Beefy Boxes and Bandwidth Generously Provided by pair Networks
Do you know where your variables are?

Re: Bulletproofing Servers

by jwest (Friar)
on Jul 19, 2002 at 19:24 UTC ( #183397=note: print w/ replies, xml ) Need Help??

in reply to Bulletproofing Servers

To your first question, it means:

If the value of the hash %CHILDREN at key $child is a reference to a block of 'CODE' (a subroutine), then call that code reference with the value of $child as its first parameter.

kill TERM => keys %CHILDREN is very much like you suspect. To be clearer, it could be written as:

kill('TERM', keys(%CHILDREN));

kill takes a signal as the first parameter, and a list of pids to send the signal to as the rest of its parameters.


-><- -><- -><- -><- -><-
All things are Perfect
    To every last Flaw
    And bound in accord
         With Eris's Law
 - HBT; The Book of Advice, 1:7

Comment on Re: Bulletproofing Servers
Select or Download Code

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://183397]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others imbibing at the Monastery: (5)
As of 2015-11-29 04:29 GMT
Find Nodes?
    Voting Booth?

    What would be the most significant thing to happen if a rope (or wire) tied the Earth and the Moon together?

    Results (746 votes), past polls