10-01-2015
Response
Hi Don,
Thanks for the reply, so do you have any examples of this which I could use for reference (with your points above included) ? my expierence in this area isnt great hence the questions but hopefully with some guidence I can learn/understand.
Thanks
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
give me a shell-script which extract data from log file on a server by giving date and time as input (for both start time and end time) and it will give the logs generated during the given time as output. (4 Replies)
Discussion started by: abhishek27
4 Replies
2. Shell Programming and Scripting
I have to write a script to search the logfiles i.e msg.log for the following
The Search Criteria is as follows
1. IP address
2. String
Ex: abc.123.com
3. Timestamp ( start - end )
ex: 2008-05-04-00:30:00 - 2008-05-08-04:30:00
Can anyone help to devise a script for... (9 Replies)
Discussion started by: indiakingz
9 Replies
3. Shell Programming and Scripting
Hi All,
I would like to write a script which will search a file say abc.dat in /a/b/data for 15 mins only. If the script finds the file in 15 mins then it will exit will exit sucessfully and if there is no file for 15 mins it will exit and copy the last day file (abc.dat_ddmmyyhhmmss) from... (1 Reply)
Discussion started by: chandancsc
1 Replies
4. Shell Programming and Scripting
If I have a log like :
Mon Jul 19 05:07:34 2010; TCP; eth3; 52 bytes; from abc to def
Mon Jul 19 05:07:35 2010; UDP; eth3; 46 bytes; from aaa to bbb
Mon Jul 19 05:07:35 2010; TCP; eth3; 52 bytes; from def to ghi
I will need an output like this :
Time abc to def... (1 Reply)
Discussion started by: hitha87
1 Replies
5. Shell Programming and Scripting
HI All,
I have a log file where the logs will be in the format as given below:
2011-05-25 02:32:51 INFO PROCESS STARTING
2011-05-25 02:32:52 INFO PROCESS STARTED
.
.
.
I want to retrieve only the logs which are less than 5 mins older than current time using grep... (3 Replies)
Discussion started by: rvhg16
3 Replies
6. AIX
I want to grep only last 5 mins of a log file in bash
I have a syslog which contains the following
Mon Jul 11 20:47:42
Mon Jul 11 20:47:52
The following works in Unix but not in AIX . Please can you let me know as to what would be the AIX equivalent
Code: for (( i = 5; i >=0;... (1 Reply)
Discussion started by: necro98
1 Replies
7. Shell Programming and Scripting
A happy Monday to you all,
I have a .csv file which contains data taken every 5 seconds. I want to average these 5 second data points into 30 minute averages!
date co2
25/06/2011 08:04 8.31
25/06/2011 08:04 8.32
25/06/2011 08:04 8.33... (18 Replies)
Discussion started by: gd9629
18 Replies
8. Shell Programming and Scripting
Hello,
Since I m new to shell, I had a hard time to sought out this problem.
I have a log file of a utility which tells that batch files are successful with timestamp. Given below is a part of the log file.
2013/03/07 00:13:50 Apache/1.3.29 (Unix) configured -- resuming normal operations... (12 Replies)
Discussion started by: rpm120
12 Replies
9. Shell Programming and Scripting
Hello All,
I have to write a script which will search for diffrent patterns like "Struck" "Out of Memory" , etc from a log file in Linux box's.
Now I will be executing a cron job to find out the results by executing the script once in every 30 minutes.
suppose time is
14-04-29:05:31:09
So I... (3 Replies)
Discussion started by: Shubhasis Mathr
3 Replies
10. Shell Programming and Scripting
Dears,
I am looking for a script which will work as a watch directory.
I ha directory which keep getting files in every 10 mins and some time delay.
I want to monitor if the directory getting the files in every 10 mins if not captured the last received file time and calculate the delay.
... (6 Replies)
Discussion started by: sadique.manzar
6 Replies
LEARN ABOUT CENTOS
fail2ban
FAIL2BAN(1) General Commands Manual FAIL2BAN(1)
NAME
fail2ban - a set of server and client programs to limit brute force authentication attempts.
DESCRIPTION
Fail2Ban consists of a client, server and configuration files to limit brute force authentication attempts.
The server program fail2ban-server is responsible for monitoring log files and issuing ban/unban commands. It gets configured through a
simple protocol by fail2ban-client, which can also read configuration files and issue corresponding configuration commands to the server.
For details on the configuration of fail2ban see the jail.conf(5) manual page. A jail (as specified in jail.conf) couples filters and
actions definitions for any given list of files to get monitored.
For details on the command-line options of fail2ban-server see the fail2ban-server(1) manual page.
For details on the command-line options and commands for configuring the server via fail2ban-client see the fail2ban-client(1) manual page.
For testing regular expressions specified in a filter using the fail2ban-regex program may be of use and its manual page is fail2ban-
regex(1).
LIMITATION
Fail2Ban is able to reduce the rate of incorrect authentications attempts however it cannot eliminate the risk that weak authentication
presents. Configure services to use only two factor or public/private authentication mechanisms if you really want to protect services.
A local user is able to inject messages into syslog and using a Fail2Ban jail that reads from syslog, they can effectively trigger a DoS
attack against any IP. Know this risk and configure Fail2Ban/grant shell access accordingly.
FILES
/etc/fail2ban/*
AUTHOR
Manual page written by Daniel Black and Yaroslav Halchenko
REPORTING BUGS
Report bugs to https://github.com/fail2ban/fail2ban/issues
COPYRIGHT
Copyright (C) 2013
Copyright of modifications held by their respective authors. Licensed under the GNU General Public License v2 (GPL).
SEE ALSO
fail2ban-server(1) fail2ban-client(1) fail2ban-regex(1) jail.conf(5)
Fail2Ban March 2013 FAIL2BAN(1)