Netstat in Linux

List all ports
# netstat -a | more

List all tcp ports using netstat -at
# netstat -at

List all udp ports using netstat -au
# netstat -au

List only listening ports
# netstat -l

List only listening TCP Ports using netstat -lt
# netstat -lt

List only listening UDP Ports using netstat -lu
# netstat -lu

List only the listening UNIX Ports using netstat -lx
# netstat -lx

Show statistics for all ports
# netstat -s

Show statistics for TCP/UDP ports
# netstat -st
# netstat -su

Display PID and program names
# netstat -pt

Don’t resolve host, port and user name
# netstat -an

Print netstat information continuously
# netstat -c

Find the non supportive Address families in your system
# netstat --verbose

Display the kernel routing information
# netstat -r

Find out on which port a program is running
# netstat -ap | grep ssh

Find out which process is using a particular port
# netstat -an | grep ':80'

Show the list of network interfaces
# netstat -i

Display extended information on the interfaces
# netstat -ie


How to install SendMailAnalyser in linux, centOS?

SendmailAnalyzer can work in any platform where Sendmail and Perl could run. What you need is a modern Perl distribution 5.8.x or more is good but older version should also work.

Download sendmailanalyzer-x.x.tar.gz and perform the following opertaions

# tar -zxvf sendmailanalyzer-x.x.tar.gz
# cd sendmailanalyzer-x.x/
# perl Makefile.PL
# make && make install

Start SendmailAnalyzer daemon:

# /usr/local/sendmailanalyzer/sendmailanalyzer -f

Add httpd configuratiosn for SendmailAnalyzer

Alias /sareport /usr/local/sendmailanalyzer/www

<Directory /usr/local/sendmailanalyzer/www>
Options ExecCGI
AddHandler cgi-script .cgi
DirectoryIndex sa_report.cgi
Order deny,allow
Deny from all
Allow from 127.0.0.1
Allow from ::1
# Allow from .example.com
</Directory>

Test:

http://server_ip_address/sareport

Additional tasks to be added in crontab

# SendmailAnalyzer log reporting daily cache
0 1 * * * /usr/local/sendmailanalyzer/sa_cache > /dev/null 2>&1
# On huge MTA you may want to have five minutes caching
#*/5 * * * * /usr/local/sendmailanalyzer/sa_cache -a > /dev/null 2>&1

Logrotate:

/etc/logrotate.d/syslog to restart SendmailAnalyzer when maillog is rotated or create a cron job.

For example:

/var/log/cron /var/log/debug /var/log/maillog /var/log/messages /var/log/secure /var/log/spooler /var/log/syslog
{
   sharedscripts
   postrotate
        /bin/kill -HUP `cat /var/run/syslogd.pid 2>/dev/null` 2>/dev/null || true
/PATH_TO/rc.sendmailanalyzer restart >/dev/null 2>&1 || true
# or /etc/rc.d/init.d/sendmailanalyzer restart >/dev/null 2>&1 || true
   endscript
}

How to install darkstat in linux, centOS?

Darkstat - Web Based Network Traffic & Bandwidth Monitoring Tool on Linux

# yum install darkstat

# darkstat -i eth0

Test:

http://ip-address:667

How to install Monitorix in linux, centOS?

-->Monitorix is a lightweight system monitoring tool that can track services and resources of a system. This is one of the best tool to track system activities in simple and easiest way.

It can monitor system attributes like
-->System load
-->Active processes
-->Memory allocation
-->Kernel usage
-->Context switches and forks
-->VFS usage
-->Kernel usage per processor
-->Filesystems usage
-->Disk I/O activity
-->Inode usage
-->Time spent in I/O activity
-->Network traffic and usage
-->IPv4 states
-->IPv6 states
-->Active close
-->Passive close
-->UDP statistics
-->System services demand
-->IMAP and POP3 services
-->SMTP service
-->Network port traffic (Ports: 21, 22, 25, 80, 110, 139, 3306, 53, 143)
-->Users using the system
-->Devices interrupt activity


Installation Procedure

# yum install httpd rrdtool rrdtool-perl perl-libwww-perl perl-MailTools perl-MIME-Lite perl-CGI perl-DBI

Note: Some times on updated package this may not be enough, use the following command to update and download more packages to support the configurations.

# yum -y install rrdtool rrdtool-perl perl-libwww-perl perl-MailTools perl-MIME-Lite perl-CGI perl-DBI perl-XML-Simple perl-Config-General perl-HTTP-Server-Simple perl-IO-Socket-SSL

Download monitorix and install

# rpm -ivh http://www.monitorix.org/monitorix-n.n.n-1.noarch.rpm

After successful installations

# service monitorix start
#chkconfig monitorix on  ----> Add to startup

Log file: /var/log/monitorix

Testing:

http://ip-address:8080/monitorix/


Thats all, comments and suggestions are welcome!!

Download whole website using command

# wget -r --level=0 -convert-links --page-requisites --no-parent www.website.com

The wget options:
-r
--recursive, perform recursive
-l
--level=,Use 0 for infinite depth level or use number greater than 0 for limited depth.
-k
-convert-links,Modify links inside downloaded files to point to local files.
-p
--page-requisites, Get all images, css, js files which make up the web page.
-np
--no-parent, Don't download parent directory contents.

Install Cacti in Linux

Cacti is a complete frontend to RRDTool, it stores all of the necessary information to create graphs and populate them with data in a MySQL database.

We need to install the following software to install cacti.

1) MySQL Server : Store cacti data
2) NET-SNMP server – SNMP (Simple Network Management Protocol) is a protocol used for network management.
3) PHP with net-snmp module – Access SNMP data using PHP.
4) Apache / lighttpd / ngnix webserver : Web server to display graphs created with PHP and RRDTOOL.

Install the software

# yum install mysql-server mysql php-mysql php-pear php-common php-gd php-devel php php-mbstring php-cli php-snmp php-pear-Net-SMTP php-mysql httpd

Configure MySQL server

Setting up root password:-
# mysqladmin -u root password NEWPASSWORD

Create cacti MySQL database
# mysql -u root -p -e ‘create database cacti’

Create a user name cacti with a password your password, then enter

Login to mysql
# mysql -u root –p

mysql> GRANT ALL ON cacti.* TO cacti@localhost IDENTIFIED BY ‘your password’;
mysql> FLUSH privileges;
mysql> \q

Intall snmpd

Type the following command to install net-snmpd
# yum install net-snmp-utils php-snmp net-snmp-libs

To configure snmpd, open the snmpd.conf configuration file.

# vi /etc/snmp/snmpd.conf and modify like the following

com2sec local     localhost           public
group MyRWGroup v1         local
group MyRWGroup v2c        local
group MyRWGroup usm        local
view all    included  .1                               80
access MyRWGroup “”      any       noauth    exact  all    all    none
syslocation Unknown (edit /etc/snmp/snmpd.conf)
syscontact Root  (configure /etc/snmp/snmp.local.conf)
pass .1.3.6.1.4.1.4413.4.1 /usr/bin/ucd5820stat

Save and closed the configuration file and start the snmp service. Type the following.

# /etc/init.d/snmpd start
# chkconfig snmpd on

Install cacti

Update the repository:

rpm -Uvh http://download.fedora.redhat.com/pub/epel/5/x86_64/epel-release-5-4.noarch.rpm

# yum install cacti

Install cacti tables

Type the following command to find out cacti.sql path:
# rpm -ql cacti | grep cacti.sql

Sample output:

/usr/share/doc/cacti-0.8.7d/cacti.sql

Type the following command to install cacti tables, use cacti user and password

# mysql -u cacti -p cacti < /usr/share/doc/cacti-0.8.7d/cacti.sql

Configure cacti database string, Open /var/www/cacti/include
# config.php

Modify the following changes as follows

/* make sure these values refect your actual database/host/user/password */

$database_type = “mysql”;
$database_default = “cacti”;
$database_hostname = “localhost”;
$database_username = “cacti”;
$database_password = “your password”;
$database_port = “3306″;

Configure httpd for cacti, Update allow from line, set to your LAN subnet to allow access to cacti

Open /etc/httpd/conf.d/cacti.conf file

# vi /etc/httpd/conf.d/cacti.conf

Alias /cacti/ /var/www/cacti/

<Directory /var/www/cacti/>
DirectoryIndex index.php
Options -Indexes
AllowOverride all
order deny,allow
allow from 172.16.0.0/16 #your network address
AddType application/x-httpd-php .php
php_flag magic_quotes_gpc on
php_flag track_vars on
</Directory>

Restart the httpd

# /etc/init.d/httpd  restart

Setup cacti cronjob

Open /etc/cron.d/cacti file

# vi /etc/cron.d/cacti

Uncomment the line:
*/5 * * * *     cacti   /usr/bin/php /usr/share/cacti/poller.php > /dev/null 2>&1

Save and close the file.

Now cacti is ready, you can run the cacti type the following

http://server-IP-address/cacti/

or http://localhost/cacti

Note: The default username and password for cacti is admin / admin.

Monitor Network Switch and Ports Using Nagios


1. Enable switch.cfg in nagios.cfg

Uncomment the switch.cfg line in /usr/local/nagios/etc/nagios.cfg as shown below.

cfg_file=/usr/local/nagios/etc/objects/switch.cfg

2. Add new hostgroup for switches in switch.cfg

Add the following switches hostgroup to the /usr/local/nagios/etc/objects/switch.cfg file.

define hostgroup
{
hostgroup_name  switches
alias           Network Switches
}

3. Add a new host for the switch to be monitered

In this example, I’ve defined a host to monitor the core switch in the /usr/local/nagios/etc/objects/switch.cfg file. Change the address directive to your switch ip-address accordingly.

define host
{
use             generic-switch
host_name       core-switch
alias           Cisco Core Switch
address         192.168.1.50
hostgroups      switches
}

4. Add common services for all switches

Displaying the uptime of the switch and verifying whether switch is alive are common services for all switches. So, define these services under the switches hostgroup_name as shown below.

# Service definition to ping the switch using check_ping

define service
{
use                     generic-service
hostgroup_name          switches
service_description     PING
check_command           check_ping!200.0,20%!600.0,60%
normal_check_interval   5
retry_check_interval    1
}

# Service definition to monitor switch uptime using check_snmp

define service
{
use                     generic-service
hostgroup_name          switches
service_description     Uptime
check_command           check_snmp!-C public -o sysUpTime.0
}

5. Add service to monitor port bandwidth usage

check_local_mrtgtraf uses the Multil Router Traffic Grapher – MRTG. So, you need to install MRTG for this to work properly. The *.log file mentioned below should point to the MRTG log file on your system.

define service
{
use        generic-service
host_name core-switch
service_description Port 1 Bandwidth Usage
check_command check_local_mrtgtraf!/var/lib/mrtg/192.168.1.11_1.log!AVG!1000000,2000000!5000000,5000000!10
}

6. Add service to monitor an active switch port

Use check_snmp to monitor the specific port as shown below. The following two services monitors port#1 and port#5. To add additional ports, change the value ifOperStatus.n accordingly. i.e n defines the port#.

# Monitor status of port number 1 on the Cisco core switch

define service
{
use                  generic-service
host_name            core-switch
service_description  Port 1 Link Status
check_command        check_snmp!-C public -o ifOperStatus.1 -r 1 -m RFC1213-MIB
}

# Monitor status of port number 5 on the Cisco core switch

define service
{
use                  generic-service
host_name            core-switch
service_description  Port 5 Link Status
check_command       check_snmp!-C public -o ifOperStatus.5 -r 1 -m RFC1213-MIB
}


7. Add services to monitor multiple switch ports together

Sometimes you may need to monitor the status of multiple ports combined together. i.e Nagios should send you an alert, even if one of the port is down. In this case, define the following service to monitor multiple ports.

# Monitor ports 1 - 6 on the Cisco core switch.

define service
{
use                   generic-service
host_name             core-switch
service_description   Ports 1-6 Link Status
check_command         check_snmp!-C public -o ifOperStatus.1 -r 1 -m RFC1213-MIB, -o ifOperStatus.2 -r 1 -m RFC1213-MIB, -o ifOperStatus.3 -r 1 -m RFC1213-MIB, -o ifOperStatus.4 -r 1 -m RFC1213-MIB, -o ifOperStatus.5 -r 1 -m RFC1213-MIB, -o ifOperStatus.6 -r 1 -m RFC1213-MIB
}


8. Validate configuration and restart nagios

Verify the nagios configuration to make sure there are no warnings and errors.

# /usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg

Total Warnings: 0
Total Errors:   0
Things look okay - No serious problems were detected during the pre-flight check

Restart the nagios server to start monitoring the VPN device.

# /etc/rc.d/init.d/nagios stop

Stopping nagios: .done.

# /etc/rc.d/init.d/nagios start

Starting nagios: done.

Check: http://Your-server-ip/nagios or http://localhost/nagios in browsers

Network Related Commands

# dhclient eth0   
active interface 'eth0' in dhcp mode

# ethtool eth0   
show network statistics of eth0

# host www.example.com   
lookup hostname to resolve name to ip address and viceversa

# hostname   
show hostname of system

# ifconfig eth0   
show configuration of an ethernet network card

# ifconfig eth0 192.168.1.1 netmask 255.255.255.0   
configure IP Address

# ifconfig eth0 promisc   
configure 'eth0' in promiscuous mode to gather packets (sniffing)

# ifdown eth0   
disable an interface 'eth0'

# ifup eth0   
activate an interface 'eth0'

# ip link show   
show link status of all network interfaces

# iwconfig eth1   
show wireless networks

# iwlist scan   
wifi scanning to display the wireless connections available

# mii-tool eth0   
show link status of 'eth0'

# netstat -tup   
show all active network connections and their PID

# netstat -tupl   
show all network services listening on the system and their PID

# netstat -rn   
show routing table alike "route -n"

# nslookup www.example.com   
lookup hostname to resolve name to ip address and viceversa

# route -n   
show routing table

# route add -net 0/0 gw IP_Gateway   
configure default gateway

# route add -net 192.168.0.0 netmask 255.255.0.0 gw 192.168.1.1   
configure static route to reach network '192.168.0.0/16'

# route del 0/0 gw IP_gateway   
remove static route

# echo "1" > /proc/sys/net/ipv4/ip_forward   
activate ip routing

# tcpdump tcp port 80   
show all HTTP traffic

# whois www.example.com   
lookup on Whois database

User and Group Related Commands

# chage -E 2005-12-31 user1   
set deadline for user password

# groupadd [group-name]   
create a new group

# groupdel [group-name]   
delete a group

# groupmod -n moon sun   
rename a group from moon to sun

# grpck   
check correct syntax and file format of '/etc/group' and groups existence

# newgrp - [group-name]   
log into a new group to change default group of newly created files

# passwd   
change password

# passwd user1   
change a user password (only by root)

# pwck   
check correct syntax and file format of '/etc/passwd' and users existence

# useradd -c "User Linux" -g admin -d /home/user1 -s /bin/bash user1   
create a new user "user1" belongs "admin" group

# useradd user1   
create a new user

# userdel -r user1   
delete a user ( '-r' eliminates home directory)

# usermod -c "User FTP" -g system -d /ftp/user1 -s /bin/nologin user1   
change user attributes

ls commands

See list SCSI devices (or hosts) and their attributes under Linux operating systems
# lsscsi -g

Use this command to list block devices
# lsblk

To see file system type
# lsblk -f

To output info about permissions
# lsblk -m

Use this command to see Linux distribution-specific information, enter
# lsb_release
# lsb_release -a

Use this command to see USB buses in the Linux based system and the devices connected to them
# lsusb

lscpu command shows information about CPU architecture information like number of CPUs, threads, cores
# lscpu

lspci command shows information about PCI buses in the system and devices connected
# lspci

lspci command can be used to find out if a given PCI hardware
# lspci | grep VT6120

lshw command finds detailed information about the hardware configuration
# lshw / lshw-gtk

Use ls command to list directory contents
# ls
# ls -l ## long format
# ls -F ## appends a character revealing the nature of a file
# ls -a ## Show all files including hidden files
# ls -R ## recursively lists subdirectories
# ls -d ## Get info about a symbolic link or directory
# ls -t ## Sort the list of files by modification time
# ls -h ## Show sizes in human readable format
# ls -B ## In directories, ignore files that end with ‘~’ (backup files)
# ls -Z ## Display the SELinux security context
# ls --group-directories-first -l ## Show directories first (group directories). Useful on server.
# ls --color ##  Colorize the # ls output
# ls --hide='*.txt' -l ## Hide or  ignore files whose names ends with .txt

Use this command list open files, network ports, active process

#lsof | less
List all open file

#lsof -u vivek -i
See all files  opened by user "vivek"

#lsof -i 4 -a -p 7007
List all open IPv4 network files in use by the process whose PID is 7007

#lsof -i TCP80
Find process running on tcp port 80

#lsof -i 6
List only open IPv6 network files

#lsof -i 4
List only open IPv4 network files

#lsof -i TCP1-1024
List process open in port range 1 to 1024

#lsof -i @server.host.example1200-1205
List all files using any protocol on ports 1200 to 1205 of host server.host.example, use            

#lsof /dev/sr0
List all open files on device /dev/sr0

#lsof /dev/dvd
Find out why my DVD drive does not eject?

#lsof -i -u^root
See all files open by all users except root

#lsof /etc/foobar
Find out who's looking at the /etc/foobar file?

Use lsattr to lists the file attributes on a second extended file system
# lsattr /etc/passwd

Use lshal command to display items in the HAL (Hardware Abstraction Layer)
# lshal | less

Use this command to show the content of given initramfs images
# lsinitramfs /boot/initrd.img

Use this command to list all device driver loaded currently in the Linux Kernel
# lsmod

See information about the PCMCIA sockets and devices
# lspcmcia

Use this command to to lists all locks associated with the local files of the system
# lslk

Use this command to display the number of messages in a mailbox
# lsmbox

Text Manipulating Commands in Linux

# cat example.txt | awk 'NR%2==1'
remove all even lines from example.txt

# echo a b c | awk '{print $1}'
view the first column of a line

# echo a b c | awk '{print $1,$3}'
view the first and third column of a line

# cat -n file1
number row of a file

# comm -1 file1 file2
compare contents of two files by deleting only unique lines from 'file1'

# comm -2 file1 file2
compare contents of two files by deleting only unique lines from 'file2'

# comm -3 file1 file2
compare contents of two files by deleting only the lines that appear on both files

# diff file1 file2
find differences between two files

# grep Aug /var/log/messages
look up words "Aug" on file '/var/log/messages'

# grep ^Aug /var/log/messages
look up words that begin with "Aug" on file '/var/log/messages'

# grep [0-9] /var/log/messages
select from file '/var/log/messages' all lines that contain numbers

# grep Aug -R /var/log/*
search string "Aug" at directory '/var/log' and below

# paste file1 file2
merging contents of two files for columns

# paste -d '+' file1 file2
merging contents of two files for columns with '+' delimiter on the center

# sdiff file1 file2
find differences between two files and merge interactively alike "diff"

# sed 's/string1/string2/g' example.txt
replace "string1" with "string2" in example.txt

# sed '/^$/d' example.txt
remove all blank lines from example.txt

# sed '/ *#/d; /^$/d' example.txt
remove comments and blank lines from example.txt

# sed -e '1d' exampe.txt
eliminates the first line from file example.txt

# sed -n '/string1/p'
view only lines that contain the word "string1"

# sed -e 's/ *$//' example.txt
remove empty characters at the end of each row

# sed -e 's/string1//g' example.txt
remove only the word "string1" from text and leave intact all

# sed -n '1,5p' example.txt
print from 1th to 5th row of example.txt

# sed -n '5p;5q' example.txt
print row number 5 of example.txt

# sed -e 's/00*/0/g' example.txt
replace more zeros with a single zero

# sort file1 file2
sort contents of two files

# sort file1 file2 | uniq
sort contents of two files omitting lines repeated

# sort file1 file2 | uniq -u
sort contents of two files by viewing only unique line

# sort file1 file2 | uniq -d
sort contents of two files by viewing only duplicate line

# echo 'word' | tr '[:lower:]' '[:upper:]'
convert from lower case in upper case

Install proftd in linux

1. Download proftpd rpm package, download it from http://rpm.pbone.net

# wget ftp://ftp.pbone.net/mirror/centos.karan.org/el5/extras/testing/x86_64/RPMS/proftpd-1.3.1-3.el5.kb.x86_64.rpm

2. Install rpm package

# rpm -i proftpd-1.3.1-3.el5.kb.x86_64.rpm

3. Use ftpasswd to create user and group for ftp login. Complete manual click here.

Add users

# mkdir /etc/proftpd
# ftpasswd –passwd –file=/etc/proftpd/passwd –name=bob –uid=1001 –home=/home/bob –shell=/bin/false

Add group

# ftpasswd –group –file=/etc/proftpd/group –name=group-name –gid=group-id –member=user-member1 –member=user-member2 … –member=user-memberN

4. Edit /etc/proftpd.conf file

AuthUserFile /etc/proftpd/passwd
AuthGroupFile /etc/proftpd/group

#Disable PAM authentification
#AuthPAMConfig proftpd
#AuthOrder mod_auth_pam.c* mod_auth_unix.c

AuthPAM off

5. Restart proftpd service and put proftpd service in startup list.

# /etc/init.d/proftpd start
# chkconfig proftpd on

Mount Linux partition in Windows

Ext2Fsd free software to mount linux partition into my Windows system. It’s so easy to install and use. Just install it and with their friendly navigation we can mount it painlessly.

Package Auto Update Notifications

Install apticron

Type the following command at a shell prompt:

# apt-get update
# apt-get install apticron

Configure apticron to send email notifications

The default coniguration file is located at /etc/apticron/apticron.conf. Open file using text editor:

# vi /etc/apticron/apticron.conf

You need to set email address to email the notification as follows:

EMAIL="your_email@domain.com"

================================================================

sample configuration file

# apticron.conf
#
# set EMAIL to a list of addresses which will be notified of impending updates
#

EMAIL="admin@myhost.com"

#
# Set LISTCHANGES_PROFILE if you would like apticron to invoke apt-listchanges
# with the --profile option. You should add a corresponding profile to
# /etc/apt/listchanges.conf
#
# LISTCHANGES_PROFILE="apticron"

#
# Set SYSTEM if you would like apticron to use something other than the output
# of "hostname -f" for the system name in the mails it generates
#
# SYSTEM="foobar.example.com"

#
# Set IPADDRESSNUM if you would like to configure the maximal number of IP
# addresses apticron displays. The default is to display 1 address of each
# family type (inet, inet6), if available.
#
# IPADDRESSNUM="1"

#
# Set IPADDRESSES to a whitespace seperated list of reachable addresses for
# this system. By default, apticron will try to work these out using the
# "ip" command
#
# IPADDRESSES="192.10.2.1 2001:db8:1:2:3::1"

Save and close the file. /etc/cron.daily/apticron is the cron script for executing apticron daily and it will send you notfication when updates available.


SSH Manipulations

SSH Banner Message

Login as root and edit ssh config file

# vi /etc/ssh/sshd_config

Find this variable in the config file

# Banner /some/locations/file

Uncomment it and save the file

Restart openssh server

# /etc/init.d/ssh restart

SSH Timeout

echo “TMOUT=300 >> /etc/bashrc

echo “readonly TMOUT” >> /etc/bashrc

echo “export TMOUT” >> /etc/bashrc

Extract a single file from single tar ball

Extracting Specific Files

Extract a file called etc/default/sysstat from config.tar.gz tarball

#tar -ztvf config.tar.gz
#tar -zxvf config.tar.gz etc/default/sysstat
#tar -xvf {tarball.tar} {path/to/file}

This is also valid

#tar --extract --file={tarball.tar} {file}

Extract a directory called css from cbz.tar
##tar --extract --file=cbz.tar css

Wildcard based extracting

You can also extract those files that match a specific globbing pattern (wildcards). For example, to extract from cbz.tar all files that begin with pic, no matter their directory prefix, you could type:

#tar -xf cbz.tar --wildcards --no-anchored 'pic*'

To extract all php files, enter

#tar -xf cbz.tar --wildcards --no-anchored '*.php'

Where,

-x: instructs tar to extract files.
-f: specifies filename / tarball name.
-v: Verbose (show progress while extracting files).
-j : filter archive through bzip2, use to decompress .bz2 files.
-z: filter archive through gzip, use to decompress .gz files.
–wildcards: instructs tar to treat command line arguments as globbing patterns.
–no-anchored: informs it that the patterns apply to member names after any / delimiter.


Tar listing

Tar command provides the option to list files inside compressed tar ball. However mtools includes command called lz which gunzips and shows a listing of a gzip’d tar’d archive without extracting files.

For example, display listing of file called backup.tar.gz type command:

#lz backup.tar.gz

As you see lz provides a listing of a gzip’d tar’d archive, that is a tar archive compressed with the gzip command. It is not strictly necessary on Debian GNU/Linux (or other Linux/BSD/Solaris oses), because the GNU tar(1) program provides the same capability with the command:

#tar -tzf backup.tar.gz

Locking and Unlocking User Accounts in Linux


To lock, you can use the follow command

# passwd -l username

To Unlock the same account

# passwd -u username

Creating command Alias in Linux

Creating aliases is very easy. You can either enter them at the command line as you're working, or more likely, you'll put them in one of your startup files, like your .bashrc file, so they will be available every time you log in.

I created the l alias above by entering the following command into my .bashrc file:

alias l="ls -al"

As you can see, the syntax is very easy:

   1. Start with the alias command
   2. Then type the name of the alias you want to create
   3. Then an = sign, with no spaces on either side of the =
   4. Then type the command (or commands) you want your alias to execute when it is run. This can be a simple command, or can be a powerful combination of commands.

Sample aliases example

To get you going, here is a list of sample aliases I use all the time. I've pretty much just copied them here from my .bashrc file:

alias l="ls -al"
alias lm="ls -al|more"
alias html="cd /web/apache/htdocs/devdaily/html"
alias logs="cd /web/apache/htdocs/devdaily/logs"
alias qp="ps auxwww|more"
alias nu="who|wc -l"
alias aug="ls -al|grep Sep|grep -v 2010"

Ubuntu: Very useful Commands

Command privileges

    sudo command - run command as root
    sudo su – root shell open
    sudo su user – open shell as a user
    sudo -k – forget your password sudo
    gksudo command – sudo visual dialog (GNOME)
    kdesudo command – sudo visual dialog (KDE)
    sudo visudo – edit / etc / sudoers
    gksudo nautilus – root file manager (GNOME)
    kdesudo konqueror – root file manager (KDE)
    passwd – change your password

Command Network

    ifconfig – displays information network
    iwconfig – displays information from wireless
    sudo iwlist scan – scan wireless networks
    sudo /etc/init.d/networking restart – reset the network
    (file) /etc/network/interfaces – manual configuration
    ifup interface – bring online interface
    ifdown interface – disable interface

Commands Display

    sudo /etc/init.d/gdm restart – reset X (Gnome)
    sudo /etc/init.d/kdm restart – reset X (KDE)
    (file) /etc/X11/xorg.conf – show Configuration
    sudo dpkg-reconfigure - reconfigure xserver-xorg-phigh - reset configuration X
    Ctrl+Alt+Bksp – X display reset if frozen
    Ctrl+Alt+FN – switch to tty N
    Ctrl+Alt+F7 – switch back to X display

Commands Service System

    start service – service to start work (Upstart)
    stop service – service to stop working (Upstart)
    status service – check if service is running (Upstart)
    /etc/init.d/service start – start service (SysV)
    /etc/init.d/service stop – stop service (SysV)
    /etc/init.d/service status – check service (SysV)
    /etc/init.d/service restart – reset service (SysV)
    runlevel – get current runlevel

Commands for Firewall

    ufw enable – turn on the firewall
    ufw disable – turn off the firewall
    ufw default allow – allow all connections by default
    ufw default deny – drop all connections by default
    ufw status – current rules and
    ufw allow port – to allow traffic on port
    ufw deny port – port block
    ufw deny from ip – ip block

Command System

    lsb_release -a – get the version of Ubuntu
    uname -r – get kernel version
    uname -a – get all the information kernel

Commands for Package Manager

    apt-get update – refresh updates available
    apt-get upgrade – update all packages
    apt-get dist-upgrade – version update
    apt-get install pkg – installing pkg
    apt-get remove pkg – uninstall pkg
    apt-get autoremove – removing packages obsotletos
    apt-get -f install – try to fix packages
    dpkg –configure -a – try to fix a broken package
    dpkg -i pkg.deb – install file pkg.deb
    (file) /etc/apt/sources.list – list of repositories APT

Special Packages For commands

    ubuntu-desktop – Setting the standard Ubuntu
    kubuntu-desktop – KDE Desktop
    xubuntu-desktop – desktop XFCE
    ubuntu-minimal – core earnings Ubuntu
    ubuntu-standard – the standard utilities Ubuntu
    ubuntu-restricted-extras – not free, but useful
    kubuntu-restricted-extras – ditto KDE
    xubuntu-restricted-extras – ditto XFCE
    build-essential – packages used to compile
    linux-image-generic – latest generic kernel image
    linux-headers-generic – latest headlines

Applications commands

    nautilus – File Manager (GNOME)
    dolphin – File Manager (KDE)
    konqueror – Web browser (KDE)
    kate – text editor (KDE)
    gedit – text editor (GNOME)


Installing GRUB using grub-install


In order to install GRUB under a UNIX-like OS (such as gnu), invoke the program grub-install as the superuser (root).

The usage is basically very simple. You only need to specify one argument to the program, namely, where to install the boot loader. The argument has to be either a device file (like ‘/dev/hda’). For example, under Linux the following will install GRUB into the MBR of the first IDE disk:

# grub-install /dev/hda

Likewise, under GNU/Hurd, this has the same effect:

# grub-install /dev/hd0

But all the above examples assume that GRUB should put images under the /boot directory. If you want GRUB to put images under a directory other than /boot, you need to specify the option --boot-directory. The typical usage is that you create a GRUB boot floppy with a filesystem. Here is an example:

# mke2fs /dev/fd0
# mount -t ext2 /dev/fd0 /mnt
# mkdir /mnt/boot
# grub-install --boot-directory=/mnt/boot /dev/fd0
# umount /mnt

Some BIOSes have a bug of exposing the first partition of a USB drive as a floppy instead of exposing the USB drive as a hard disk (they call it “USB-FDD” boot). In such cases, you need to install like this:

# losetup /dev/loop0 /dev/sdb1
# mount /dev/loop0 /mnt/usb
# grub-install --boot-directory=/mnt/usb/bugbios --force --allow-floppy /dev/loop0

This install doesn't conflict with standard install as long as they are in separate directories.

Note that grub-install is actually just a shell script and the real task is done by grub-mkimage and grub-setup. Therefore, you may run those commands directly to install GRUB, without using grub-install. Don't do that, however, unless you are very familiar with the internals of GRUB. Installing a boot loader on a running OS may be extremely dangerous.

Windows: control panel shortcuts

Accessibility Options........................access.cpl
Add New Hardware     ........................sysdm.cpl
Add/Remove Programs  ........................appwiz.cpl
Date/Time Properties ........................timedate.cpl
Display Properties   ........................desk.cpl
FindFast             ........................findfast.cpl
Fonts Folder         ........................fonts
Internet Properties  ........................inetcpl.cpl
Joystick Properties  ........................joy.cpl
Keyboard Properties  ........................main.cpl keyboard
Microsoft Exchange   ........................mlcfg32.cpl
Microsoft Mail Post Office...................wgpocpl.cpl
Modem Properties     ........................modem.cpl
Mouse Properties     ........................main.cpl
Multimedia Properties........................mmsys.cpl
Network Properties   ........................netcpl.cpl
Password Properties  ........................password.cpl
PC Card              ........................main.cpl pc card (PCMCIA)
Power Management.............................main.cpl power
Power Management.............................powercfg.cpl
Printers Folder      ........................printers
Regional Settings    ........................intl.cpl
Scanners and Cameras ........................sticpl.cpl
Sound Properties     ........................mmsys.cpl sounds
System Properties    ........................sysdm.cpl

Exim Mail Commands in Details

Print a count of the messages in the queue:

[root@localhost]# exim -bpc

Print a listing of the messages in the queue (time queued, size, message-id, sender, recipient):

[root@localhost]# exim -bp

Print a summary of messages in the queue (count, volume, oldest, newest, domain, and totals):

[root@localhost]# exim -bp | exiqsumm

Print what Exim is doing right now:

[root@localhost]# exiwhat

Test how exim will route a given address:

[root@localhost]# exim -bt alias@localdomain.com

#user@thishost.com
    <-- alias@localdomain.com
  router = localuser, transport = local_delivery

[root@localhost]# exim -bt user@thishost.com
user@thishost.com
  router = localuser, transport = local_delivery
[root@localhost]# exim -bt user@remotehost.com
  router = lookuphost, transport = remote_smtp
  host mail.remotehost.com [1.2.3.4] MX=0

Run a pretend SMTP transaction from the command line, as if it were coming from the given IP address. This will display Exim's checks, ACLs, and filters as they are applied. The message will NOT actually be delivered.

