Solved

ntop configuration for different port where art thou.

Posted on 2011-03-22
1
646 Views
Last Modified: 2012-05-11
 So im trying to configure ntop, which is currently running fine, to use another interface for monitoring. Currently its using the same interface the web pages are dilivered on.  So I goto to admin web page >> preferences and under the -i option it gives me "You cannot set the capture interface: missing privileges." fine so i need to be roo or whatever. then I click "Show configurattion" link at the bottom and get a page that gives me the parameters that ntop starts with. Under "start as" i get this line "/usr/sbin/ntop -d -L -u ntop -P /var/lib/ntop --access-log-file -i eth0 -p /etc/ntop/protocol.list -O /var/log/ntop "
awsome!!! the golden egg. I search the internet for hours trying to find where this line is kept and nothing every file it suggests is either blank or non existant. Im running Ubuntu 10 can anyone solve my mystery??!!  arg
0
Comment
Question by:Roodona
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
de2Zotjes earned 500 total points
ID: 35193876
That line nowhere to be found because it is generated by the start script for ntop: /etc/init.d/ntop
It contains the following lines:
  start-stop-daemon --start --quiet --name $NAME --exec $DAEMON -- \
  -d -L -u $USER -P $HOMEDIR \
  --access-log-file=$LOGDIR/access.log -i "$INTERFACES" \
  -p /etc/ntop/protocol.list \
  -O $LOGDIR $GETOPT

Open in new window


The bit you are interested in is  -i "$INTERFACES".
A bit of searching shows that /var/lib/ntop/init.cfg is included (via /etc/default/ntop), this init.cfg contains the following (on my box):
USER="ntop"
INTERFACES="eth0"

Open in new window


0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

OnPage: Incident management and secure messaging on your smartphone
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question