The document provides instructions for obtaining CE licenses from the RBS system through MOSHELL in 3 steps:
1) To get a CE license for a particular site, check the site's existing license status and capacity.
2) To get CE licenses for all sites, use the "mobatch" command to run a command like "cat /c/license/licensekeys.xml" across multiple sites simultaneously.
3) To get CE licenses for more than 5 sites at a time, create a file with the site list, run it through the "mobatch" command followed by the license checking command. This will run the command across numerous sites in parallel.
This document provides instructions for configuring a DNS server with static IP addressing and domain name resolution. It describes installing and configuring the bind package to enable DNS services, editing configuration files like named.conf and zone files, and testing the DNS server setup using commands like dig and nslookup. The DNS server is configured to resolve hostnames for the example.com domain and provide forward and reverse lookups once the named service is restarted.
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...Saroj Sahu
Unable to access Netapp Filer by ssh from the RedHat Linux machine throwing the error message as "Unable to negotiate with 10.150.10.10 port 22: no matching cipher found. Their offer: 3des-cbc
This document summarizes the WebSocket protocol specifications for establishing a WebSocket connection between a client and server, including the handshake process and frame format for sending messages. It also provides an example of an incoming message stream class that can unmask payloads according to the WebSocket specifications.
The document provides steps to install and configure OpenVPN on CentOS to create a VPN server. It describes installing required packages, setting up bridging and network interfaces, generating certificates using EasyRSA, configuring iptables, and writing server and client configuration files.
This document outlines the steps of a DNS request from a user's computer to resolve a domain name, including the initial DNS query to the root server, subsequent queries to TLD servers and authoritative name servers, and the final response returned to the user. It also shows ARP requests made to determine the MAC address of the local gateway router when establishing a connection.
This document provides an overview of common commands, configurations, and tools used for deploying projects on Linux servers including CentOS. It covers setting up networking, remote access, domains, Java, MySQL, web containers like Tomcat and GlassFish, web servers Apache and Nginx, time synchronization with NTP, automatic startup of services, and firewall management.
The document contains log entries from Nero burning software. It lists the software and hardware versions used, details about the burning process such as settings and tracks, and indicates that the burn was aborted by the user due to insufficient free space on the disc.
PENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid UmarWalid Umar
The document describes steps to configure a server to provide network services including DHCP, DNS, FTP, Samba file sharing, Apache web server, MySQL, mail server, and SquirrelMail webmail. Key services configured are Bind DNS, ProFTPD FTP, Samba file sharing, Apache web server, Postfix mail server, and SquirrelMail webmail. Network interfaces are configured and services are enabled, configured and tested.
This document provides instructions for configuring a DNS server with static IP addressing and domain name resolution. It describes installing and configuring the bind package to enable DNS services, editing configuration files like named.conf and zone files, and testing the DNS server setup using commands like dig and nslookup. The DNS server is configured to resolve hostnames for the example.com domain and provide forward and reverse lookups once the named service is restarted.
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...Saroj Sahu
Unable to access Netapp Filer by ssh from the RedHat Linux machine throwing the error message as "Unable to negotiate with 10.150.10.10 port 22: no matching cipher found. Their offer: 3des-cbc
This document summarizes the WebSocket protocol specifications for establishing a WebSocket connection between a client and server, including the handshake process and frame format for sending messages. It also provides an example of an incoming message stream class that can unmask payloads according to the WebSocket specifications.
The document provides steps to install and configure OpenVPN on CentOS to create a VPN server. It describes installing required packages, setting up bridging and network interfaces, generating certificates using EasyRSA, configuring iptables, and writing server and client configuration files.
This document outlines the steps of a DNS request from a user's computer to resolve a domain name, including the initial DNS query to the root server, subsequent queries to TLD servers and authoritative name servers, and the final response returned to the user. It also shows ARP requests made to determine the MAC address of the local gateway router when establishing a connection.
This document provides an overview of common commands, configurations, and tools used for deploying projects on Linux servers including CentOS. It covers setting up networking, remote access, domains, Java, MySQL, web containers like Tomcat and GlassFish, web servers Apache and Nginx, time synchronization with NTP, automatic startup of services, and firewall management.
The document contains log entries from Nero burning software. It lists the software and hardware versions used, details about the burning process such as settings and tracks, and indicates that the burn was aborted by the user due to insufficient free space on the disc.
PENYELESAIAN SOAL UKK/UPK TAHUN 2018 Paket 3 oleh Walid UmarWalid Umar
The document describes steps to configure a server to provide network services including DHCP, DNS, FTP, Samba file sharing, Apache web server, MySQL, mail server, and SquirrelMail webmail. Key services configured are Bind DNS, ProFTPD FTP, Samba file sharing, Apache web server, Postfix mail server, and SquirrelMail webmail. Network interfaces are configured and services are enabled, configured and tested.
This document provides an overview of different cybersecurity tools and techniques used for reconnaissance, scanning, exploitation, and attacks. It discusses tools for footprinting and reconnaissance like nslookup and web spiders. It also covers port scanning, vulnerabilities in SQL injection and scripting languages, and intrusion detection system evasion. Finally, it mentions sniffing tools, denial of service attacks, vulnerability scanners, and wireless hacking tools.
This document discusses the configuration of various server services, including:
- Setting up an Apache web server with SSL encryption and generating SSL certificates.
- Additional Apache configurations like virtual hosting, CGI scripts, and SELinux contexts.
- Basic SMTP configuration using Postfix and setting up an internal mail server.
- Configuring a caching-only DNS server using Named.
- Setting up NFS for file sharing between servers.
- Enabling file sharing with Windows clients using Samba (CIFS).
- Configuring an anonymous FTP server with vsftpd.
It provides instructions and examples for configuring each of these services on Linux servers.
agri inventory - nouka data collector / yaoya data convertorToshiaki Baba
This document provides instructions for setting up and using an agri inventory system called nouka and yaoya. Nouka collects data from servers using commands and sends it to the naya data store, which uses fluentd and MongoDB. It explains the components, data formats, and provides steps to get the required software and set up the system.
TechTalkThursday 29.06.2017: Wie verhält sich DDoS in der Realität?nine
Hast du dich jemals gefragt, wie eine DDoS-Attacke aus der Perspektive eines Hosting-Providers aussieht? Unser Senior Linux Operations Engineers, Patrick Hunziker zeigt, welche Attacken wir bereits erlebt und welche Massnahmen wir ergriffen haben.
This document discusses several common problems encountered with TCP sockets, connections, and memory usage. Solutions provided include increasing socket backlog limits, connection tracking limits, adjusting TIME_WAIT settings, and scaling memcached with multiple processes instead of threads.
This document provides instructions and examples for using process accounting (psacct) on Linux.
The instructions show how to install psacct with yum and enable it to start on boot and immediately.
The examples demonstrate different commands to view process accounting data: lastcomm shows commands for a user; sa shows statistics on executed processes; sa -u shows processes grouped by user; and sa -m shows total process times grouped by user. Each example provides details on what each column represents.
The document summarizes the steps taken to install and configure NGINX, PostgreSQL, Python, and uWSGI on a CentOS 7 server. Key steps include:
1) Installing NGINX using yum and enabling it to start automatically at boot;
2) Installing and initializing PostgreSQL, configuring it to allow local connections, and creating a database user;
3) Installing Python 3.7 using pyenv and setting it as the global version;
4) Installing uWSGI and using it to run a simple Python application served over HTTP on port 9090.
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Ontico
В какой-то момент 3-й в мире работный сайт начал периодически падать на несколько минут. Сюрпризом стало то, что в этот раз действительно из-за сети.
Для масштабирования сервисов и их взаимодействия между собой hh.ru использует внутренний балансировщик. Обработку 25 тыс. запросов в секунду обеспечивают 5 серверов с nginx. Обращение к этим серверам балансирует коммутатор.
Я расскажу, как мы расследовали серию инцидентов, которая была вызвана нарушением протокола TCP при балансировке. И что мы придумали, чтобы продолжить безнаказанно его нарушать.
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Андрей Шорин
В какой-то момент 3-й в мире работный сайт начал периодически падать на несколько минут. Сюрпризом стало то, что в этот раз действительно из-за сети.
Для масштабирования сервисов и их взаимодействия между собой hh.ru использует внутренний балансировщик. Обработку 25 тыс. запросов в секунду обеспечивают 5 серверов с nginx. Обращение к этим серверам балансирует коммутатор.
Я расскажу, как мы расследовали серию инцидентов, которая была вызвана нарушением протокола TCP при балансировке. И что мы придумали, чтобы продолжить безнаказанно его нарушать.
Suivez le périple d'une log depuis son émission, jusqu'à sa destination finale. Un parcourt semé d’embûches pour sauver la belle application du méchant NullPointor. Des courses poursuites à plus 10000 messages/s dans le dédale des systèmes distribués. Acteurs: Logback le faillot, Filebeat l'espion, Kafka le transporteur, Elasticsearch.... Costumes et Maquillage: Logstash
Il s'agit d'un retour d'expérience sur la configuration et l'exploitation d'un pipeline de données (des logs, des métriques...). A partir des problèmes rencontrés en production, j'expliquerai le fonctionnement interne des outils utilisés, pour vous permettre d'éviter les même écueils. Je m’intéresserai à des problématiques comme la fiabilité (perte de messages), la résilience, la performance ou la sécurité.
MixIT conference 2017
https://mixitconf.org/2017/l-odyssee-de-la-log
The document describes the Zet x86 open source SoC project, including both physical and logical descriptions. At the physical level, it describes how the SoC is implemented on a Terasic Altera DE1 FPGA board with various devices connected. At the logical level, it provides details on the SoC top level Wishbone architecture and the design of the Zet processor core, including its instruction format, decoder, pipeline, and microcode. It concludes by discussing plans for a new version of Zet with an 8-stage pipeline targeting 100 MHz operation.
The document provides instructions for deploying Red Hat OpenStack on Red Hat Enterprise Linux using PackStack. It describes starting two virtual machines for the RDO control and compute nodes. It then discusses using PackStack to install OpenStack on the nodes in an interactive or automated way. Finally, it outlines exploring the OpenStack dashboard and services like Keystone, Glance, Nova, Cinder, and Swift after installation.
The log details a cluster takeover event where node akfiler13 took over for node akfiler12 due to a reboot. The takeover completed successfully in 35 seconds. However, shortly after a disk inventory mismatch was detected, indicating the status of several disks had changed on akfiler12 or it was missing those disks.
This document provides instructions for setting up a simple VPN connection between two servers using OpenVPN. It includes steps to install OpenVPN, enable IP forwarding, create the VPN tunnels between the servers with ifconfig settings, and add routing entries to allow communication between the private networks on each server over the VPN.
1. The document configures Oracle database cloud with two nodes using container database and shared servers. It checks the status of the dispatcher and shared servers on node 1 and confirms connection between the nodes.
2. It provides instructions to connect node 2 using Putty SSH and save the TNS name of node 1 in tnsnames.ora on node 2.
3. After connecting, it checks the status of dispatcher and shared servers to confirm two shared servers are configured across the two nodes.
This document discusses PostgreSQL and Solaris as a low-cost platform for medium to large scale critical scenarios. It provides an overview of PostgreSQL, highlighting features like MVCC, PITR, and ACID compliance. It describes how Solaris and PostgreSQL integrate well, with benefits like DTrace support, scalability on multicore/multiprocessor systems, and Solaris Cluster support. Examples are given for installing PostgreSQL on Solaris using different methods, configuring zones for isolation, using ZFS for storage, and monitoring performance with DTrace scripts.
Fail2Ban is a tool that protects Linux servers from brute-force attacks. It monitors log files for signs of incorrect authentication attempts and bans IP addresses that show malicious signs. It works by updating firewall rules to reject IP addresses for a specified amount of time. The presentation covered installing and configuring Fail2Ban, testing banning policies for SSH and MySQL logins, and how to unban IP addresses.
The document logs the startup process of a messaging client. It records the loading of configuration files and plugins, the establishment of network connections, and the initial authentication process with the messaging service. Errors are encountered when loading some plugins due to missing dependencies. The client then successfully connects to the messaging service and authenticates the user account.
This document provides a summary of ESXi 5.0 commands and their equivalents in different ESXi shells and APIs. It maps VMware ESXCFG and VICFG commands to their corresponding ESXCLI 5.0 commands, PowerCLI cmdlets, and CIM/API methods. It also provides examples of common tasks like configuration of networking, storage, security and other host settings.
DeveloperWeek 2015: A Practical Introduction to DockerSteve Smith
Steve Smith gave a presentation on Docker and how it can be used for development and testing. He demonstrated how to build Docker images for Elasticsearch and Postgresql databases. Fig was shown to automate and simplify running linked Docker containers. Continuous integration and deployment with Docker was briefly discussed. While Docker provides benefits, it is still changing rapidly and there is no single solution.
HTTP logging met Varnishlog - PHPWVL 2022Thijs Feryn
This document discusses HTTP logging and Varnish log formats. It provides examples of Varnish log output showing request information like IP address, request method, URL, status code, timestamp and more. It also covers Varnish log filtering techniques like grouping transactions, including/excluding tags, and using Varnishlog queries.
This document provides an overview of different cybersecurity tools and techniques used for reconnaissance, scanning, exploitation, and attacks. It discusses tools for footprinting and reconnaissance like nslookup and web spiders. It also covers port scanning, vulnerabilities in SQL injection and scripting languages, and intrusion detection system evasion. Finally, it mentions sniffing tools, denial of service attacks, vulnerability scanners, and wireless hacking tools.
This document discusses the configuration of various server services, including:
- Setting up an Apache web server with SSL encryption and generating SSL certificates.
- Additional Apache configurations like virtual hosting, CGI scripts, and SELinux contexts.
- Basic SMTP configuration using Postfix and setting up an internal mail server.
- Configuring a caching-only DNS server using Named.
- Setting up NFS for file sharing between servers.
- Enabling file sharing with Windows clients using Samba (CIFS).
- Configuring an anonymous FTP server with vsftpd.
It provides instructions and examples for configuring each of these services on Linux servers.
agri inventory - nouka data collector / yaoya data convertorToshiaki Baba
This document provides instructions for setting up and using an agri inventory system called nouka and yaoya. Nouka collects data from servers using commands and sends it to the naya data store, which uses fluentd and MongoDB. It explains the components, data formats, and provides steps to get the required software and set up the system.
TechTalkThursday 29.06.2017: Wie verhält sich DDoS in der Realität?nine
Hast du dich jemals gefragt, wie eine DDoS-Attacke aus der Perspektive eines Hosting-Providers aussieht? Unser Senior Linux Operations Engineers, Patrick Hunziker zeigt, welche Attacken wir bereits erlebt und welche Massnahmen wir ergriffen haben.
This document discusses several common problems encountered with TCP sockets, connections, and memory usage. Solutions provided include increasing socket backlog limits, connection tracking limits, adjusting TIME_WAIT settings, and scaling memcached with multiple processes instead of threads.
This document provides instructions and examples for using process accounting (psacct) on Linux.
The instructions show how to install psacct with yum and enable it to start on boot and immediately.
The examples demonstrate different commands to view process accounting data: lastcomm shows commands for a user; sa shows statistics on executed processes; sa -u shows processes grouped by user; and sa -m shows total process times grouped by user. Each example provides details on what each column represents.
