Hi all,
i am copying .gz files from production server to development server using
"scp" command.my requirement is after copying .gz files i want to delete old
.gz files(two days back) in development server from production server.
like this way i need to delelte .log ,.z and .dmp files... (3 Replies)
I want to write a script which would run from one host say A and connect to other remote host B and then run rest of commands in that host. I tried connecting from A host to B with SSH but after connecting to host B it just getting me inside Host B command prompt. Rest of the script is not running... (6 Replies)
Gurus/Experts
We have a centralized UNIX/Solaris server from where we can actually ssh to all other UNIX/Solaris servers...I need to write a script that reside on this centerlized server and do FileSystem monitoring (basically run df -h or -k) of other remote servers and then send an email to me... (6 Replies)
Suppose host B does not allow public/private key authentication - only secureID authentication. I already have a master ssh connection from host A to host B. Host A does allow public/private key authentication. Is there any way to connect from host C to host B by way of the master ssh connection... (2 Replies)
From a host A an application is trying to connect to host B.
From firewall side I can see packets dropped coming from host A to host B.
I've access to host A: how can I know which "application" is trying to connect to host B?
Thanks,
Marco (3 Replies)
I do a ssh to remote host(A1) from local host(L1). I then ssh to another remote(A2) from A1.
When I do a who -m from A2, I see the "connected from" as "A1".
=> who -m
userid pts/2 2010-03-27 08:47 (A1)
I want to identify who is the local host who initiated the connection to... (3 Replies)
Hi All,
I want to print a privacy statement for e.g. "Users must be authorized to login into this host" .... of this kind of message when the users tries to connect to a Solaris host. i.e. before the user key's in credentials.
Is there any command that i can use to print this kind of... (1 Reply)
Hi,
Given addresses of 2 remote machines, using a shell script is it possible to
get the state of running processes in "src"
stop all the processes in "src"
exit out of "src"
ssh into "dest"
resume the state of executing processes captured in step 1 in "dest"
Assumption:
"src" is... (3 Replies)
I was wondering why does ssh store the fingerprints of remote host when connecting for the first time?
I will appreciate a detailed response, can't figure it out. (2 Replies)
Geeks,
Could you please help me out in my script and identify the missing piece. I need to check/get the exit status of a remote command executed on remote host through script and send out an email when process/processes is/are not running on any/all server(s).
Here's the complete... (5 Replies)
Discussion started by: lovesaikrishna
5 Replies
LEARN ABOUT OSF1
binlog.auth
binlog.auth(4) Kernel Interfaces Manual binlog.auth(4)NAME
binlog.auth - authorization file for accepting remote binlog messages
SYNOPSIS
# format: Each fully qualified host name on a separate line hostname.domain_name
DESCRIPTION
The /etc/binlog.auth file specifies which remote hosts are allowed to forward binlog messages to the local host. For the sake of security,
only messages coming from remote hosts listed in the local /etc/binlog.auth file will be logged by the binlogd daemon.
Each remote host name should appear in a separate line in /etc/binlog.auth. A line started with the # character is considered as a comment
and is thus ignored.
A host name must be a complete domain name such as trout.zk3.dec.com. If a domain host name is given, it must either appear in the local
/etc/hosts file or be able to be resolved by the name server.
Note that a host name can have at most as many characters as defined by the MAXHOSTNAMELEN constant in <sys/param.h>, although each line in
the /etc/binlog.auth file can have up to 512 characters.
The /etc/binlog.auth file must be owned by root and has a permission of 0600.
If the /etc/binlog.auth file does not exist or it exists but is empty or has no valid remote host names in it, the system will assume no
remote host is allowed to forward binlog messages to the local host.
To invoke a new version of the /etc/binlog.auth file, run the following command (as the super user) to re-initialize the binlogd daemon:
kill -HUP `cat /var/run/binlogd.pid`
EXAMPLES
The following example provides a typical authorization file: # format: Each fully qualified host name on a separate line
c3poid.rvo.dec.com r2d2id.ckt.dec.com
FILES
Location of the authorization file.
RELATED INFORMATION
Commands: binlogd(8)
System Administration delim off
binlog.auth(4)