[root@localhost]# exim -bh 192.168.11.22

Display all of Exim's configuration settings:

[root@localhost]# exim -bP

Searching the queue with exiqgrep

Exim includes a utility that is quite nice for grepping through the queue, called exiqgrep. Learn it. Know it. Live it. If you're not using this, and if you're not familiar with the various flags it uses, you're probably doing things the hard way, like piping `exim -bp` into awk, grep, cut, or `wc -l`. Don't make life harder than it already is.
First, various flags that control what messages are matched. These can be combined to come up with a very particular search.
Use -f to search the queue for messages from a specific sender:

[root@localhost]# exiqgrep -f [luser]@domain

Use -r to search the queue for messages for a specific recipient/domain:

[root@localhost]# exiqgrep -r [luser]@domain

Use -o to print messages older than the specified number of seconds. For example, messages older than 1 day:

[root@localhost]# exiqgrep -o 86400 [...]

Use -y to print messages that are younger than the specified number of seconds. For example, messages less than an hour old:

[root@localhost]# exiqgrep -y 3600 [...]

Use -s to match the size of a message with a regex. For example, 700-799 bytes:

[root@localhost]# exiqgrep -s '^7..$' [...]

Use -z to match only frozen messages, or -x to match only unfrozen messages.
There are also a few flags that control the display of the output.
Use -i to print just the message-id as a result of one of the above two searches:

[root@localhost]# exiqgrep -i [ -r | -f ] ...

Use -c to print a count of messages matching one of the above searches:

[root@localhost]# exiqgrep -c ...

Print just the message-id of the entire queue:

[root@localhost]# exiqgrep -i

Managing the queue
The main exim binary (/usr/sbin/exim) is used with various flags to make things happen to messages in the queue. Most of these require one or more message-IDs to be specified in the command line, which is where `exiqgrep -i` as described above really comes in handy.

Start a queue run:

[root@localhost]# exim -q -v

Start a queue run for just local deliveries:

[root@localhost]# exim -ql -v

Remove a message from the queue:

[root@localhost]# exim -Mrm <message-id> [ <message-id> ... ]

Freeze a message:

[root@localhost]# exim -Mf <message-id> [ <message-id> ... ]

Thaw a message:

[root@localhost]# exim -Mt <message-id> [ <message-id> ... ]

Deliver a message, whether it's frozen or not, whether the retry time has been reached or not:

[root@localhost]# exim -M <message-id> [ <message-id> ... ]

Deliver a message, but only if the retry time has been reached:

[root@localhost]# exim -Mc <message-id> [ <message-id> ... ]

Force a message to fail and bounce as "cancelled by administrator":

[root@localhost]# exim -Mg <message-id> [ <message-id> ... ]

Remove all frozen messages:

[root@localhost]# exiqgrep -z -i | xargs exim -Mrm

Remove all messages older than five days (86400 * 5 = 432000 seconds):

[root@localhost]# exiqgrep -o 432000 -i | xargs exim -Mrm

Freeze all queued mail from a given sender:

[root@localhost]# exiqgrep -i -f luser@example.tld | xargs exim -Mf

View a message's headers:

[root@localhost]# exim -Mvh <message-id>

View a message's body:

[root@localhost]# exim -Mvb <message-id>

View a message's logs:

[root@localhost]# exim -Mvl <message-id>

Add a recipient to a message:

[root@localhost]# exim -Mar <message-id> <address> [ <address> ... ]

Edit the sender of a message:

[root@localhost]# exim -Mes <message-id> <address>

Searching the logs with exigrep
The exigrep utility (not to be confused with exiqgrep) is used to search an exim log for a string or pattern. It will print all log entries with the same internal message-id as those that matched the pattern, which is very handy since any message will take up at least three lines in the log. exigrep will search the entire content of a log entry, not just particular fields.

One can search for messages sent from a particular IP address:

[root@localhost]# exigrep '<= .* \[12.34.56.78\] ' /path/to/exim_log

Search for messages sent to a particular IP address:

[root@localhost]# exigrep '=> .* \[12.34.56.78\]' /path/to/exim_log

This example searches for outgoing messages, which have the "=>" symbol, sent to "user@domain.tld". The pipe to grep for the "<=" symbol will match only the lines with information on the sender - the From address, the sender's IP address, the message size, the message ID, and the subject line if you have enabled logging the subject. The purpose of doing such a search is that the desired information is not on the same log line as the string being searched for.

[root@localhost]# exigrep '=> .*user@domain.tld' /path/to/exim_log | fgrep '<='

Generate and display Exim stats from a logfile:

[root@localhost]# eximstats /path/to/exim_mainlog

Same as above, with less verbose output:

[root@localhost]# eximstats -ne -nr -nt /path/to/exim_mainlog

Same as above, for one particular day:

[root@localhost]# fgrep YYYY-MM-DD /path/to/exim_mainlog | eximstats

To delete all queued messages containing a certain string in the body:

[root@localhost]# grep -lr 'a certain string' /var/spool/exim/input/ | \
                sed -e 's/^.*\/\([a-zA-Z0-9-]*\)-[DH]$/\1/g' | xargs exim -Mrm

Note that the above only delves into /var/spool/exim in order to grep for queue files with the given string, and that's just because exiqgrep doesn't have a feature to grep the actual bodies of messages. If you are deleting these files directly, YOU ARE DOING IT WRONG! Use the appropriate exim command to properly deal with the queue.
If you have to feed many, many message-ids (such as the output of an `exiqgrep -i` command that returns a lot of matches) to an exim command, you may exhaust the limit of your shell's command line arguments. In that case, pipe the listing of message-ids into xargs to run only a limited number of them at once. For example, to remove thousands of messages sent from hero@linux-geek.com:

[root@localhost]# exiqgrep -i -f '<hero@linux-geek.com>' | xargs exim -Mrm

Deleting mail from the mail queue in sendmail

Sendmail does not provide a command-line argument to remove messages from the mail queue. It may be necessary to manually remove messages from the mail queue rather than allowing Sendmail to attempt redelivery of messages for Timeout.queureturn days (5, by default).
The proper way to remove messages from the mail queue is to use the qtool.pl program included in the contrib subdirectory of the Sendmail source code distribution. qtool.pl uses the same file locking mechanism as Sendmail.

Removing "double bounce" messages

The following is a Perl script that calls /usr/local/bin/qtool.pl to remove "double bounce" messages. A "double bounce" is a message that is addressed to a non-existent user and that is sent from an invalid return address. Busy mail relays often have hundreds to thousands of these messages.
The script below will delete a queued message if it is (1) "deferred" (unable to be returned to the sender), (2) being sent from our postmaster email address, and (3) the subject is unique to delivery failure notifications.

#!/usr/bin/perl

use strict;

my $qtool = "/usr/local/bin/qtool.pl";
my $mqueue_directory = "/var/spool/mqueue";
my $messages_removed = 0;

use File::Find;
# Recursively find all files and directories in $mqueue_directory
find(\&wanted, $mqueue_directory);

sub wanted {
   # Is this a qf* file?
   if ( /^qf(\w{14})/ ) {
      my $qf_file = $_;
      my $queue_id = $1;
      my $deferred = 0;
      my $from_postmaster = 0;
      my $delivery_failure = 0;
      my $double_bounce = 0;
      open (QF_FILE, $_);
      while(<QF_FILE>) {
         $deferred = 1 if ( /^MDeferred/ );
         $from_postmaster = 1 if ( /^S<>$/ );
         $delivery_failure = 1 if \
            ( /^H\?\?Subject: DELIVERY FAILURE: (User|Recipient)/ );
         if ( $deferred && $from_postmaster && $delivery_failure ) {
            $double_bounce = 1;
            last;
         }
      }
      close (QF_FILE);
      if ($double_bounce) {
         print "Removing $queue_id...\n";
         system "$qtool", "-d", $qf_file;
         $messages_removed++;
      }
   }
}

print "\n$messages_removed total \"double bounce\" message(s) removed from ";
print "mail queue.\n";

Queued mail by domain

The following Perl script will show all queued mail by domain. A message may be counted more than once if it has multiple envelope recipients from different domains.