The document summarizes the steps taken to install and configure NGINX, PostgreSQL, Python, and uWSGI on a CentOS 7 server. Key steps include:
1) Installing NGINX using yum and enabling it to start automatically at boot;
2) Installing and initializing PostgreSQL, configuring it to allow local connections, and creating a database user;
3) Installing Python 3.7 using pyenv and setting it as the global version;
4) Installing uWSGI and using it to run a simple Python application served over HTTP on port 9090.
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Ontico
В какой-то момент 3-й в мире работный сайт начал периодически падать на несколько минут. Сюрпризом стало то, что в этот раз действительно из-за сети.
Для масштабирования сервисов и их взаимодействия между собой hh.ru использует внутренний балансировщик. Обработку 25 тыс. запросов в секунду обеспечивают 5 серверов с nginx. Обращение к этим серверам балансирует коммутатор.
Я расскажу, как мы расследовали серию инцидентов, которая была вызвана нарушением протокола TCP при балансировке. И что мы придумали, чтобы продолжить безнаказанно его нарушать.
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Андрей Шорин
В какой-то момент 3-й в мире работный сайт начал периодически падать на несколько минут. Сюрпризом стало то, что в этот раз действительно из-за сети.
Для масштабирования сервисов и их взаимодействия между собой hh.ru использует внутренний балансировщик. Обработку 25 тыс. запросов в секунду обеспечивают 5 серверов с nginx. Обращение к этим серверам балансирует коммутатор.
Я расскажу, как мы расследовали серию инцидентов, которая была вызвана нарушением протокола TCP при балансировке. И что мы придумали, чтобы продолжить безнаказанно его нарушать.
Suivez le périple d'une log depuis son émission, jusqu'à sa destination finale. Un parcourt semé d’embûches pour sauver la belle application du méchant NullPointor. Des courses poursuites à plus 10000 messages/s dans le dédale des systèmes distribués. Acteurs: Logback le faillot, Filebeat l'espion, Kafka le transporteur, Elasticsearch.... Costumes et Maquillage: Logstash
Il s'agit d'un retour d'expérience sur la configuration et l'exploitation d'un pipeline de données (des logs, des métriques...). A partir des problèmes rencontrés en production, j'expliquerai le fonctionnement interne des outils utilisés, pour vous permettre d'éviter les même écueils. Je m’intéresserai à des problématiques comme la fiabilité (perte de messages), la résilience, la performance ou la sécurité.
MixIT conference 2017
https://mixitconf.org/2017/l-odyssee-de-la-log
The document describes the Zet x86 open source SoC project, including both physical and logical descriptions. At the physical level, it describes how the SoC is implemented on a Terasic Altera DE1 FPGA board with various devices connected. At the logical level, it provides details on the SoC top level Wishbone architecture and the design of the Zet processor core, including its instruction format, decoder, pipeline, and microcode. It concludes by discussing plans for a new version of Zet with an 8-stage pipeline targeting 100 MHz operation.
The document provides instructions for deploying Red Hat OpenStack on Red Hat Enterprise Linux using PackStack. It describes starting two virtual machines for the RDO control and compute nodes. It then discusses using PackStack to install OpenStack on the nodes in an interactive or automated way. Finally, it outlines exploring the OpenStack dashboard and services like Keystone, Glance, Nova, Cinder, and Swift after installation.
The log details a cluster takeover event where node akfiler13 took over for node akfiler12 due to a reboot. The takeover completed successfully in 35 seconds. However, shortly after a disk inventory mismatch was detected, indicating the status of several disks had changed on akfiler12 or it was missing those disks.
This document provides instructions for setting up a simple VPN connection between two servers using OpenVPN. It includes steps to install OpenVPN, enable IP forwarding, create the VPN tunnels between the servers with ifconfig settings, and add routing entries to allow communication between the private networks on each server over the VPN.
1. The document configures Oracle database cloud with two nodes using container database and shared servers. It checks the status of the dispatcher and shared servers on node 1 and confirms connection between the nodes.
2. It provides instructions to connect node 2 using Putty SSH and save the TNS name of node 1 in tnsnames.ora on node 2.
3. After connecting, it checks the status of dispatcher and shared servers to confirm two shared servers are configured across the two nodes.
This document discusses PostgreSQL and Solaris as a low-cost platform for medium to large scale critical scenarios. It provides an overview of PostgreSQL, highlighting features like MVCC, PITR, and ACID compliance. It describes how Solaris and PostgreSQL integrate well, with benefits like DTrace support, scalability on multicore/multiprocessor systems, and Solaris Cluster support. Examples are given for installing PostgreSQL on Solaris using different methods, configuring zones for isolation, using ZFS for storage, and monitoring performance with DTrace scripts.
Fail2Ban is a tool that protects Linux servers from brute-force attacks. It monitors log files for signs of incorrect authentication attempts and bans IP addresses that show malicious signs. It works by updating firewall rules to reject IP addresses for a specified amount of time. The presentation covered installing and configuring Fail2Ban, testing banning policies for SSH and MySQL logins, and how to unban IP addresses.
The document logs the startup process of a messaging client. It records the loading of configuration files and plugins, the establishment of network connections, and the initial authentication process with the messaging service. Errors are encountered when loading some plugins due to missing dependencies. The client then successfully connects to the messaging service and authenticates the user account.
