Provided by: logcentral-tools_2.7-1_amd64 bug

NAME

       logForwarder - Log item to manage ssh tunnels between log components and tools

NAME

       logForwarder  -  Tools  for creating and maintaining ssh tunnels between log components in
       complex topologies

SYNOPSYS

          logForwarder [options] ...

DESCRIPTION

       logForwarder helps simplifying the maintenance of ssh tunnels between log  components  and
       tools, thus improving log scalability and configuration in complex network topologies. The
       components may be defined in a program to be  monitored,  they  publish  messages  in  the
       LogCentral. The tools get the messages subscribing to the LogCentral.

       Before starting a log forwarder, you must:

       • launch omniNames on the local and remotes hosts.

       • launch the remote peer only defining its name and network configuration.

       • launch  local  peer and give him remote peer's name, ssh connection informations, remote
         port to use and pass -C option to create the ssh tunnel.

       [Remark: forwarders must be launched before the log tools/components]

OPTIONS

       --name [name]
              String identifying the forwarder

       --peer-name [name]
              String identifying its peer on the other network

       --ssh-host [host]
              Host hosting the ssh tunnel

       --ssh-login [login]
              Login used to establish the ssh connection (default: current user login).

       --ssh-key [/path/to/ssh/key]
              Path to the ssh key (the private one  !)  used  to  establish  the  ssh  connection
              (default: $HOME/.ssh/id_rsa).

       --remote-port [port]
              Port listening on the ssh host.

       --remote-host [host]
              Host  to  which the connection is made by the tunnel (corresponds to ssh options -L
              and -R).

       --nb-retry [nb]
              Number of times that the local forwarder will try to  bind  itself  to  the  remote
              forwarder (default: 3).

       --peer-ior [IOR]
              Pass  remote forwarder's IOR. By default, the local forwarder will retrive its peer
              IOR.

       --net-config [path/to/configuration/file]
              Path to configuration file.

       -C     Create the tunnel from this forwarder.

CONFIGURATION FILE

       You can pass a configuration file to dietForwarder instead of using command  line  options
       through  the  --net-config  option.  Configuration  file  lists  several  rules describing
       networks reachable using this forwarder.

       There's two category of rules:

       accept rules
              describe which networks are accessible through the forwarder.

       reject rules
              describe which networks are not accessible through the forwarder.

       A rule always starts by either accept:  or  reject:  immediately  followed  by  a  regular
       expression  (Posix)  describing  host  concerned  by the rule.  Rules are evaluated in the
       following order: accept then reject.  For instance:
          accept:.*  reject:localhost

       This fragment means that  the  forwarder  will  accept  connections  to  every  hosts  but
       localhost.

EXAMPLE

       Here's a simple configuration:

       • We  have  two  domains: net1 and net2, forwarders will be launched on hosts fwd.net1 and
         fwd.net2.

       • There's no link between hosts fwd.net1 and fwd.net2 but user may  access  fwd.net2  from
         fwd.net1 using a ssh connection.

       • We'll name fwd.net1 forwarder Fwd1 and fwd.net2 fowarder Fwd2.

       • One tool lives in fwd.net2 while a component lives on the net1 domain.

       Command line for launchind Fwd1

       fwd.net1$ logForwarder --name Fwd1 --peer-name Fwd2 \
         --ssh-host fwd.net2 --ssh-login dietUser \
         --ssh-key id rsa net2 --remote-port 50000 \
         --net-config net1.cfg -C

       Command line to launch Fwd2

       fwd.net2$ logForwarder --name Fwd2 --net-config net2.cfg

       Configuration file for Fwd1

       In this example, the forwarders Fwd1 accepts only the connections to fwd.net2.

       accept:fwd.net2

       Configuration file for Fwd2

       In  this  example,  the forwarders Fwd2 accepts all the connections except those which are
       for the localhost.

       accept:.*
       reject:localhost

RATIONALE

       The log service uses CORBA as its communication layer. While it's a  flexible  and  robust
       middleware,  it  remains  hard  deploying  the  log on heterogeneous networks that are not
       reachable except through ssh tunnels. Log forwarders help administrator configuring  their
       grid  without  manually  set-up ssh tunnels which arguably is neither simple nor scalable.
       Log forwarders make it very easy configuring such topologies.

LICENSE AND COPYRIGHT

   Copyright
       (C)2011, GRAAL, INRIA Rhone-Alpes, 46 allee d'Italie, 69364  Lyon  cedex  07,  France  all
       right reserved <diet-dev@ens-lyon.fr>

   License
       This  program is free software: you can redistribute it and/or mod‐ ify it under the terms
       of the GNU General Public License as pub‐ lished by the Free Software  Foundation,  either
       version  3  of  the  License,  or  (at  your  option)  any  later version. This program is
       distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the
       implied  warranty  of  MERCHANTABILITY  or  FITNESS  FOR A PARTICULAR PURPOSE. See the GNU
       General Pub- lic Li‐ cense for more details. You should have received a copy  of  the  GNU
       General    Public    License    along    with    this    program.    If    not,   see   <‐
       http://www.gnu.org/licenses/>.

AUTHORS

       GRAAL INRIA  Rhone-Alpes  46  allee  d'Italie  69364  Lyon  cedex  07,  FRANCE  Email:  <‐
       diet-dev@ens-lyon.fr> WWW: http://graal.ens-lyon.fr/DIET

SEE ALSO

       omniNames(1), dietForwarder(1), LogCentral(1)

BUGS

       On  some  systems,  forwarder  rules  won't  work  unless  you use IP addresses instead of
       hostnames

AUTHOR

       haikel.guemar@sysfera.com, kevin.coulomb@sysfera.com

       License: GPLv3

COPYRIGHT

       DIET developers