article Number: 58 Rating: Unrated Last Updated: Wed, Jul 19, 017 at 11:59 PM O ve r vie w This KB article explains how to use external scripts / plugins

More information

Control Structures. CIS 118 Intro to LINUX

Control Structures. CIS 118 Intro to LINUX Control Structures CIS 118 Intro to LINUX Basic Control Structures TEST The test utility, has many formats for evaluating expressions. For example, when given three arguments, will return the value true

More information

Configuring the Embedded Event Manager

Configuring the Embedded Event Manager This chapter describes how to configure the Embedded Event Manager (EEM) to detect and handle critical events on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information,

More information

A shell can be used in one of two ways:

A shell can be used in one of two ways: Shell Scripting 1 A shell can be used in one of two ways: A command interpreter, used interactively A programming language, to write shell scripts (your own custom commands) 2 If we have a set of commands

More information

Conditional Control Structures. Dr.T.Logeswari

Conditional Control Structures. Dr.T.Logeswari Conditional Control Structures Dr.T.Logeswari TEST COMMAND test expression Or [ expression ] Syntax Ex: a=5; b=10 test $a eq $b ; echo $? [ $a eq $b] ; echo $? 2 Unix Shell Programming - Forouzan 2 TEST

More information

Shell Programming. Introduction to Linux. Peter Ruprecht Research CU Boulder

Shell Programming. Introduction to Linux. Peter Ruprecht  Research CU Boulder Introduction to Linux Shell Programming Peter Ruprecht peter.ruprecht@colorado.edu www.rc.colorado.edu Downloadable Materials Slides and examples available at https://github.com/researchcomputing/ Final_Tutorials/

More information

LoGA: Low-Overhead GPU Accounting Using Events

LoGA: Low-Overhead GPU Accounting Using Events 10th ACM International Systems and Storage Conference, (KIT) KIT The Research University in the Helmholtz Association www.kit.edu GPU Sharing GPUs increasingly popular in computing Not every application

More information

CSCI 211 UNIX Lab. Shell Programming. Dr. Jiang Li. Jiang Li, Ph.D. Department of Computer Science

CSCI 211 UNIX Lab. Shell Programming. Dr. Jiang Li. Jiang Li, Ph.D. Department of Computer Science CSCI 211 UNIX Lab Shell Programming Dr. Jiang Li Why Shell Scripting Saves a lot of typing A shell script can run many commands at once A shell script can repeatedly run commands Help avoid mistakes Once

More information

Configuring Syslog. Prerequisites for Configuring Syslog. Information About Syslog. Enabling Syslog DETAILED STEPS

Configuring Syslog. Prerequisites for Configuring Syslog. Information About Syslog. Enabling Syslog DETAILED STEPS This document describes the Syslog feature and configuration steps to implement Syslog. Prerequisites for, page 1 Information About Syslog, page 1 Enabling Syslog, page 1 Clearing Syslog, page 3 Verifying

More information

How to pimp high volume PHP websites. 27. September 2008, PHP conference Barcelona. By Jens Bierkandt

How to pimp high volume PHP websites. 27. September 2008, PHP conference Barcelona. By Jens Bierkandt How to pimp high volume PHP websites 27. September 2008, PHP conference Barcelona By Jens Bierkandt 1 About me Jens Bierkandt Working with PHP since 2000 From Germany, living in Spain, speaking English

More information

Assignment 1: Plz Tell Me My Password

Assignment 1: Plz Tell Me My Password Assignment 1: Plz Tell Me My Password Part I Due: 11:59 pm, September 23, 2013 Part II Due : 11:59 pm, September 27, 2013 1 Introduction The objective of this assignment is to gain experience in: socket

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER1 This chapter describes how to configure health monitoring on the ACE to track the state of a server by sending out probes. Also referred to as out-of-band health monitoring, the ACE verifies the

More information

Error Code 502 Proxy Error. The Requested

Error Code 502 Proxy Error. The Requested Error Code 502 Proxy Error. The Requested Resource Is In Use. (170) 170 lines (152 sloc) 14.822 kb else sys.error("can't register status code in non-standard region without additional information") "There

More information

Architectural Flexibility

Architectural Flexibility Architectural Flexibility Key to Successful Monitoring By Shamas Demoret 1st Edition Architectural Flexibility // 1 Introduction Part 1: Checking Individual Systems Active Checks Passive Checks Agent-based

More information

Shell Start-up and Configuration Files

Shell Start-up and Configuration Files ULI101 Week 10 Lesson Overview Shell Start-up and Configuration Files Shell History Alias Statement Shell Variables Introduction to Shell Scripting Positional Parameters echo and read Commands if and test

More information

Log Command Reference

Log Command Reference Event and Accounting Logs Log Command Reference Command Hierarchies Log Command Reference on page 439 Accounting Policy Commands on page 440 Custom Record Commands on page 441 File ID Commands on page

More information

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:

More information

Monitoring (and) IPv6

Monitoring (and) IPv6 >> 1/26 Monitoring (and) IPv6 Dipl. Inform. October 28, 2009 Open Source Monitoring Conference Nürnberg, Germany >> 2/26 Introduction IPv6

More information

OK: {C: 68% free / 99.51GB total} 'C: free'= g; ; ;0; 'C: free %'=68%;20;10;0;100

OK: {C: 68% free / 99.51GB total} 'C: free'= g; ; ;0; 'C: free %'=68%;20;10;0;100 Disk Space Checks Article Number: 770 Rating: Unrated Last Updated: Mon, Nov 13, 2017 at 6:27 PM Dis k S pa c e C he c ks Disk space checks vary depending on the following factors: Disk Free Space - Percentage

More information

EECS 470 Lab 5. Linux Shell Scripting. Friday, 1 st February, 2018

EECS 470 Lab 5. Linux Shell Scripting. Friday, 1 st February, 2018 EECS 470 Lab 5 Linux Shell Scripting Department of Electrical Engineering and Computer Science College of Engineering University of Michigan Friday, 1 st February, 2018 (University of Michigan) Lab 5:

More information

SHELL SCRIPT BASIC. UNIX Programming 2014 Fall by Euiseong Seo

SHELL SCRIPT BASIC. UNIX Programming 2014 Fall by Euiseong Seo SHELL SCRIPT BASIC UNIX Programming 2014 Fall by Euiseong Seo Shell Script Interactive shell sequentially executes a series of commands Some tasks are repetitive and automatable They are what programs

More information

Antonio Sgro, Agent Architect for SAPM John Alvord, L2 Support IBM Tivoli Monitoring

Antonio Sgro, Agent Architect for SAPM John Alvord, L2 Support IBM Tivoli Monitoring ITM v6.x Situations November,2012 Antonio Sgro, Agent Architect for SAPM John Alvord, L2 Support Introduction and Agenda Situation Architecture Situation Definition Situation Best Practices Q&A 2 Situation

More information

Shell Programming (bash)

Shell Programming (bash) Shell Programming Shell Programming (bash) Commands run from a file in a subshell A great way to automate a repeated sequence of commands. File starts with #!/bin/bash absolute path to the shell program

More information

Title:[ Variables Comparison Operators If Else Statements ]

Title:[ Variables Comparison Operators If Else Statements ] [Color Codes] Environmental Variables: PATH What is path? PATH=$PATH:/MyFolder/YourStuff?Scripts ENV HOME PWD SHELL PS1 EDITOR Showing default text editor #!/bin/bash a=375 hello=$a #No space permitted

More information

Basic Data & Dynamic Query

Basic Data & Dynamic Query Working with data in ERP-ONE ERP-ONE provides a couple of ways to easily create or modify groupings of data Importing and Exporting using Excel Dynamic Query Working with data in ERP-ONE In order to work

More information

STREAM Integrated Risk Manager Multi-user Deployment Options

STREAM Integrated Risk Manager Multi-user Deployment Options Multi-user Deployment Options Contents Multi-User Edition: can be accessed using a Web Browser can be accessed from an iphone or ipad (free app in App Store), and a range of other platforms and mobile

More information

DiskBoss DATA MANAGEMENT

DiskBoss DATA MANAGEMENT DiskBoss DATA MANAGEMENT Disk Change Monitor Version 9.3 May 2018 www.diskboss.com info@flexense.com 1 1 Product Overview DiskBoss is an automated, policy-based data management solution allowing one to

More information

SHELL SCRIPT BASIC. UNIX Programming 2015 Fall by Euiseong Seo

SHELL SCRIPT BASIC. UNIX Programming 2015 Fall by Euiseong Seo SHELL SCRIPT BASIC UNIX Programming 2015 Fall by Euiseong Seo Shell Script! Interactive shell sequentially executes a series of commands! Some tasks are repetitive and automatable! They are what programs

More information

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS Pass4sure.500-285.42q Number: 500-285 Passing Score: 800 Time Limit: 120 min File Version: 6.1 Cisco 500-285 Securing Cisco Networks with Sourcefire IPS I'm quite happy to announce that I passed 500-285

More information

State of the Nagios Plugins. Ton Voon October 2007

State of the Nagios Plugins. Ton Voon October 2007 State of the Nagios Plugins Ton Voon October 2007 Statistics New team members Thomas Guyot-Sionnest Holger Weiss Matthias Eble Contributors For 1.4.4 release: 200 contributors For 1.4.10 release: 228 =

More information

Drupal Command Line Instructions Windows 7 List All >>>CLICK HERE<<<

Drupal Command Line Instructions Windows 7 List All >>>CLICK HERE<<< Drupal Command Line Instructions Windows 7 List All Drush is a command-line interface for Drupal that provides a wide set of utilities for administering and drush @pantheon.drupal-7-sandbox.dev status

More information

"Charting the Course... RHCE Rapid Track Course. Course Summary

Charting the Course... RHCE Rapid Track Course. Course Summary Course Summary Description This course is carefully designed to match the topics found in the Red Hat RH299 exam prep course but also features the added benefit of an entire extra day of comprehensive

More information

More Scripting and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1

More Scripting and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1 More Scripting and Regular Expressions Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 Regular Expression Summary Regular Expression Examples Shell Scripting 2 Do not confuse filename globbing

More information

Linux Clusters Institute: Monitoring

Linux Clusters Institute: Monitoring Linux Clusters Institute: Monitoring Nathan Rini -- National Center for Atmospheric Research (NCAR) nate@ucar.edu Kyle Hutson System Administrator for Kansas State University kylehutson@ksu.edu Why monitor?

More information

E through event manager Commands

E through event manager Commands , page 1 1 event application event application To specify the event criteria for an Embedded Event Manager (EEM) applet that is run on the basis of an event raised through the EEM Event Publish application

More information

Cross-realm trusts with FreeIPA v3

Cross-realm trusts with FreeIPA v3 Cross-realm trusts with FreeIPA v3 Alexander Bokovoy, Andreas Scheider Alexander Bokovoy about:me Member of Samba Team since 2003 Principal Software Engineer, Red Hat FreeIPA project Andreas Schneider

More information

Cisco IMC Plugin and Addon Release User Guide For Nagios Core

Cisco IMC Plugin and Addon Release User Guide For Nagios Core Cisco IMC Plugin and Addon Release 0.9.3 - User Guide For Nagios Core October 8, 2015 Table of Content 1. OVERVIEW... 1 1.1 ACRONYMS AND ABBREVIATIONS... 1 1.2 SYSTEM REQUIREMENTS... 1 2. INSTALLING THE

More information

Datacom Systems Inc. 9 Adler Dr. East Syracuse, NY Phone: Support:

Datacom Systems Inc. 9 Adler Dr. East Syracuse, NY Phone: Support: Datacom Systems Inc. 9 Adler Dr. East Syracuse, NY 13057 Phone: +1-315-463-9541 Support: www.datacomsystems.com Release Notes Firmware for: VS-1012-F, VS-1012-F-1pwr, VS-1024-F, VS-1112-F, VS-1124-F, VS-1212-F,

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Under What Circumstances Would You Want. Manually Resolve Conflicts In Ms Project

Under What Circumstances Would You Want. Manually Resolve Conflicts In Ms Project Under What Circumstances Would You Want To Manually Resolve Conflicts In Ms Project You control when you want to accept changes from other developers by Note: In order for Microsoft Project to interact

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

PROVIDING YOU LOG INFRASTRUCTURE LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE

PROVIDING YOU LOG INFRASTRUCTURE LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE PROVIDING YOU LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE LOG INFRASTRUCTURE 01 ENTERPRISE EDITION NXLOG KEY FEATURES: DO YOU NEED TO COLLECT LOG DATA OF YOUR EVENTS? NXLOG ENTERPRISE

More information

Plugin Monitoring for GLPI

Plugin Monitoring for GLPI Plugin Monitoring for GLPI Introduction 2 TOC 3 Contents Preface: Introduction...v Goals of this project... v Why is it revolutionnary?...v Links...v Internet site...v IRC-Channel...v Terms used in this

More information

20.5. urllib Open arbitrary resources by URL

20.5. urllib Open arbitrary resources by URL 1 of 9 01/25/2012 11:19 AM 20.5. urllib Open arbitrary resources by URL Note: The urllib module has been split into parts and renamed in Python 3.0 to urllib.request, urllib.parse, and urllib.error. The

More information

Stonesoft Management Center. Release Notes Revision A

Stonesoft Management Center. Release Notes Revision A Stonesoft Management Center Release Notes 5.10.2 Revision A Table of contents 1 About this release...3 System requirements... 3 Build version...4 Compatibility... 5 2 New features...6 3 Enhancements...

