EnglishFrenchSpanish

OnWorks favicon

pmproxy - Online in the Cloud

Run pmproxy in OnWorks free hosting provider over Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

This is the command pmproxy that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator

PROGRAM:

NAME


pmproxy - proxy for performance metrics collector daemon

SYNOPSIS


pmproxy [-Af] [-C dirname] [-i ipaddress] [-l logfile] [-L bytes] [-p port[,port ...] [-P
passfile] [-U username] [-x file]

DESCRIPTION


pmproxy acts as a protocol proxy for pmcd(1), allowing Performance Co-Pilot (PCP)
monitoring clients to connect to one or more pmcd(1) instances via pmproxy.

Normally pmproxy is deployed in a firewall domain, or on a ``head'' node of a cluster
where the IP (Internet Protocol) address of the hosts where pmcd(1) is running may be
unknown to the PCP monitoring clients, although the IP address of the host where pmproxy
is running is known to these clients. Similarly, the clients may have network
connectivity only to the host where pmproxy is running, while there is network
connectivity from that host to the hosts of interest where pmcd(1) is running.

The behaviour of the PCP monitoring clients is controlled by either the PMPROXY_HOST
environment variable or through the extended hostname specification (see PCPIntro(1) for
details). If neither of these mechanisms is used, clients will make their connections
directly to pmcd(1). If the proxy hostname syntax is used or PMPROXY_HOST is set, then
this should be the hostname or IP address of the system where pmproxy is running, and the
clients will connect to pmcd(1) indirectly through the protocol proxy services of pmproxy.

The options to pmproxy are as follows.

-A Disable service advertisement. By default, pmproxy will advertise its presence on
the network using any available mechanisms (such as Avahi/DNS-SD), assisting remote
monitoring tools with finding it. These mechanisms are disabled with this option.

-C dirname
Specify the path to the Network Security Services certificate database, for
(optional) secure connections. The default is /etc/pki/nssdb. Refer also to the
-P option. If it does not already exist, this database can be created using the
certutil utility. This process and other certificate database maintenance
information is provided in the PCPIntro(1) manual page and the online PCP
tutorials.

-f By default pmproxy is started as a daemon. The -f option indicates that it should
run in the foreground. This is most useful when trying to diagnose problems with
establishing connections.

-i ipaddress
This option is usually only used on hosts with more than one network interface
(very common for firewall and ``head'' node hosts where pmproxy is most likely to
be deployed). If no -i options are specified pmproxy accepts PCP client
connections on any of its host's IP addresses. The -i option is used to specify
explicitly an IP address that PCP client connections should be accepted on.
ipaddress should be in the standard dotted form (e.g. 100.23.45.6). The -i option
may be used multiple times to define a list of IP addresses. When one or more -i
options is specified, attempted connections made on any other IP addresses will be
refused.

-l logfile
By default a log file named pmproxy.log is written in the current directory. The
-l option causes the log file to be written to logfile instead of the default. If
the log file cannot be created or is not writable, output is written to the
standard error instead.

-L bytes
PDUs received by pmproxy from PCP monitoring clients are restricted to a maximum
size of 65536 bytes by default to defend against Denial of Service attacks. The -L
option may be used to change the maximum incoming PDU size.

-P passfile
Specify the path to a file containing the Network Security Services certificate
database password for (optional) secure connections, and for databases that are
password protected. Refer also to the -C option. When using this option, great
care should be exercised to ensure appropriate ownership ("pcp" user, typically)
and permissions on this file (0400, so as to be unreadable by any user other than
the user running the pmproxy process).

-U username
Assume the identity of username before starting to accept incoming packets from PCP
monitoring clients.

-x file
Before the pmproxy logfile can be opened, pmproxy may encounter a fatal error which
prevents it from starting. By default, the output describing this error is sent to
/dev/tty but it may redirected to file.

STARTING AND STOPPING PMPROXY


Normally, pmproxy is started automatically at boot time and stopped when the system is
being brought down. Under certain circumstances it is necessary to start or stop pmproxy
manually. To do this one must become superuser and type

# $PCP_RC_DIR/pmproxy start

to start pmproxy, or

# $PCP_RC_DIR/pmproxy stop

to stop pmproxy. Starting pmproxy when it is already running is the same as stopping it
and then starting it again.

Normally pmproxy listens for PCP client connections on TCP/IP port number 44322
(registered at http://www.iana.org/). Either the environment variable PMPROXY_PORT -p
command line option may be used to specify alternative port number(s) when PMPROXY_PORT or
the -p command line option may be used to specify alternative port number(s) when pmproxy
is started; in each case, the specification is a comma-separated list of one or more
numerical port numbers. Should both methods be used or multiple -p options appear on the
command line, pmproxy will listen on the union of the set of ports specified via all -p
options and the PMPROXY_PORT environment variable. If non-default ports are used with
pmproxy care should be taken to ensure that PMPROXY_PORT is also set in the environment of
any client application that will connect to pmproxy, or that the extended host
specification syntax is used (see PCPIntro(1) for details).

Use pmproxy online using onworks.net services


Free Servers & Workstations

Download Windows & Linux apps

  • 1
    Phaser
    Phaser
    Phaser is a fast, free, and fun open
    source HTML5 game framework that offers
    WebGL and Canvas rendering across
    desktop and mobile web browsers. Games
    can be co...
    Download Phaser
  • 2
    VASSAL Engine
    VASSAL Engine
    VASSAL is a game engine for creating
    electronic versions of traditional board
    and card games. It provides support for
    game piece rendering and interaction,
    and...
    Download VASSAL Engine
  • 3
    OpenPDF - Fork of iText
    OpenPDF - Fork of iText
    OpenPDF is a Java library for creating
    and editing PDF files with a LGPL and
    MPL open source license. OpenPDF is the
    LGPL/MPL open source successor of iText,
    a...
    Download OpenPDF - Fork of iText
  • 4
    SAGA GIS
    SAGA GIS
    SAGA - System for Automated
    Geoscientific Analyses - is a Geographic
    Information System (GIS) software with
    immense capabilities for geodata
    processing and ana...
    Download SAGA GIS
  • 5
    Toolbox for Java/JTOpen
    Toolbox for Java/JTOpen
    The IBM Toolbox for Java / JTOpen is a
    library of Java classes supporting the
    client/server and internet programming
    models to a system running OS/400,
    i5/OS, o...
    Download Toolbox for Java/JTOpen
  • 6
    D3.js
    D3.js
    D3.js (or D3 for Data-Driven Documents)
    is a JavaScript library that allows you
    to produce dynamic, interactive data
    visualizations in web browsers. With D3
    you...
    Download D3.js
  • More »

Linux commands

Ad