This document provides a summary of ESXi 5.0 commands and their equivalents in different ESXi shells and APIs. It maps VMware ESXCFG and VICFG commands to their corresponding ESXCLI 5.0 commands, PowerCLI cmdlets, and CIM/API methods. It also provides examples of common tasks like configuration of networking, storage, security and other host settings.
DeveloperWeek 2015: A Practical Introduction to DockerSteve Smith
Steve Smith gave a presentation on Docker and how it can be used for development and testing. He demonstrated how to build Docker images for Elasticsearch and Postgresql databases. Fig was shown to automate and simplify running linked Docker containers. Continuous integration and deployment with Docker was briefly discussed. While Docker provides benefits, it is still changing rapidly and there is no single solution.
HTTP logging met Varnishlog - PHPWVL 2022Thijs Feryn
This document discusses HTTP logging and Varnish log formats. It provides examples of Varnish log output showing request information like IP address, request method, URL, status code, timestamp and more. It also covers Varnish log filtering techniques like grouping transactions, including/excluding tags, and using Varnishlog queries.
This document summarizes the steps to build and run a Docker container for Nginx. It describes creating a Dockerfile that installs Nginx on Ubuntu, builds the image, runs a container from the image mounting a local directory, and commits changes to create a new image version. Key steps include installing Nginx, exposing ports 80 and 443, committing a container to create a new image with added files, and using Docker commands like build, run, commit, diff and inspect.
AtlasCamp 2015 Docker continuous integration trainingSteve Smith
A 2-hour training session delivered at AtlasCamp in Prague, June 9th 2015.
* Docker vs virtual machines
* Docker concepts
* Docker for testing
* Automation with Docker Compose
* Continuous integration with Bamboo Docker support
* Extracting test results from Docker containers
* Continuous deployment with deployment environments
DCEU 18: Tips and Tricks of the Docker CaptainsDocker, Inc.
Brandon Mitchell - Solutions Architect, BoxBoat
Docker Captain Brandon Mitchell will help you accelerate your adoption of Docker containers by delivering tips and tricks on getting the most out of Docker. Topics include managing disk usage, preventing subnet collisions, debugging container networking, understanding image layers, getting more value out of the default volume driver, and solving the UID/GID permission issues with volumes in a way that allows images to be portable from any developer laptop and to production.
This document provides instructions for various system administration tasks on Sun Solaris systems, including:
- Installing and configuring NFS, DNS, FTP, and other network services.
- Configuring devices like SCSI disks, modems, and tape drives.
- Performing backups, installing software packages, and viewing system information.
- Troubleshooting tips, monitoring performance, and debugging syslog.
It covers topics ranging from low-level kernel configuration to high-level network administration. The document serves as a reference guide for Solaris system administrators to complete common system management and maintenance activities.
This document outlines the steps to install Oracle Grid Infrastructure and configure high availability for an Oracle database cluster using Grid, NFS, and IP failover. It describes prerequisites like installing Oracle Grid and database packages, configuring shared storage, creating Oracle user accounts, and bonding network interfaces. The steps also include configuring the Oracle environment, installing the Grid software, and basic post-installation configuration to enable high availability functionality.
Docker can be used as an everyday development tool. It allows building, shipping and running applications securely by using containers. Containers allow encapsulating applications from the host machine and provide resource isolation using features like cgroups and namespaces. The key Docker concepts include images, containers, volumes, and the Docker engine. Docker Compose can be used to define and run multi-container Docker applications using a YAML file.
Oracle Architecture document discusses:
1. The cost of an Oracle Enterprise Edition license is $47,500 per processor.
2. It provides an overview of key Oracle components like the instance, database, listener and cost based optimizer.
3. It demonstrates how to start an Oracle instance, check active processes, mount and open a database, and query it locally and remotely after starting the listener.
The document provides instructions for installing various Alfresco components, including:
1) Installing PostgreSQL for the database, configuring users and permissions.
2) Installing the Alfresco webapp, applying AMPs, and configuring Tomcat.
3) Installing SOLR 6 for search and configuring the Alfresco properties.
4) Installing the Share webapp and configuring it to connect to Alfresco.
5) Installing and configuring LibreOffice as a conversion service.
This document outlines the steps to install Oracle Grid Infrastructure and configure an Oracle Real Application Clusters (RAC) database with iSCSI high availability on two nodes. It describes pre-requisite tasks like setting up repositories, installing Oracle Grid and database packages, configuring users, directories and environment variables. Specific steps covered include bonding network interfaces, configuring the hosts file, setting swap space and installing Oracle Grid software.
The document discusses reverse engineering the firmware of Swisscom's Centro Grande modems. It identifies several vulnerabilities found, including a command overflow issue that allows complete control of the device by exceeding the input buffer, and multiple buffer overflow issues that can be exploited to execute code remotely by crafting specially formatted XML files. Details are provided on the exploitation techniques and timeline of coordination with Swisscom to address the vulnerabilities.
Apache web server installation/configuration, Virtual Hostingwebhostingguy
The document describes the history and development of the Apache web server. Some key points:
- Apache was originally developed by the Apache group in 1995 as an open source alternative to NCSA httpd. It was called "A PAtCHy server" as it was initially developed through people contributing patch files to NCSA httpd.
