04-22-2010
Quote:
Originally Posted by
mmersoylu
Hi,
every midnight hacmp verification is run automatically.
Yes, that is the default setting but you can change the time when verifcation runs.
Quote:
Originally Posted by
mmersoylu
clverify.log says there is no erro bu clutils.log says there is 1 error but when i look at the clverify.log no problem at all.
Below is the output of the clverify.log[...]
Well .... first of all I'd like to say that you probably do not need to worry if verification says that your cluster is O.K. Secondly I think it is difficult to say what the problem with the clutils is if you supply info from the clverify. Could you post a relevant part of the clutils.log?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I'm really new at this and wondering how I would go about adding code to my script to verify that all records loaded successfully? (I am loading a file into a table) i'm using the Korn shell.
I'm also having trouble verifying parts in the header as i do not really understand the header and... (3 Replies)
Discussion started by: sheranjem
3 Replies
2. Programming
hello every body,
I have to verifiy if the param_key is selectionned twice or more and to print only one occurence i'm using htable what's the good implementation to add to the code to verify this.
code :
{
char *tmpStr = NULL;
ght_iterator_t iterator_param;
void... (0 Replies)
Discussion started by: kamel.seg
0 Replies
3. Linux
Hi All,
I got lots of request with sudo, a manager request, verbal command, do this and do that.
The problem with this kind of request is when I added that script and that. It will not be perfect, it's because I can't verify the userid sudo access, I can't reset their password as well, I... (2 Replies)
Discussion started by: itik
2 Replies
4. UNIX for Dummies Questions & Answers
Do we have any defined error code for FTP status (2 Replies)
Discussion started by: krissathish
2 Replies
5. AIX
hi,
when I do a failover, hacmp always starts db2 but recently it fails to start db2..noticed the issue is db2nodes.cfg is not modified by hacmp and is still showing primary node..manually changed the node name to secondary after which db2 started immediately..unable to figure out why hacmp is... (4 Replies)
Discussion started by: gkr747
4 Replies
6. Shell Programming and Scripting
Hi eveyone
I am planning to use crontab to delete all files in my donwloads directory that are older than one hour
I will be using crontab to run this script
find /home/kee/downloads/* -daystart -mmin +59 -type f -name -exec rm -r {}\;
could you please let me know if the above... (1 Reply)
Discussion started by: k33k00
1 Replies
7. Shell Programming and Scripting
Hello,
I have a file, in which line 40 is commented. It is basically a cron job,
#05,35,50 * * * * /usr/local/scripts/my.sh
how i can i verify the line 40 is commented, if not then give me message not commented, otherwise provide us message it is commented. (5 Replies)
Discussion started by: learnbash
5 Replies
8. Solaris
Hi ,
How to ensure the server i logged in OS cluster ?
Is there any command to verify that ?
Regards,
maddy (5 Replies)
Discussion started by: Maddy123
5 Replies
9. Programming
Using ECDSA, how do you verify integrity of Data (D), Given the value for the following:
Random number (r)
Signature (s)
ECpublic Key (K)
Thanks. (0 Replies)
Discussion started by: dragonpoint
0 Replies
10. OS X (Apple)
Hi guys!
Me again! ...
I'm trying to build (on MacOS directly) a bash script that will help me verify a SHA1 digest (to verify downloads and so on and so forth).
So first off, here's my version of BASH under OSX:
bash-4.4$
And here's my version of Sierra (macOS):
10.12.3 (16D32)
... (2 Replies)
Discussion started by: Ardzii
2 Replies
LEARN ABOUT CENTOS
ipsec_barf
IPSEC_BARF(8) Executable programs IPSEC_BARF(8)
NAME
ipsec_barf - spew out collected IPsec debugging information
SYNOPSIS
ipsec barf [--short --maxlines <100>]
DESCRIPTION
Barf outputs (on standard output) a collection of debugging information (contents of files, selections from logs, etc.) related to the
IPsec encryption/authentication system. It is primarily a convenience for remote debugging, a single command which packages up (and labels)
all information that might be relevant to diagnosing a problem in IPsec.
The --short option limits the length of the log portion of barf's output, which can otherwise be extremely voluminous if debug logging is
turned on.
--maxlines <100> option sets the length of some bits of information, currently netstat -rn. Useful on boxes where the routing table is
thousands of lines long. Default is 100.
Barf censors its output, replacing keys and secrets with brief checksums to avoid revealing sensitive information.
Beware that the output of both commands is aimed at humans, not programs, and the output format is subject to change without warning.
Barf has to figure out which files in /var/log contain the IPsec log messages. It looks for KLIPS and general log messages first in
messages and syslog, and for Pluto messages first in secure, auth.log, and debug. In both cases, if it does not find what it is looking for
in one of those "likely" places, it will resort to a brute-force search of most (non-compressed) files in /var/log.
FILES
/proc/net/*
/var/log/*
/etc/ipsec.conf
/etc/ipsec.secrets
HISTORY
Written for the Linux FreeS/WAN project <http://www.freeswan.org> by Henry Spencer.
BUGS
Barf uses heuristics to try to pick relevant material out of the logs, and relevant messages which are not labelled with any of the tags
that barf looks for will be lost. We think we've eliminated the last such case, but one never knows...
Finding updown scripts (so they can be included in output) is, in general, difficult. Barf uses a very simple heuristic that is easily
fooled.
The brute-force search for the right log files can get expensive on systems with a lot of clutter in /var/log.
AUTHOR
Paul Wouters
placeholder to suppress warning
libreswan 12/16/2012 IPSEC_BARF(8)