一些免费的开源工具软件

 

目录

一、很容易地改变远程Windows主机口令的工具:... 1

二、生成随机口令的工具:... 3

三、一个用户友好的SNMP Trap控制台... 4

四、系统服务帐号维护工具... 5

五、保持windows文件系统整洁维护工具... 7

六、一个基于Windows的反垃圾邮件工具... 9

七、收集系统日志的工具... 10

八、收集系统日志的轻型工具... 17

十、一些Nagios具插件... 21

 

 

一、很容易地改变远程Windows主机口令的工具:

https://www.itefix.no/i2/chwinpw

 

Chwinpw is a small command line utility that can securely change passwords on windows machines. By periodic password maintenance of your vital accounts, chwinpw can help you to enforce a higher degree of security in your environment. Chwinpw can notify a service about a password change of its service account, and has the ability of password reset (change without supplying the old password) on local machines. Chwinpw can be run from a logon script or from a central location. It is also possible to instruct chwinpw to make bulk changes.

NB! I KNOW the encryption key and the scrambling logic used in chwinpw. If you are comfortable with that, then go ahead.

Usage

Supported platforms: NT/2000/XP/2003.

Chwinpw has two operation modes :

Mode

Description

encryption

Since chwinpw is a command line utility and deals with passwords, it is obvious that password information must be encrypted before use. Chwinpw in encryption mode uses TEA encryption algorithm and some scrambling, and produces a command with encrypted passwords for changing passwords securely.

set

By default, Chwinpw in this mode decrypts passwords from command line and performs password change. This command can be generated automatically from chwinpw in encryption mode and can be used in logon scripts or can be activated from a central location. It is also possible to specify plain passwords by using --plain switch.


Example 1:

 

chwinpw -c encrypt -u testuser -n T1e3s5t% -o plainpw -m testnode


produces following output :

Command to set password :
   chwinpw -c set --new v6b0pGqtjA2Afw19x69s6w --old ZwSx_rmJJ4g --user testuser --machine testnode


You can use this command to change testuser's password on machine testnode.

Example 2:


chwinpw -c set --plain --new password1--old password2 --user testuser --machine testnode --Service MyService


You can use this command to change testuser's password on machine testnode and notify service MyService for password change.

Example 3:

chwinpw -c encrypt -u test -n test123


produces following output :

Command to set password :
CHWINPW -c set --user test --machine local-machine --new t1IgxqICBj8


You can use this command to reset test's password on the local machine.

Command Syntax

 

Argument

Description

--command, -c

Instructs chwinpw what to do. Can be encrypt or set (required).

--user, -u

(Local) user account for password change (required).

--newpwd, -n

New password (required)

--oldpwd, -o

Old password (required for remote, optional for local).

--machine, -m

Machine name. You can also specify a domain name here. A leading @ causes to read machine names from a file for bulk change(One machine, one line).
Don't specify this argument if you want to make password change on your local machine.

--service, -s

Name of the service to be notified about password change.

--plain, -p

Use plain passwords instead of encrypted ones

 

Exit codes

Chwinpw produces following exist codes upon completion :

  • 0 - successful completion
  • 1 - usage error
  • 2 - system error 

License

This package comes with following terms of licensing:

Component

Licensing

In short

chwinpw

chwinpw license

Free to use (MIT License)

 

二、生成随机口令的工具:

https://www.itefix.no/i2/ipwdgen

 

NAME

ipwdgen - generate passwords (pronounceable if you wish)

 


SYNOPSIS

ipwdgen [--mode mode] [--length password length] [--count number of passwords] [--numspec number/special char count] [--capital capital letter count] [--base64] [--help]

 


DESCRIPTION

ipwdgen is a yet another password generator, capable of generating secure random pronounceable passwords. It uses Crypt::GeneratePassword module.

 


OPTIONS

--mode mode

Specify password generation mode. Three modes are supported:

  • chars - generates a completely random password (Default mode).
  • word - generates a random pronounceable word.
  • word3 - generates a random trigram.

--length password length

Specify the length of the password(s) to be generated. Default is 8.

--count number of passwords

Specify the number of passwords to be generated. Default is 1.

--numspec number/special char count

Specify the maximum number of numbers/special characters in the generated passwords. The default is 0.

--capital capital letter count

Specify the maximum number of capital letters in the generated passwords. The default is 0.

--base64

Print the passwords as BASE64-encoded as well.

--help

Produces a help message.

 


EXAMPLES

 

 

ipwdgen

Generates a 8-char password with lowercase letters.

  

ipwdgen --mode word --len 10

Generates a 10-char pronounceable password.

  

ipwdgen --length 12 --numspec 3 --capital 3 --count 10 --base64

Generates 10 pieces of 12-char passwords containing 1-3 numbers/specials and 1-3 capitals. BASE64-encoded passwords will also be printed at the same line.

 


AUTHOR

Tevfik Karagulle http://www.itefix.no

  


 

SEE ALSO

Perl module Crypt::GeneratePassword http://search.cpan.org/dist/Crypt-GeneratePassword/lib/Crypt/GeneratePassword.pm

 


COPYRIGHT

This program is distributed under the Artistic License. http://www.opensource.org/licenses/artistic-license.php

  


 

VERSION

Version 1.0, August 2008

 


CHANGELOG

Initial version

 

 

三、一个用户友好的SNMP Trap控制台

https://www.itefix.no/i2/vutrapcon

 

NAME

vutrapcon - A very descriptive and user friendly SNMP Trap Console

 


SYNOPSIS

vutrapcon [options]

  Options:

    -smtpserver <mail server>

    -sender     <from mail address>

    -receiver   <to mail address>

    -help

 


DESCRIPTION

vutrapcon is an SNMP trap console. It monitors incoming traps, searches installed MIBs for descriptions and generates a very detailed and user friendly mail notification. vutrapcon is based on components from Net-Snmp.

Mail notification parameters can be configured from the command line or via configuration file vutrapcon.conf in the same directory as vutrapcon.

vutrapcon expects that MIBs are installed in the mibs-subdirectory.

 


OPTIONS

Use quotes for values containing spaces.

-smtpserver

Mail server name / address. Notifications will be sent to this server for distribution.

-sender

Sender mail address. Corresponds to From-field in the mail message.

-receiver

Comma-separated list of mail addresses for receivers. Correpsonds to To-field in the mail message

-help

Shows this message.

 


CAVEATS

The current version of vutrapcon is NOT designed for high-performance. However, that may change in the future.

 

四、系统服务帐号维护工具

https://www.itefix.no/i2/isvcpwd

 

NAME

isvcpwd - Service Account Password Maintenance

 


SYNOPSIS

isvcpwd --account account[,account] ... [[--account ... ] ... ] [[--password password[,password] ... ] ... ] [[--filter filterspec[,filterspec] ... ] ... ] [--domain domain] [--verbose] [--help]

 


DESCRIPTION

It is a general practice to use dedicated accounts for network-aware services in windows environments. However, some of those accounts may have elevated privileges and their passwords tend to be static over time, thus creating a security risk. isvcpwd may help you to locate service accounts domain-wide and let you notify them about password changes. You can run it from a central location, allowing you to perform periodic password maintenance in an easy way. It is also possible to filter target machines based on name or ip-addresses/networks.

 


OPTIONS

--account account[,account]

This option specifies service accounts to check. You can specify several comma separated accounts for one --account option, as well as several --account options. At least one is required.

--password password[,password]

This option specifies new passwords of service accounts. You can specify several comma separated passwords for one --password option, as well as several --password options. Optional. If specified, there must a one-to-one correspondence between accounts and passwords specified.

--filter filterspec[,filterspec]

Specify filters to select target machines. A filterspec consists of three fields: filter name, operator and value. You can specify several comma separated filters for one --filter option, as well as several --filter options. Defaults to all machines if no filter is defined. List of filters available:

 Filter Name     Valid Operators           Valid Value(s)

 -----------     ---------------           --------------

 name            match                     a regular expression

 ip              match                     a regular expression

--domain domain

Specify the domain to select machines from. Optional. Local machine is assumed if not specified.

