CheckAuthLog Reference documentation: Difference between revisions

From voipsupport
Jump to navigation Jump to search
(Created page with "==Running from Crontab=== After installing Check Auth Log the best way to run it is to schedule it in crontab, for example: <pre>vi /etc/crontab</pre> The following entry w...")
 
No edit summary
Line 1: Line 1:
==Running from Crontab===
==Running from Crontab==


After installing Check Auth Log the best way to run it is to schedule it in crontab, for example:
After installing Check Auth Log the best way to run it is to schedule it in crontab, for example:
Line 11: Line 11:
If you provide the configuration file in the standard location /etc/check_auth_log.conf there is no need to run with any parameters, for example
If you provide the configuration file in the standard location /etc/check_auth_log.conf there is no need to run with any parameters, for example


===Parameter Reference===
==Command Line Parameter Reference==


/usr/local/bin/check_auth_log
This is a list of all parameters accepted:
This is a list of all parameters accepted:
-a username: manually adds the user to the blocked users
-a username: manually adds the user to the blocked users
Line 24: Line 23:
-y extract the cache file entries from internal cache file db. The cache file contains info on the log lines already parsed and their offset in the mail log file.
-y extract the cache file entries from internal cache file db. The cache file contains info on the log lines already parsed and their offset in the mail log file.
-z runs the self check routines only
-z runs the self check routines only
==Configuration File Reference==

Revision as of 17:11, 13 June 2016

Running from Crontab

After installing Check Auth Log the best way to run it is to schedule it in crontab, for example:

vi /etc/crontab

The following entry will run CheckAuthLog every 5 minutes

  • /5 * * * * root /path/to/check_auth_log

If you provide the configuration file in the standard location /etc/check_auth_log.conf there is no need to run with any parameters, for example

Command Line Parameter Reference

This is a list of all parameters accepted: -a username: manually adds the user to the blocked users -c config_file: uses the named configuration file instead of checking in /etc/check_auth_log.conf -d username: deletes the block, thereby re-enabling mail sending for the user. -e email: sends a test blocking notification email to the specified address. Useful for testing email setup and template without having to trigger a block. -t activates tracing to standard output. Useful for debugging. -v prints the version and terminates -x extract the authenication entries from internal db. The database contains info on the authentication times and ip addresses. When new entries are added old ones are purged if no longer needed (older than expire time) -y extract the cache file entries from internal cache file db. The cache file contains info on the log lines already parsed and their offset in the mail log file. -z runs the self check routines only

Configuration File Reference