Commit 7ea5d161 authored by Daniel Armbruster's avatar Daniel Armbruster Committed by thomas.forbriger
Browse files

manual correction - now make use of original included files

This is a legacy commit from before 2015-05-18.
It may be incomplete as well as inconsistent.
See COPYING.legacy and README.history for details.


SVN Path:     http://gpitrsvn.gpi.uni-karlsruhe.de/repos/TFSoftware/trunk
SVN Revision: 4507
SVN UUID:     67feda4a-a26e-11df-9d6e-31afc202ad0c
parent 59c18ad7
...@@ -34,6 +34,7 @@ scheduling the processes. ...@@ -34,6 +34,7 @@ scheduling the processes.
For more information how to set up a csback configuration file read the pdf For more information how to set up a csback configuration file read the pdf
documentation which comes along with this package. documentation which comes along with this package.
---- ----
Documentation: Documentation:
---- ----
......
...@@ -22,6 +22,7 @@ ...@@ -22,6 +22,7 @@
# 25/06/2010 V1.0 Daniel Armbruster # 25/06/2010 V1.0 Daniel Armbruster
# 18/08/2010 V1.1 translate help into english # 18/08/2010 V1.1 translate help into english
# 02/07/2011 V1.2 complete update # 02/07/2011 V1.2 complete update
# 31/01/2012 V1.3 ajusted for csback
# #
# #
...@@ -56,6 +57,15 @@ DEL=rm -rvf ...@@ -56,6 +57,15 @@ DEL=rm -rvf
TEXFILES = $(wildcard *.tex) TEXFILES = $(wildcard *.tex)
PICS = $(wildcard ./$(IMGDIR)/*) PICS = $(wildcard ./$(IMGDIR)/*)
CSBACKTOOLS=csback2cron.py csbackgen.py csbackchk.py csbackntfy.py
CSBACKHELPS=$(addsuffix .help,$(basename $(CSBACKTOOLS)))
$(CSBACKHELPS): %.help:
/bin/bash -c "chmod +x ../$(addsuffix .py,$(basename $@))"
/bin/bash -c "./../$(addsuffix .py,$(basename $@)) -h 2>&1" > $@
# ============================================================================= # =============================================================================
.PHONY: clean .PHONY: clean
clean: ; clean: ;
...@@ -71,6 +81,7 @@ clean: ; ...@@ -71,6 +81,7 @@ clean: ;
-find . -name \*.nav | xargs --no-run-if-empty /bin/rm -vf -find . -name \*.nav | xargs --no-run-if-empty /bin/rm -vf
-find . -name \*.snm | xargs --no-run-if-empty /bin/rm -vf -find . -name \*.snm | xargs --no-run-if-empty /bin/rm -vf
-find . -name \*.out | xargs --no-run-if-empty /bin/rm -vf -find . -name \*.out | xargs --no-run-if-empty /bin/rm -vf
-find . -name \*.help | xargs --no-run-if-empty /bin/rm -vf
# ============================================================================= # =============================================================================
# pattern rules # pattern rules
...@@ -141,21 +152,22 @@ epsimages: $(EPSIMAGES) ...@@ -141,21 +152,22 @@ epsimages: $(EPSIMAGES)
cd $(IMGDIR) cd $(IMGDIR)
$(MAKE) $< $(MAKE) $<
ifdef PDFIMAGES ifdef PDFIMAGES
pdf: pdfimages pdf: pdfimages $(CSBACKHELPS)
rm -f $(MAIN).pdf rm -f $(MAIN).pdf
$(MAKE) $(MAIN).pdf $(MAKE) $(MAIN).pdf
else else
pdf: pdf: $(CSBACKHELPS)
rm -f $(MAIN).pdf rm -f $(MAIN).pdf
$(MAKE) $(MAIN).pdf $(MAKE) $(MAIN).pdf
endif endif
ifdef EPSIMAGES ifdef EPSIMAGES
dvi: epsimages dvi: epsimages $(CSBACKHELPS)
$(MAKE) $(MAIN).dvi $(MAKE) $(MAIN).dvi
else else
dvi: epsimages dvi: $(CSBACKHELPS)
$(MAKE) $(MAIN).dvi $(MAKE) $(MAIN).dvi
endif endif
......
