10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
How can we connect to remote computers with a bash script.? (1 Reply)
Discussion started by: diw10
1 Replies
2. UNIX for Dummies Questions & Answers
hi Im unable to find how this script in conencting to DB and which DB and job is scheduled in TWS to run this script.
Any sugggestion where to look for or how to get information.
please find below part of script for DB conenction.
##### SET VARIABLES ##################
rundate=`date... (1 Reply)
Discussion started by: saif2825
1 Replies
3. UNIX for Advanced & Expert Users
Hi everybody,
I am running a program on a supercomputer via my personal computer through a ssh connection. My program take more than a day to run, so when I left work with my PC I stop the connection with the supercomputer and the program stop.
I am wondering if someone know how I can manage... (2 Replies)
Discussion started by: TomTomGre
2 Replies
4. AIX
Hi,
I have a server AIX 5.3
Few people have the root password and somebody used the root login to erase a file (command rm in the .sh_history of root). :mad:
I would like to know if a file exist with what ip address has been connected.
I want to find the guilty!!! :D
Thanks guys (2 Replies)
Discussion started by: Castelior
2 Replies
5. Shell Programming and Scripting
Hi,
I'm trying to write a script which will run a select on db.
#!/usr/bin/ksh
SQL_INPUT_FILE=file_name.sql
SQL_OUTPUT_FILE=output.txt
MANPATH=/usr/share/man:/opt/SUNWspro/man:/usr/local/man... (2 Replies)
Discussion started by: ozum
2 Replies
6. Solaris
Hi everyone,
I am hoping anyone of you could help me in this weird problem we have in 1 of our Solaris 10 servers. Lately, we have been having some ftp problems in this server. Though it can ping any server within the network, it seems that it can only ftp to a select few. For most servers, the... (4 Replies)
Discussion started by: labdakos
4 Replies
7. UNIX for Advanced & Expert Users
Hello
I'm facing the above problem while doing a performance run. I've a script which I'm launching from my windows desktop using mozilla. The script will invoke backend action on a Solaris host which in turn feeds the records to a driver located on a linux box(Cent OS).
What's happening is... (1 Reply)
Discussion started by: subramanyab
1 Replies
8. UNIX for Dummies Questions & Answers
Hi Everyone,
Good day.
Scenario:
2 unix servers -- A (SunOS) and B (AIX)
I have an ftp script to sftp 30 files from A to B which happen almost instantaneously i.e 30 sftp's happen at the same time.
Some of these sftp's fail with the following error:
ssh_exchange_identification: Connection... (1 Reply)
Discussion started by: jeevan_fimare
1 Replies
9. IP Networking
Hi, I understand assignment qns are not allowed.
However, I need major help.. please teach me how to write a tcp/ip programme using C, wad are the websites that i can refer to?
wad are the codes required for it?
I have never done tcp/ip configurations before, and never learnt C before,... (13 Replies)
Discussion started by: microuniz
13 Replies
10. Cybersecurity
I just started a new job and inherited a Fedora core 3 server. I wanted to open the ftp ports and I wanted to verify this code before I mess things up. From my reading the two lines below should allow ftp access can anyone confirm my attempt.
iptables -A INPUT -p tcp - sport 21 -m state - state... (0 Replies)
Discussion started by: mungaz
0 Replies
Policing action in tc(8) Linux Policing action in tc(8)
NAME
police - policing action
SYNOPSIS
tc ... action police rate RATE burst BYTES[/BYTES] [ mtu BYTES[/BYTES] ] [ peakrate RATE ] [ overhead BYTES ] [ linklayer TYPE ] [ CONTROL
]
tc ... filter ... [ estimator SAMPLE AVERAGE ] action police avrate RATE [ CONTROL ]
CONTROL := conform-exceed EXCEEDACT[/NOTEXCEEDACT
EXCEEDACT/NOTEXCEEDACT := { pipe | ok | reclassify | drop | continue | goto chain CHAIN_INDEX }
DESCRIPTION
The police action allows to limit bandwidth of traffic matched by the filter it is attached to. Basically there are two different algo-
rithms available to measure the packet rate: The first one uses an internal dual token bucket and is configured using the rate, burst, mtu,
peakrate, overhead and linklayer parameters. The second one uses an in-kernel sampling mechanism. It can be fine-tuned using the estimator
filter parameter.
OPTIONS
rate RATE
The maximum traffic rate of packets passing this action. Those exceeding it will be treated as defined by the conform-exceed option.
burst BYTES[/BYTES]
Set the maximum allowed burst in bytes, optionally followed by a slash ('/') sign and cell size which must be a power of 2.
mtu BYTES[/BYTES]
This is the maximum packet size handled by the policer (larger ones will be handled like they exceeded the configured rate). Setting
this value correctly will improve the scheduler's precision. Value formatting is identical to burst above. Defaults to unlimited.
peakrate RATE
Set the maximum bucket depletion rate, exceeding rate.
avrate RATE
Make use of an in-kernel bandwidth rate estimator and match the given RATE against it.
overhead BYTES
Account for protocol overhead of encapsulating output devices when computing rate and peakrate.
linklayer TYPE
Specify the link layer type. TYPE may be one of ethernet (the default), atm or adsl (which are synonyms). It is used to align the
precomputed rate tables to ATM cell sizes, for ethernet no action is taken.
estimator SAMPLE AVERAGE
Fine-tune the in-kernel packet rate estimator. SAMPLE and AVERAGE are time values and control the frequency in which samples are
taken and over what timespan an average is built.
conform-exceed EXCEEDACT[/NOTEXCEEDACT]
Define how to handle packets which exceed or conform the configured bandwidth limit. Possible values are:
continue
Don't do anything, just continue with the next action in line.
drop Drop the packet immediately.
shot This is a synonym to drop.
ok Accept the packet. This is the default for conforming packets.
pass This is a synonym to ok.
reclassify
Treat the packet as non-matching to the filter this action is attached to and continue with the next filter in line (if any).
This is the default for exceeding packets.
pipe Pass the packet to the next action in line.
EXAMPLES
A typical application of the police action is to enforce ingress traffic rate by dropping exceeding packets. Although better done on the
sender's side, especially in scenarios with lack of peer control (e.g. with dial-up providers) this is often the best one can do in order
to keep latencies low under high load. The following establishes input bandwidth policing to 1mbit/s using the ingress qdisc and u32 fil-
ter:
# tc qdisc add dev eth0 handle ffff: ingress
# tc filter add dev eth0 parent ffff: u32
match u32 0 0
police rate 1mbit burst 100k
As an action can not live on it's own, there always has to be a filter involved as link between qdisc and action. The example above uses
u32 for that, which is configured to effectively match any packet (passing it to the police action thereby).
SEE ALSO
tc(8)
iproute2 20 Jan 2015 Policing action in tc(8)