Software: Apache. PHP/8.3.27 uname -a: Linux pdx1-shared-a4-04 6.6.104-grsec-jammy+ #3 SMP Tue Sep 16 00:28:11 UTC 2025 x86_64 uid=6659440(dh_z2jmpm) gid=2086089(pg10499364) groups=2086089(pg10499364) Safe-mode: OFF (not secure) /usr/share/doc/libapache2-mod-qos/ drwxr-xr-x | |
| Viewing file: Select action/file-type: QSEXECSection: qsexec man page (1)Updated: May 2019 Index Return to Main Contents NAMEqsexec - parses the data received via stdin and executes the defined command on a pattern match.SYNOPSISqsexec -e <pattern> [-t <number>:<sec>] [-c <pattern> [<command string>]] [-p] [-u <user>] <command string>DESCRIPTIONqsexec reads log lines from stdin and searches for the defined pattern. It executes the defined command string on pattern match.OPTIONS
EXAMPLEExecutes the deny.sh script providing the IP address of the client causing a mod_qos(031) messages whenever the log message appears 10 times within at most one minute:ErrorLog "|/usr/bin/qsexec -e \'mod_qos\(031\).*, c=([0-9a-zA-Z:.]*)\' -t 10:60 \'/usr/local/bin/deny.sh $1\'" SEE ALSOqsdt(1), qsfilter2(1), qsgeo(1), qsgrep(1), qshead(1), qslog(1), qslogger(1), qspng(1), qsre(1), qsrespeed(1), qsrotate(1), qssign(1), qstail(1)AUTHORPascal Buchbinder, http://mod-qos.sourceforge.net/
Index |
:: Command execute :: | |
--[ c99shell v. 2.5 [PHP 8 Update] [24.05.2025] | Generation time: 0.1058 ]-- |