...@@ -10,6 +10,7 @@ ...@@ -10,6 +10,7 @@
% 16/01/2012 V0.1 Daniel Armbruster % 16/01/2012 V0.1 Daniel Armbruster
% 17/01/2012 V0.3 added configuration of optional *nix tools % 17/01/2012 V0.3 added configuration of optional *nix tools
% 18/01/2012 V0.4 time specification file exclusion keys % 18/01/2012 V0.4 time specification file exclusion keys
% 31/01/2012 V0.5 corrections and additional appendices added
% %
% ============================================================================ % ============================================================================
% %
...@@ -21,6 +22,7 @@ ...@@ -21,6 +22,7 @@
\usepackage{amsmath} \usepackage{amsmath}
%\usepackage[slantedgreek]{mathtime} %\usepackage[slantedgreek]{mathtime}
\usepackage{graphicx} \usepackage{graphicx}
\usepackage{verbatim}
\usepackage{textfit} \usepackage{textfit}
\usepackage{fancyhdr} \usepackage{fancyhdr}
\usepackage{booktabs} \usepackage{booktabs}
...@@ -70,7 +72,7 @@ ...@@ -70,7 +72,7 @@
Daniel Armbruster\\ Daniel Armbruster\\
Blackforest Observatory (BFO)\\ Blackforest Observatory (BFO)\\
\vspace{3pt} \vspace{3pt}
\today\ (\mbox{\texttt{$$Revision: 0.4 $$}})\par \today\ (\mbox{\texttt{$$Revision: 0.5 $$}})\par
\end{raggedleft} \end{raggedleft}
\bigskip] \bigskip]
\thispagestyle{plain} \thispagestyle{plain}
...@@ -85,7 +87,7 @@ provide the possibility to calculate \emph{checksum files} and check the ...@@ -85,7 +87,7 @@ provide the possibility to calculate \emph{checksum files} and check the
checksums of the corresponding files from time to time. Because all information checksums of the corresponding files from time to time. Because all information
is saved in \texttt{ASCII} files the processes always are transparent. This is saved in \texttt{ASCII} files the processes always are transparent. This
manual describes the installation and configuration of \texttt{csback} which was manual describes the installation and configuration of \texttt{csback} which was
developed by \href{mailto:dani.armbruster@gmail.com}{Daniel Armbruster} . developed by \href{mailto:dani.armbruster@gmail.com}{Daniel Armbruster}.
\texttt{csback} was developed both for python2 and python3 and therefore should \texttt{csback} was developed both for python2 and python3 and therefore should
be platform independent. Because it uses several already existing unix tools be platform independent. Because it uses several already existing unix tools
...@@ -100,8 +102,8 @@ on the operating system are: ...@@ -100,8 +102,8 @@ on the operating system are:
\end{itemize} \end{itemize}
If you are familiar with writing \texttt{crontabs} using other programs If you are familiar with writing \texttt{crontabs} using other programs
providing the same functionality as the tools mentioned above should be no providing the same functionality as the tools mentioned above should be no
obstacle. Additionally make sure to use a current version of your python obstacle. Additionally make sure to use a recent version of your python
interpreter. Privileged are python3 interpreters. interpreter. Prefered are python3 interpreters.
After setting up a \texttt{csback} configuration file the command After setting up a \texttt{csback} configuration file the command
\texttt{csback2cron} generates a crontab. The crontab must be added to the \texttt{csback2cron} generates a crontab. The crontab must be added to the
...@@ -141,7 +143,7 @@ make install ...@@ -141,7 +143,7 @@ make install
\end{verbatim} \end{verbatim}
to the command line. If you prefer the installation by hand just guarantee that to the command line. If you prefer the installation by hand just guarantee that
your environment knows the \texttt{csback} scripts. First make the scripts your environment knows the \texttt{csback} scripts. First make the scripts
executable. Then use the appropriated names for the softlinks your are creating executable. Then use the appropriated names for the softlinks you are creating
in your local binary directory. For \texttt{csbackgen.py} use in your local binary directory. For \texttt{csbackgen.py} use
\texttt{csbackgen}, for \texttt{csbackchk.py} use \texttt{csbackchk} and for \texttt{csbackgen}, for \texttt{csbackchk.py} use \texttt{csbackchk} and for
\texttt{csbackntfy.py} use \texttt{csbackntfy}. Otherwise you might run into \texttt{csbackntfy.py} use \texttt{csbackntfy}. Otherwise you might run into
...@@ -149,7 +151,7 @@ problems while using the \emph{crontab} generated by \texttt{csback2cron}. ...@@ -149,7 +151,7 @@ problems while using the \emph{crontab} generated by \texttt{csback2cron}.
