I have pasted the man page that is provided in this package below:
checksuite(1) checksuite(1)
NAME
checksuite - a suite of 9 programs for resource and security checking
SYNOPSIS
checkdisk [-hlo] [-t ] [-e ] [-p ]
checkhardware [-hlo] [-e ] [-p ]
checkinodes [-hlo] [-t ] [-e ] [-p ]
checkload [-hlo] [-t ] [-e ] [-p ]
checksecurity [-hlo] [-r] [-e ]
checkswap [-hlo] [-t ] [-e ] [-p ]
checksyn [-hlo] [-t ] [-e ]
checklinks [-hlo] [-q] [-r] [-d ] [-e ]
checkzombie [-hlo] [-t ] [-e ] [-p ]
DESCRIPTION
checksuite is a suite of perl scripts that are specifically meant to assist a
system administrator with day-to-day monitoring of system resources. This suite
is not intended to act in replacement of a system administrator by any means.
COMPONENTS
checkdisk - monitors disk utilization on the server by pulling data from the
"df" command. By default, the threshold is set to 85% utilization and if it
hits that it will also perform a "du" for that specific partition.
checkhardware - looks for common errors or problems in the system dmesg log. It
is not meant to be a total solution for hardware monitoring. This may help as
an early warning detection service for issues with the system, providing, an
error is logged in dmesg.
checkinodes - watches every partitions inode utilization on the system by
pulling data from the "df" command. This threshold is set to 85% usage like
checkdisk.
checkload - keeps an eye on the systems 5 minute load average. The default
threshold is set to 7. If the load average becomes that high, this program will
collect a snapshot of every active process during that exact time. It pulls
from /proc/cpuinfo to collect the data.
checksecurity - performs basic security checking that should surface any signs
of a system being compromised. Several known hacker footprints are investigated
on the system as well as a full system RPM verification. This program is not
intended to protect or disinfect a system.
checkswap - watches swap or paging memory utilization. The threshold is set to
half of the total swap space that is available on the system. If it does over
that 50% mark, it will also, like checkload, print out some of the active pro-
cesses running that could be contributing.
checksyn - will watch for SYN_RECV connections in netstat and block each unique
IP address that could potentially be SYN flooding the system. It blocks with
IPChains or IPTables, depending on kernel version. It will also flush the chain
periodically depending on how often the script is executed from cron. A new
threshold option has been added for you to specify how many times an IP can be
seen with a SYN_RECV before blocking them. Default is 5.
checklinks - will check for broken symbolin links on the specified filesys-
tem/directory. By default it will check /. You can also use it to remove the
broken links.
checkzombie - watches for processes that obtain a āZā state (zombie). The
default threshold is set to 1. If zombie processes are found, this program will
send out a notification of how many zombie processes and which ones they are.
OPTIONS
-h display help for command line arguments
-l log the output to the appropriate logfile in /var/log/checksuite.d/
-o force data output to screen
-q query the filesystem for broken links [checklinks]
-r perform full RPM system check [checksecurity] or removes broken links
[checklinks]
-d specify the directory to check for broken links
-t
specify a threshold different from the default
-e
send output to mail the specified e-mail address
-p
send shortend output to pager or cell phone e-mail
FILES
/usr/local/sbin
location of all checksuite scripts
/etc/cron.d/checksuite.cron
cron file for execution of programs and configuration of options
/etc/logrotate.d/checksuite
the logrotate configurations to rotate logs in /var/log/checksuite.d
/var/log/checksuite.d
the log directory where each individual log is stored
AUTHOR
Larry Long http://checksuite.sourceforge.net 2003-2010
GNU/Linux Saturday, August 2, 2003 checksuite(1)