# Update repo and install packages dependencies needed by Zimbra. Yum update yum -y install perl perl-core wget screen w3m elinks openssh-clients openssh-server bind bind-utils unzip nmap sed nc sysstat libaio rsync telnet aspell # Configure local DNS Server. Zimbra needed lookup to MX records on domain that used.
What is the best way to go about finding all ports being used by MySQL for clustering purposes? I am on Linux platform with MySQL NDB 5.7. I am trying to monitor all traffic related to MySQL clustering – between data nodes, management node and sql nodes. To that end, I used netstat to list all open ports listening on my machine before starting MySQL cluster.
Then, I started MySQL cluster and ran netstat again. I assumed that the ports that were listening the second time around, but not the first time, were related to MySQL clustering. But there are two problems with this. First, there could be ports opened by other processes between the two netstat runs. Second, MySQL might open other ports after I ran the netstat command the second time.
What is the best way to go about finding all ports being used by MySQL for clustering purposes? I believe ephemeral ports are picked dynamically, so perhaps if I knew all the MySQL clustering related processes that would be running, I can figure out every port that they are using. Pointers will be very welcome.
Description nmap - Network exploration tool and security scanner Property Value Distribution CentOS 6 Repository CentOS x8664 Package name nmap Package version 5.51 Package release 6.el6 Package architecture x8664 Package type rpm Installed size 9.68 MB Download size 2.75 MB Official Mirror mirror.centos.org Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification).
Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, reverse-identd scanning, and more. In addition to the classic command-line nmap executable, the Nmap suite includes a flexible data transfer, redirection, and debugging tool (netcat utility ncat), a utility for comparing scan results (ndiff), and a packet generation and response analysis tool (nping). Alternatives Package Version Architecture Repository 6.47 i686 Atomic 6.47 x8664 Atomic 6.46 i686 Atomic 6.46 x8664 Atomic 6.01 i686 CERT Forensics Tools 6.01 x8664 CERT Forensics Tools 6.00 i386 CERT Forensics Tools 5.51 i686 CentOS -Requires Name Value /usr/bin/python -Provides Name Value nmap = 5.51-6.el6 nmap(x86-64) = 5.51-6.el6.