\section{Configuration} \section{Configuration}
Before using \texttt{csback2cron} to generate a \emph{crontab} a Before using \texttt{csback2cron} to generate a \emph{crontab} a
\texttt{csback} configuration file has to be set up. This package already \texttt{csback} configuration file has to be set up. This package already
contains such a configuration file that contains a description of available contains such a configuration file which contains a description of available
commands and configuration options. Afterwards either \texttt{csback2cron} has commands and configuration options. Afterwards either \texttt{csback2cron} has
to be called with the command to be called with the command
\begin{verbatim} \begin{verbatim}
...@@ -161,9 +163,10 @@ must be copied to \texttt{\$HOME/.csback/csbackrc} so that the command ...@@ -161,9 +163,10 @@ must be copied to \texttt{\$HOME/.csback/csbackrc} so that the command
csback2cron crontab csback2cron crontab
\end{verbatim} \end{verbatim}
is sufficient to generate a \emph{crontab} file with the filename is sufficient to generate a \emph{crontab} file with the filename
\texttt{crontab}. Then install the \texttt{crontab} using the appropriated \texttt{crontab}. Then install the \texttt{crontab} using the appropriate
\emph{crontab} command. Note that an exemplary \texttt{csback} configuration \emph{crontab} command. Note that an exemplary \texttt{csbackrc} configuration
file comes along with this package. file comes along with this package and is appended to this document
\ref{subsec:csbackrc}.
While converting the \texttt{csback} configuration file entries to While converting the \texttt{csback} configuration file entries to
\texttt{crontab} lines \texttt{csback2cron} does not perform any logical checks. \texttt{crontab} lines \texttt{csback2cron} does not perform any logical checks.
...@@ -211,7 +214,7 @@ targetdir = /directory/to/save ...@@ -211,7 +214,7 @@ targetdir = /directory/to/save
\end{verbatim} \end{verbatim}
Every copy rule section's name includes the prefix \texttt{copy\_}. A minimal Every copy rule section's name includes the prefix \texttt{copy\_}. A minimal
copy rule section setup is \texttt{[copy\_copy3]}. It only contains obligatory copy rule section setup is \texttt{[copy\_copy3]}. It only contains obligatory
entries that are: entries which are:
\begin{itemize} \begin{itemize}
\item \label{item:cronexpr} \texttt{cronexpr}: Here the copy process can be \item \label{item:cronexpr} \texttt{cronexpr}: Here the copy process can be
scheduled. A valid cron expression should be provided. A good introduction to scheduled. A valid cron expression should be provided. A good introduction to
...@@ -317,7 +320,7 @@ If you are not familiar with regular expressions read ...@@ -317,7 +320,7 @@ If you are not familiar with regular expressions read
Default value is \texttt{no}. Default value is \texttt{no}.
\item \texttt{amin}: Exclude files which were last accessed \texttt{N} minutes \item \texttt{amin}: Exclude files which were last accessed \texttt{N} minutes
ago. ago.
\item \texttt{atime}: Exclude files which were last accessed \texttt{N}*24 \item \texttt{atime}: Exclude files which were accessed at least \texttt{N}*24
hours ago. To match \texttt{atime} +1, a file has to have been accessed at least hours ago. To match \texttt{atime} +1, a file has to have been accessed at least
two days ago. two days ago.
\item \texttt{cmin}: Exclude files which status was last changed \texttt{N} \item \texttt{cmin}: Exclude files which status was last changed \texttt{N}
...@@ -422,9 +425,9 @@ Exclude all files which were last read from 0 (now) to 24h ago. ...@@ -422,9 +425,9 @@ Exclude all files which were last read from 0 (now) to 24h ago.
\end{itemize} \end{itemize}
\subsubsection{\texttt{test} configuration} \subsubsection{\texttt{test} configuration}
\texttt{[test]} rule sections are provided to test the files integrity form time \texttt{[test]} rule sections are provided to test the files integrity from time
to time. The checksums of files listed in its directory's checksum file will be to time. The checksums of files listed in its directory's checksum file will be
compared to the registered checksum and so either a \emph{WARNING}, a compared to the registered checksum and so either a \emph{WARNING}, an
\emph{ERROR} or a \emph{CRITICAL} log message will be send to the systems logger \emph{ERROR} or a \emph{CRITICAL} log message will be send to the systems logger
if \texttt{logging} is enabled. First the test rule section headers must be if \texttt{logging} is enabled. First the test rule section headers must be
defined using the \texttt{keys} option within a \texttt{[test]} section. For defined using the \texttt{keys} option within a \texttt{[test]} section. For
...@@ -475,6 +478,9 @@ and files. See also \ref{followlinks}. ...@@ -475,6 +478,9 @@ and files. See also \ref{followlinks}.
\item \texttt{logging}: Enable the \texttt{csback} logging mechanism. See also \item \texttt{logging}: Enable the \texttt{csback} logging mechanism. See also
\ref{item:logging}. \ref{item:logging}.
\end{itemize} \end{itemize}
The result of the checks performed will be send to a logfile named
\texttt{checksumfile.result} which will be created in the directory the checksum
file is located.
\subsubsection{\texttt{mail} configuration} \subsubsection{\texttt{mail} configuration}
Within a \texttt{[mail]} section the \texttt{csback} logfile checking mechanism Within a \texttt{[mail]} section the \texttt{csback} logfile checking mechanism
...@@ -491,19 +497,16 @@ mechanism. See also \ref{item:cronexpr}. ...@@ -491,19 +497,16 @@ mechanism. See also \ref{item:cronexpr}.
\item \texttt{port}: Port of the SMTP server. \item \texttt{port}: Port of the SMTP server.
\item \texttt{username}: Username for SMTP server. \item \texttt{username}: Username for SMTP server.
\item \texttt{password}: Password of \texttt{username} for SMTP server. Remember \item \texttt{password}: Password of \texttt{username} for SMTP server. Remember
to make the \texttt{csback} configuration file readonly to prevent abusing the to grant read access only to the appropriate user for the \texttt{csback}
password. configuration file to prevent abusing the password.
\end{itemize} \end{itemize}
The only optional key within a \texttt{[mail]} section is the \texttt{logging} The only optional key within a \texttt{[mail]} section is the \texttt{logging}
key. If logging for \texttt{csbackntfy} is desired set the value to key. If logging for \texttt{csbackntfy} is desired set the value to
\texttt{yes} else to \texttt{no}. Default value is \texttt{no}. \texttt{yes} else to \texttt{no}. Default value is \texttt{no}.
The result of the checks performed will be send to a logfile named
\texttt{checksumfile.result} which will be created in the directory the checksum
file is located.
\section{Configuration of optional *nix tools} \section{Configuration of optional *nix tools}
\texttt{csback} strongly falls back on reliable *nix tools i.e. the syslog \texttt{csback} makes use of reliable *nix tools i.e. the syslog
server \texttt{syslog-ng}, \texttt{rsync} or \texttt{cron} deamon. In this server \texttt{syslog-ng}, \texttt{rsync} or \texttt{cron} deamon. In this
section a basic configuration of some of that tools is available. Configuring section a basic configuration of some of that tools is available. Configuring
these tools properly is necessary for a stable functionality of \texttt{csback}. these tools properly is necessary for a stable functionality of \texttt{csback}.
...@@ -511,7 +514,7 @@ these tools properly is necessary for a stable functionality of \texttt{csback}. ...@@ -511,7 +514,7 @@ these tools properly is necessary for a stable functionality of \texttt{csback}.