#!/usr/bin/perl

use strict;

my $mqueue_directory = "/var/spool/mqueue";
my %occurrences;

use File::Find;
# Recursively find all files and directories in $mqueue_directory
find(\&wanted, $mqueue_directory);

sub wanted {
   # Is this a qf* file?
   if ( /^qf\w{14}/ ) {
      open (QF_FILE, $_);
      while(<QF_FILE>) {
         # Lines beginning with R contain an envelope recipient
         if ( /^R.*:<.*\@(.*)>$/ ) {
            my $domain = lc($1);
            # Add 1 to the %occurrences hash
            $occurrences{$domain}++;
         }
      }
   }
}

# Subroutine to sort hash by ascending value
sub hashValueAscendingNum {
   $occurrences{$a} <=> $occurrences{$b};
}

# Print sorted results
foreach my $key (sort hashValueAscendingNum (keys(%occurrences))) {
   print "$occurrences{$key} $key\n";
}

Removing mail by domain

The following Perl script will remove all mail in the mail queue addressed to domain. Messages with multiple envelope recipients to different domains will not be deleted.

#!/usr/bin/perl

use strict;

# Exit immediately if domain was not specified as command-line argument
if (!(defined($ARGV[0]))) {
   (my $basename = $0) =~ s!^.*/!!;
   print "Usage: $basename domain\n";
   exit 1;
}

# Convert domain supplied as command-line argument to lowercase
my $domain_to_remove = lc($ARGV[0]);

my $qtool = "/usr/local/bin/qtool.pl";
my $mqueue_directory = "/var/spool/mqueue";
my $messages_removed = 0;

use File::Find;
# Recursively find all files and directories in $mqueue_directory
find(\&wanted, $mqueue_directory);

sub wanted {
   # Is this a qf* file?
   if ( /^qf\w{14}/ ) {
      my $QF_FILE = $_;
      my $envelope_recipients = 0;
      my $match = 1;
      open (QF_FILE, $_);
      while(<QF_FILE>) {
         # If any of the envelope recipients contain a domain other than
         # $domain_to_remove, do not match the message
         if ( /^R.*:<.*\@(.*)>$/ ) {
            my $recipient_domain = lc($1);
            $envelope_recipients++;
            if ($recipient_domain ne $domain_to_remove) {
               $match = 0;
               last;
            }
         }
      }
      close (QF_FILE);
      # $QF_FILE may not contain an envelope recipient at the time it is opened
      # and read. Do not match $QF_FILE in that case.
      if ($match == 1 && $envelope_recipients != 0) {
         print "Removing $QF_FILE...\n";
         system "$qtool", "-d", $QF_FILE;
         $messages_removed++;
      }
   }
}

print "$messages_removed total message(s) removed from mail queue.\n";

Queued mail by email address

The following Perl script will show all queued mail by email address. A message may be counted more than once if it has multiple envelope recipients.

#!/usr/bin/perl

use strict;

my $mqueue_directory = "/var/spool/mqueue";
my %occurrences;

use File::Find;
# Recursively find all files and directories in $mqueue_directory
find(\&wanted, $mqueue_directory);

sub wanted {
   # Is this a qf* file?
   if ( /^qf\w{14}/ ) {
      open (QF_FILE, $_);
      while(<QF_FILE>) {
         # Lines beginning with R contain an envelope recipient
         if ( /^R.*:<(.*)>$/ ) {
            my $domain = lc($1);
            # Add 1 to the %occurrences hash
            $occurrences{$domain}++;
         }
      }
   }
}

# Subroutine to sort hash by ascending value
sub hashValueAscendingNum {
   $occurrences{$a} <=> $occurrences{$b};
}

# Print sorted results
foreach my $key (sort hashValueAscendingNum (keys(%occurrences))) {
   print "$occurrences{$key} $key\n";
}

Removing mail by email address

The following Perl script will remove all mail in the mail queue addressed to email_address. Messages with multiple envelope recipients will not be deleted.

#!/usr/bin/perl

use strict;

# Exit immediately if email_address was not specified as command-line argument
if (!(defined($ARGV[0]))) {
   (my $basename = $0) =~ s!^.*/!!;
   print "Usage: $basename email_address\n";
   exit 1;
}

# Convert email address supplied as command-line argument to lowercase
my $address_to_remove = lc($ARGV[0]);

my $qtool = "/usr/local/bin/qtool.pl";
my $mqueue_directory = "/var/spool/mqueue";
my $messages_removed = 0;

use File::Find;
# Recursively find all files and directories in $mqueue_directory
find(\&wanted, $mqueue_directory);

sub wanted {
   # Is this a qf* file?
   if ( /^qf\w{14}/ ) {
      my $QF_FILE = $_;
      my $envelope_recipients = 0;
      my $match = 1;
      open (QF_FILE, $_);
      while(<QF_FILE>) {
         # If any of the envelope recipients contain an email address other than
         # $address_to_remove, do not match the message
         if ( /^R.*:<(.*)>$/ ) {
            my $recipient_address = lc($1);
            $envelope_recipients++;
            if ($recipient_address ne $address_to_remove) {
               $match = 0;
               last;
            }
         }
      }
      close (QF_FILE);
      # $QF_FILE may not contain an envelope recipient at the time it is opened
      # and read. Do not match $QF_FILE in that case.
      if ($match == 1 && $envelope_recipients != 0) {
         print "Removing $QF_FILE...\n";
         system "$qtool", "-d", $QF_FILE;
         $messages_removed++;
      }
   }
}

print "$messages_removed total message(s) removed from mail queue.\n";

Older notes

Note: the preferred method of queue removal is to use qtool.pl as illustrated above.
In order to remove mail from the queue, you have to delete the df* and qf* files from  your mail queue directory, generally /var/spool/mqueue. The qf* file is the header of the message and the control file, and the df* file is the body of the message.

script to move undeliverable email in our /var/spool/mqueue mail queue to an alternate /tmp/mqueue directory.

#!/bin/sh

if [ -z $@ ] ; then
   echo "Usage: $0 email_address"
   exit 1
fi

for i in `(cd /var/spool/mqueue; grep -l "To:.*$1" qf* | cut -c3-)`
do
   mv /var/spool/mqueue/*$i /tmp/mqueue
done

If you have multiple mail queues, such as q1, q2, q3, q4, and q5, you can use the following script:

#!/bin/sh

if [ -z $@ ] ; then
   echo "Usage: $0 email_address"
   exit 1
fi

for i in q1 q2 q3 q4 q5
do
   for j in `(cd /var/spool/mqueue/$i; grep -l "To:.*$1" qf* | cut -c3-)`
   do
     mv /var/spool/mqueue/$i/*$j /tmp/mqueue
   done
done

For example, running the script while passing the command-line argument badsender@baddomain.com will look for each qf* file in the mail queue containing To:.*badsender@baddomain.com. The regular
expression .* will match zero or more occurrences of any characters, numbers, or whitespace. For example, it would match:

To: badsender@baddomain.com
To: Bad Sender <badsender@baddomain.com>

The script then moves any other files (i.e. the body of the message) in the mail queue with the same Sendmail message ID to the alternate directory. It does this with the cut -c3- command, as the Sendmail message ID is the 3rd through the last character.
The mail is moved to /tmp/mqueue. If you are confident that you do not want the messages, you can delete them from this directory, or you could change the script to remove the files.

MRTG: Install and Configure in centOS


The Multi Router Traffic Grapher MRTG is a tool to monitor the traffic load on network-links.

MRTG generates HTML pages containing PNG images which provide a LIVE visual representation of this traffic. You need the following packages:

Requirements:
mrtg : Multi Router Traffic Grapher
net-snmp and net-snmp-utils : SNMP (Simple Network Management Protocol) is a protocol used for network management. The NET-SNMP project includes various SNMP tools. net-snmp package contains the snmpd and snmptrapd daemons, documentation, etc. Net-snmp-utils package

1:Install MRTG

Type the following command to install packages using yum command under CentOS / Fedora Linux:

# yum install mrtg net-snmp net-snmp-utils

2:Configure snmpd

If you need to monitor localhost including interface and other stuff such as CPU, memory etc, configure snmpd. Open /etc/snmp/snmpd.conf, enter:

# vi /etc/snmp/snmpd.conf

Update it as follows to only allow access from localhost:

com2sec local     localhost           public
group MyRWGroup v1         local
group MyRWGroup v2c        local
group MyRWGroup usm        local
view all    included  .1                               80
access MyRWGroup ""      any       noauth    exact  all    all    none
syslocation Your_Location
syscontact Root <your@emailaddress.com>

Save and close the file.

# chkconfig snmpd on
# service snmpd restart

Make sure you see interface IP, by running the following command:
# snmpwalk -v 1 -c public localhost IP-MIB::ipAdEntIfIndex

Sample Outputs:

IP-MIB::ipAdEntIfIndex.123.xx.yy.zzz = INTEGER: 2
IP-MIB::ipAdEntIfIndex.127.0.0.1 = INTEGER: 1

3:Configure MRTG

Use cfgmaker command to creates /etc/mrtg/mrtg.cfg file.

