05-10-2011
What changes exactly were made to the configuration file? Whats the current IP configuration for the machine, what was the old configuration? Were any software upgrades done? Note that the log file isn't necessarily mysqld.log, but can also be named mysql.{log,err}, or is logging through the regular syslog mechanism.
A database corruption is rather unlikely if all that changed really is just the network configuration.
7 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
how can I lock my keyboard while I'm away from the computer without using lock command. What other commands gives me the option to lock keyboard device?
thanks (7 Replies)
Discussion started by: dianayun
7 Replies
2. Programming
(sorry for my english)
Hi, i have an app that uses MYSQL API C.. i trying do a timeout until the table is locked by an other thread , in the docs of Mysql i can see that MYSQL_OPT_READ_TIMEOUT is not implemented for linux ¿?¿?.. any body knows a way to do a timeout until the table is locked by... (0 Replies)
Discussion started by: JEscola
0 Replies
3. Virtualization and Cloud Computing
Here is an excellent article on Running MySQL on Amazon EC2 with Elastic Block Store.
Amazon Web Services Developer Connection : Running MySQL on Amazon EC2 with Elastic Block Store (0 Replies)
Discussion started by: Neo
0 Replies
4. Red Hat
Hello all,
If anyone has time, I have a few questions:
How do I do the following in Linux. We are using Red Hat and Oracle Enterprise Linux, which is based on Red Hat too.
1. How to lock the account after a few (like 3) invalid password attempts?
2. How do you lock a screen after 30... (1 Reply)
Discussion started by: nstarz
1 Replies
5. UNIX for Advanced & Expert Users
Hi all,
I have to test some user priviliges. The goal is to be sure that an unauthorized user can't restart some modules (ssh, mysql etc...).
I'm trying to automate it with a shell script but in same cases I got the syslog broadcast message.
Is there any way to simply get a return code... (3 Replies)
Discussion started by: Dedalus
3 Replies
6. Shell Programming and Scripting
Hi
#Testing for file existence
if ; then
echo 'SCHOOL data is available for processing'
else
echo 'SCHOOL DATA IS NOT AVAILABLE FOR PROCESSING'
:
i wrote a script, where it begins by checking if file exists or not.
If it exists, it truncates the database... (2 Replies)
Discussion started by: rxg
2 Replies
7. Shell Programming and Scripting
Hi guys,
i am not too sure how i got this error,
file exists, -f not specified and is running in the background
my coding is just schedule to rm files that is more then 365 days.
find $BDUMP_DIR -name "*.bak.Z" -mtime +365 -exec rm {} \;
:confused::confused: (1 Reply)
Discussion started by: redologger
1 Replies
LEARN ABOUT LINUX
unattended-upgrade
unattended-upgrade(8) System Manager's Manual unattended-upgrade(8)
NAME
unattended-upgrade - automatic installation of security (and other) upgrades
SYNOPSIS
unattended-upgrade [options]
DESCRIPTION
This program can download and install security upgrades automatically and unattended, taking care to only install packages from the config-
ured APT source, and checking for dpkg prompts about configuration file changes. All output is logged to /var/log/unattended-ugprades.log.
This script is the backend for the APT::Periodic::Unattended-Upgrade option and designed to be run from cron (e.g. via
/etc/cron.daily/apt).
OPTIONS
unattended-upgrade accepts the following options
-h, --help
help output
-d, --debug
extra debug output into /var/log/unattended-upgrades.log
--dry-run
Just simulate installing updates, do not actually do it
CONFIGURATION
The configuration is done via the apt configuration mechanism, the default configuration file can be found at /etc/apt/apt.conf.d/50unat-
tended-upgrades
AUTHORS
unattended-upgrade is written by Michael Vogt <mvo@ubuntu.com>
This manual page was originally written by Michael Vogt <mvo@ubuntu.com>
COPYRIGHT
Copyright (C) 2005-2009 Canonical
There is NO warranty. You may redistribute this software under the terms of the GNU General Public License. For more information about
these matters, see the files named COPYING.
May 4, 2009 unattended-upgrade(8)