\subsection{\texttt{crontab} and \texttt{cron}} \subsection{\texttt{crontab} and \texttt{cron}}
After generating a \texttt{crontab} with \texttt{csback2cron} the After generating a \texttt{crontab} with \texttt{csback2cron} the
\texttt{crontab} must be added to the locally installed \texttt{cron} deamon. \texttt{crontab} must be added to the locally installed \texttt{cron} deamon.
The command line prompt The command
\begin{verbatim} \begin{verbatim}
crontab <CRONTABFILENAME> crontab <CRONTABFILENAME>
\end{verbatim} \end{verbatim}
...@@ -519,22 +522,23 @@ will install the \texttt{crontab}. \texttt{crontab} itself is the name of the so ...@@ -519,22 +522,23 @@ will install the \texttt{crontab}. \texttt{crontab} itself is the name of the so
called program that installs, deinstalls or lists the tables used to drive the called program that installs, deinstalls or lists the tables used to drive the
\texttt{cron} deamon. With \texttt{cron} deamon. With
\begin{verbatim} \begin{verbatim}
crontab -r <CRONTABFILENAME> crontab -r
\end{verbatim} \end{verbatim}
the table will be deinstalled. the table will be deinstalled.
\subsection{\texttt{syslog-ng}} \subsection{\texttt{syslog-ng}}
The \texttt{csback} toolkit comes along with a basic configuration file The \texttt{csback} toolkit comes along with a basic configuration file
\texttt{csback\_syslog-ng.conf} for the syslog server \texttt{syslog-ng}. \texttt{csback\_syslog-ng.conf} for the syslog server \texttt{syslog-ng}
Because \texttt{csback} only sends its log messages to the system logger any \ref{subsec:syslog-ng.conf}. Because \texttt{csback} only sends its log messages
different implementation i.e. \texttt{rsyslog} might be used. The only to the system logger any different implementation i.e. \texttt{rsyslog} might be
prerequisite the server must fulfil is to listen on \texttt{localhost} on used. The only prerequisite the server must fulfil is to listen on
\texttt{tcp port 3333}. To guarantee that \texttt{csbackntfy} does its work \texttt{localhost} on \texttt{tcp port 3333}. To guarantee that
properly the syslog deamon should send the log messages to the file \texttt{csbackntfy} does its work properly the syslog deamon should send the log
\texttt{/var/log/csback.log}. All these prerequisites are fulfilled if the messages to the file \texttt{/var/log/csback.log}. All these prerequisites are
configuration file \texttt{csback\_syslog-ng.conf} which comes along with this fulfilled if the configuration file \texttt{csback\_syslog-ng.conf} which comes
package will be installed. So add to the \texttt{syslog-ng} configuration file along with this package will be installed. So add to the \texttt{syslog-ng}
(usually \texttt{/etc/syslog-ng/syslog-ng.conf}) the following line configuration file (usually \texttt{/etc/syslog-ng/syslog-ng.conf}) the
following line
\begin{verbatim} \begin{verbatim}
include "/path/to/cfgfile/csback_syslog-ng.conf"; include "/path/to/cfgfile/csback_syslog-ng.conf";
\end{verbatim} \end{verbatim}
...@@ -555,194 +559,40 @@ contains the line ...@@ -555,194 +559,40 @@ contains the line
include /etc/logrotate.d include /etc/logrotate.d
\end{verbatim} \end{verbatim}
Next set a link to \texttt{csback\_logrotate.conf} in Next set a link to \texttt{csback\_logrotate.conf} in
\texttt{/etc/logrotate.d/} or copy this file to \texttt{/etc/logrotate.d/} \texttt{/etc/logrotate.d/} (see appendix \ref{subsec:logrotate.conf}) or copy
directory. The next time \texttt{logrotate} will be executed it'll check the this file to \texttt{/etc/logrotate.d/} directory. The next time
logfile rotation configuration of \texttt{csback.log}. \texttt{logrotate} will be executed it'll check the logfile rotation
configuration of \texttt{csback.log}.
\newpage \newpage
\onecolumn \onecolumn
\begin{appendix} \begin{appendix}
\section{Programs} \section{Programs}
\subsection{\texttt{csback2cron}} \subsection{\texttt{csback2cron}}
\begin{verbatim} \verbatiminput{csback2cron.help}
Version: V0.9.1
License: GPLv2
$Id$
Author: Daniel Armbruster
Usage: csback2cron [-v|--verbose] [-o|--overwrite] [-i|--infile CONFIGFILE]
<CRONTABFILENAME>
or: csback2cron -h|--help
-------------------------------------------------------------------------------
-v|--verbose Be verbose.
-h|--help Display this help.
-i|--infile ARG If ARG is the path to csbackrc - the configuration file for
the csback crontab generation.
If this argument wasn't passed csback2cron assumes
~/.csback/csbackrc as default path to the configuration
file.
-o|--overwrite Overwrite already existing crontab.
<CRONTABFILENAME> Outputfilename of the generated crontab.
-------------------------------------------------------------------------------
Notice that csback2cron does not check any logical values e.g. pathes and/or
cron expressions.
\end{verbatim}
\subsection{\texttt{csbackgen}} \subsection{\texttt{csbackgen}}
\begin{verbatim} \verbatiminput{csbackgen.help}
Version: V0.5
License: GPLv2
$Id$
Author: Daniel Armbruster
Usage: csbackgen [-v|--verbose] [-e REGEX [-e REGEX [...]]]
[-R|--notrecursive] [-d|--debug] [-f|--followlinks]
[-t|--target ROOTDIR] [-l|--logging] [-H|--hash ARG]
[-L|--lock] [-D|--daystart] [--atime N] [--mtime N]
[--ctime N] [--amin N] [--mmin N] [--cmin N] PATH
or: csbackgen -h|--help
-------------------------------------------------------------------------------
-v|--verbose Be verbose.
-h|--help Display this help.
-e REGEX While generating a checksumfile exclude files matching
REGEX(s).
-R|--notrecursive Do not generate checksumfiles for subdirectories of PATH.
-d|--debug Debug mode. Be really verbose.
-f|--followlinks Follow symbolic links. Only available if option -R is not
set. Note that this option can lead to infinite
recursion.
-t|--target ROOTDIR Root target directory for checksumfile. The checksumfile
will be put to the appropiated location as the files had
in PATH or rather Paths' subdirectories. So target must
have the same subdirectory structure as PATH.
-l|--logging Switch on logging to files. Logfiles will be located in
/var/log/ .
-H|--hash ARG Set the hash function algorithm. Valid values are:
sha224, sha256, sha384, sha512. (default: sha256)
-L|--lock Lock the directories working at. This flag is useful in
case csbackgen was run simultaneously with other csback
processes working in the same directory. Setting this
option avoids checksumfile access problems which might
occur.
-D|--daystart Measure times (for --amin, --atime, --cmin, --ctime,
--mmin, and --mtime) from the beginning of today rather
than from 24 hours ago.
--amin N Exclude files which were last accessed N minutes ago.
--atime N Exclude files which were last accessed N*24 hours ago.
To match --atime +1, a file has to have been accessed at
least two days ago.
--cmin N Exclude files which status was last changed N minutes ago.
--ctime N Exclude files which status was last changed N*24 hours
ago.
--mmin N Exclude files which data was last modified N minutes ago.
--mtime N Exclude files which data was last modified N*24 hours
ago.
PATH Path to generate checksumfile(s) for including its
subdirectories if option '-R' is not set.
-------------------------------------------------------------------------------
1. General
==========
csbackgen.py will either generate a checksumfile if still no checksumfile is
available or in case there is an existing checksumfile csbackgen.py will append
the not yet registered files to the current checksumfile. In the latter case
csbackgen.py is working in its update mode.
Notice that in case PATH contains subdirectories and either option '-R' is set
or the subdirectory is excluded by a matching regular expression or time
specification every subdirectory will contain its own checksumfile.
2. Time specification
=====================
For file selection regarding time numeric arguments can be passed as follows:
+N for greater/older than N,
-N for less/younger than N,
N for exactly N.
a) Notice if several +N (for greater than N) or -N (for less than N) values are
passed with one parameter the last one will overwrite the previous values.
b) --cmin and --ctime arguments are evaluated platform dependent i.e. time of
most recent metadata change on Unix, or the time of creation on Windows.
c) If times for selection file are specified here the files matching were
excluded in contrast to the Unix find command where files were included.
\end{verbatim}
\subsection{\texttt{csbackchk}} \subsection{\texttt{csbackchk}}
\begin{verbatim} \verbatiminput{csbackchk.help}
Version: V0.2
License: GPLv2
$Id$
Author: Daniel Armbruster
Usage: csbackchk [-v|--verbose] [-e REGEX [-e REGEX [...]]]
[-R|--notrecursive] [-d|--debug] [-f|--followlinks]
[-t|--tolerant] [-l|--logging] [-L|--lock] [SOURCEPATH] PATH
or: csbackchk -h|--help
-------------------------------------------------------------------------------
-v|--verbose Be verbose.
-h|--help Display this help.
-e REGEX While checking a checksumfile(s) exclude files and
directories matching REGEX(s).
-R|--notrecursive Do not search in subdirectories of PATH.
-d|--debug Debug mode. Be really verbose.
-f|--followlinks Follow symbolic links. Only available if option -R is not
set. Note that this option can lead to infinite recursion.
-t|--tolerant Be tolerant.
While checking don't report anything if a file listed in
the checksumfile is missing. This flag is useful if a test
of a directory is executed but this directory is realized
e.g. as a ring buffer.
-l|--logging Switch on logging to files. Logfiles will be located in
/var/log/ .
-L|--lock Lock the directories working at. This flag is useful in
case csbackchk was run simultaneously with other csback
processes working in the same directory. Setting this
option avoids checksumfile access problems which might
occur.
SOURCEPATH Optional sourcepath for comparison with files backed up in
PATH. PATH and its subdirectories (if option '-R' had not
been selected) must contain the csback checksumfile(s).
Note that the directory structure (if option '-R' is not
set) bellow SOURCEPATH should be equal to those in PATH
because otherwise the files won't be found.
If SOURCEPATH is not passed a check of files located in
PATH with its checksumfiles will be performed.
PATH Path to perform check with its checksumfile(s). If option
'-R' had not been set the check will be performed
additionally for PATHs' subdirectories.
\end{verbatim}
\subsection{\texttt{csbackntfy}} \subsection{\texttt{csbackntfy}}
\begin{verbatim} \verbatiminput{csbackntfy.help}
Version: V0.2
License: GPLv2
$Id$
Author: Daniel Armbruster
Usage: csbackntfy [-v|--verbose] [-d|--debug] [-l|--logging] -P|--port ARG
-H|--host ARG -u|--username ARG -p|--password ARG
-r|--receiver ADDRESS [-r|--receiver ADDRESS [...]]
-s|--sender ADDRESS [PATH [PATH [...]]]
or: csbackntfy [-v|--verbose] [-d|--debug] [-l|--logging] -n|--nagios
[PATH [PATH [...]]]
or: csbackntfy -h|--help
-------------------------------------------------------------------------------
-v|--verbose Be verbose.
-h|--help Display this help.
-d|--debug Debug mode. Be really verbose.
-l|--logging Switch on logging to logfile. Logfile(s) will be located in
/var/log/ .
-r|--receiver ADDR Email address(es) of the receiver(s). (obligatory)
-s|--sender ADDR Email address of the sender (Sending over SMTP).
(obligatory)
-P|--port ARG SMTP port.
-H|--host ARG Hostname of the SMTP server.
-u|--username ARG Username for SMTP server login.
-p|--password ARG Password for SMTP server login.
-n|--nagios Use csbackntfy in it's nagios mode and print the current
status in a simple line to stdout.
PATH Path(s) of the logfile(s) to check. If not specified the
logfiles in /var/log/ were investigated.
\end{verbatim}
\end{appendix}
\section{Configuration files}
\subsection{\texttt{csbackrc}}
\label{subsec:csbackrc}
\verbatiminput{../csbackrc}
\subsection{\texttt{csback\_syslog-ng.conf}}
\label{subsec:syslog-ng.conf}
\verbatiminput{../csback_syslog-ng.conf}
\subsection{\texttt{csback\_logrotate.conf}}
\label{subsec:logrotate.conf}
\verbatiminput{../csback_logrotate.conf}
\end{appendix}
\end{document} \end{document}
% ----- END OF manual.tex ----- % ----- END OF manual.tex -----
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment