Skip to main content

Call and monitor executables

Project description

Monitcall is a small script to run executeables and watch for deadlocks in the process.

Usage:

monitcall [-h] [-a ARGS] [-t CYCLES] [-l LIMIT] [-s SIGNAL]
          [-d DEBUGLOG] [-v] cmd

The script will call the given command (CMD) together with the given arguments (ARGS). If the CPU usage of the command is higher than the given limit (LIMIT) for more than CYCLES cycles the command is killed with the signal SIGNAL.

Example:

To extract the contents of a MS-Word document mydocument.doc to an utf-8 text printed on stdout call:

monitcall wvWare -a '-c utf-8 --nographics mydocument.doc'

Known issues:

  • The argument string must not start with -a. Like this:

    ... -a '-a 4 -c utf-8 ...'
    

    This seems to be a bug in the argparse module

Change history

0.3.1 (2010-08-27)

  • fixed binary

0.3 (2010-08-27)

  • fixed nameerror
  • added some tests

0.2 (2010-08-26)

  • first public release

Project details


Release history Release notifications

This version
History Node

0.3.1

History Node

0.3

History Node

0.2

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Filename, size & hash SHA256 hash help File type Python version Upload date
monitcall-0.3.1.tar.gz (4.2 kB) Copy SHA256 hash SHA256 Source None Aug 27, 2010

Supported by

Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging CloudAMQP CloudAMQP RabbitMQ AWS AWS Cloud computing Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page