Sponsored Content
Full Discussion: regarding net
Top Forums Programming regarding net Post 302096562 by Corona688 on Thursday 16th of November 2006 09:24:05 AM
Old 11-16-2006
Quote:
Originally Posted by phani_sree
Thank you corona.
My problem was solved with your code, but is there any way to do this without using ping?
Thank you very much.
sree
Well, you could always try the other method !_30 and I suggested?
 

6 More Discussions You Might Find Interesting

1. Solaris

Getting on the net

I've been having trouble getting my old gateway computer on the net with solaris. All of the network stuff is built into the motherboard. Is there a way that I can get it recognized? (4 Replies)
Discussion started by: possuman72
4 Replies

2. UNIX for Dummies Questions & Answers

/etc/rc.d/net - eth1

I just installed Crux on my laptop, which means I'll have to configure /etc/rc.d/net to adapt to my wireless internet. When I ran Linux before, I connected through eth1. How should I configure the /etc/rc.d/net file accordingly? Thanks for reading, Octal. (0 Replies)
Discussion started by: Octal
0 Replies

3. Shell Programming and Scripting

Net::SSLeay or Net::FTPSSL

Hello, I ran into an issue in one of my monitoring scripts. If I use the public ip address in my connection string everything works, but if I switch the connection string ip to 127.0.0.1 or the internal ip I get, " Connection refused at... (1 Reply)
Discussion started by: Styles
1 Replies

4. Shell Programming and Scripting

net help with getopts

Hi I have written the following script. But the variable sid is not getting set why is that. When i run the script i get the output as ORATAB FOR is Instead if i run the script like test.sh xiamin i am expecting the output as ORATAB FOR xiamin is #!/bin/ksh while... (4 Replies)
Discussion started by: xiamin
4 Replies

5. UNIX for Dummies Questions & Answers

How to use one net card of two

I have two server with 2 net cards each one: Server 1 A = 100 Mbs B = 1000Mbs (Gigabit) Server 2 A = 100 Mbs B = 1000Mbs (Gigabit) In A i ' am conected to the public network ( In both servers) and in B i make a point to point lan 1 gigabit of speed. Between the servers ... (1 Reply)
Discussion started by: enkei17
1 Replies

6. What is on Your Mind?

Net Neutrality

Hi, Just wanted to know your opinion on this What you need to know about the court decision that just struck down net neutrality — Tech News and Analysis (1 Reply)
Discussion started by: ni2
1 Replies
SA-CHECK_SPAMD.RAW(1)					User Contributed Perl Documentation				     SA-CHECK_SPAMD.RAW(1)

NAME
sa-check_spamd - spamd monitoring script for use with Nagios, etc. SYNOPSIS
sa-check_spamd [options] Options: -c secs, --critical=secs Critical ping response threshold -h, -?, --help Print usage message -H hostname, --hostname=hostname Hostname of spamd service to ping -p port, --port=port Port of spamd service to ping --socketpath=path Connect to given UNIX domain socket -t secs, --timeout=secs Max time to wait for a ping response -v, --verbose Verbose debug output -V, --version Output version info -w secs, --warning=secs Warning ping response threshold DESCRIPTION
The purpose of this program is to provide a tool to monitor the status of "spamd" server processes. spamd is the daemonized version of the spamassassin executable, both provided in the SpamAssassin distribution. This program is designed for use, as a plugin, with the Nagios service monitoring software available from http://nagios.org. It might be compatible with other service monitoring packages. It is also useful as a command line utility or as a component of a custom shell script. OPTIONS
Options of the long form can be shortened as long as the remain unambiguous (i.e. --host can be used instead of --hostname). -c secs, --critical=secs Critical ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds) the program will exit with a value of 2 to indicate the critical status. This value must be at least as long as the value specified for warning and less than the value specified for timeout. -h, -?, --help Prints this usage message and exits. -H hostname, --hostname=hostname The hostname, or IP address, of the spamd service to ping. By default the hostname localhost is used. If --socketpath is set this value will be ignored. -p port, --port=port The port of the spamd service to ping. By default port 783 (the spamd default port number) is used. If --socketpath is set this value will be ignored. --socketpath=path Connect to given UNIX domain socket. Use instead of a hostname and TCP port. When set, any hostname and TCP port specified will be ignored. -t secs, --timeout=secs The maximum time to wait for a ping response. Once exceeded the program will exit with a value of 2 to indicate the critical status. The default timeout value is 45 seconds. The timeout must be no less than 1 second. This value must be greater than the values specified for both the critical and warning values. -v, --verbose Display verbose debug output on STDOUT. -V, --version Display version info on STDOUT. -w secs, --warning=secs Warning ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds), and does not exceed the critical threshold value, the program will exit with a value of 1 to indicate the warning staus. This value must be no longer than the value specified for critical and less than the value specified for timeout. EXIT CODES
The program will indicate the status of the spamd process being monitored by exiting with one of these values: 0 OK: A spamd ping response was received within all threshold times. 1 WARNING: A spamd ping response exceeded the warning threshold but not the critical threshold. 2 CRITICAL: A spamd ping response exceeded either the critical threshold or the timeout value. 3 UNKNOWN: An error, probably caused by a missing dependency or an invalid configuration parameter being supplied, occurred in the sa-check_spamd program. SEE ALSO
spamc(1) spamd(1) spamassassin(1) PREREQUISITES
"Mail::SpamAssassin" version 3.1.1 or higher (3.1.6 or higher recommended) AUTHOR
Daryl C. W. O'Shea, DOS Technologies <spamassassin@dostech.ca> LICENSE
sa-check_spamd is distributed under the Apache License, Version 2.0, as described in the file "LICENSE" included with the Apache SpamAssassin distribution and available at http://www.apache.org/licenses/LICENSE-2.0 perl v5.14.2 2014-02-14 SA-CHECK_SPAMD.RAW(1)
All times are GMT -4. The time now is 01:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy