log – POFTUT

Tagged: log

What Is Apache Kafka, Use Cases, Advantages and How To Install and Use Apache Kafka? 0

What Is Apache Kafka, Use Cases, Advantages and How To Install and Use Apache Kafka?

Apache Kafka is a distributed streaming platform. Let’s explain it in more details. Apache Kafka is three key capabilities where publish and subscribe to streams of records, similar to a message queue or enterprise messaging system. Apache Kafka provides a distributed publish-subscribe messaging system and robust queue that can handle a high volume of data and enables us to pass message consumption. Apache Kafka Advantages Apache Kafka provides a lot...

0

NTP Port Number and Configuration Tutorial For Linux Local System

NTP is a core protocol used today’s IT infrastructure to synchronize date and time information. In order to work properly, we need to configuration NTP port in our server, client and intermediate systems like switch, firewall, router. NTP Port UDP 123 NTP uses the UDP port number 123 by default. NTP services run on UDP protocol because of the UDP simplicity and performative behavior. NTP is also a very simple protocol...

0

What is Syslog Default Port and Secure Port and How to Configure It?

syslog is a standardized protocol used to send Logs and events to the Log server. syslog can be used in different platforms like Linux, Windows, Unix, Applications etc. In this tutorial we will look the default syslog port and secure syslog port and some examples about how to change this port number. Default Port Number UDP 514 syslog is a protocol which is defined in RFC 5424 and RFC 3164 . The port...

0

What Is Nagios?

Nagios is an open source system, network, application monitoring system. Nagios is designed to be run on Linux operating system or distributions like Ubuntu, Debian, CentOS etc. Architecture and Components Nagios is not a single component to run. Nagios is actually a suite which provides following components. Nagios IX Nagios IX is the core of the Nagios suite where it providing core monitoring features. Nagios IX can monitor IT infrastructure...

0

How To Use Linux dmesg Command To Print System Logs?

dmesg is used to print and control kernel ring buffer. This explanation may be confusing for the most of the readers. Here simplified explanation. dmesg provides logs for troubleshoot, diagnose or save which is created by Linux kernel. It provides low level messages which is not logged by other subsystems. Provided Information Type dmesg command and buffer provides a lot of different type of messages and logs. Here the list...

0

Understanding and Configuring Apache Access Log

Web servers logs provide a lot of information about the web application and user. Apache is a very popular web server used by millions of web sites. Apache provides different types of logs like access , error etc. In this tutorial, we will look at how Apache Access Log configured and try to understand log format. Apache Access Log Apache Access Log provides information about access to the Apache web server....

1

Windows Robocopy Command Tutorial with Examples To Copy Files In Safe Way

Robocopy or Robust File and Folder Copy application is very popular amongst in Windows system administrators. Robocopy will copy the local or given file to the remote or destination location. Syntax The general syntax of robocopy command is like below. SOURCE is the source file or directory we want to copy DESTINATION is the destination file or directory we want to copy OPTIONS are different features or behaviors we want to...

0

Git – Reviewing Changes

Git stores all commits as snapshots. We can commit limitless. If we can to review our commits we can use log command. Git Log We can simple list commits without any argument tot the log command.

As we see there are 3 commits for the whole history of the Git repository. log command provides commit hash which is used as identifier and a unique value. Author is the developer info like name and email...

2

How To Manage Windows Firewall From Command Line With Netsh Command?

Windows firewall is a useful mechanism which is used to control network traffic and ports. There are different ways to manage Windows firewall like GUI, Powershell and MS-DOS. Today we will look in detail how to manage windows firewall from command line with a popular tool named netsh . Netsh is a built-in tool which exists all Windows versions like Windows Server 2008, Windows Server 2012, windows Server 2016, Windows 7,...

3

How To Use Psexec Tools To Run Commands and Get Shell Remote Windows Systems?

Windows operating system provides different ways to manage remote systems. Telnet, RDP, VNC are some of them. But these options are generally bound to a graphical user interface. If we prefer command line interface there is an alternative named Psexec. Psexec is actually a toolset consisting of following tools. PSexec used to execute commands at remote or get a shell from a remote system PsFile used to list file and folders at...

Enjoy this blog? Please spread the word :)