01-02-2013
Best open a new question so it shows as unanswered!
This User Gave Thanks to DGPickett For This Post:
9 More Discussions You Might Find Interesting
1. Cybersecurity
hye all..
I like to know if anyone here can justify and make wise recommendation to me, whether to choose MRTG or NAGIOS as network Monitoring Performance.
If can, is there any website that provide comparison for both of them?
Ur help are highly appreciated..
Regards,
~unknown (1 Reply)
Discussion started by: unknown2205
1 Replies
2. Solaris
I am using shell script to do secure ftp. I have done key file setup to do password less authentication. Following are the FTP Details:
FTP Client has Sun SSH.
FTP Server has F-Secure.
I am using SCP Command to do secure copy files. When I am doing this, I am getting the foll error
scp:... (2 Replies)
Discussion started by: ftpguy
2 Replies
3. Red Hat
HI all,
This is my first topic in this forum.
I have a test environment which has a fedora in it and i installed nagios 3.0.6
I added windows clients into it.
But i am not getting informative outputs from it.
Can anyone tell me where i can edit inorder to get a more informative garph output.... (4 Replies)
Discussion started by: Renjesh
4 Replies
4. Infrastructure Monitoring
What are the chances of getting a Nagios forum? The community is really lacking for a good place to work issues in Nagios. There just aren't any good places to go that I've found.
Thanks,
Docster (27 Replies)
Discussion started by: Docster
27 Replies
5. Infrastructure Monitoring
Hi Folks,
I have Nagios 3.0.6 which is monitoring 400+ servers in my environment and is administered by multiple administrators. I want to get notified if somebody enable or disable any notification of any of the hosts/services from GUI. Is it possible to configure?
If so, how? (0 Replies)
Discussion started by: SiddhV
0 Replies
6. Red Hat
Hello,
I installed Nagios on the Centreon Platform <----"Centralized monitoring platform" anyways now every time i click on any of the tabs inside centreon interface, it gives me a Blank page, i have no idea what to do. i thought of resetting nagios to an earlier time when it was running... (2 Replies)
Discussion started by: waelkd
2 Replies
7. Infrastructure Monitoring
We have a dual Nagios server setup. One is setup for internal server monitoring on our LAN, while the second Nagios server is hosted externally and is used for external checks only such as URL and ping checks form the WAN side.
I was wondering if there is any way to setup cross dependencies... (1 Reply)
Discussion started by: eugenes18t
1 Replies
8. Red Hat
Hi,
I want to configure nagios core with my own scripts.Default configuration has been done like ping,http,Root partition,..so on...
But according to my requirement i have a script called cpumon.sh which will monitor the current cpu usage.
I gone through below link but could not find out... (1 Reply)
Discussion started by: mastansaheb
1 Replies
9. UNIX for Dummies Questions & Answers
Hello,
I want to setup Nagios with service Memcache...We have Amazon Cloud..Please help me to setup this service on my Nagios Client.
How to check Memcache is working or not on my server??
1. Please provide us the command defination to set on Nagios Server for .cfg file.
2.Please provide... (1 Reply)
Discussion started by: chetan
1 Replies
rm(1) General Commands Manual rm(1)
Name
rm, rmdir - remove (unlink) files or directories
Syntax
rm [-f] [-r] [-i] [-] file-or-directory-name...
rmdir directory-name...
Description
The command removes the entries for one or more files from a directory. If there are no links to the file then the file is destroyed. For
further information, see
The command removes entries for the named directories, which must be empty. If they are not empty, the directories remain, and displays an
error message (see EXAMPLES).
To remove a file, you must have write permission in its directory, but you do not need read or write permission on the file itself. When
you are using from a terminal, and you do not have write permission on the file, the command asks for confirmation before destroying the
file.
If input is redirected from the standard input device (your terminal), then checks to ensure that input is not coming from your terminal.
If not, sets the -f option, which overrides the file protection, and removes the files silently, regardless of what you have specified in
the file redirected as input to See EXAMPLES.
Options
- Specifies that the named files have names beginning with a minus (for example ).
-f Forces the removal of file or directory without first requesting confirmation. Only system or usage messages are displayed.
-i Prompts for yes or no response before removing each entry. Does not ask when combined with the -f option. If you type a y, followed
by any combination of characters, a yes response is assumed.
-r Recursively removes all entries from the specified directory and, then, removes the entry for that directory from its parent direc-
tory.
Examples
The following example shows how to remove a file in your current working directory.
rm myfile
This example shows use of the null option to remove a file beginning with a minus sign.
rm - -gorp
This example shows how a confirmation is requested for removal of a file for which you do not have write permission.
rm testfile
rm: override protection 400 for testfile? y
This example shows how the combination of -i and -r options lets you examine all the files in a directory before removing them. In the
example, mydirectory is a subdirectory of the current working directory. Note that the last question requests confirmation before removing
the directory itself. Although the user types ``y'', requesting removal of the directory, the command does not allow this, because the
directory is not empty; the user typed ``n'' to the question about the file file2 , so file2 was not removed.
rm -ir mydirectory
rm: remove mydirectory/file1? y
rm: remove mydirectory/file2? n
.
.
.
rm: remove mydirectory? y
rm: mydirectory: Directory not empty
This example illustrates that overrides file protection when input is redirected from the standard input device. The user creates a file
named ``alfie'', with a read-only file protection. The user then creates a file named ``ans'' to contain the character ``n''. The command
following destroys the file ``alfie'', even though the redirected input file requested no deletion.
cat > alfie
hello
^d
chmod 444 alfie
cat > ans
n
^d
rm < ans alfie
See Also
unlink(2)
rm(1)