On Fri, 29 Jul 2005, Joe Rizzo wrote: > I believe you could accomplish what you want with iptables. IE Match > the IP address with an iptables rule. The rule has counters for the > packets and bytes.
Yes that was the other route I was looking at. I will have to hack a script that grabs all the IP aliases and then creates a chain with a rule for each IP. (I was hoping someone had done this already :-) BTW, would those counters be accessible through SNMP then? (Would be nice to use cacti to graph it). > I believe there are tools / projects that provide iptables accounting. > > Hope that helps. > > Joe > > -----Original Message----- > From: A. Khattri [mailto:[EMAIL PROTECTED] > Sent: Thursday, July 28, 2005 9:10 PM > To: [email protected] > Subject: Re: [gentoo-server] Tracking bandwidth usage > > On Thu, 28 Jul 2005, Wendall Cada wrote: > > > On Thu, 2005-07-28 at 17:38 -0500, kashani wrote: > > A. Khattri wrote: > > > I have a web server with 100 IP aliases on it. > > > > > > I want to be able to track bandwidth usage on each IP. > > > (Maybe MRTG graphs?) > > > > > > Anyone come up with an elegant solution? > > > > ntop works well. Graphing is a part of it's built in functionality. I > > have been using it on my primary router for over a year without > issues. > > The only problem being that last time I looked at ntop is does take away > a > chunk of CPU time from your server (unless you have it on a separate > box). > > > -- smoke and mirrors n. Marketing deceptions. The term is mainstream in this general sense. Among hackers it's strongly associated with bogus demos and crocked benchmarks (see also MIPS, machoflops). "They claim their new box cranks 50 MIPS for under $5000, but didn't specify the instruction mix -- sounds like smoke and mirrors to me." The phrase, popularized by newspaper columnist Jimmy Breslin c.1975, has been said to derive from carnie slang for magic acts and `freak show' displays that depend on `trompe l'oeil' effects, but also calls to mind the fierce Aztec god Tezcatlipoca (lit. "Smoking Mirror") for whom the hearts of huge numbers of human sacrificial victims were regularly cut out. Upon hearing about a rigged demo or yet another round of fantasy-based marketing promises, hackers often feel analogously disheartened. See also stealth manager. -- [email protected] mailing list
