05-16-2018
This ntpq is a measurement.
If you trust your NTP setup then you do not need a measurement.
BTW I just have changed my last post, added another check for the case that NTP service does not work (somebody stopped it, all time peers are unreachable, ...).
With HP-UX 11.23 I remember a strangeness: ntpq reported sudden time jumps and the monitoring got occasional alerts.
No such issues on AIX, Solaris, Linux.
driftfile is not relevant. This is the drift between the hardware clock and the NTP servers., that predicts the real drift in case the time peers would not be reachable. Effectively it only causes a faster time sync after a startup of the NTP service. One can run NTP without a driftfile.
Last edited by MadeInGermany; 05-16-2018 at 03:39 PM..
This User Gave Thanks to MadeInGermany For This Post:
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have a script which must not be run more than once at any given time. THis script will be scheduled to run every 20 mins as a cron job.
In my script can i have logic to say if this script is already running from the previous cron, then exit.
How do i go about doing that. If you describe the... (11 Replies)
Discussion started by: rmulchandani
11 Replies
2. Shell Programming and Scripting
Hi guys I'm very new to unix and I have to create an awk script that detects webpage addresses from a file/webpage and outputs how many times each webpage was detected.e.g. if my file was:
(Note: The symbol " was added to stop them being created into links)
"www.google.com"... (1 Reply)
Discussion started by: ROFL
1 Replies
3. Shell Programming and Scripting
Hi guys I'm very new to unix and I have to create an awk script that detects webpage addresses from a file/webpage and outputs how many times each webpage was detected.e.g. if my file was:
www.google.com
www.facebook.com
www.google.com
the output should be:
www.google.com x2... (2 Replies)
Discussion started by: ROFL
2 Replies
4. Shell Programming and Scripting
Dear community,
what I'm try to do is deny users to run a script without parameters from command bash, but the same script should run without parameters only from crontab.
Example runs by crontab:*/5 * * * * /tmp/script.sh
Here the normal execution starts every 5 minutes
Example #1 runs by... (16 Replies)
Discussion started by: Lord Spectre
16 Replies
5. Shell Programming and Scripting
I have to check daily 20 processes each day. The names are like Network1 Network2 Network3 ....... Network20.
There is built in utility for doing this. Following is the command to check a single network process.
check_process_status 1
If we want to check the status of Network2 then the... (6 Replies)
Discussion started by: Nakul_sh
6 Replies
6. Shell Programming and Scripting
Hi all,
I am needing some help with a script that will search for a video file by known extensions and then do a pattern search (I'm guessing via regex) and then based on a match of one type of another move the file to an assigned directory.
I would like to do this with either a shell script... (7 Replies)
Discussion started by: Simplify
7 Replies
7. UNIX for Advanced & Expert Users
Hi forum,
So I am trying to determine the OS type with the following script:
#!/usr/bin/sh
OStype1=`uname -s`
Sunos1=SunOs
if
then
echo "This system is Linux"
exit 0
elif
then
echo "This system is SunOs"
exit 0
elif (1 Reply)
Discussion started by: dampio
1 Replies
8. UNIX for Beginners Questions & Answers
Hello there,
I am not an expert in networking related stuff but I got a requirement to create UNIX script to query our Company's internal time source via NTP for time drift detect and report it when > +/- 50ms.
I have been googling a lot but thought to post it in this forum to get a... (1 Reply)
Discussion started by: Green_Star
1 Replies
9. Shell Programming and Scripting
Hello,
I have a small script and it runs from web application in below format:
pipe:///path_to_myscript.sh url1 url2 url3
myscript.sh:
#!/bin/bash
count=0
while
do
count=$((count+1))
exec 3>&1
((ffmpeg -i $1 ...... -f mpegts pipe:1 2>/dev/null 1>&3 ) 2>&1 | \
while read LINE; do echo... (9 Replies)
Discussion started by: baris35
9 Replies
LEARN ABOUT OSF1
ntp.keys
ntp.keys(4) Kernel Interfaces Manual ntp.keys(4)
NAME
ntp.keys - Network Time Protocol (NTP) authentication key file
DESCRIPTION
The NTP standard specifies an extension to allow verification of the authenticity of received NTP packets and to provide an indication of
authenticity in outgoing packets. This is implemented in xntpd using the MD5 algorithm to compute the message-digest. The specification
allows any one of possibly 4 billion keys, numbered with 32-bit key identifiers, to be used to authenticate an association. The servers
involved in an association must agree on the key and key identifier used to authenticate their data, though they must each learn the key
and key identifier independently. In MD5, the keys are 64 bits (8 bytes). The xntpd daemon reads its keys from a file specified using the
-k command line option, or the keys statement in the configuration file. While key number 0 is fixed by the NTP standard (as 56 zero bits)
and may not be changed, one or more of the keys numbered 1 through 15 may be arbitrarily set in the keys file.
One of the keys may be chosen, by way of the configuration file requestkey statement, to authenticate run time configuration requests made
using the xntpdc(8) program. The latter program obtains the key from the terminal as a password, so it is generally appropriate to specify
the key chosen to be used for this purpose in ASCII format.
The NTP key file uses the same comment conventions as the configuration file. Key entries use a fixed format of the form: keyno type key
In this format: Is a positive integer. Is a single character that defines the format the key is given in. This is always M, representing
Message Digest (MD5) on Tru64 UNIX systems. Is the key itself. The MD5 algorithm key is a 1-to-8 character ASCII string. Because of the
simple tokenizing routine, you cannot use the following characters in an ASCII key: " " (space), "#" (number sign), "", "0, and " ". Note
that both the keys and the authentication scheme (MD5) must be identical between a set of peers sharing the same key number.
EXAMPLES
The following sample key file shows two defined NTP keys: 2 M RIrop8KPPvQvYotM # MD5 key as a random ASCII string 14 M sundial
# MD5 key as an ASCII string
FILES
Conventional name of the key file
RELATED INFORMATION
Commands: ntpdate(8), ntpq(8), xntpd(8), xntpdc(8)
Files: ntp.conf(4)
Network Administration delim off
ntp.keys(4)