Smokeping工具,安裝的方式可參考官網,目前實作用Slack發出告警訊息
依照個人安裝的目錄,調整相關的設定檔路徑即可
vi /usr/local/smokeping/etc/slack_notify.sh
#!/bin/bash
function send_alert {
# Send a SmokePing status alert to the slack channel
alertname="$1"
target="$2"
losspattern="$3"
rtt="$4"
hostname="$5"
2019年11月9日
2019年10月5日
Juniper 高階SRX Cluster Login Other RE方式
適用於高階SRX 的型號如3000系列或是5000系列
{primary:node0} user@SRX01-LAB-DC> start shell % rlogin -Jk -T node1 --- JUNOS 15.1X49-D170.4 built 2019-02-22 23:02:01 UTC {secondary:node1} user@SRX02-LAB-DC>
適用於一般低階SRX 的型號(通用指令)
{primary:node0} user@SRX01-LAB-DC> request routing-engine login node 1 --- JUNOS 15.1X49-D170.4 built 2019-02-22 23:02:01 UTC {secondary:node1} user@SRX02-LAB-DC>
2019年8月3日
Cisco 3850X IP SLA send syslog config
ip sla 1
icmp-echo 192.168.99.205
threshold 500
timeout 500
frequency 1
ip sla 2
icmp-echo 192.168.99.201
threshold 500
timeout 500
frequency 1
ip sla 3
icmp-echo 192.168.99.197
threshold 500
timeout 500
frequency 1
icmp-echo 192.168.99.205
threshold 500
timeout 500
frequency 1
ip sla 2
icmp-echo 192.168.99.201
threshold 500
timeout 500
frequency 1
ip sla 3
icmp-echo 192.168.99.197
threshold 500
timeout 500
frequency 1
2019年7月21日
Juniper OSPF traceoptions
set protocols ospf traceoptions file ospf.log
set protocols ospf traceoptions flag database-description
set protocols ospf traceoptions flag event
set protocols ospf traceoptions flag error
set protocols ospf traceoptions flag lsa-request
set protocols ospf traceoptions flag database-description
set protocols ospf traceoptions flag event
set protocols ospf traceoptions flag error
set protocols ospf traceoptions flag lsa-request
2019年6月27日
Juniper SRX Monitor Traffic
Host:
root# run monitor traffic interface ge-0/0/x matching "host 10.130.38.94" no-resolve
Protocol:
root# run monitor traffic interface ge-0/0/x matching arp
Port:
root# run monitor traffic interface ge-0/0/x matching "port 22"
IP address:
root# run monitor traffic interface ge-0/0/x matching "host 10.130.38.94" no-resolve detail
A network:
root# run monitor traffic interface ge-0/0/x matching "net 225.1.1.0/24" no-resolve detail
TCP port 179:
root# run monitor traffic interface ge-0/0/x matching "tcp port 179"
root# run monitor traffic interface ge-0/0/x matching "host 10.130.38.94" no-resolve
Protocol:
root# run monitor traffic interface ge-0/0/x matching arp
Port:
root# run monitor traffic interface ge-0/0/x matching "port 22"
IP address:
root# run monitor traffic interface ge-0/0/x matching "host 10.130.38.94" no-resolve detail
A network:
root# run monitor traffic interface ge-0/0/x matching "net 225.1.1.0/24" no-resolve detail
TCP port 179:
root# run monitor traffic interface ge-0/0/x matching "tcp port 179"