10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I'm trying to run a program from the bash prompt and I don't understand why it is returning with an error.
Dig is my C program, and it takes in parameters J4, detect, 3 and 0182F98E
var1="cygdrive/c/2i/test fixture/software/mccdaqtest/debug/Dig J4 detect 3 0182F98E"
when I do
... (6 Replies)
Discussion started by: oahmad
6 Replies
2. Shell Programming and Scripting
Hi,
I am running a schedular script which will check for a specific time and do the job. I wanted to run this continuously. Meaning even after the if condition is true and it executes the job, it should start running again non stop.
I am using below script
#!/bin/sh
start:
while true
do... (10 Replies)
Discussion started by: sandeepcm
10 Replies
3. Shell Programming and Scripting
Hi guys,
been scratching round the forums and my mountain of resources.
Maybe I havn't read deep enough
My question is not how sed edits a stream and outputs it to a file, rather something like this below:
I have a .txt with some text in it :rolleyes:
abc:123:xyz
123:abc:987... (7 Replies)
Discussion started by: the0nion
7 Replies
4. UNIX for Dummies Questions & Answers
Hey all,
I'm trying to execute a program and despite it appearing to be there, I keep getting this:
-bash: ./aisdispatcher: No such file or directoryTo run it, I'm going into the directory where it is stored and running
./aisdispatcher...the result of which should just be a listing of options... (10 Replies)
Discussion started by: pmd006
10 Replies
5. UNIX for Dummies Questions & Answers
Hey guys, so I've been trying to write a bash script called runSorter.sh that runs an executable that also takes in some parameters and outputs the results to a text file. The executable, sorter, takes in a number parameter. I want to make it so that you can input as many number parameters into... (4 Replies)
Discussion started by: Duo11
4 Replies
6. Shell Programming and Scripting
I have this "process keepalive" script:
#!/bin/bash
PIDFILE=/tmp/php.pid
PHPSCRIPT=/home/www/mydomain.com/subdomains/www/parser.php
echo 'Checking php process from PID file'
if ; then
PID=`cat $PIDFILE`
if ps ax | grep -v grep | grep $PID > /dev/null
then
echo "php process still... (4 Replies)
Discussion started by: LukasB
4 Replies
7. Shell Programming and Scripting
Hi there,
I have written a script to check daily process,
each script is in a different directory.
Now the first process is running fine, when it goes to the next directory the process doesn't executes.
cd result/logs
ref=month_1888.log
echo $ref>> $logfile
cd /max/tot/first... (3 Replies)
Discussion started by: NehaKrish
3 Replies
8. UNIX for Dummies Questions & Answers
hi
i have file extentioned with test.vbs. i am able to run this file n execute through command promt but i dont know how to run in shell script
example:
file name is test.vbs which contains
strSoundFile = "C:\windows\Media\Notify.wav"
Set objShell = CreateObject("Wscript.Shell")
strCommand... (5 Replies)
Discussion started by: atl@mav
5 Replies
9. Shell Programming and Scripting
Hi
I have a script, which i ran in background, can someone please help in stopping this.
i gave this command:
ksh abc.ksh &
this script sends me a mail every 30 seconds. i have deleted the script but still i am getting the mails. can some one please help me stopping dese.
... (3 Replies)
Discussion started by: Prateek007
3 Replies
10. Programming
I've created a c program and compiled it with gcc, in unix.
The file name is abc.c and it is run by typing the command ./abc
I have another program which creates a child process, and I need this abc program to run on that child process. I've tried execvp(), but it doesn't work.
How can I run... (2 Replies)
Discussion started by: sdsd
2 Replies
SMOKEPING_MASTER_SLAVE(7) SmokePing SMOKEPING_MASTER_SLAVE(7)
NAME
smokeping_master_slave - How to run multiple distributed instances of SmokePing
OVERVIEW
Normally smokeping probes run their tests from the host where smokeping runs to some target host and monitor the latency of the connection
between the two.
The Master/Slave concept enables all smokeping probes to run remotely. The use case for this is to measure the overall connectivity in a
network. If you are interested in checking that your central DNS server or your file server works for everyone, you could setup several
smokeping instances checking up on on the two servers from multiple locations within your network. With the Master/Slave smokeping
configuration this process becomes much simpler, as one smokeping master server can control multiple slaves.
All monitoring data is stored and presented on the server, but collected by the slaves. The slaves will also get their configuration
information from the master, so that you just have to maintain the master server configuration file and the rest is taken care of
automatically.
DESCRIPTION
Architecture
The slaves communicate with the master smokeping server via the normal smokeping web interface. On initial startup each slave connects to
the master server and asks for its assignments. When the slave has done a round of probing it connects to the master again to deliver the
results.
If the assignment for a slave changes, the master will tell the slave after the slave has delivered its results.
The master and the slaves sign their messages by supplying an HMAC-MD5 code (RFC 2104) of the message and a shared secret. Optionally the
whole communication can run over ssl.
[slave 1] [slave 2] [slave 3]
| | |
+-------+ | +--------+
| | |
v v v
+---------------+
| master |
+---------------+
The slave is a normal smokeping instance setup where the configuration comes from the master instead of a local configuration file. The
slave tries to contact the master server after every round of probing, supplying its results. If the master server can not be reached, the
results will be sent to the server together with the next round of results. Results will be stored in a file in Perl storable form so that
they survive a restart of the smokeping instance.
Master Configuration
To configure a master/slave setup, add a slaves section to your smokeping configuration file. Each slave has a section in the slaves part
of the master configuration file. The section name must match the hostname of the slave. If some configuration parameter must be set to a
special value for the slave, use an override section to configure this.
The slave names must be the names the hosts think they have, not their outside hostnames or ip addresses or anything like that. When the
slave calls the master to get its config or report its measurements it will tell the master its 'hostname'. This together with the shared
secret is used to authenticate and identify who is who.
*** Slaves ***
secrets=/etc/smokeping/slavesecrets.conf
+slave1
display_name=erul22
location=India
color=ff0000
++override
Probes.FPing.binary = /usr/bin/fping
...
Then in the targets section you can define slaves at every level. Again the settings get inherited by lower order targets and can be
overwritten anywhere in the tree.
A slave will then get the appropriate configuration assigned by the server.
*** Targets ***
slaves = slave1 slave2
...
+dest1
slaves =
...
+dest2
slaves = slave1
...
+dest3
...
The data from the slaves will be stored in TargetName~SlaveName.rrd. So the example above would create the following files:
dest1.rrd
dest2.rrd
dest2~slave1.rrd
dest3.rrd
dest3~slave1.rrd
dest3~slave2.rrd
The slavesecrets.conf file contains a colon separated list of hostnames and secrets.
host1:secret1
host2:secret2
Slave Configuration
A smokeping slave setup has no configuration file. It just needs to know that it runs in slave-mode and its secret. The secret is stored in
a file for optimal protection. By default the persistent data cache will be located in /tmp/smokeping.$USER.cache.
./smokeping --master-url=http://smokeping/smokeping.cgi
--cache-dir=/var/smokeping/
--shared-secret=/var/smokeping/secret.txt
The secret.txt file contains a single word, the secret of this slave. It is NOT the same as the slavesecrets.conf file the master uses.
SECURITY CONSIDERATIONS
The master effectively has full access to slave hosts as the user running the slave smokeping instance. The configuration is transferred
as Perl code that is evaluated on the slave. While this is done inside a restricted "Safe" compartment, there are various ways that a
malicious master could embed arbitrary commands in the configuration and get them to run when the slave probes its targets.
The strength of the shared secret is thus of paramount importance. Brute forcing the secret would enable a man-in-the-middle to inject a
malicious new configuration and compromise the slave.
COPYRIGHT
Copyright (c) 2007 by Tobias Oetiker, OETIKER+PARTNER AG. All right reserved.
LICENSE
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation,
Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
AUTHOR
Tobias Oetiker <tobi@oetiker.ch>
2.6.8 2012-02-26 SMOKEPING_MASTER_SLAVE(7)