07-06-2013
Is the citrix server on the internal network and are you otherwise accessing it from outside? Perhaps your firewall(s) are blocking requests?
9 More Discussions You Might Find Interesting
1. UNIX and Linux Applications
Hello all
I is there freeware application that as Microsoft access and VB (RAD tool )
That is free to use and multi platform? (2 Replies)
Discussion started by: umen
2 Replies
2. Solaris
Hi Everyone,
I have installed open solaris 10 on one of the x86 machines available but inspite of configuring the IP i am unable to access the machine through the network.
Can anyone please help me wih the settings required to access the machine across the network.Its really Urg..Any help is... (13 Replies)
Discussion started by: sankasu
13 Replies
3. UNIX for Dummies Questions & Answers
Hi everyone-
I'm relatively new to UNIX (Primarily Oracle background), wondering if anyone can help me.
I did not configure Oracle Database Control (Web-Based admin interface) on the Database Server (HP-UX), however it is running and the URL is configured with an internal IP, which users have... (4 Replies)
Discussion started by: campbellg
4 Replies
4. Solaris
Hi All,
I have an application which I wanted to install on one solaris server instead of installing it on 6 solaris servers and then users should be able to access this application via one of those 6 servers. I think NFS is one of the option. Is there any other way we can invoke this application... (6 Replies)
Discussion started by: sam101
6 Replies
5. UNIX and Linux Applications
Hi,
I'm a italian student. For my thesis I develop a gateway with protocol 6lowpan.
For that I must access to network interface to develope my personal stack based on standard 802.15.4.
Can you help me? I need an explanation for that. (0 Replies)
Discussion started by: berny88
0 Replies
6. Web Development
Hi,
I would like to create an application with HTML front end in Unix.
I am working on enterprise Unix server, so I could not install any add ons or software in my machine. but still i have super user permissions. I can change the permissions as i wish. I have built a small application with... (1 Reply)
Discussion started by: Balasankar
1 Replies
7. Web Development
Hello,
I installed Jboss EAP 6 on a remote Linux server in standalone mode, and deployed a HelloWorld war file successfully.
Opened a browser on my PC and pointed to http://127.0.0.1:8080/filename. I can see “Hello World!” on my browser. However, if the browser points to http://server's... (3 Replies)
Discussion started by: learnix
3 Replies
8. Linux
I attempted to update Python on my CentOS 5.6 VM and have encountered some issues after then. Initially yum wouldn't work, but I have resolved that.
However, now I am unable to access the Network Configuration section under setup.
When I do select this option I see this at the command line:
... (2 Replies)
Discussion started by: crmpicco
2 Replies
9. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
LEARN ABOUT DEBIAN
mergelogs
MERGELOGS(1) General Commands Manual MERGELOGS(1)
NAME
mergelogs - merge and consolidate web server logs
SYNOPSIS
mergelogs -p penlog [-c] [-d] [-j jitter] [-t seconds] server1:logfile1 [server2:logfile2 ...]
EXAMPLES
mergelogs -p pen.log 10.0.0.1:access_log.1 10.0.0.2:access_log.2
mergelogs -p pen.log 10.0.18.6:access_log-10.0.18.6 10.0.18.8:access_log-10.0.18.8
DESCRIPTION
When pen is used to load balance web servers, the web server log file lists all accesses as coming from the host running pen. This makes it
more difficult to analyze the log file.
To solve this, pen creates its own log file, which contains the real client address, the time of the access, the target server address and
the first few bytes of the requests.
Mergelogs reads pen's log file and the log files of all load balanced web servers, compares each entry and creates a combined log file that
looks as if the web server cluster were a single physical server. Client addresses are replaced with the real client addresses.
In the event that no matching client address can be found in the pen log, the server address is used instead. This should never happen, and
is meant as a debugging tool. A large number of these indicates that the server system date needs to be set, or that the jitter value is
too small.
You probably don't want to use this program. Penlog is a much more elegant and functional solution.
OPTIONS
-c Do not cache pen log entries. The use of this option is not recommended, as it will make mergelogs search the entire pen log for
every line in the web server logs.
-d Debugging (repeat for more).
-p penlog
Log file from pen.
-j jitter
Jitter in seconds (default 600). This is the maximum variation in time stamps in the pen and web server log files. A smaller value
will result in a smaller pen log cache and faster processing, at the risk of missed entries.
-t seconds
The difference in seconds between the time on the pen server and UTC. For example, this is 7200 (two hours) in Finland.
server:logfile
Web server address and name of log file.
AUTHOR
Copyright (C) 2001-2003 Ulric Eriksson, <ulric@siag.nu>.
SEE ALSO
pen(1), webresolve(1), penlog(1), penlogd(1)
LOCAL MERGELOGS(1)