feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
Subjects(RVK)
Keywords
  • 1
    Book
    Book
    Birmingham, Mumbai :Packt,
    UID:
    almahu_BV046163353
    Format: V, 172 Seiten.
    ISBN: 978-1-78953-883-0
    Content: Bash and shell script programming is central to using Linux, but it has many peculiar properties that are hard to understand and unfamiliar to many programmers, with a lot of misleading and even risky information online. Bash Quick Start tackles these problems head on, and shows you the best practices of shell script programming
    Content: Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: What is Bash? -- What Bash is and is not -- Getting Bash -- Checking Bash is running -- Switching the login shell to Bash -- Identifying the Bash version number -- Upgrading Bash on macOS X -- Understanding Bash features -- POSIX shell script features -- Bash-specific features -- Do I need Bash? -- Choosing when to apply Bash -- Choosing when to avoid Bash -- Getting help with Bash -- Summary -- Chapter 2: Bash Command Structure -- Using Bash interactively -- Interactive key bindings -- Simple commands -- Shell metacharacters -- Quoting -- Escaping -- Single quotes -- Double quotes -- Quote concatenation -- Running commands in sequence -- Exit values -- Stopping a command list on error -- Running a command in the background -- Summary -- Chapter 3: Essential Commands -- Distinguishing command types -- Essential Bash builtin commands -- The type command -- The echo command -- The printf command -- The pwd command -- Tilde paths -- The cd command -- Changing the directory in scripts -- The set command -- The declare command -- The test, [, and [[ commands -- Essential system commands -- The ls command -- Getting filename lists without ls -- The mv command -- The cp command -- The rm and rmdir commands -- The grep command -- The cut command -- The wc command -- Getting file sizes with wc or du -- The find command -- Executing commands for each result -- A note about find and xargs -- The sort and uniq commands -- Summary -- Chapter 4: Input, Output, and Redirection -- Redirecting output -- Redirection paths -- Avoiding overwrites -- Appending to files -- Understanding created file permissions -- Choosing permissions for created files -- Redirecting errors -- Combining errors with output
    Content: Blocking errors completely -- Sending output to more than one place -- Redirecting input -- Using a long string as input with here-documents -- Using pipes -- Adding file contents to a stream -- Piping output from multiple programs -- Filtering programs -- The sed stream editor -- The AWK programming language -- Summary -- Chapter 5: Variables and Patterns -- Using variables -- Listing variables -- Naming variables -- Variable name case -- Clearing variables -- Environment variables -- Calling programs with environment variables -- Expanding variables -- Reading a value into a variable -- Getting command output in variables -- Parameter expansion forms -- Specifying default values -- String chopping -- Extracting substrings -- Getting string length -- Substituting strings -- Changing case -- Combining parameter expansion forms -- Doing math in Bash -- Fixed or floating-point arithmetic -- Using globs -- Configuring globbing behavior -- Including dot files, but excluding dot and dot-dot -- Expanding to nothing -- Case-insensitive globbing -- Extended globbing -- Using arrays -- Glob expansion in arrays -- Associative arrays -- Summary -- Chapter 6: Loops and Conditionals -- Using the if keyword -- Using the test command -- Using the [ command -- Using the [[ keyword -- Arithmetic conditions -- Switching with the case keyword -- Looping over shell words with for -- Skipping an iteration -- Ending the loop -- Misuse of for loops -- Using Bash's C-style for loops -- Using while loops -- Infinite loops -- Reading data line by line -- Field splitting -- Saving fields into arrays -- Choosing the splitting character -- Disabling whitespace trimming -- Reading process output -- Avoiding subshell problems -- Avoiding input problems with ssh -- Summary -- Chapter 7: Scripts, Functions, and Aliases -- Aliases -- Defining new aliases
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-1-78953-408-5
    Language: English
    Subjects: Computer Science
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9948317710202882
    Format: iii, 349 p. : , ill.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Series Statement: Community experience distilled
    Note: Includes index.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Birmingham ; : Packt Publishing Ltd.,
    UID:
    almahu_9949274446702882
    Format: 1 online resource (178 pages)
    ISBN: 9781789534085 (e-book)
    Additional Edition: Print version: Ryder, Tomb. Bash quick start guide : get up and running with Shell scripting with Bash. Birmingham ; Mumbai : Packt Publishing Ltd., c2018 ISBN 9781789538830
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949319917202882
    Format: 1 online resource (386 pages) : , illustrations (some color)
    Edition: Second edition.
    ISBN: 9781785883132 (e-book)
    Series Statement: Quick answers to common problems
    Note: Includes index.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almafu_9959244086502883
    Format: 1 online resource (386 p.)
    Edition: 2nd ed.