# cfgmaker --global 'WorkDir: /var/www/mrtg' --output /etc/mrtg/mrtg.cfg public@localhost

--global 'WorkDir: /var/www/mrtg' : add global config entries i.e. set workdir to store MRTG graphs.
--output /etc/mrtg/mrtg.cfg: configr output filename

public@localhost: public is the community name and it is by default. Using the wrong community name you will give no response from the device. localhost is the DNS name or the IP number of an SNMP-managable device.

Finally, run indexmaker to create web pages which display the status of an array of mrtg interface status pages

# indexmaker --output=/var/www/mrtg/index.html /etc/mrtg/mrtg.cfg

4: Verify Cron Job

/etc/cron.d/mrtg runs mrtg command to monitor the traffic load on network links

# cat /etc/cron.d/mrtg

Sample Output

*/5 * * * * root LANG=C LC_ALL=C /usr/bin/mrtg /etc/mrtg/mrtg.cfg --lock-file /var/lock/mrtg/mrtg_l --confcache-file
/var/lib/mrtg/mrtg.ok

# chkconfig --list crond

If it is off in run level # 3, run the following to turn on crond service:

# chkconfig crond on
# service crond on

View mrtg graphs:
You need Apache web server to view graphs:

# yum install httpd
# chkconfig httpd on
# service httpd on

Go to a web browser and type
http://your-ip.add.ress/mrtg/

Mount partitions with ntfs file system with read/write access

If the rpmforge repo is disabled by default,
# yum --enablerepo=rpmforge install fuse fuse-ntfs-3g

For CentOS 6,

# yum install ntfs-3g

if you prefer to leave EPEL disabled by default

# yum --enablerepo epel install ntfs-3g 

For Additional Functionality

# yum install ntfsprogs ntfsprogs-gnomevfs

Mounting NTFS Drives

# mkdir /mnt/drv1
# mkdir /mnt/drv2
# mkdir /mnt/drv3

Mounting with Read Only Access, add the line in /etc/fstab

/dev/sda1       /mnt/drv1   ntfs-3g  ro,umask=0222,defaults 0 0

Mounting with Read Write Access, add the line in /etc/fstab

/dev/sda1       /mnt/drv1   ntfs-3g  ro,umask=0222,defaults 0 0
/dev/sda1       /mnt/drv2   ntfs-3g  ro,umask=0222,defaults 0 0
/dev/sda1       /mnt/drv3   ntfs-3g  ro,umask=0222,defaults 0 0

# mount /mnt/drv1
# mount /mnt/drv2
# mount /mnt/drv3

Thats All, Enjoy Linux

System Information Related Commands

Show architecture of machine
# arch

Show the timetable of 2007
# cal 2007

Show information CPU info
# cat /proc/cpuinfo

Show interrupts
# cat /proc/interrupts

Verify memory use
# cat /proc/meminfo

Show file(s) swap
# cat /proc/swaps

Show version of the kernel
# cat /proc/version

Show network adpters and statistics
# cat /proc/net/dev

Show mounted file system(s)
# cat /proc/mounts

Save date changes on BIOS
# clock -w

Show system date
# date

set date and time - MonthDayhoursMinutesYear.Seconds
# date 041217002007.00

Show hardware system components - (SMBIOS / DMI)
# dmidecode -q

Displays the characteristics of a hard-disk
# hdparm -i /dev/hda

Perform test reading on a hard-disk
# hdparm -tT /dev/sda

Display PCI devices
# lspci -tv

Show USB devices
# lsusb -tv

Show architecture of machine
# uname -m

Show used kernel version
# uname -r

Archiving and Backup related commands


Decompress a file called 'file1.bz2'
# bunzip2 file1.bz2

Compress a file called 'file1'
# bzip2 file1

Decompress a file called 'file1.gz'
# gunzip file1.gz

Compress a file called 'file1'
# gzip file1

Compress with maximum compression
# gzip -9 file1

Create an archive rar called 'file1.rar'
# rar a file1.rar test_file

Compress 'file1', 'file2' and 'dir1' simultaneously
# rar a file1.rar file1 file2 dir1

Decompress rar archive
# rar x file1.rar

Create a uncompressed tarball
# tar -cvf archive.tar file1

Create an archive containing 'file1', 'file2' and 'dir1'
# tar -cvf archive.tar file1 file2 dir1

Show contents of an archive
# tar -tf archive.tar

Extract a tarball
# tar -xvf archive.tar

Extract a tarball into / tmp
# tar -xvf archive.tar -C /tmp

Create a tarball compressed into bzip2
# tar -cvfj archive.tar.bz2 dir1

Decompress a compressed tar archive in bzip2
# tar -xvfj archive.tar.bz2

Create a tarball compressed into gzip
# tar -cvfz archive.tar.gz dir1

Decompress a compressed tar archive in gzip
# tar -xvfz archive.tar.gz

Decompress rar archive
# unrar x file1.rar

Decompress a zip archive
# unzip file1.zip

Create an archive compressed in zip
# zip file1.zip file1

Compress in zip several files and directories simultaneously
# zip -r file1.zip file1 file2 dir1

Hard Disk related commands in Linux


Checking Disk capacity, Partition tables, etc.
[root@server ~]# fdisk -l

Get Detailed/current information directly from hard drive
[root@server ~]# hdparm -I /dev/sda

Check available/used/free spaces in each partitions
[root@server ~]# df -h

Check Hard drive speeds
[root@server ~]# hdparm -Tt /dev/sda

To list the partition tables for the specified devices
#fdisk -l

Pass print option to displays the partition table
#parted /dev/sda print

To display all disks and storage controllers in the system
#lshw -class disk -class storage

Find Out Disks Name Only
#lshw -short -C disk

The smartctl command act as a control and monitor Utility for SMART disks under Linux and Unix like operating systems
#smartctl -d ata -a -i /dev/sda

Partition the new disk using fdisk command
#fdisk -l | grep '^Disk'

Format the new disk using mkfs.ext3 command
#mkfs.ext3 /dev/sdb1

Mount the new disk using mount command
#mkdir /disk1
#mount /dev/sdb1 /disk1
#df -H

Label the partition
#e2label /dev/sdb1 /backup

Checking the Hard Disk for errors
#fsck.file_system_type, E.g #fsck.ext3

Show list of partitions mounted
# df -h   [man]

show the used space by installed deb packages, sorting by size
#dpkg-query -W -f='${Installed-Size;10}t${Package}n' | sort -k1,1n

Estimate space used by directory 'dir1'
#du -sh dir1

Show size of the files and directories sorted by size
#du -sk * | sort -rn

Show size of the files and directories ordered by size
#ls -lSr |more

Show space used by rpm packages installed sorted by size
# rpm -q -a --qf '%10{SIZE}t%{NAME}n' | sort -k1,1n

Format a floppy disk
# fdformat -n /dev/fd0

Create a filesystem type linux ext2 on hda1 partition
# mke2fs /dev/hda1

Create a filesystem type linux ext3 on hda1 partition
# mke2fs -j /dev/hda1

Create a filesystem type linux on hda1 partition
# mkfs /dev/hda1

Create a FAT32 filesystem
# mkfs -t vfat 32 -F /dev/hda1

Create a swap filesystem
# mkswap /dev/hda3

Force umount when the device is busy
# fuser -km /mnt/hda2

Mount disk called hda2 - verify existence of the directory '/ mnt/hda2'
# mount /dev/hda2 /mnt/hda2

Mount a floppy disk
# mount /dev/fd0 /mnt/floppy

Mount a cdrom / dvdrom
# mount /dev/cdrom /mnt/cdrom

Mount a cdrw / dvdrom
# mount /dev/hdc /mnt/cdrecorder

Mount a cdrw / dvdrom   [man]
# mount /dev/hdb /mnt/cdrecorder

Mount a file or iso image
# mount -o loop file.iso /mnt/cdrom

Mount a Windows FAT32 file system
# mount -t vfat /dev/hda5 /mnt/hda5

Mount a usb pen-drive or flash-drive
# mount /dev/sda1 /mnt/usbdisk

Mount a windows network share
# mount -t smbfs -o username=user,password=pass //WinClient/share /mnt/share

Unmount disk called hda2 - exit from mount point '/ mnt/hda2' first
# umount /dev/hda2

Run umount without writing the file /etc/mtab - useful when the file is read-only or the hard disk is full
# umount -n /mnt/hda2

Munin Installation in CentOS

Munin is a monitoring tool for servers. It uses RRDtool to log and graph data from your servers. The plugin API is very easy to grasp. Actually, I haven’t read the API documentation yet. I just looked at the output of the plugins and it looks easy to achieve. The data can be accessed through the web.

