10-17-2007
kindly shed some light on it
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
hi!,
is there any way to retrieve a file that I have deleted few minutes back?? I am using Solaris- 5.6..
:rolleyes: (2 Replies)
Discussion started by: jyotipg
2 Replies
2. Shell Programming and Scripting
Hi,
I'm a begginer in Unix Scripting and i'm trying to write a script that performs this functions..
1. Rlogin to a system
2. Copy a Perl script inTO the system
3. Run the Perl Script
4. Retrieve the result(file) of the Perl Script
5. Copy the result file to a single system
6. Logout of... (3 Replies)
Discussion started by: vicesjr
3 Replies
3. UNIX for Advanced & Expert Users
hi
The "ps" command shows the command line arguments of running processes:
$ /bin/ps -o pid,args -e
....
26031 pico /tmp/crontab2KaG1Y
596 /usr/lib/sendmail -bd -q15m
9955 xterm -n 1 -sb -sl 800 -g 80+70+70
2627 /usr/sbin/snmpd -Lsd -Lf /dev/null -p /var/run/snmpd -a 1691
....
I... (2 Replies)
Discussion started by: Andrewkl
2 Replies
4. UNIX for Dummies Questions & Answers
Hi one and all,
I'm working on a Bash script that is designed to calculate how much IP traffic has passed through a port to determine traffic volume over a given amount of time.
I've currently been able to use the netstat -s command coupled with grep to write to a file the total packets... (13 Replies)
Discussion started by: nistleloy
13 Replies
5. Shell Programming and Scripting
Alright, so I am trying to use perl (or any other shell scripting language, awk/sed/bash for instance), to retrieve the mime-type of a file.
I want to keep it in one file, and most of the modules that are on cpan that check for mime types (Magic), aren't installed on these boxes.
Anyone have... (2 Replies)
Discussion started by: Rhije
2 Replies
6. UNIX for Dummies Questions & Answers
Hi..
I have a dat file containing both column names and data. Now I want to get only Particular row along with the column names.
My dat fiel is as below
EmpName Dept Salary
Shally Admin 20000
Swati HR 15000
Deepali IT 45000
Preetika EEE 60000
Now I want to display only row 3rd along... (5 Replies)
Discussion started by: Mayuri P R
5 Replies
7. UNIX for Advanced & Expert Users
Hi Gurus,
The requirement is to collect the timestamp of soft links and collect it in a file in the following pattern:
This is the expected output:
Pattern:
MM/DD/YYYY hh:mi:ss filename
Example:
12/26/2008 10:31:09 <Filename>.zip
The closest way I could get was this:
ls... (8 Replies)
Discussion started by: jidsh
8 Replies
8. Shell Programming and Scripting
Hi,
I have a number of firewalls that send there traffic logs to a syslog server.
Each log entry takes up about 3 lines and the text within the log entry is delimited by a space. There are parts of the three lines that I need from every traffic log entry. I have been using a combination of sed,... (2 Replies)
Discussion started by: andyblaylock
2 Replies
9. Shell Programming and Scripting
Hi All..
I have a Filename as
FAB1_600015_CONRAD.A0_7XYZ12345.000_LT-SWET.01_LTPA25L_20110622-161429_07_WFR12345_20110622-161429_20110712-125228.data.dis
I want to get the result as... (5 Replies)
Discussion started by: asheshrocky
5 Replies
10. Shell Programming and Scripting
Hello experts :cool:,
I am new to programming and will need your help.. I have 2 very large files with the following format:
FILE1:
>MLP1019 PL4
>MLP7456 PL3
>MLP9268 PL9
>MLP6245 PL1
FILE2:
>MLP1019
STNAPLQTSNTWVSYQPSMMMSLQ
>MLP7456
PPYWYWNSAVMIFYVQPLSLLAVLLA
>MLP9268... (2 Replies)
Discussion started by: narachaid
2 Replies
LEARN ABOUT OPENDARWIN
shlock
SHLOCK(1) BSD General Commands Manual SHLOCK(1)
NAME
shlock -- create or verify a lock file for shell scripts
SYNOPSIS
shlock -f lockfile [-p PID] [-u] [-v]
DESCRIPTION
The shlock command can create or verify a lock file on behalf of a shell or other script program. When it attempts to create a lock file, if
one already exists, shlock verifies that it is or is not valid. If valid, shlock will exit with a non-zero exit code. If invalid, shlock
will remove the lock file, and create a new one.
shlock uses the rename(2) system call to make the final target lock file, which is an atomic operation (i.e. "dot locking", so named for this
mechanism's original use for locking system mailboxes). It puts the process ID ("PID") from the command line into the requested lock file.
shlock verifies that an extant lock file is still valid by using kill(2) with a zero signal to check for the existence of the process that
holds the lock.
The -f argument with lockfile is always required.
The -p option with PID is given when the program is to create a lock file; when absent, shlock will simply check for the validity of the lock
file.
The -u option causes shlock to read and write the PID as a binary pid_t, instead of as ASCII, to be compatible with the locks created by
UUCP.
The -v option causes shlock to be verbose about what it is doing.
RETURN VALUES
A zero exit code indicates a valid lock file.
EXAMPLES
BOURNE SHELL
#!/bin/sh
lckfile=/tmp/foo.lock
if shlock -f ${lckfile} -p $$
then
# do what required the lock
rm ${lckfile}
else
echo Lock ${lckfile} already held by `cat ${lckfile}`
fi
C SHELL
#!/bin/csh -f
set lckfile=/tmp/foo.lock
shlock -f ${lckfile} -p $$
if ($status == 0) then
# do what required the lock
rm ${lckfile}
else
echo Lock ${lckfile} already held by `cat ${lckfile}`
endif
The examples assume that the filesystem where the lock file is to be created is writeable by the user, and has space available.
HISTORY
shlock was written for the first Network News Transfer Protocol (NNTP) software distribution, released in March 1986. The algorithm was sug-
gested by Peter Honeyman, from work he did on HoneyDanBer UUCP.
AUTHOR
Erik E. Fair <fair@clock.org>
BUGS
Does not work on NFS or other network filesystem on different systems because the disparate systems have disjoint PID spaces.
Cannot handle the case where a lock file was not deleted, the process that created it has exited, and the system has created a new process
with the same PID as in the dead lock file. The lock file will appear to be valid even though the process is unrelated to the one that cre-
ated the lock in the first place. Always remove your lock files after you're done.
BSD
June 29, 1997 BSD