More information

Flow-Based Network Monitoring using nprobe and ntopng

Flow-Based Network Monitoring using nprobe and ntopng Flow-Based Network Monitoring using nprobe and ntopng Simone Mainardi, PhD @simonemainardi mainardi@ntop.org Agenda About ntop Flow-based network monitoring, beyond SNMP nprobe: NetFlow/IPFIX/sFlow probe

More information

Linux Clusters Institute: Monitoring. Zhongtao Zhang, System Administrator, Holland Computing Center, University of Nebraska-Lincoln

Linux Clusters Institute: Monitoring. Zhongtao Zhang, System Administrator, Holland Computing Center, University of Nebraska-Lincoln Linux Clusters Institute: Monitoring Zhongtao Zhang, System Administrator, Holland Computing Center, University of Nebraska-Lincoln Why monitor? 2 Service Level Agreement (SLA) Which services must be provided

More information

CSCI-GA Scripting Languages

CSCI-GA Scripting Languages CSCI-GA.3033.003 Scripting Languages 6/7/2012 Textual data processing (Perl) CS 5142 Cornell University 9/7/13 1 Administrative Announcements Homework 2 due Friday at 6pm. First prelim 9/27, Review on

More information

System Monitor Driver PTC Inc. All Rights Reserved.

System Monitor Driver PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents System Monitor Driver 1 Table of Contents 2 System Monitor Driver 3 Overview 3 Setup 4 Channel Properties General 4 Channel Properties Write Optimizations

More information

NMI End-to-End Diagnostic Advisory Group BoF. Spring 2004 Internet2 Member Meeting

NMI End-to-End Diagnostic Advisory Group BoF. Spring 2004 Internet2 Member Meeting NMI End-to-End Diagnostic Advisory Group BoF Spring 2004 Internet2 Member Meeting Progress Report Outline Review of goals Problem analysis from the perspective of the user Survey Architecture Event data

More information

CS Unix Tools & Scripting

CS Unix Tools & Scripting Cornell University, Spring 2014 1 February 24, 2014 1 Slides evolved from previous versions by Hussam Abu-Libdeh and David Slater A note on awk for (item in array) The order in which items are returned

More information

1 sur 5 11/09/ :22

1 sur 5 11/09/ :22 [WARNING! + GUIDE] Backup and Restore IMEI / Galaxy S3... 1 sur 5 11/09/01 08: 5,797,601 MEMBERS,71 NOW ONLINE Remember Me? Forgot your password? > Samsung Galaxy S III I9300, I9305 > Galaxy S III I9305

More information

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Publication Date: June 12, 2012 Abstract EventTracker allows you to effectively manage your systems and provides operational efficiencies

More information

Lab 4: Shell scripting

Lab 4: Shell scripting Lab 4: Shell scripting Comp Sci 1585 Data Structures Lab: Tools Computer Scientists Outline 1 2 3 4 5 6 What is shell scripting good? are the duct tape and bailing wire of computer programming. You can

More information

Hank Janssen GPM OSSL 2007

Hank Janssen GPM OSSL 2007 Hank Janssen GPM OSSL 2007 hjanssen@microsoft.com http://port25.technet.com Technology Understanding Innovation Change Agent Interoperability Cultural Understanding Technology Research Deep Unix & Linux

More information

How to run stable benchmarks

How to run stable benchmarks How to run stable benchmarks FOSDEM 2017, Brussels Victor Stinner victor.stinner@gmail.com BINARY_ADD optim In 2014, int+int optimization proposed: 14 patches, many authors Is is faster? Is it worth it?

More information

VARONIS DATALERT APP FOR IBM QRADAR

VARONIS DATALERT APP FOR IBM QRADAR VARONIS DATALERT APP FOR IBM QRADAR Integration Guide Publishing Information Software version 0 Document version 1 Publication date October 9, 2018 Copyright 2005-2018 Varonis Systems Inc. All rights reserved.