--verbose

Increases output verbosity for debugging.

--help

Produces a help message.

 


EXAMPLES

 isvcpwd.exe --account SvcDHCP

Lists all services run by the accounts matching SvcDHCP on the local machine (case sensitive).

 isvcpwd.exe --account SvcDHCP,SvcDB --password password1,password2 --domain mydomain

Enumerates all servers in the domain mydomain, finds all services run by the account(s) matching SvcDHCP or SvcDB, and notifies them about new passwords password1 and password2 respectively.

 isvcpwd.exe --account SvcSQL --domain mydomain --password password1 --filter "name match sqlserv,ip match 10\.10\.10\."

Enumerates all servers in the domain mydomain, selects servers with the names matching sqlserv and the ip-addresses matching 10.10.10, finds all services run by account(s) matching SvcSQL and notifies them about the new password password1.

 


AUTHOR

Tevfik Karagulle http://www.itefix.no

  


  COPYRIGHT

This program is distributed under the Artistic License. http://www.opensource.org/licenses/artistic-license.php

  


 VERSION

Version 1.1, December 2008

 


CHANGELOG

Initial public version

 

五、保持windows文件系统整洁维护工具

https://www.itefix.no/i2/fpe

 

File Policy Enforcer allows server administrators to create and enforce file policies for their Windows systems. A file policy ensures that file resources are being used according to specified rules, thus making file usage complying with regulations available, and avoiding system outages due to lack of resources.

 Feature list: 

  • Multiple policies
  • Policy targets can be be directories or Active Directory containers from where users' home directories and mail adresses are extracted.
  • File count, -size and/or extensions as selection criteria
  • Warning notification or file removal as policy actions
  • Flexible definition of time periods and time/date values
  • E-mail notifications and templates with scan codes
  • Wild card based exclusion of files
  • Persistent storage to resume operations
  • Installs as a service and available all the time
  • Configurable via a simple set of parameters in a configuration file

 Examples of Files Policy Enforcer use:

Policy

Definition in the configuration file

Check home directories of users in the Active Directory container "OU=MyUsers,DC=MyDomain,DC=com" for multi media content every sunday and saturday in february, april, september and november. Randomize start time between 8 and 16 hours. Send the user a notification immediately, wait two weeks before sending a second warning and wait one more week before removing files and notifying user.

[General]
check_window= mo {feb apr sep nov} wd {sat-sun}
min_check_interval=8 hours
max_check_interval=16 hours

[Policy MULTIMEDIA-HOMEDIR]
file_extensions=.avi|.mov|.mp4|.mpg|.mdi|.mp3
target=OU=MyUsers,DC=MyDomain,DC=com
action=warning,now,now,warning_message_1
action=warning,2 weeks,2 weeks,warning_message_2
action=delete,3 weeks,2 weeks,delete_message

Check the directory C:\MyApp\Logs for files three times a day (1am, 9am, 5pm) during the summer season, once a day otherwise (1 am). Randomize start time between 40 and 50 minutes. Remove files older than one day if the total size of the files exceeds 1 GB. Notify the admin.

[General]
check_window= mo {jun-aug} hour {1 9 17}, hour { 1 }
min_check_interval=40 minutes
max_check_interval=50 minutes

[Policy MyApp-Logs]
size_threshold=1073741824
target=C:\MyApp\Logs
action=delete,now,1 day,delete_message notify=admin@mycompany.com

 

How to install File Policy Enforcer?

Supported platforms are Windows 2000/XP/2003/Vista/2008/7.

  1. Run the installer.
  2. Accept the license agreement if you agree.
  3. Specify an installation location.
  4. Installation starts.

File Policy Enforcer is now installed on your machine as a service with manual start. All you have to do now is to configure it by updating the self documented configuration file available from the start menu.

 

License

Component

Version

Licensing

In short

File Policy Enforcer

1.2.0

BSD License

Free to use


Copyright (c) 2009-2012, ITEFIX Consulting & Software

All rights reserved.

 

Redistribution and use in source and binary forms, with or without

modification, are permitted provided that the following conditions are met:

 

1. Redistributions of source code must retain the above copyright notice, this

   list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice,

   this list of conditions and the following disclaimer in the documentation

   and/or other materials provided with the distribution.

 

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND

ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED

WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE

DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR

ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES

(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;

LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND

ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT

(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS

SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

 

The views and conclusions contained in the software and documentation are those

of the authors and should not be interpreted as representing official policies,

either expressed or implied, of the FreeBSD Project.
 

Uninstallation

Run Uninstall File Policy Enforcer from the start menu.

 

六、一个基于Windows的反垃圾邮件工具

https://www.itefix.no/i2/wrbldnsd

 

wrbldnsd是一个基于Windows的反垃圾邮件解决方案,本地服务的DNSBL区域。这是一个包装的rbldnsdrsync的,SSHcygwin。您可以使用本地镜像DNSBL区域文件wrbldnsd,从而消除延迟的问题,在更大的环境和减少过滤显著电子邮件使用的时间。

 

Wrbldnsd is a windows-based anti-spam solution by serving DNSBL zones locally. It is a packaging of rbldnsd, rsync, ssh and cygwin. You can use wrbldnsd to locally mirror DNSBL zone files, thus eliminating latency problems in larger environments and decreasing time used for email filtering significantly.

Rbldnsd is a small and fast DNS daemon which is especially engineered for serving DNSBL zones.  It can serve both IP-based and name-based blocklists. All zones are kept in memory for faster performance with a decent memory footprint.  Rsync uses the Rsync algorithm which provides a very fast method for bringing remote files into sync. It does this by sending just the differences in the files across the link, without requiring that both sets of files are present at one of the ends of the link beforehand. Cygwin is a Linux-like environment for Windows. It consists of a DLL, which emulates substantial Linux API functionality, and a collection of tools.

Installation

Supported platforms : Windows 2000/XP/2003/Vista/2008/7.

Wrbldnsd comes as a ZIP file containing an NSIS installer. Simply unzip your downloaded copy and run the package "wrbldnsd_x.x_Installer.exe" :

  1. Accept License agreement.
  2. Specify an installation location.
  3. Specify a service account.
  4. Specify IP-address and port number which rbldnsd will listen to, and the list of zone:dataset mappings
  5. Installation starts. By clicking 'Details' button, you can get more detailed information about installation. Check if everything seems ok.

You may check wrbldnsd forum if you experience problems.

You're DONE! Wrbldnsd is installed and the rbldnsd portion is activated as a service.

License/Version

This package contains components with different terms of licensing:

Component

Version

Licensing

In short

Rbldnsd

0.996b

Rbldnsd license

Free to use (GPL)

Download source

Cygwin and GNU tools

1.7.7

CYGWIN license

Free to use (GPL mostly)

Download source

Rsync

3.0.6

Rsync license

Free to use (GPL)

Download source

Wrbldnsd (the rest)

3.0.1

Wrbldnsd license

Free to use (MIT-license)

 

 

七、收集系统日志的工具

https://www.itefix.no/i2/logrepserver

 

Logrep is a secure multi-platform framework for the collection, extraction, and presentation of information from various log files. It features HTML reports, multi dimensional analysis, overview pages, SSH communication, and graphs, and supports over 30 popular systems including Snort, Squid, Postfix, Apache, Sendmail, syslog, ipchains, iptables, NT event logs, Firewall-1, wtmp, xferlog, Oracle listener and Pix.



Benefits

  • Supports multiple platforms and logfile formats
  • Keeps compressed copies of logfiles on a central location
  • Secure SSH communication between client and server
  • Capable of multi dimensional analysis
  • Quick access to favorite graphs, reports and all nodes
  • Binary installation packages
  • Client setup with a very small footprint
  • Open source and highly customizable !

 

I am interested in enhancing logrep with new log file formats. Please send me log file segments (2-3000 lines), If you would like to see logrep supporting your log files.

 

 

Installation

Logrepserver - Linux Server Setup

Requirements

OPENSSH client, PERL 5.6 or 5.8, gd library with png support.
Normally, they are part of a standard Linux distribution.

Installation

  1. Download RPM package for Logrep server.
  2. Install package : rpm --install package name

Logrep is installed with following directory structure:

/usr/local/logrep - logrep installation files

/etc/logrep - logrep configuration files

/etc/init.d/logrepd - Logrep daemon script

/var/log/logrep - Logrep activity log directory

/var/logrep - Logrep data directory for log files and reports

  1. Configure Logrep configuration file /etc/logrep/logrep.conf as needed. Currently, there is no other documentation than the file itself.
  2. Create setup packages for your clients and configure them.
  3. Start Logrep server for the first time: /etc/init.d/logrepd start

Logrepserver - Windows Server Setup

Requirements

Standard PERL distribution.

Installation 

  1. Download and unzip ZIP file containing Installer executable.
  2. Run the installation package. You can specify a new directory during installation. Monitoring the installation process can be done by clicking Details button. If everyting seems ok, then Logrep is installed and configured as a service.
  3. Configure Logrep configuration file Installation directory\etc\logrep.conf as needed. Currently, there is no other documentation than the file itself.
  4. Create setup packages for your clients and configure them.
  5. By default, the LogrepServer service is configured with LocalSystem as logon account. Due to some complications caused by ssh public key authentication, however, it is necessary to configure this service with the current user as logon account. A better solution will appear in future versions, I hope.
  6. Start Logrep server for the first time: net start LogrepServer

Logrepserver - Linux Client Setup

Requirements

Logrep Server 1.4.x is installed on your server. OPENSSH server on client. Normally, it is a part of a standard Linux distribution.

Installation

  1. Create a client setup package on your server :

perl bin/logrep-admin.pl --makeclient linux
(Assuming that you run this command from logrep inst.directory on linux)

This command creates a tar file containing a shell script and public key file for ssh authentication.

  1. Transfer this tar file to a temporary directory on your linux client(s). Extract contents of the tar archive.
  2. Run the following commands :

cd tar created directory
source install.sh

This script generates a local logrep user and a home directory, copies public key for ssh authentication and sets ownership and permissions. NB! install.sh contains password information. Please remove tar created directory and tar archive itself after a successful setup.

  1. Establish an ssh session on your server :

bin\util\bin\ssh -l logrep -i etc/logrep.key "client ip/name" echo EVERYTHING SEEMS OK!
(Assuming that you run this command from logrep inst.directory and with default configuration values on windows)

You get a question about the authenticity of your client. Answer yes to add your client permanently to the list of known hosts. Your client setup is done successfully if you get the message "EVERYTHING SEEMS OK!" without any further prompting.

Logrepserver - Windows Client Setup

Requirements

Logrep Server 1.4.x is installed on your server.

COPSSH. You don't need to activate any user. Logrep does this job itself.

Installation

  1. Create a client setup package on your server :

perl bin\logrep-admin.pl --makeclient windows
(Assuming that you run this command from logrep inst.directory on windows)

This command creates a tar file containing a shell script and public key file for ssh authentication.

  1. Transfer this tar file to "COPSSH inst.directory\tmp" directory on your windows client(s). Extract contents of the tar archive.
  2. Start an interactive BASH shell session from copSSH start menu and run the following commands :

cd /tmp/tar created directory
source install.sh

This script generates a local logrep user and a home directory, copies public key for ssh authentication and sets ownership and permissions. NB! install.sh contains password information. Please remove tar created directory and tar archive itself after a successful setup.

  1. Establish an ssh session on your server :

bin\util\bin\ssh -l logrep -i etc/logrep.key "client ip/name" echo EVERYTHING SEEMS OK!
(Assuming that you run this command from logrep inst.directory and with default configuration values on windows)

You get a question about the authenticity of your client. Answer yes to add your client permanently to the list of known hosts. Your client setup is done successfully if you get the message "EVERYTHING SEEMS OK!" without any further prompting.

 

Supported log formats

 

Logrep sees log files as logical blocks containing attributes. Mostly, one block corresponds to one line. However, there are some exceptions like postfix and sendmail files with multi-line blocks, and syslogs with last line repeated messages that contain many blocks in a one single line!.

Logrep parsing modules extract attributes from each block and populate multi dimensional data structures for further analysis and reporting.

Composite attributes

As of version 1.4.3, Logrep supports composite attributes. With this feature you can combine several basic attributes into a composite attribute for logrep analysis. For example, combined attribute 'month.day' can give you trend analysis spanning several months. Another example can be "from.to.result", giving a one-step overview of transfer results from one source to a destination.

Currently, only concatenation operator (.) is supported.

Supported systems and attributes

The current version of logrep can analyze log files with 31 different formats.

The table below shows lists of available attributes by system :

System

Log type

Attribute list

Apache

Common Log Format

month, day, hour, from, user, authuser, method, document, result, kbsize

Apache

Combined Log Format

month, day, hour, from, user, authuser, method, document, result, kbsize, referrer, useragent

Exchange

5.5 Tracking log

month, day, hour, gateway, from, priority, sizeKB, to

Exchange

2000/2003 Tracking log

month, day, hour, clientname, partner, servername, to, eventid, msgid, priority, status, sizeKB, nrecipients, encryption, from

Checkpoint Firewall-1

4.1 Export

month, day, hour, originator, type, action, alert, interface, direction, protocol, source, destination, service, rule, length

Checkpoint Firewall-1 NG

NG Export

month, day, hour, origin, type, action, interface, protocol, source, destination, service, rule, information, user, sourceport

Checkpoint Firewall-1 NGX

NG Export

month, day, hour, origin, type, action, interface, protocol, source, destination, service, rule, information, user, sourceport, rulename, currentrule

Cisco Pix Firewall

syslog

month, day, hour, pixnode, severity, source, sourceport, destination, destport, event

Cisco SEC messages

syslog

month, day, hour, pixnode, list, code, action, proto, source, sourceport, destination, destport, npacket

Cisco VPN Concentrator

syslog

month, day, hour, code, message, from, group, user, length

Microsoft IIS

5.0 W3C standard

month, day, hour, from, user, to, port, method, document, result

Microsoft IIS

6.0 W3C extended

month, day, hour, from, user, to, port, method, document, result

Microsoft SUS

5.0 W3C standard

month, day, hour, from, to, client, activity, item, platform, language, status, error, message

Microsoft SUS

6.0 W3C extended

month, day, hour, from, to, client, activity, item, platform, language, status, error, message

GTA Firewall appliance (WELF)

Kiwi syslog

month, day, hour, id, fw, pri, msg, proto, src, srcport, nat, natport, dst, dstport, rule, duration, cataction, catsite, flttype, fltaction, interface, attribute

Ipchains

-

month, day, hour, server, chain, action, interface, protocol, source, sourceport, destination, destport, sizeKB, rule

Iptables

-

month, day, hour, server, in, out, source, destination, sizeKB, ttl, protocol, sourceport, destport, windowKB

Trend Micro Virus Scan

Virus log file

month, day, hour, from, to, virus

Netscreen

-

month, day, hour, server, severity, errortype, duration, policyid, protocol, direction, action, sentKB, receivedKB, source, destination, sourceport, destport, description

NT Event Log

Dumpel export

day, month, hour, type, category ,event, source, user

Oracle SQL listener

-

month, day, hour, connectdata, address, sid, event, returncode

Postfix

-

month, day, hour, from, to, size, recipients, delay, status

Sendmail

-

month, day, hour, from, to, size, recipients, delay, status

Snort

Ascii alert file

month, day, hour, from, to, event

Snort

Syslog

month, day, hour, from, to, event

Squid

-

month, day, hour, elapsed, from, cache, result, sizeKB, method, url, content

Syslog

-

month, day, hour, server, source, message

Watchguard Firewall

syslog

month, day, hour, fw, pri, rule, source, destination, protocol, srcport, destport, indev, inport, rc, message

WinInstall Software Distribution

-

month, day, hour, installtype, result, package, netaddr, workstation, user

Wtmp

last -i command

month, day, hour, user, tty, from, duration

Xferlog

-

month, day, hour, transfertimemins, remotehost, filesizekb, filename, transfertype, specialaction, direction, accessmode, username, authmethod,authuser

 

 

八、收集系统日志的轻型工具

https://www.itefix.no/i2/logreplight

 

LogrepLight is a downsized version of logrep, allowing you to analyze logfiles you already have on your PC. It contains a GUI and logrep parsing modules.

Supported log formats

Requirements


Binary versions for Windows and Linux have no requirements. They are ready to run.

Source version of logrep requires perl 5.6/5.8 and modules Tk, GD, GD::Graph, GD::TextUtil and Storable.

Installation


Windows

  1. Download and unzip ZIP file containing Logrep light Installer executable.
     
  2. Run the installation package. You can specify a new directory during installation. Monitoring the installation process can be done by clicking Details button.
     

Linux

  1. Download tar.gz file for Logrep light.
     
  2. Install package : tar xvzf tar.gz file wherever you want.
     

 

Usage

Binary versions:

logreplight [options]

Source version:

perl logreplight.pl [options]

(Assuming that you run this command from logrep light inst. directory)



Logreplight will display a set of web forms where you can specify log file or cube, log type, attributes to be analyzed, number of dimensions and so on. You can also define options below from the command line:

Options

Option

Description

-u, --lookup lookup list

Optional. Some of the attributes may contain data that you want to translate to more human friendly values via a lookup. Examples are DNS reverse lookup, months or return codes. This option allows you to instruct logrep for performing lookups. A lookup list is a comma separated attribute:lookup type pairs. Example:

--lookup source:dns,destination:dns


NB! This is experimental and currently supports DNS reverse lookups only.
 

--dns server list

Optional. If the default DNS configuration on your machine doesn't work for reverse DNS lookups (see option -u), then you can use this option to specify a comma separated list of DNS servers.

-v, --verbose

Optional. Produces statistics during analysis, lookup and reporting phases. Useful to gauge logrep performance on your machine.

-fsec, --feedback_seconds seconds

Optional. Seconds between progress messages. Default is 3 secs.

-mxstr, --max_graphstring chars

Optional. Determines the length of strings in graphs. Default is 30 chars.

-mxtop, --max_topcount number

Optional. Determines the number of elements in a top graph. Default value depends on attribute type : hour - 24, day - 31, month - 12, other - 15.

-mxtbl, --max_tablecount number

Optional. Determines the number of rows in report tables. Default is 50 rows.

-gx, --graph_width pixels

Optional. Determines graph width in pixels. Default is 400.

-gy, --graph_height pixels

Optional. Determines graph height in pixels. Default is 400.

--noautoreport

Optional.Windows only Don't start web browser automatically for displaying reports. Default is autoreport.

 

 

九、windows下的备份工具

https://www.itefix.no/i2/hardbackup

 

hardBackup is a powerful solution for disk-based backup on windows systems. By utilizing well proven open source technologies like Dirvish, Rsync, Openssh and Cygwin, hardBackup can:

  • keep several images of backup in a rotating scheme
  • represent identical files in different images by one single physical copy
  • transfer only changes in files via secure channels

Dirvish is a fast, disk based, rotating network backup system. With dirvish you can maintain a set of complete images of your filesystems with unattended creation and expiration. A dirvish backup vault is like a time machine for your data.  Rsync uses the Rsync algorithm which provides a very fast method for bringing remote files into sync. It does this by sending just the differences in the files across the link, without requiring that both sets of files are present at one of the ends of the link beforehand. OpenSSH is a free version of the SSH protocol suite of network connectivity tools. Cygwin is a Linux-like environment for Windows. It consists of a DLL (cygwin1.dll), which emulates substantial Linux API functionality, and a collection of tools.

Installation

Supported platforms: NT/2000/XP/2003/Vista/2008/7 with NTFS filesystem.

hardBackup comes as a zip archive containing a Nullsoft Installer package. Unzip downloaded file and run hardBackup_x.x.x_Installer.exe :

  1. Click Next at Welcome-page
  2. View license agreement.
  3. Specify an installation location.
  4. Installation starts. By clicking 'Details' button, you can get more detailed information about installation. Check if everything seems ok.
  5. At the end of the installation, hardBackup gives you some information about usage.
     

You're DONE! hardBackup is installed on your machine.

Usage

You should first customize the master configuration file available from the start menu. Master configuration allows you to specify:

  • where you want to store your backups
  • naming scheme for backup images
  • how to store logs
  • how to store search indexes
  • exclude patterns
  • when backup images will expire
  • backup vaults to run

Customizable parameters in the master configuration are not limited by those listed above. Consult Dirvish Configuration from the start menu for a complete list.

You can now define your backup vaults. A vault is simply a directory within the root of the backup directory specified in the master configuration. Existence of a vault is determined by a dirvish subdirectory containing a file named default.conf. It allows you to specify:

  • target host
  • local directory/rsync module that will be backed up

Customizable parameters in the vault configuration are not limited by those listed above. You can override almost every master configuration value here. Consult Dirvish Configuration for a complete list. A vault example and vault related instructions are available from the start menu.

The third step is to activate your hardBackup environment. A batch file (hardbackup.cmd) is created for that purpose. It processes vaults according to your configuration, removes expired images and creates new ones. You can simply schedule it as a windows task.

License/Version

This package contains components with following terms of licensing:

Component

Version

Licensing

In short

Dirvish

1.2.1

Dirvish license

Free to use (OSL v2)

Download source

Rsync

3.0.7

Rsync license

Free to use (GPL)

Download source

Cygwin and GNU tools

1.7.7

CYGWIN license

Free to use (GPL mostly)

Download source

OpenSSH

5.6p

OpenSSH license

Free to use (BSD)

OpenSSL

0.9.8o

OpenSSL license

Free to use (BSD)

hardBackup

2.0.0

hardBackup license

Free to use (OSL v2)

Download source

 

Uninstallation

This one is easy too:

  1. Make sure that no backup clients are connected.
  2. Choose Uninstall hardBackup from Start menu. Again, you can monitor uninstallation process by clicking 'Details' button.

 Thanks!

Let me emphasize that I play a very small role in this big game :-) I would like to thank to all people that make dirvish+rsync+openssh+cygwin a powerful, flexible and secure solution for rotating disk-based network backups.

 

十、一些Nagios工具插件

 

检查Windows事件:

check_winevent - NRPE check plugin for Windows eventlogs

检查Windows服务:

check_winservice - NRPE check plugin for Windows services

Ping工具:

check_winping - Nagios ping check plugin for Windows systems

Rsync检查插件:

check_rsync - NRPE check plugin for Rsync

Windows 进程检查插件:

check_winprocess - NRPE check plugin for Windows processes

winrpe - Nagios NRPE for Windows

check_tslicense - NRPE check plugin for Microsoft Terminal Services Licensing

检查处理器、磁盘、内存插件:

check_pdm - NRPE check plugin for processor, disk and memory on Windows

检查Oracle插件:

check_oracle - NRPE check plugin for Oracle

检查Windows 文件/目录插件:

check_winfile - NRPE check plugin for Windows files/directories

检查Dell服务器硬件插件:

check_dell - NRPE check plugin for Dell hardware

check_ad - NRPE check plugin for Active Directory

check_dnsdup - NRPE check plugin for dynamic dns duplicates

 

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值