Featured Posts

GoAccess is an interactive and website / web-server log analyzer tool currently better than the ApacheTop interface. It provides fast and valuable HTTP statistics for system administrators that require a visual...

Readmore

AjaxMyTop AjaxMyTop is a Web-based tool featuring an AJAX user interface for monitoring a MySQL server. Installing and configuring is fairly simple which you can done it within 2 minutes. [caption id="attachment_587"...

Readmore

Mod_spin is a content handler and/or a filter, meaning, for a specified file extension, mod_spin will read the file (or other input), parse it into an Abstract Syntax Tree (AST) and then replace the occurrences...

Readmore

Server Monitoring using DSTAT DSTAT an excellent tool which combines the overall stats of vmstat, iostat, netstat and ifstat. Dstat allows us to view all of the system resources in the real-time including the network bandwidth, network...

Readmore

BWM-NG Monitoring Network Bandwidth and Disk I/O using BWM-NG BWN-NG (Bandwidth-NG) is old and simple tool to monitor the bandwidth and disk I/O including the RAMdisk usage, this tool really helps the...

Readmore

  • Prev
  • Next

Shellinabox – SSH terminal in a web browser

Posted on : 10-03-2014 | By : admin | In : Admin Tools

0

Mostly, we are using putty to connect your linux server. Shell In A Box implements a web server that can export arbitrary command line tools to a web based terminal emulator. This emulator is accessible to any JavaScript and CSS enabled web browser and does not require any additional browser plugins. Most typically, login shells would be exported this way:

shellinaboxd -s /:LOGIN

This command starts a web server at http://localhost:4200 that allows users to login with their username and password and to get access to their login shell.

All client-server communications are encrypted, if SSL/TLS certificates have been installed.

Shellinabox   SSH terminal in a web browser

How to install Shellinabox tool?

You can download and install source file or use yum to install it.

Please make sure openssl is installed in your server. Use the following steps to install shellinabox in CentOS.

[root@gopal ~]#yum install shellinabox

Once the installation completed, you should browse your server ip address with 4200 port. For example,

https://192.168.1.133:4200/

Normally Root login is not work due to security reason.

Install it from source file.

[root@gopal ~]#wget https://shellinabox.googlecode.com/files/shellinabox-2.14.tar.gz

[root@gopal ~]#tar -zxvf shellinabox-2.14.tar.gz

[root@gopal ~]#cd shellinabox-2.14

[root@gopal ~]#./configure

[root@gopal ~]#make

[root@gopal ~]#make install

 

Shellinabox Examples:-

 

shellinaboxd

Attaches a web-enabled login shell to https://localhost:4200/. If the user connected without SSL, the session will automatically be promoted. Unless SSL certificates can be found in the current directory, the daemon will automatically generate suitable self-signed certificates. If the command was invoked by a non-root user, the daemon uses ssh instead of /bin/login for the session.

shellinaboxd -t

Attaches a web-enabled login shell to http://localhost:4200/ with SSL/TLS support disabled.

shellinaboxd -t -f beep.wav:/dev/null

Runs all services with the audible-bell permanently disabled.

shellinaboxd -s /:SSH:example.org

The terminal connects to a ssh session on example.org.

shellinaboxd -t -s /:AUTH:HOME:/bin/bash

Interactively request the user’s name and password prior to launching a Bourne shell. This command can be run by unprivileged users. But if doing so, it only allows this particular user to log in.

shellinaboxd -c certificates -g shellinaboxd

If the certificates directory exists and is writable by the shellinaboxd group, self-signed SSL certificates will be generated in this directory. Running this command as root allows any user on the system to log in at http://localhost:4200/. Sessions will automatically be promoted to SSL/TLS.

shellinaboxd -t -s /:LOGIN -s /who:nobody:nogroup:/:w

In addition to the login shell at http://localhost:4200, show a list of currently logged in users when accessing http://localhost:4200/who. This command must be run as root in order to be able to change to nobody:nogroup as requested by the service description.

shellinaboxd -t -s ‘/:root:root:/:wy60 -c /bin/login’

Instead of the standard ANSI/VT100 terminal, publish a Wyse 60 terminal. Again, this command should be run as root.

shellinaboxd –css white-on-black.css

Loads the white-on-black.css style sheet from the current directory and appends it to the built-in styles.css sheet. This causes the terminal to always render white text on a black background.

shellinaboxd –user-css Normal:+black-on-white.css,Reverse:-white-on-black.css

Allow the user to select whether they want text to be rendered normally or in reverse video. This command line option adds a new entry to the right-click context menu.

 

Monitorix Linux monitoring tool

Posted on : 31-01-2014 | By : admin | In : Admin Tools, Monitoring Tools

Tags: ,

0

Monitorix is a free, open source, lightweight system monitoring tool designed to monitor as many services and system resources as possible. It has been created to be used under production Linux/UNIX servers.

It consists mainly of two programs: a collector, called monitorix, which is a Perl daemon that is started automatically like any other system service, and a CGI script called monitorix.cgi. Since 3.0 version Monitorix includes its own HTTP server built in, so you don’t need to install any web server to use it.

Every time ‘monitorix’ is started it reads the configuration file from the path specified in the command line (using the -c option), and once checked, it creates the ‘index.html’ file that will act as the Monitorix main page.

Features

System load average and usage
Global kernel usage
Per-processor kernel usage
HP ProLiant System Health
LM-Sensors and GPU temperatures
NVIDIA temperatures and usage
Disk drive temperatures and health
Filesystem usage and I/O activity
Network traffic and usage
Mail statistics
Network port traffic
Users using the system
FTP statistics
Apache statistics
Lighttpd statistics
MySQL statistics
Squid Proxy Web Cache statistics
Alert capabilities supported
Memcached statistics
Wowza Media Server
Supported systems: GNU/Linux, FreeBSD, OpenBSD and NetBSD.

 

Monitorix Linux monitoring tool        Monitorix Linux monitoring tool

Monitorix Linux monitoring tool installation.

Monitorix requires some others packages to be installed that your GNU/Linux distribution may or may not have:

Perl
Perl-CGI
Perl-MailTools
Perl-MIME-Lite
Perl-libwww
Perl-DBI
Perl-XML-Simple
Perl-Config-General
Perl-HTTP-Server-Simple
RRDtool and its Perl bindings (perl-rrdtool or rrdtool-perl)
(Optional) a CGI capable Web server (Apache, Nginx, lighttpd, etc.)

Disable SELinux

vi /etc/selinux/config

SELINUX=disabled

Install the required packages.

# yum install rrdtool rrdtool-perl perl-libwww-perl perl-MailTools perl-MIME-Lite perl-CGI perl-DBI perl-XML-Simple perl-Config-General perl-HTTP-Server-Simple

Users of newer Fedora versions are able to install Monitorix using directly the official repositories. Therefore a simple command like the following should suffice:

# yum install monitorix

or Download CentOS RPM packages and install the Monitorix.

wget http://www.monitorix.org/monitorix-3.4.0-1.noarch.rpm
rpm -ivh monitorix-3.4.0-1.noarch.rpm

or you can install through the source file

http://www.monitorix.org/monitorix-3.4.0.tar.gz

Once succesfully installed, please take a look into the configuration file /etc/monitorix.conf to set the options according your system and enable or disable graphs.

Finally start Monitorix with:

# service monitorix start

Monitorix will start gathering the system information based on the configuration set in monitorix.conf file, and after some minutes you should be able to see the results from your favorite browser pointing it at:

http://<ipaddress>:8080/monitorix/

Siege – http load testing tool

Posted on : 11-01-2014 | By : admin | In : Admin Tools, Monitoring Tools

Tags: ,

0

Siege is an open source regression  test and  benchmark utility. It can stress test a single URL  with a user  defined  number of
simulated  users, or  it can  read  many  URLs into  memory  and stress  them  simultaneously.

When launching a web application, you want to ensure that it will be able to handle the load of users accessing the site. We can get an idea of how it will perform by using a benchmarking tool. While there are many popular tools such as ab (Apache benchmarking tool) and Siege.

Siege is an http load testing and benchmarking utility. It was designed to let web developers measure their code under duress, to see how it will stand up to load on the internet. Siege supports basic authentication, cookies, HTTP and HTTPS protocols. It lets its user hit a web server with a configurable number of simulated web browsers. Those browsers place the server “under siege.”

http load Testing tool installation

 

  • cd /usr/local/src
  • wget http://www.joedog.org/pub/siege/siege-3.0.5.tar.gz
  • tar -zxvf siege-3.0.5.tar.gz
  • cd siege-3.0.5/
  • ./configure
  • make
  • make install

Configuration

The configure script attempts to guess the values which are set on your platform.  If all goes well, you should only have to run it
with some preferred arguments.  The more notable ones are listed below:

–help                 prints the configure script’s help section
–prefix=/some/dir     installs the files in /some/dir
–bindir=/some/bin     installs the executable in /some/bin
–mandir=/some/man     installs the man page in /some/man
–with-ssl=/some/dir   where dir is where you installed ssl, this
flag is used to enable https protocol.

This will install the application ( siege ) in the default directory/usr/local/bin.  If that directory is in your PATH, then to run siegeand view the online help type:

$ siege –help

You can use this benchmark tool forever, or you can specify a specific period of time. To set the duration of the test, use the -t NUMm option. The NUMm format is a representation of time. Here are some time format examples:

-t60S (60 seconds)
-t1H (1 hour)
-t120M (120 minutes)

siege -b -t60S http://domain.com

Example of the output

Lifting the server siege…      done.

Transactions:                    160 hits
Availability:                  99.38 %
Elapsed time:                  59.32 secs
Data transferred:               0.95 MB
Response time:                  4.99 secs
Transaction rate:               2.70 trans/sec
Throughput:                     0.02 MB/sec
Concurrency:                   13.47
Successful transactions:         171
Failed transactions:               1
Longest transaction:           26.57
Shortest transaction:           1.66

Test Multiple URLs

You can provide a file of URLs separated by line to the -f option. Another recommendation is to set the -i option that tells Siege to randomly select URLs from the text file, resulting in a more real-world test.

siege -c50 -d10 -i -f site.txt

 

1 2 3 4 5 6 7 8 9 10 .... 62 63   Next Page »