I think I saw a program called "uping" or "mping" which had more fine-grained timing controls (I think part of the MRTG suite ... could have been "fastping" too).
Two other ideas come to mind.
1. Run asynchronously. Spawn off a big bunch of pings and even if some of them take one second or more, the whole bunch will finish in one or two seconds (provided you have the CPU and bandwidth to run enough of them in parallel).
Code:
subnet=192.168.2.
for addr in `seq 1 1 255 `; do
( ping -c 1 -t 1 $subnet$addr > /dev/null && echo Found $subnet$addr ) &
done
2. Is ping really what you want? If you have a hunch about a port you could expect to be open, netcat could do this much faster (and probably produce more accurate results -- the fact that ping works doesn't really mean the host is up and working correctly).
The problem I am facing now is that the QNX host could not ping the SCO host and vice versa. They are in the same domain, ie, 172.20.3.xx. As I am very new to Unix, I guess I must have missed out some important steps. Pls help... Thanx alot (2 Replies)
Hi all,
i am copying .gz files from production server to development server using
"scp" command.my requirement is after copying .gz files i want to delete old
.gz files(two days back) in development server from production server.
like this way i need to delelte .log ,.z and .dmp files... (3 Replies)
Gurus/Experts
We have a centralized UNIX/Solaris server from where we can actually ssh to all other UNIX/Solaris servers...I need to write a script that reside on this centerlized server and do FileSystem monitoring (basically run df -h or -k) of other remote servers and then send an email to me... (6 Replies)
I do a ssh to remote host(A1) from local host(L1). I then ssh to another remote(A2) from A1.
When I do a who -m from A2, I see the "connected from" as "A1".
=> who -m
userid pts/2 2010-03-27 08:47 (A1)
I want to identify who is the local host who initiated the connection to... (3 Replies)
Hello....
I have two servers, one has an empty / and the other has a subdirectory with a large number (4 gig) with many, many files. I need a way to transfer the files en masse from the server with the large number of files to the one that is essentially blank.
I don't have space on the used... (16 Replies)
Hi all,
This is my sample code in /etc/httpd/conf.d/applications.conf file currently we are creating subdomain mannually for every new subdomain. I want to automate this process througs bash script , how its possible.
<VirtualHost *:80>
ServerName google.com
ServerAlias google.com... (5 Replies)
Im trying to write a script using the host command but its not working properly. I cant understand what Im doing wrong. When I use it at the command prompt, it works fine. But its being used actually in the script, it says its not found: 2 SERVFAIL. Can anyone help me? Here's what I have so far: no... (6 Replies)
Hi All
I am having VxVm on two Solaris hosts. host1 is using disk group dgHR. right now this server went down due to hardware fault. Not I need to import this dgHR into host2 server. Please let me know the procedure for the same. (1 Reply)
Hello Everyone,
My following script is giving me problems, when the SIP trunk goes down and the telnet session is started and just when the command is about to complete the connection is closed then script restarts.
I have noticed that as soon the script types in "sys re" or "sys rebo" or... (6 Replies)
Discussion started by: jeetz
6 Replies
LEARN ABOUT DEBIAN
sa-check_spamd
SA-CHECK_SPAMD.RAW(1) User Contributed Perl Documentation SA-CHECK_SPAMD.RAW(1)NAME
sa-check_spamd - spamd monitoring script for use with Nagios, etc.
SYNOPSIS
sa-check_spamd [options]
Options:
-c secs, --critical=secs Critical ping response threshold
-h, -?, --help Print usage message
-H hostname, --hostname=hostname Hostname of spamd service to ping
-p port, --port=port Port of spamd service to ping
--socketpath=path Connect to given UNIX domain socket
-t secs, --timeout=secs Max time to wait for a ping response
-v, --verbose Verbose debug output
-V, --version Output version info
-w secs, --warning=secs Warning ping response threshold
DESCRIPTION
The purpose of this program is to provide a tool to monitor the status of "spamd" server processes. spamd is the daemonized version of the
spamassassin executable, both provided in the SpamAssassin distribution.
This program is designed for use, as a plugin, with the Nagios service monitoring software available from http://nagios.org. It might be
compatible with other service monitoring packages. It is also useful as a command line utility or as a component of a custom shell script.
OPTIONS
Options of the long form can be shortened as long as the remain unambiguous (i.e. --host can be used instead of --hostname).
-c secs, --critical=secs
Critical ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds) the program
will exit with a value of 2 to indicate the critical status.
This value must be at least as long as the value specified for warning and less than the value specified for timeout.
-h, -?, --help
Prints this usage message and exits.
-H hostname, --hostname=hostname
The hostname, or IP address, of the spamd service to ping. By default the hostname localhost is used. If --socketpath is set this
value will be ignored.
-p port, --port=port
The port of the spamd service to ping. By default port 783 (the spamd default port number) is used. If --socketpath is set this value
will be ignored.
--socketpath=path
Connect to given UNIX domain socket. Use instead of a hostname and TCP port. When set, any hostname and TCP port specified will be
ignored.
-t secs, --timeout=secs
The maximum time to wait for a ping response. Once exceeded the program will exit with a value of 2 to indicate the critical status.
The default timeout value is 45 seconds. The timeout must be no less than 1 second.
This value must be greater than the values specified for both the critical and warning values.
-v, --verbose
Display verbose debug output on STDOUT.
-V, --version
Display version info on STDOUT.
-w secs, --warning=secs
Warning ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds), and does not
exceed the critical threshold value, the program will exit with a value of 1 to indicate the warning staus.
This value must be no longer than the value specified for critical and less than the value specified for timeout.
EXIT CODES
The program will indicate the status of the spamd process being monitored by exiting with one of these values:
0 OK: A spamd ping response was received within all threshold times.
1 WARNING: A spamd ping response exceeded the warning threshold but not the critical threshold.
2 CRITICAL: A spamd ping response exceeded either the critical threshold or the timeout value.
3 UNKNOWN: An error, probably caused by a missing dependency or an invalid configuration parameter being supplied, occurred in the
sa-check_spamd program.
SEE ALSO spamc(1)spamd(1)spamassassin(1)PREREQUISITES
"Mail::SpamAssassin" version 3.1.1 or higher (3.1.6 or higher recommended)
AUTHOR
Daryl C. W. O'Shea, DOS Technologies <spamassassin@dostech.ca>
LICENSE
sa-check_spamd is distributed under the Apache License, Version 2.0, as described in the file "LICENSE" included with the Apache
SpamAssassin distribution and available at http://www.apache.org/licenses/LICENSE-2.0
perl v5.14.2 2014-02-14 SA-CHECK_SPAMD.RAW(1)