- The first official public release was version 0.6.2 in April 1995. Key early features included adaptive pre-fork child processes and a modular/extensible structure and API.
- Apache quickly gained popularity and overtook NCSA httpd as the most widely used web server on the Internet after releasing version 1.0 in December 1995.
The document provides instructions for installing Solr on a Linux system in 6 steps:
1. Check that Java is installed correctly
2. Extract the Solr source file to the /opt directory
3. Run the installation script to create a Solr user and service, extract files to /opt/solr, and configure Solr to start on boot
This document discusses running Kubernetes on Raspberry Pi 4 boards to create a low-cost Kubernetes cloud. It describes setting up the infrastructure including an HTTP server, DHCP server, and DNS registry. It then covers building a custom Raspberry Pi 4 kernel, installing it on the boards, and configuring WiFi. Next, it discusses deploying Kubernetes with one master node and two worker nodes. Finally, it demonstrates running a multi-container Tomcat application on the Kubernetes cluster.
This document provides guidance on deploying and upgrading a MongoDB sharded cluster. It discusses the components of a sharded cluster including config servers, shards, and mongos processes. It recommends a production deployment has at least 3 config servers, 3 nodes per shard replica set, and multiple mongos instances. The document outlines steps for deploying each component, including initializing replica sets and adding shards. It also provides a checklist for upgrading between minor and major versions, such as changes to configuration options, deprecated operations, and connectivity changes.
This document provides an overview and instructions for deploying, upgrading, and troubleshooting a MongoDB sharded cluster. It describes the components of a sharded cluster including shards, config servers, and mongos processes. It provides recommendations for initial deployment including using replica sets for shards and config servers, DNS names instead of IPs, and proper user authorization. The document also outlines best practices for upgrading between minor and major versions, including stopping the balancer, upgrading processes in rolling fashion, and handling incompatible changes when downgrading major versions.
This document provides guidance on deploying and upgrading a MongoDB sharded cluster. It discusses the components of a sharded cluster including config servers, shards, and mongos processes. It recommends a production deployment have at least 3 config servers, 3 nodes per shard replica set, and multiple mongos instances. The document outlines steps for deploying each component, including initializing replica sets and adding shards. It also provides a checklist for upgrading between minor and major versions, such as changes to configuration options, deprecated operations, and connectivity changes.
Docker can be used as an everyday work tool for developers and system administrators. It provides tools to work with containers, which enable operating-system-level virtualization. Docker images contain executable packages that include code, runtimes, and configuration files to run software. Containers run as isolated processes on the host machine, using resources from the host operating system. Common Docker commands include docker run to launch containers, docker build to build images, and docker ps to view running containers. Docker Compose allows defining and running multi-container applications using a YAML configuration file.
VDCF is a management tool for virtualizing and monitoring Solaris environments. It allows centralized installation, operation, migration, monitoring, security, hardening and disaster recovery of Solaris zones, LDoms, and bare metal servers. VDCF provides simplicity, standardization, and high availability for private clouds. It has been in production use since 2006 to virtualize and manage Solaris environments.
Similar to How to get ce license at the rbs through moshell (20)
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Best 20 SEO Techniques To Improve Website Visibility In SERP
How to get ce license at the rbs through moshell
1. DESCRIPTION
1 (12)
Prepared (also subject responsible if other) No.
Approved Checked Date Rev Reference
PA
How to get CE license and CE number at the RBS through MOSHELL
Content:
1 How to Collect CE license from the system……………………………...2
1.1 How to get CE license for particular site………………………..2
1.2 How to get CE license for all sites...…………………………….4
1.3 How to get CE license for more than 5 sites at a time…………..7
2. DESCRIPTION
2 (12)
Prepared (also subject responsible if other) No.
Approved Checked Date Rev Reference
PA
1. How to Collect CE license from the system:
----- 1.1 How to get CE license for particular site.
Procedure:
Step 1: Connect site through moshell
Step 2: Check the existing CE license status through command
cat /c/license/licensekeys.xml
If it appears like this e.g.
LT28WM> cat /c/license/licensekeys.xml
080607-06:31:58 10.11.4.25 7.0e stopfile=/tmp/27280
Trying password from ipdatabase file: /opt/moshell/sitefiles/ipdatabase...
$ cat /c/license/licensekeys.xml
$
It means this site has unlimited CE license.
If the below state appears, check the highlighted line of downlink & uplink
SENTWM> cat /c/license/licensekeys.xml
080607-06:31:21 10.11.12.65 7.0e stopfile=/tmp/27205
Trying password from ipdatabase file: /opt/moshell/sitefiles/ipdatabase...
$ cat /c/license/licensekeys.xml
<?xml version="1.0" encoding="UTF-8"?>
<licFile xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<body formatVersion="1.0" signatureType="1">
<sequenceNumber>1</sequenceNumber>
<ELSN elsnId="EL9443720001">
<generalInfo>
<generated>2007-01-02T09:54:15</generated>
<issuer>Ericsson AB</issuer>
</generalInfo>
3. DESCRIPTION
3 (12)
Prepared (also subject responsible if other) No.
Approved Checked Date Rev Reference
PA
<fingerprint method="1" print="X911117783">
<featureKey id="CXC4020002">
<description>SOFTWARE KEY/HSDPA16QAM</description>
<start>2007-01-02</start>
<stop>9999-12-31</stop>
</featureKey>
<featureKey id="CXC4030001">
<description>SOFTWARE KEY/HSDPAMOBILITYPHASE1</description>
<start>2007-01-02</start>
<stop>9999-12-31</stop>
</featureKey>
<featureKey id="CXC4030517">
<description>LOAD MODULE/RABCOMBINATION017</description>
<start>2007-01-02</start>
<stop>9999-12-31</stop>
</featureKey>
<capacityKey id="CXC4010071/4003">
<description>SOFTWARE KEY/WCDMA RBS KEY FOR DOWNLINK</description>
<start>2007-01-02</start>
<stop>9999-12-31</stop>
<capacity>48</capacity>
<hardLimit>48</hardLimit>
</capacityKey>
<capacityKey id="CXC4010071/4002">
<description>SOFTWARE KEY/WCDMA RBS KEY FOR UPLINK CA</description>
<start>2007-01-02</start>
<stop>9999-12-31</stop>
<capacity>48</capacity>
<hardLimit>48</hardLimit>
</capacityKey>
</fingerprint>
</ELSN>
</body>
<signature>IN2IYsHz3uuAKG8De3T/pA==</signature>
$
That means Uplink CE license is 48 and downlink CE license is 48.
4. DESCRIPTION
4 (12)
Prepared (also subject responsible if other) No.
Approved Checked Date Rev Reference
PA
-------- 1.2 How to get CE license for all site.
Procedure:
Step 1: Launch Moshell
Step 2: Run following command
cd /opt/moshell/sitefiles/
Step 3: Use the mobatch command
mobatch sitelist 'cat /c/license/licensekeys.xml'
Then we will get something like following:
$ cd /opt/moshell/sitefiles/
$ mobatch sitelist 'cat /c/license/licensekeys.xml'
Sitefile = sitelist. Number of sites = 502
Command = cat /c/license/licensekeys.xml
Timeout set to 20 minutes (default value)
Maximum number of parallel processes set to 10 (default value)
Logfiles stored in /export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-07/sitelist/07-24
###########################################################################################
>>>>> STARTED (pid)
** FINISHED (result) STATUS (started, finished, queue, running, sites running)
###########################################################################################
>>>>> TSMDWM (28558) 1s 0f 501q 1r: TSMDWM
>>>>> NAGAWM (28561) 2s 0f 500q 2r: NAGAWM TSMDWM
>>>>> IDUSWM (28563) 3s 0f 499q 3r: IDUSWM NAGAWM TSMDWM
>>>>> PMEWWM (28564) 4s 0f 498q 4r: IDUSWM NAGAWM PMEWWM TSMDWM
>>>>> TUNKWM (28569) 5s 0f 497q 5r: IDUSWM NAGAWM PMEWWM TSMDWM TUNKWM
>>>>> WSMJWM (28572) 6s 0f 496q 6r: IDUSWM NAGAWM PMEWWM TSMDWM TUNKWM WSMJWM
>>>>> RARAWM (28575) 7s 0f 495q 7r: IDUSWM NAGAWM PMEWWM RARAWM TSMDWM TUNKWM
WSMJWM
>>>>> GDENWM (28577) 8s 0f 494q 8r: GDENWM IDUSWM NAGAWM PMEWWM RARAWM TSMDWM
TUNKWM WSMJWM
>>>>> UMENWM (28578) 9s 0f 493q 9r: GDENWM IDUSWM NAGAWM PMEWWM RARAWM TSMDWM
TUNKWM UMENWM WSMJWM
>>>>> KENYWM (28582) 10s 0f 492q 10r: GDENWM IDUSWM KENYWM NAGAWM PMEWWM RARAWM
TSMDWM TUNKWM UMENWM WSMJWM
** IDUSWM (OK) 10s 1f 492q 9r: GDENWM KENYWM NAGAWM PMEWWM RARAWM TSMDWM
TUNKWM UMENWM WSMJWM
** GDENWM (OK) 10s 2f 492q 8r: KENYWM NAGAWM PMEWWM RARAWM TSMDWM TUNKWM
UMENWM WSMJWM
** KENYWM (OK) 10s 3f 492q 7r: NAGAWM PMEWWM RARAWM TSMDWM TUNKWM UMENWM
WSMJWM
** PMEWWM (OK) 10s 4f 492q 6r: NAGAWM RARAWM TSMDWM TUNKWM UMENWM WSMJWM
6. DESCRIPTION
6 (12)
Prepared (also subject responsible if other) No.
Approved Checked Date Rev Reference
PA
TDUTWM OK
TEHSWM OK
TENAWM OK
TERAWM OK
TFRIWM OK
. .
. .
. .
. .
Step 4: Now you need to grep the list ……..use command grep –i <command> /<the filename
as Logfiles stored>/*
egrep –i "<capacity>|<hardlimit>" /export/home/rnoc/moshell_logfiles/
logs_mobatch/2008-06-06/sitelist/12-10/*
(Note: every time we have to use current path which will generate every time when you run
that “mobatch” command above mentioned in red colour)
Then we’ll get output like this…..
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-05-06/sitelist/13-
13/AJAYWM.log:<capacity>32</capacity>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-05-06/sitelist/13-
13/AJAYWM.log:<hardLimit>32</hardLimit>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-05-06/sitelist/13-
13/AJAYWM.log:<capacity>32</capacity>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-05-06/sitelist/13-
13/AJAYWM.log:<hardLimit>32</hardLimit>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-05-06/sitelist/13-
-
-
-
-This means the capacity of the site AJAYWM is 32 CE and the hardware limit is 32 CE.
Step 5: Then go through the all output and grab all CE license of all sites.
7. DESCRIPTION
7 (12)
Prepared (also subject responsible if other) No.
Approved Checked Date Rev Reference
PA
------ 1.3 How to get CE license more for than 5 sites at a time:
Procedure:
Step 1: Create a file with a list of sites
Step 2: Save it in Server via FTP
(Note: Connect 10.10.4.202 through MiTv SFTP GUI, and then save your file in
/export/home/rnoc/)
Step 3: Open Moshell window
Step 4: Run command mobatch <filename> ‘<command>’ ; Please refer the example
below:
$ mobatch CE 'cat /c/license/licensekeys.xml'
↑ ↑→ command
↑
↑→ Filename
We’ll get output like this
Sitefile = CE1.txt. Number of sites = 8
Command = cat /c/license/licensekeys.xml
Timeout set to 20 minutes (default value)
Maximum number of parallel processes set to 10 (default value)
Logfiles stored in /export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-
09/CE1.txt/17-42
8. DESCRIPTION
8 (12)
Prepared (also subject responsible if other) No.
Approved Checked Date Rev Reference
PA
############################################################################
###############
>>>>> STARTED (pid)
** FINISHED (result) STATUS (started, finished, queue, running,
sites running)
############################################################################
###############
>>>>> TPPMWM (2199) 1s 0f 7q 1r: TPPMWM
>>>>> UTENWM (2201) 2s 0f 6q 2r: TPPMWM UTENWM
>>>>> TFRIWM (2205) 3s 0f 5q 3r: TFRIWM TPPMWM UTENWM
>>>>> DDESWM (2207) 4s 0f 4q 4r: DDESWM TFRIWM TPPMWM
UTENWM
>>>>> PCHTWM (2209) 5s 0f 3q 5r: DDESWM PCHTWM TFRIWM
TPPMWM UTENWM
>>>>> KJGTWM (2214) 6s 0f 2q 6r: DDESWM KJGTWM PCHTWM
TFRIWM TPPMWM UTENWM
>>>>> SMEWWM (2216) 7s 0f 1q 7r: DDESWM KJGTWM PCHTWM
SMEWWM TFRIWM TPPMWM UTENWM
>>>>> KINRWM (2217) 8s 0f 0q 8r: DDESWM KINRWM KJGTWM
PCHTWM SMEWWM TFRIWM TPPMWM UTENWM
** TFRIWM (OK) 8s 1f 0q 7r: DDESWM KINRWM KJGTWM
PCHTWM SMEWWM TPPMWM UTENWM
** TPPMWM (OK) 8s 2f 0q 6r: DDESWM KINRWM KJGTWM
PCHTWM SMEWWM UTENWM
** SMEWWM (OK) 8s 3f 0q 5r: DDESWM KINRWM KJGTWM
PCHTWM UTENWM
** DDESWM (OK) 8s 4f 0q 4r: KINRWM KJGTWM PCHTWM
UTENWM
** PCHTWM (OK) 8s 5f 0q 3r: KINRWM KJGTWM UTENWM
** KJGTWM (OK) 8s 6f 0q 2r: KINRWM UTENWM
** UTENWM (OK) 8s 7f 0q 1r: KINRWM
** KINRWM (OK) 8s 8f 0q 0r:
############################################################################
###############
DDESWM OK
KINRWM OK
KJGTWM OK
PCHTWM OK
SMEWWM OK
TFRIWM OK
TPPMWM OK
UTENWM OK
$
Step 5: Now we need to grep the list ……..use command grep –i <command> /<the filename
as Logfiles stored>/*
(Note: every time we have to use current path which will generate every time when you run
that “mobatch” command above)
11. DESCRIPTION
11 (12)
Prepared (also subject responsible if other) No.
Approved Checked Date Rev Reference
PA
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/TPPMWM.log:<capacity>32</capacity>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/TPPMWM.log:<hardLimit>32</hardLimit>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<capacity>1</capacity>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<hardLimit>1</hardLimit>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<capacity>16</capacity>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<hardLimit>16</hardLimit>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<capacity>5</capacity>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<hardLimit>5</hardLimit>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<capacity>32</capacity>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<hardLimit>32</hardLimit>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<capacity>32</capacity>
/export/home/rnoc/moshell_logfiles/logs_mobatch/2008-06-09/CE1.txt/17-
42/UTENWM.log:<hardLimit>32</hardLimit>
$
Step 6: Finally, get all files from the server via FTP from the given directory.
Step 7: Then go through the all output and grab the CE license of all sites.
Note: For find out CE Number of site, all procedure is same as above explained, only
few changes there which is explained below:
Use command ‘inv’ instead of
'cat /c/license/licensekeys.xml'
and use egrep -i "RBS_RAXB" ………
rest all are same.