11-14-2009
Great!
FWIW, it is good to post the relevant log file entries here when trying to solve problems. (Don't forget to post log file entries in quote tags
)
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
using redhat 7.2
Is it possible to not allow root to ssh into the server remotely, but allow the account that ssh'd in to the box to su to root? This way there is the added security of a hacker needing two passwords to hack your computer, a username/password for a regular account and also the... (3 Replies)
Discussion started by: theDirtiest
3 Replies
2. AIX
Hello,
I would like to issue a couple of commands as root on a remote machine without having to enter the root password. I used "ssh-keygen -t rsa" to generate the encryption keys, copied the public key to the remote machine, etc.
I also tried playing around with the sshd_config file and... (3 Replies)
Discussion started by: sphericon
3 Replies
3. Solaris
I edited my /etc/default/login file and commented the line:
# If CONSOLE is set, root can only login on that device.
# Comment this line out to allow remote login by root.
#
#CONSOLE=/dev/console
I still cant login thru telnet or ssh.
What else do i have to do to be able to login... (14 Replies)
Discussion started by: BG_JrAdmin
14 Replies
4. Cybersecurity
Hi all,
I have a situation where I have a shell script that I need to run remotely on multiple *nix machines via SSH. Unfortunately, some of the commands in it require root access. I know that best practices for ssh entail configuring it so that the root account cannot log in, you need to... (4 Replies)
Discussion started by: irinotecan
4 Replies
5. Solaris
Hi Friends,
I would like to configure ssh for root user.
Note : I am able to use the ssh for other user.
Can someone suggest me what needs to be done....???
Thanks & Regards,
jumadhiya. (8 Replies)
Discussion started by: jumadhiya
8 Replies
6. UNIX for Dummies Questions & Answers
I have already disabled root login over the ssh by modifying /etc/ssh/sshd_config.
But how would i disable root login on a server itself.
We have implemented LDAP in our environment and our security guide states that root login must be obtained by first logging into the host using his/her own... (2 Replies)
Discussion started by: pinga123
2 Replies
7. Solaris
Hi, The issue is that root can not ssh to a Solaris 8 server:
Please help. Thank you in advance! (7 Replies)
Discussion started by: aixlover
7 Replies
8. Solaris
Hi guys.
I have two machines and I am using both as root. I need to know , is there a way by which I can ssh from Machine1 to Machine2 without giving the root password for Machine2.
I actually need to write a script so that when its executed , it will ssh into another machine and run a... (4 Replies)
Discussion started by: Junaid Subhani
4 Replies
9. Solaris
Hi Experts,
I am trying to setup passwordless ssh for root between two of my solaris servers(say A & B).
I have exchanged the public keys between both servers.
Password less ssh working fine while I try to connect from Server A to Server B.
However it is still asking password... (6 Replies)
Discussion started by: sai_2507
6 Replies
10. SuSE
I access over 100 SUSE SLES servers as root from my admin server, via ssh sessions using ssh keys, so I don't have to enter a password. My SUSE Admin server is setup in the following manner:
1) Remote root access is turned off in the sshd_config file.
2) I am the only user of this admin... (6 Replies)
Discussion started by: dvbell
6 Replies
LEARN ABOUT DEBIAN
varnishsizes
VARNISHSIZES(1) VARNISHSIZES(1)
NAME
varnishsizes - Varnish object size request histogram
SYNOPSIS
varnishsizes [-b] [-C] [-c] [-d] [-I regex] [-i tag] [-m tag:regex ...]
[-n varnish_name] [-r file] [-V] [-w delay] [-X regex] [-x tag]
DESCRIPTION
The varnishsizes utility reads varnishd(1) shared memory logs and presents a continuously updated histogram showing the distribution of the
last N requests by their processing. The value of N and the vertical scale are displayed in the top left corner. The horizontal scale is
a logarithmic representation of bytes. Hits are marked with a pipe character ("|"), and misses are marked with a hash character ("#").
The following options are available:
-b Include log entries which result from communication with a backend server. If neither -b nor -c is specified, varnishsizes acts as
if they both were.
-C Ignore case when matching regular expressions.
-c Include log entries which result from communication with a client. If neither -b nor -c is specified, varnishsizes acts as if they
both were.
-d Process old log entries on startup. Normally, varnishsizes will only process entries which are written to the log after it starts.
-I regex
Include log entries which match the specified regular expression. If neither -I nor -i is specified, all log entries are included.
-i tag Include log entries with the specified tag. If neither -I nor -i is specified, all log entries are included.
-m tag:regex only list record where tag matches regex. Multiple -m
options are AND-ed together.
-n Specifies the name of the varnishd instance to get logs from. If -n is not specified, the host name is used.
-r file
Read log entries from file instead of shared memory.
-V Display the version number and exit.
-w delay
Wait at least delay seconds between each update. The default is 1. file instead of displaying them. The file will be overwritten
unless the -a option was specified.
-X regex
Exclude log entries which match the specified regular expression.
-x tag Exclude log entries with the specified tag.
SEE ALSO
o varnishd(1)
o varnishlog(1)
o varnishncsa(1)
o varnishstat(1)
o varnishtop(1)
HISTORY
The varnishsizes utility was developed by Kristian Lyngstol based on varnishhist. This manual page was written by Kristian Lyngstol,
Dag-Erling Smorgrav and Per Buer.
COPYRIGHT
This document is licensed under the same licence as Varnish itself. See LICENCE for details.
o Copyright (c) 2010 Varnish Software AS
AUTHOR
Dag Erling Smorgrav, Kristian Lyngstol, Per Buer
1.0 2010-05-31 VARNISHSIZES(1)