More information

Security, Internet Access, and Communication Ports

Security, Internet Access, and Communication Ports Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: Security Requirements Security Requirements, on

More information

Preview. Review. The test, or [, command. Conditions. The test, or [, command (String Comparison) The test, or [, command (String Comparison) 2/5/2019

Preview. Review. The test, or [, command. Conditions. The test, or [, command (String Comparison) The test, or [, command (String Comparison) 2/5/2019 Review Shell Scripts How to make executable How to change mode Shell Syntax Variables Quoting Environment Variables Parameter Variables Preview Conditions The test, or [ Command if statement if--if statement

More information

Assignment 3, Due October 4

Assignment 3, Due October 4 Assignment 3, Due October 4 1 Summary This assignment gives you practice with writing shell scripts. Shell scripting is also known as bash programming. Your shell is bash, and when you write a shell script

More information

Nagios XI Monitoring Windows Event Logs With NagEventLog

Nagios XI Monitoring Windows Event Logs With NagEventLog The Industry Standard in IT Infrastructure Monitoring Purpose This document describes how to monitor Windows event logs using Nagios XI and the NagEventLog addon. Target Audience This document is intended

More information

Manual Update Java 7 25 Mac 32 Bit

Manual Update Java 7 25 Mac 32 Bit Manual Update Java 7 25 Mac 32 Bit Java SE 8 Update 20: Everything you need to run Java applications and Operating Systems: Linux, Mac OS X, Windows 7 (32 bit), Windows 7 (64 bit). For more information,

More information

FreeBSD Jails vs. Solaris Zones

FreeBSD Jails vs. Solaris Zones FreeBSD Jails vs. Solaris Zones (and OpenSolaris) James O Gorman james@netinertia.co.uk Introduction FreeBSD user since 4.4-RELEASE Started using Solaris ~3.5 years ago Using jails for website hosting

More information

event mat through R Commands

event mat through R Commands , page 1 1 event mat event mat To publish an event when a mac-address is learned in the mac-address-table, use the event matcommand in applet configuration mode. To disable the publishing of events, use

More information

Adding your IMAP Mail Account in Outlook 2013 on Windows

Adding your IMAP Mail Account in Outlook 2013 on Windows Adding your IMAP Mail Account in Outlook 2013 on Windows Replace example.co.za with your domain name as it was sent to you by Visualize IT 1. Launch Outlook 2. Select File on the top left menu bar 3. Select

More information

Centreon DSM Documentation

Centreon DSM Documentation Centreon DSM Documentation Release 2.1.0 Centreon March 22, 2016 Contents i ii Centreon is an Open Source software package that lets you supervise all the infrastructures and applications comprising your

More information

Dell Smart Plug-in Version 4.1 For HP Operations Manager 9.0 For Microsoft Windows User's Guide

Dell Smart Plug-in Version 4.1 For HP Operations Manager 9.0 For Microsoft Windows User's Guide Dell Smart Plug-in Version 4.1 For HP Operations Manager 9.0 For Microsoft Windows User's Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use

More information

Shell Script Example. Here is a hello world shell script: $ ls -l -rwxr-xr-x 1 horner 48 Feb 19 11:50 hello* $ cat hello #!/bin/sh

Shell Script Example. Here is a hello world shell script: $ ls -l -rwxr-xr-x 1 horner 48 Feb 19 11:50 hello* $ cat hello #!/bin/sh Shell Programming Shells A shell can be used in one of two ways: A command interpreter, used interactively A programming language, to write shell scripts (your own custom commands) Shell Scripts A shell

More information

Manual Update Java 7 25 Mac Windows Xp

Manual Update Java 7 25 Mac Windows Xp Manual Update Java 7 25 Mac Windows Xp This release will be the last Oracle JDK 7 publicly available update. JavaFX SDK is now included in JDK 7 for Windows, Mac OS X, and Linux x86/x64. 5.3.1 Java Control

More information

Implementing Performance Management

Implementing Performance Management Performance management (PM) on the Cisco IOS XR Software provides a framework to perform these tasks: Collect and export PM statistics to a TFTP server for data storage and retrieval Monitor the system

More information

Shells & Shell Programming (Part B)

Shells & Shell Programming (Part B) Shells & Shell Programming (Part B) Software Tools EECS2031 Winter 2018 Manos Papagelis Thanks to Karen Reid and Alan J Rosenthal for material in these slides CONTROL STATEMENTS 2 Control Statements Conditional

More information

Manually Merge Hyper-v Snapshots Back Into One Vhd

Manually Merge Hyper-v Snapshots Back Into One Vhd Manually Merge Hyper-v Snapshots Back Into One Vhd The snapshots that Hyper-V typically creates are of the Standard type. and then Hyper-V merges the checkpoint back into the primary.vhd file and deletes

More information

Shell Programming (Part 2)

Shell Programming (Part 2) i i Systems and Internet Infrastructure Security Institute for Networking and Security Research Department of Computer Science and Engineering Pennsylvania State University, University Park, PA Shell Programming

More information

Computer Systems and -architecture

Computer Systems and -architecture Computer Systems and -architecture Project 5: Datapath 1 Ba INF 2018-2019 Brent van Bladel brent.vanbladel@uantwerpen.be Don t hesitate to contact the teaching assistant of this course. M.G.305 or by e-mail.

More information

Writing ARM Assembly. Steven R. Bagley

Writing ARM Assembly. Steven R. Bagley Writing ARM Assembly Steven R. Bagley Hello World B main hello DEFB Hello World\n\0 goodbye DEFB Goodbye Universe\n\0 ALIGN main ADR R0, hello ; put address of hello string in R0 SWI 3 ; print it out ADR

More information

5 Zabbix Agent (Windows)

5 Zabbix Agent (Windows) 2017/10/17 09:19 1/5 5 Zabbix Agent (Windows) 5 Zabbix Agent (Windows) Installation Installation is very simple and includes 3 steps: Step 1 Create configuration file. Create configuration file c:/zabbix_agentd.conf

More information

Error While Opening Connection - Ldap Error Code 49 - Invalid Credentials

Error While Opening Connection - Ldap Error Code 49 - Invalid Credentials Error While Opening Connection - Ldap Error Code 49 - Invalid Credentials AuthenticationException: (LDAP: error code 49-80090308: LdapErr: invalid credentials new user directory with the original configuration

More information

Dfs Replication Schema Version 30 Not Supported

Dfs Replication Schema Version 30 Not Supported Dfs Replication Schema Version 30 Not Supported Direct a Distributed File System (DFS) client to the server that is hosting the requested The KCC does not use Lightweight Directory Access Protocol (LDAP).

More information

Branching and Merging

Branching and Merging Branching and Merging SWEN-261 Introduction to Software Engineering Department of Software Engineering Rochester Institute of Technology Version control branching supports the ability to manage software

More information

How To Monitor Apache Cassandra Distributed Databases

How To Monitor Apache Cassandra Distributed Databases Purpose This document describes how to configure to monitor Apache Cassandra distributed database implementations in order to ensure that data, as well as the hardware housing it, is operating properly.

More information

ECE571: Advanced Microprocessor Design Final Project Spring Officially Due: Friday, 4 May 2018 (Last day of Classes)

ECE571: Advanced Microprocessor Design Final Project Spring Officially Due: Friday, 4 May 2018 (Last day of Classes) Overview: ECE571: Advanced Microprocessor Design Final Project Spring 2018 Officially Due: Friday, 4 May 2018 (Last day of Classes) Design a project that explores the power, energy, and/or performance

More information

The Modern Mainframe At the Heart of Your Business

The Modern Mainframe At the Heart of Your Business The Modern Mainframe At the Heart of Your Business IT Service Management Service Oriented Finance Needs to Satisfy Service Levels For Their Critical Applications I must make sure to meet my service levels.

More information

System Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices:

System Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices: The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices: Introduction to, page 2 Appliance Information, page 5 Custom HTTPS Certificates,

More information

Monitoring Agent for SAP Applications Fix pack 11. Reference IBM

Monitoring Agent for SAP Applications Fix pack 11. Reference IBM Monitoring Agent for SAP Applications 7.1.1 Fix pack 11 Reference IBM Monitoring Agent for SAP Applications 7.1.1 Fix pack 11 Reference IBM Note Before using this information and the product it supports,

More information

Implementing Performance Management

Implementing Performance Management Performance management (PM) on the Cisco IOS XR Software provides a framework to perform these tasks: Collect and export PM statistics to a TFTP server for data storage and retrieval Monitor the system

More information

IceWarp to IceWarp Migration Guide

IceWarp to IceWarp Migration Guide IceWarp Unified Communications IceWarp to IceWarp Migration Guide Version 12.0 IceWarp to IceWarp Migration Guide 2 Contents IceWarp to IceWarp Migration Guide... 4 Used Terminology... 4 Brief Introduction...

More information

Plugin Monitoring for GLPI

Plugin Monitoring for GLPI Plugin Monitoring for GLPI Introduction 2 TOC 3 Contents Preface: Introduction...v Goals of this project... v Why is it revolutionary?...v Links...v Internet site...v IRC-Channel...vi Terms used in this

More information