Sponsored Content
Full Discussion: How secure using Nagios?
Special Forums UNIX and Linux Applications Infrastructure Monitoring How secure using Nagios? Post 302750701 by DGPickett on Wednesday 2nd of January 2013 09:15:38 AM
Old 01-02-2013
Best open a new question so it shows as unanswered!
This User Gave Thanks to DGPickett For This Post:
 

9 More Discussions You Might Find Interesting

1. Cybersecurity

MRTG vs Nagios

hye all.. I like to know if anyone here can justify and make wise recommendation to me, whether to choose MRTG or NAGIOS as network Monitoring Performance. If can, is there any website that provide comparison for both of them? Ur help are highly appreciated.. Regards, ~unknown (1 Reply)
Discussion started by: unknown2205
1 Replies

2. Solaris

Secure FTP Problem using Sun SSH on Client system F-Secure on Server system

I am using shell script to do secure ftp. I have done key file setup to do password less authentication. Following are the FTP Details: FTP Client has Sun SSH. FTP Server has F-Secure. I am using SCP Command to do secure copy files. When I am doing this, I am getting the foll error scp:... (2 Replies)
Discussion started by: ftpguy
2 Replies

3. Red Hat

nagios configuration

HI all, This is my first topic in this forum. I have a test environment which has a fedora in it and i installed nagios 3.0.6 I added windows clients into it. But i am not getting informative outputs from it. Can anyone tell me where i can edit inorder to get a more informative garph output.... (4 Replies)
Discussion started by: Renjesh
4 Replies

4. Infrastructure Monitoring

Nagios Forum

What are the chances of getting a Nagios forum? The community is really lacking for a good place to work issues in Nagios. There just aren't any good places to go that I've found. Thanks, Docster (27 Replies)
Discussion started by: Docster
27 Replies

5. Infrastructure Monitoring

Nagios Auditing

Hi Folks, I have Nagios 3.0.6 which is monitoring 400+ servers in my environment and is administered by multiple administrators. I want to get notified if somebody enable or disable any notification of any of the hosts/services from GUI. Is it possible to configure? If so, how? (0 Replies)
Discussion started by: SiddhV
0 Replies

6. Red Hat

Nagios Problem

Hello, I installed Nagios on the Centreon Platform <----"Centralized monitoring platform" anyways now every time i click on any of the tabs inside centreon interface, it gives me a Blank page, i have no idea what to do. i thought of resetting nagios to an earlier time when it was running... (2 Replies)
Discussion started by: waelkd
2 Replies

7. Infrastructure Monitoring

Nagios check dependent on second nagios server

We have a dual Nagios server setup. One is setup for internal server monitoring on our LAN, while the second Nagios server is hosted externally and is used for external checks only such as URL and ping checks form the WAN side. I was wondering if there is any way to setup cross dependencies... (1 Reply)
Discussion started by: eugenes18t
1 Replies

8. Red Hat

Nagios configuration

Hi, I want to configure nagios core with my own scripts.Default configuration has been done like ping,http,Root partition,..so on... But according to my requirement i have a script called cpumon.sh which will monitor the current cpu usage. I gone through below link but could not find out... (1 Reply)
Discussion started by: mastansaheb
1 Replies

9. UNIX for Dummies Questions & Answers

Memcache in Nagios

Hello, I want to setup Nagios with service Memcache...We have Amazon Cloud..Please help me to setup this service on my Nagios Client. How to check Memcache is working or not on my server?? 1. Please provide us the command defination to set on Nagios Server for .cfg file. 2.Please provide... (1 Reply)
Discussion started by: chetan
1 Replies
rm(1)							      General Commands Manual							     rm(1)

Name
       rm, rmdir - remove (unlink) files or directories

Syntax
       rm [-f] [-r] [-i] [-] file-or-directory-name...
       rmdir directory-name...

Description
       The command removes the entries for one or more files from a directory.	If there are no links to the file then the file is destroyed.  For
       further information, see

       The command removes entries for the named directories, which must be empty.  If they are not empty, the directories remain, and displays an
       error message (see EXAMPLES).

       To  remove  a file, you must have write permission in its directory, but you do not need read or write permission on the file itself.  When
       you are using from a terminal, and you do not have write permission on the file, the command asks for confirmation  before  destroying  the
       file.

       If  input  is redirected from the standard input device (your terminal), then checks to ensure that input is not coming from your terminal.
       If not, sets the -f option, which overrides the file protection, and removes the files silently, regardless of what you have  specified	in
       the file redirected as input to See EXAMPLES.

Options
       -    Specifies that the named files have names beginning with a minus (for example ).

       -f   Forces the removal of file or directory without first requesting confirmation.  Only system or usage messages are displayed.

       -i   Prompts  for yes or no response before removing each entry.  Does not ask when combined with the -f option.  If you type a y, followed
	    by any combination of characters, a yes response is assumed.

       -r   Recursively removes all entries from the specified directory and, then, removes the entry for that directory from  its  parent  direc-
	    tory.

Examples
       The following example shows how to remove a file in your current working directory.
       rm myfile
       This example shows use of the null option to remove a file beginning with a minus sign.
       rm - -gorp
       This example shows how a confirmation is requested for removal of a file for which you do not have write permission.
       rm testfile
       rm: override protection 400 for testfile? y
       This  example  shows  how  the combination of -i and -r options lets you examine all the files in a directory before removing them.  In the
       example, mydirectory is a subdirectory of the current working directory.  Note that the last question requests confirmation before removing
       the  directory  itself.	 Although  the user types ``y'', requesting removal of the directory, the command does not allow this, because the
       directory is not empty; the user typed ``n'' to the question about the file file2 , so file2 was not removed.
       rm -ir mydirectory
       rm: remove mydirectory/file1? y
       rm: remove mydirectory/file2? n
	     .
	     .
	     .
       rm: remove mydirectory? y
       rm: mydirectory: Directory not empty
       This example illustrates that overrides file protection when input is redirected from the standard input device.  The user creates  a  file
       named ``alfie'', with a read-only file protection.  The user then creates a file named ``ans'' to contain the character ``n''.  The command
       following destroys the file ``alfie'', even though the redirected input file requested no deletion.
       cat > alfie
       hello
       ^d
       chmod 444 alfie
       cat > ans
       n
       ^d
       rm < ans alfie

See Also
       unlink(2)

																	     rm(1)
All times are GMT -4. The time now is 11:11 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy