Solved

ntop configuration for different port where art thou.

Posted on 2011-03-22
1
637 Views
Last Modified: 2012-05-11
 So im trying to configure ntop, which is currently running fine, to use another interface for monitoring. Currently its using the same interface the web pages are dilivered on.  So I goto to admin web page >> preferences and under the -i option it gives me "You cannot set the capture interface: missing privileges." fine so i need to be roo or whatever. then I click "Show configurattion" link at the bottom and get a page that gives me the parameters that ntop starts with. Under "start as" i get this line "/usr/sbin/ntop -d -L -u ntop -P /var/lib/ntop --access-log-file -i eth0 -p /etc/ntop/protocol.list -O /var/log/ntop "
awsome!!! the golden egg. I search the internet for hours trying to find where this line is kept and nothing every file it suggests is either blank or non existant. Im running Ubuntu 10 can anyone solve my mystery??!!  arg
0
Comment
Question by:Roodona
1 Comment
 
LVL 6

Accepted Solution

by:
de2Zotjes earned 500 total points
ID: 35193876
That line nowhere to be found because it is generated by the start script for ntop: /etc/init.d/ntop
It contains the following lines:
  start-stop-daemon --start --quiet --name $NAME --exec $DAEMON -- \
  -d -L -u $USER -P $HOMEDIR \
  --access-log-file=$LOGDIR/access.log -i "$INTERFACES" \
  -p /etc/ntop/protocol.list \
  -O $LOGDIR $GETOPT

Open in new window


The bit you are interested in is  -i "$INTERFACES".
A bit of searching shows that /var/lib/ntop/init.cfg is included (via /etc/default/ntop), this init.cfg contains the following (on my box):
USER="ntop"
INTERFACES="eth0"

Open in new window


0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question