- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: system administration
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-26-2001 12:24 AM
10-26-2001 12:24 AM
system administration
I have a frontend server and a backend server. The application on the frontend uses certain ports to access the database on the backend server. I need to monitor these ports.
I have Patrol from BMC, with which I can monitor log files for a certain search string.
Can I write a script which generates a log file and this log file in turn is monitored by Patrol.
I tried using telnet, but did not succeed.
Please give some clue/help.
Thanks
Jayant
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-26-2001 12:40 AM
10-26-2001 12:40 AM
Re: system administration
Later,
Bill
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-26-2001 12:46 AM
10-26-2001 12:46 AM
Re: system administration
If its (a), then you'd have to use something like snort (www.snort.org) or nettl (bundled with os). If its (b), then netstat -an|grep LISTEN. If its (c), then lsof -i.
Hope this helps.
-Santosh
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-26-2001 02:32 AM
10-26-2001 02:32 AM
Re: system administration
Have a look at ngrep and dsniff
www.openbsd.org/cgi-bin/cvsweb/ports/net/ngrep/
http://www.monkey.org/~dugsong/dsniff/
HTH
-Michael
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-26-2001 04:16 AM
10-26-2001 04:16 AM
Re: system administration
If your intention is to just monitor
the status of the PORTs ,
netstat -a would be sufficient.
If you want to know what processes are
using the ports, you need to use the tool
"lsof " (free tool).
HTH
raj
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-26-2001 05:42 AM
10-26-2001 05:42 AM
Re: system administration
Download lsof from hp porting centre website. It's a wonderfl tool to have.
This is the address
http://hpux.cs.utah.edu/hppd/
Goodluck
-USA..
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-26-2001 08:03 AM
10-26-2001 08:03 AM
Re: system administration
If you want to do more serious sniffing, Ethereal is free and a pretty power sniffer as well.
Just another option,
Rita
..here's the thread if you decide to try it, to help get it working...it's at the same porting site as above..
http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x56b9cf38d6bdd5118ff10090279cd0f9,00.html