Sophie

Sophie

distrib > Mandriva > 2010.0 > i586 > media > contrib-release > by-pkgid > d97b4c58d8763adc61a7b020afdfd868 > files > 149

smokeping-2.4.2-9mdv2010.0.noarch.rpm

<?xml version="1.0" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Smokeping/probes/WebProxyFilter</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<link rev="made" href="mailto:root@localhost" />
</head>

<body style="background-color: white">

<p><a name="__index__"></a></p>
<!-- INDEX BEGIN -->
<!--

<ul>

	<li><a href="#name">NAME</a></li>
	<li><a href="#overview">OVERVIEW</a></li>
	<li><a href="#synopsis">SYNOPSIS</a></li>
	<li><a href="#description">DESCRIPTION</a></li>
	<li><a href="#variables">VARIABLES</a></li>
	<li><a href="#authors">AUTHORS</a></li>
	<li><a href="#bugs">BUGS</a></li>
</ul>
-->
<!-- INDEX END -->

<p>
</p>
<h1><a name="name">NAME</a></h1>
<p>Smokeping::probes::WebProxyFilter - tests webproxy filter performance and function.</p>
<p>
</p>
<hr />
<h1><a name="overview">OVERVIEW</a></h1>
<p>This probe tests if your filtering webproxy is working properly. Drawing from
a list of forbidden websites, it tries to establish a connection to
each one of them and registers a 'loss' when it suceeeds.</p>
<p>If you want to test availability of a website, use the EchoPingHttp probe.</p>
<p>
</p>
<hr />
<h1><a name="synopsis">SYNOPSIS</a></h1>
<pre>
 *** Probes ***</pre>
<pre>
 +WebProxyFilter</pre>
<pre>
 forks = 5
 maxsize = 2000
 min_interval = 0.1
 offset = 50%
 step = 300
 timeout = 15
 useragent = SmokePing/2.x (WebProxyFilter Probe)</pre>
<pre>
 # The following variables can be overridden in each target section
 deny_re = Access Prohibited
 more_hosts = www.playboy.com, www.our-competition.com
 pings = 5
 timeout = 2</pre>
<pre>
 # [...]</pre>
<pre>
 *** Targets ***</pre>
<pre>
 probe = WebProxyFilter # if this should be the default probe</pre>
<pre>
 # [...]</pre>
<pre>
 + mytarget
 # probe = WebProxyFilter # if the default probe is something else
 host = my.host
 deny_re = Access Prohibited
 more_hosts = www.playboy.com, www.our-competition.com
 pings = 5
 timeout = 2</pre>
<p>
</p>
<hr />
<h1><a name="description">DESCRIPTION</a></h1>
<p>The probe uses the LWP::UserAgent module to retreive a series of wepages. It
expects to get the firewalls 'site-prohibited' page. Any other response (or
a real loss) gets logged as a loss and can be used to trigger an alarm.</p>
<p>The probe tries to be nice to the firewall and waits at least X seconds
between starting filetransfers, where X is the value of the probe 
specific `min_interval' variable (1 by default).</p>
<p>Many variables can be specified either in the probe or in the target definition,
the target-specific variable will override the prove-specific variable.</p>
<p>
</p>
<hr />
<h1><a name="variables">VARIABLES</a></h1>
<p>Supported probe-specific variables:</p>
<dl>
<dt><strong><a name="item_forks">forks</a></strong>

</dt><dd>
<p>Run this many concurrent processes at maximum</p>
<p>Example value: 5</p>
<p>Default value: 5</p>

</dd><dt><strong><a name="item_maxsize">maxsize</a></strong>

</dt><dd>
<p>How much of the webpage should be retreived.</p>
<p>Default value: 2000</p>

</dd><dt><strong><a name="item_min_interval">min_interval</a></strong>

</dt><dd>
<p>The minimum interval between each starting GETs in seconds.</p>
<p>Example value: 0.1</p>
<p>Default value: 1</p>

</dd><dt><strong><a name="item_offset">offset</a></strong>

</dt><dd>
<p>If you run many probes concurrently you may want to prevent them from
hitting your network all at the same time. Using the probe-specific
offset parameter you can change the point in time when each probe will
be run. Offset is specified in % of total interval, or alternatively as
'random', and the offset from the 'General' section is used if nothing
is specified here. Note that this does NOT influence the rrds itself,
it is just a matter of when data acqusition is initiated.
(This variable is only applicable if the variable 'concurrentprobes' is set
in the 'General' section.)</p>
<p>Example value: 50%</p>

</dd><dt><strong><a name="item_step">step</a></strong>

</dt><dd>
<p>Duration of the base interval that this probe should use, if different
from the one specified in the 'Database' section. Note that the step in
the RRD files is fixed when they are originally generated, and if you
change the step parameter afterwards, you'll have to delete the old RRD
files or somehow convert them. (This variable is only applicable if
the variable 'concurrentprobes' is set in the 'General' section.)</p>
<p>Example value: 300</p>

</dd><dt><strong><a name="item_timeout">timeout</a></strong>

</dt><dd>
<p>How long a single 'ping' takes at maximum</p>
<p>Example value: 15</p>
<p>Default value: 5</p>

</dd><dt><strong><a name="item_useragent">useragent</a></strong>

</dt><dd>
<p>The web browser we claim to be, just in case the FW is interested</p>
<p>Default value: SmokePing/2.x (WebProxyFilter Probe)</p>

</dd></dl>
<p>Supported target-specific variables:</p>
<dl>
<dt><strong><a name="item_deny_re">deny_re</a></strong>

</dt><dd>
<p>Regular expression, matching the 'deny' response from the firewall</p>
<p>Example value: Access Prohibited</p>

</dd><dt><strong><a name="item_more_hosts">more_hosts</a></strong>

</dt><dd>
<p>A comma separated list of banned websites to test in addition to the one
specified in the <em>host</em> variable. The websites will be tested one after the
other in one round, this means that while normal probes do run the same test
serveral times in a row, this one will alter the webpage with each round.
The reason for this is, that eventhough we try to retreive remote webpages,
the answer will come from the firewall everytime, so we kill two birds in
one go. First we test the firewalls latency and second we make sure its
filter works properly.</p>
<p>Example value: www.playboy.com, www.our-competition.com</p>

</dd><dt><strong><a name="item_pings">pings</a></strong>

</dt><dd>
<p>How many pings should be sent to each target, if different from the global
value specified in the Database section. Note that the number of pings in
the RRD files is fixed when they are originally generated, and if you
change this parameter afterwards, you'll have to delete the old RRD
files or somehow convert them.</p>
<p>Example value: 5</p>

</dd><dt><strong>timeout</strong>

</dt><dd>
<p>Timeout in seconds for the test complete.</p>
<p>Example value: 2</p>
<p>Default value: 2</p>

</dd></dl>
<p>
</p>
<hr />
<h1><a name="authors">AUTHORS</a></h1>
<p>Tobias Oetiker &lt;<a href="mailto:tobi@oetiker.ch">tobi@oetiker.ch</a>&gt; sponsored by Virtela</p>
<p>
</p>
<hr />
<h1><a name="bugs">BUGS</a></h1>
<p>This probe is somewhat unortodox, since it regards the sucessful retrieval
of a banned webpage as a loss.</p>

</body>

</html>