Hello all!
I have found a new home, this place is great!
I have been searching for days to find a way to set a max size for a log.txt file using a cron job exicuting a shell script. Is it possible for a script to remove older entries in a log file to maintain a limited file size? If so,... (5 Replies)
I have set the maximum no of file descriptors open in a process to the value 8192 using the following lines
set rlim_fd_max=8192
set rlim_fd_cur=8192
in the /etc/system file.
I rebooted the machine and the command ulimit -n / -Hn both display the limits as 8192. However when I run my... (2 Replies)
i am trying to change the max number of files you can open under this
enviroment
Solaris , bash .
i first check the current setting by
ulimit -a
returns like this.
------------------------------------
data seg size (kbytes) unlimited
file size (blocks) unlimited
open files... (1 Reply)
hi,
iam getting error when i assign a variable to an array of more that 315 character in length
set -A array <variable>
<variable> value is 000001 000002 and up to 000045
it is giving error as
"The specified subscript cannot be greater than 1024."
can any one help me to solve this (2 Replies)
Hi
How to increase maximum number of open file in "sco xenix binary" running in "sco unix openserver 5.0.7" ?
I have changed "NOFILES" kernel parameter to 512, but xenix binray can't open more than 60.
tnx (4 Replies)
I have a system with the following settings:
min:0.10
Assigned: 2.0
Max: 6.0
Partition is uncapped weight is 128.
I would like to know if even if this is uncapped, is the max it can use 6?
The actual pool has 16.
I remember reading about this somewhere but I don't remember can anyone... (3 Replies)
I wrote a perl program that simultaneously reads in data from 691 tar.gz files using zcat. I can run one instance of the program without any issues and the memory and swap sizes are negligible. However, when I attempt to run more than 1 I start to get fork: resource unavailable messages. Are... (6 Replies)
Hello all,
I have been tasked with finding the current open file descriptors versus the limit set. In Linux, this can be done like so:
cat /proc/sys/fs/file-nr
3391 969 52427
| | |
| | |
| | maximum open file descriptors
| total free allocated... (2 Replies)
Ubuntu users,
I am configuring an Ubuntu 14.04 server as a load injector.
I have appended the hard and soft limits to /etc/security/limits.conf for any user (apart from root):
* hard nofile 65536
* soft nofile 65536
I am seeing the figure 65536 in... (5 Replies)
Discussion started by: aidylewis
5 Replies
LEARN ABOUT DEBIAN
pam_unix2
pam_unix2(8) Reference Manual pam_unix2(8)NAME
pam_unix2 - Standard PAM module for traditional password authentication
DESCRIPTION
The pam_unix2 PAM module is for traditional password authentication. It uses standard calls from the glibc NSS libraries to retrieve and
set account information as well as authentication. Usually this is obtained from the the local files /etc/passwd and /etc/shadow or from a
NIS map.
The options can be added in the PAM configuration files for every single service. /etc/security/pam_unix2.default defines, which password
encryption algorithm should be used in case of a password change.
OPTIONS
The following options may be passed to all types of management groups except session:
debug A lot of debug information is printed with syslog(3).
nullok Normally the account is disabled if no password is set or if the length of the password is zero. With this option the user is
allowed to change the password for such accounts. This option does not overwrite a hardcoded default by the calling process.
use_first_pass
The default is, that pam_unix2 tries to get the authentication token from a previous module. If no token is available, the user is
asked for the old password. With this option, pam_unix2 aborts with an error if no authentication token from a previous module is
available.
The following additional options may be passed to the passwd rules of this modules:
nisdir=<path>
This options specifies a path to the source files for NIS maps on a NIS master server. If this option is given, the passwords of NIS
accounts will not be changed with yppasswd(1), instead the local passwd and shadow files below <path> will be modified. In conjunc-
tion with rpasswdd(8) and pam_make rpc.yppasswdd(8) can be replaced with a more secure solution on the NIS master server.
use_authtok
Set the new password to the one provided by the previously stacked password module. If this option is not set, pam_unix2 would ask
the user for the new password.
One of the following options may be passed to the session rules of this modules:
debug Some messages (login time, logout time) are logged to syslog with priority LOG_DEBUG.
trace Some messages (login time, logout time) are logged to syslog with priority LOG_NOTICE.
none No messages are logged. This is the default.
The acct management does not recognize any additional options. For root, password and login expire are ignored, only on aging warning is
printed. If no shadow information exists, it always returns success.
FILES
/etc/security/pam_unix2.default
SEE ALSO login(1), passwd(1), pam.conf(8), pam.d(8), pam_pwcheck(8), pam(8), rpasswd(1), rpasswdd(8), rpc.yppasswdd(8), yppasswd(1)pam_unix2 August 2006 pam_unix2(8)