Munin works by polling your servers for the data hence two applications, Munin and Munin Node. The former periodically gathers data (cronned) and the latter serves the data to the former. Please refer to the following for our example configuration. You can make up a domain if you want Munin to group your servers similar to the live demo.

Munin “Graph Server” – graph-server.net (10.10.10.1)
A Munin Node – munin-sample.net (100.100.100.2)

1. Installing and Configuring Munin

In this section, we set it up on graph-server.net

Add the RPMforge repository.

#rpm -Uhv http://apt.sw.be/packages/rpmforge-release/rpmforge-release-0.3.6-1.el4.rf.i386.rpm

This step is optional if your Linux distribution has the packages in its default repositories.

Install munin.

#yum -y install munin

Change the ownership of the Munin web docroot to munin.

#chown -R munin:munin /var/www/munin

The default configuration file (in version 1.2.5-1) the value for the web docroot points to the wrong directory. Replace the value of htmldir from /var/www/html/munin to /var/www/munin at /etc/munin/munin.conf (line 7).

Restart Apache and Cron, service httpd restart && service crond restart

You can check if it’s working through your browser (i.e. http://10.10.10.1/munin/). You will get a 404 (not found) if you don’t supply a trailing slash.

2. Add a Node

In this section, we will configure munin-sample.net.

Add the RPMforge repository (see 1.1).

Install Munin Node.

#yum -y install munin-node

Configure. Edit /etc/munin/munin-node.conf with your favorite text editor.

Allow the graph server (graph-server.net/10.10.10.1) to poll the node.
allow ^192\.168\.1\.1$

If your server doesn’t report the correct hostname, add the following line

host_name munin-sample.net

If your servers have two interfaces and on the same LAN (e.g. one for Internet and another for LAN), you can configure the node to bind and listen on the local interface by changing the value of host (line 13) from * to the local IP of the node.
Start munin-node and set to start on bootup.

#service munin-node start
#chkconfig munin-node on

Edit Munin’s configuration on the graph server (/etc/munin/munin.conf).

[munin-sample.net]
address 100.100.100.2
use_node_name yes

Wait for at least 5 minutes for the new node to appear. You can also install the node on the graph server. The default node configuration will work out of the box.

3. Install/Activate Some Plugins

This section should familiarize you with the plugin installation routine. Plugins are installed in the nodes.

Apache

Create a symbolic link to the Apache plugins (stored in /usr/share/munin/plugins) in the plugin folder.

#ln -s /usr/share/munin/plugins/apache_* /etc/munin/plugins/

Enable server status reports. Add the following to Apache’s configuration file.

ExtendedStatus On
<Location /server-status>
SetHandler server-status
Order Deny,Allow
Deny from all
Allow from 127.0.0.1
</Location>

Restart Apache and the node

service httpd restart && service munin-node restart

Asterisk
Download the plugins for your Asterisk version from here.
Extract them to /usr/share/munin/plugins.
Make the files executable

#chmod 755 /usr/share/munin/plugins/asterisk_*

Configure Asterisk Manager by adding/changing the following in /etc/asterisk/manager.conf

[general]
enabled = yes
port = 5038
[munin]
secret = somepassword
permit = 127.0.0.1 ;if this doesn't work, use the local IP
write = system,call,log,verbose,command,agent,user

Add the following to the plugin configuration file in /etc/munin/plugin-conf.d/munin-node

[asterisk_*]
env.username munin
env.secret somepassword
Reload Asterisk's configuration and restart the node.
asterisk -rx reload >> /dev/null && service munin-node restart
MySQL

Create a symbolic link to the MySQL plugins (stored in /usr/share/munin/plugins) in the plugin folder.

#ln -s /usr/share/munin/plugins/mysql_* /etc/munin/plugins/

If your root user has a password (or want to use a different user), edit the plugin configuration file in /etc/munin/plugin-conf.d/munin-node and uncomment line 16 by removing the leading hash (#). Then change the parameters that will be used when mysqladmin is run.

Restart the node

#service munin-node restart

MTR

Make sure you have the latest version of MTR.

#yum -y install mtr && yum -y update mtr

Extract to /usr/share/munin/plugins
Make the file executable.

#chmod 755 /usr/share/munin/plugins/mtr100_

Create a symbolic link to the plugin (stored in /usr/share/munin/plugins) in the plugin folder. Append the host that you want to query to the link of the name.

#ln -s /usr/share/munin/plugins/mtr100_ /etc/munin/plugins/mtr100_somehost.com

To add another host to query, just create another symbolic link.

Add the following to the plugin configuration file in /etc/munin/plugin-conf.d/munin-node
[mtr100_*]
timeout 60

Restart the node
#service munin-node restart


Why Email Server in Linux are popular?


Supports POP3, IMAP and Web mail access. These are standard services that ideally should be available in any mail system for flexible email access.

Is extremely fast, reliable and scalable. Linux performs well and its uptime is very, very good.

Does not require expensive hardware. Thanks to its fast and efficient services, expensive high end hardware is not necessary.

Is very secured. The Linux operating system is very difficult to exploit. The National Security Agency even contributed to allow Linux to support even stronger levels of security.

Has a powerful anti-spam filter. SpamAssassin uses a wide variety of local and network tests to identify spam signatures.

Has an effective and regularly updated anti-virus. The open source nature of Clam Antivirus allows it to respond to new viruses even faster than commercial antivirus softwares.

Has small to zero (as in free) software cost depending on your support needs. Depending on your support needs, you have the option of using a community supported Linux or a company supported one.

Works with Microsoft Active Directory. You can integrate Microsoft Active Directory user accounts and distribution list into your Linux mail server to simplify administration.

configure: error: C++ compiler cannot create executables


SOLUTIONS:

If you are getting the following error while running configuration file
configure: error: C++ compiler cannot create executables
It means that you have not installed c++ libraries to fix that please execute the below command.
yum install *gcc-c++*
which will install gcc-c++ libraries which will fix the issue.

Mail Server Setup in details

For deploying a consistent, efficient email server, pay heeds to the following considerations

Linux Distribution


Red Hat Enterprise Linux is a Linux distribution produced by Red Hat and targeted toward the commercial market, including mainframes. Red Hat commits to supporting each version of RHEL for 7 years after its release.

  



CentOS is an Enterprise-class Linux Distribution derived from sources freely provided to the public by Red Hat.



Mail Delivery and Transfer

Postfix is an open source SMTP Server that is fast, easy to administer, flexible while at the same time being sendmail compatible enough to not upset existing users. Written by security expert Wietse Venema, it is built from the ground up to be secure.


Dovecot is an open source IMAP and POP3 server for Linux/UNIX-like systems. It complements Postfix with its high performance, ease of administration and rock solid security.

Web Mail Access



Apache is an open-source HTTP server supporting a wide range of operating systems including UNIX and Windows NT. Apache is a secure, efficient and extensible HTTP server that provides HTTP services in sync with the current HTTP standards.



Squirrelmail is an open source standards-based webmail package written in PHP.



Anti-Spam and Anti-Virus

MailScanner is an open source anti-virus and anti-spam filter for email servers. The anti-virus and anti-spam portion is delegated to third party applications.

ClamAV is an open source (GPL) anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways.


SpamAssassin is a mail filter, written in Perl, that identifies spam using a wide range of heuristic tests on mail headers and body text.





Lightweight Directory Access Protocol (LDAP)

Fedora Directory Server is an enterprise-class Open Source LDAP server for Linux. It is full-featured, supports multi-master replication, and already handles many of the largest LDAP deployments in the world.



OpenLDAP is an open source implementation of the Lightweight Directory Access Protocol.

JXplorer is a standards compliant general purpose open source ldap browser that can be used to read and search any ldap directory, or any X500 directory with an ldap interface.

Active Directory Integration

Samba is an Open Source/Free Software suite that provides seamless file and print services to SMB/CIFS clients.








System Administration


Webmin is a web-based interface for system administration for Unix. Using any modern web browser, you can setup user accounts, Apache, DNS, file sharing and much more.


For more: http://linux-circles.blogspot.com/2012/07/email-server-in-details.html