    ISBN: 1-78588-313-5
    Series Statement: Quick answers to common problems
    Content: Over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your network About This Book Master the advanced configuration techniques of Nagios Core to model your network better by improving hosts, services, and contacts Filter and improve the notifications that Nagios Core sends in response to failed checks, which can greatly assist you when diagnosing problems Pull Nagios Core's data into a database to write clever custom reports of your own devise Who This Book Is For If you are a network or system administrator and are looking for instructions and examples on working with Nagios Core, then this book is for you. Some basic shell command-line experience is required, and some knowledge of scripting would be helpful when we discuss how plugins work. What You Will Learn Manage the configuration of Nagios Core with advanced techniques to achieve fine detail in your checks Find, install, and even write your own check plugins Filter notifications to send them to the right people or programs at the right time Work around difficult network accessibility issues and delegate checks to other machines Tweak a Nagios Core server to achieve both high performance and redundancy in case of disaster Process the results of checks performed by other machines to monitor backups and similar processes Extend Nagios Core to allow advanced scripting, reporting, and network visualization behavior In Detail Nagios Core is an open source monitoring framework suitable for any network that ensures both internal and customer-facing services are running correctly and manages notification and reporting behavior to diagnose and fix outages promptly. It allows very fine configuration of exactly when, where, what, and how to check network services to meet both the uptime goals of your network and systems team and the needs of your users. This book shows system and network administrators how to use Nagios Core to its fullest as a monitoring framework for checks on any kind of network services, from the smallest home network to much larger production multi-site services. You will discover that Nagios Core is capable of doing much more than pinging a host or to see whether websites respond. The recipes in this book will demonstrate how to leverage Nagios Core's advanced configuration, scripting hooks, reports, data retrieval, and extensibility to integrate it with your existing systems, and to make it the rock-solid center of your network monitoring worl...
    Note: Includes index. , Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts on a group; Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new command , Customizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Implementing threshold checks in a plugin; Using macros as environment variables in a plugin; Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service; Chapter 4: Configuring Notifications; Introduction , Configuring notification periodsConfiguring notifications for groups; Choosing states for notification; Specifying the number of failed checks before notification; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Filtering notifications based on a host or service value; Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string , Monitoring database servicesMonitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID for monitoring; Chapter 6: Enabling Remote Execution; Introduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo(8) privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Using check_mk instead of NRPE; Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview , Viewing and interpreting availability reportsViewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interface; Viewing configuration in the web interface; Scheduling checks from the web interface; Acknowledging a problem via the web interface; Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay , Chapter 9: Managing Configuration
    Additional Edition: ISBN 1-78588-933-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Birmingham, UK :Packt Publishing,
    UID:
    almafu_9961373546302883
    Format: 1 online resource (1 volume)
    Edition: 1st edition
    ISBN: 1-78953-408-9
    Content: Learn how to write shell script effectively with Bash, to quickly and easily write powerful scripts to manage processes, automate tasks, and to redirect and filter program input and output in useful and novel ways. Key Features Demystify the Bash command line Write shell scripts safely and effectively Speed up and automate your daily work Book Description Bash and shell script programming is central to using Linux, but it has many peculiar properties that are hard to understand and unfamiliar to many programmers, with a lot of misleading and even risky information online. Bash Quick Start Guide tackles these problems head on, and shows you the best practices of shell script programming. This book teaches effective shell script programming with Bash, and is ideal for people who may have used its command line but never really learned it in depth. This book will show you how even simple programming constructs in the shell can speed up and automate any kind of daily command-line work. For people who need to use the command line regularly in their daily work, this book provides practical advice for using the command-line shell beyond merely typing or copy-pasting commands into the shell. Readers will learn techniques suitable for automating processes and controlling processes, on both servers and workstations, whether for single command lines or long and complex scripts. The book even includes information on configuring your own shell environment to suit your workflow, and provides a running start for interpreting Bash scripts written by others. What you will learn Understand where the Bash shell fits in the system administration and programming worlds Use the interactive Bash command line effectively Get to grips with the structure of a Bash command line Master pattern-matching and transforming text with Bash Filter and redirect program input and output Write shell scripts safely and effectively Who this book is for People who use the command line on Unix and Linux servers already, but don't write primarily in Bash. This book is ideal for people who've been using a scripting language such as Python, JavaScript or PHP, and would like to understand and use Bash more effectively.
    Additional Edition: ISBN 1-78953-883-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almafu_9959239923202883
    Format: 1 online resource (366 p.)
    Edition: 1st edition
    ISBN: 1-84951-557-3 , 1-299-19853-8
    Series Statement: Community experience distilled
    Content: This book is written in Cookbook style, beginning with recipes based on basic structure which gradually progresses towards using Nagios Core as a monitoring framework. This book is for System Administrators who are looking for recipes to help them deal with advanced network monitoring issues with Nagios Core.
    Note: Includes index. , Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts in a group; Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new command , Customizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service; Chapter 4: Configuring Notifications; Introduction; Configuring notification periods; Configuring notification for groups , Specifying which states to be notified aboutTolerating a certain number of failed checks; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string; Monitoring database services; Monitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID to monitor , Chapter 6: Enabling Remote ExecutionIntroduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview; Viewing and interpreting availability reports; Viewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interface , Viewing configuration in the web interfaceScheduling checks from the web interface; Acknowledging a problem via the web interface; Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay; Chapter 9: Managing Configuration; Introduction; Grouping configuration files in directories; Keeping configuration under version control; Configuring host roles using groups , Building groups using regular expressions , English
    Additional Edition: ISBN 1-84951-556-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages