01-10-2008
Hi sysgate,
Thanks for your reply. Well I'm a novice when it comes to shell programming. Can you please elaborate on
setting up "WARNING = 255"?
I know the exit part though
Thanks,
coolblue_3
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have my Mac OS X program executing a shell script (a script that copies files to a drive). I want to make it so that the shell script automatically kills itself if it finds that the host .app is not running OR kill itself if the drive that it is copying files to has been unmounted. Right now what... (2 Replies)
Discussion started by: pcwiz
2 Replies
2. Programming
I know it looks like a stupid question, but i really wanna know the reason.
Actually, i think it's because the c compiler will detect it as the end of file "EOF" of the program, but, am i wrong? because it compiles it anyway, but keep showing warnings like "no new line at the end of file".
I... (8 Replies)
Discussion started by: semash!
8 Replies
3. Programming
Hello everybody,
I'm having troubles on setting the default gateway address (and other addresses, such as netmask, or ip) of the host running a C program. I know it has to be with ioctl, but don't know how to do it.
Could somebody give me an example on how to set the default gateway address of... (4 Replies)
Discussion started by: semash!
4 Replies
4. Homework & Coursework Questions
Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted!
1. The problem statement, all variables and given/known data:
I have a question about the difference between a host and an end system. I have read a textbook and I am still... (2 Replies)
Discussion started by: greenesses
2 Replies
5. Shell Programming and Scripting
Hi,
I'm trying to copy a file from one server to remote server using SCP command. Below is the command i tried and got host key not found in database errror.
scp sendfile.txt Remoteserver:/home/xxxx/.
Error Message:
Host key not found from database
Key fingerprint:... (2 Replies)
Discussion started by: skcvasanth
2 Replies
6. Solaris
Hi all,
I have written the following program and run on both T5440 and T5220 on same OS version. I found that T5540 server takes more time than T5220. Please find below the details.
test1.cpp
#include <iostream>
#include <pthread.h>
using namespace std;
#define NUM_OF_THREADS 20... (17 Replies)
Discussion started by: sanjay_singh85
17 Replies
7. Shell Programming and Scripting
i have the follow shell script that try to find any file in the specified path and upload to oracle.
if no file will output in the concurrent log and the program return as error , how do i change the program so that if no file found will give out normal sucessful result.
i tried change the exit... (3 Replies)
Discussion started by: feilhk
3 Replies
8. AIX
Hi,
What are the differences between concurrent and enhanced concurrent VGs.?
Any advantages of enhanced concurrent VG over normal concurrent vg
Regards,
Siva (2 Replies)
Discussion started by: ksgnathan
2 Replies
9. Shell Programming and Scripting
Hi All,
I have a requirement to make a oracle concurrent program end with
warning based on a given condition. If the condition is true, the
concurrent program should end with completed warning status.
The host program I am using is a shell script that checks if a file exists.
... (2 Replies)
Discussion started by: megha2525
2 Replies
LEARN ABOUT CENTOS
k5identity
K5IDENTITY(5) MIT Kerberos K5IDENTITY(5)
NAME
k5identity - Kerberos V5 client principal selection rules
DESCRIPTION
The .k5identity file, which resides in a user's home directory, contains a list of rules for selecting a client principals based on the
server being accessed. These rules are used to choose a credential cache within the cache collection when possible.
Blank lines and lines beginning with # are ignored. Each line has the form:
principal field=value ...
If the server principal meets all of the field constraints, then principal is chosen as the client principal. The following fields are
recognized:
realm If the realm of the server principal is known, it is matched against value, which may be a pattern using shell wildcards. For
host-based server principals, the realm will generally only be known if there is a domain_realm section in krb5.conf(5) with a map-
ping for the hostname.
service
If the server principal is a host-based principal, its service component is matched against value, which may be a pattern using
shell wildcards.
host If the server principal is a host-based principal, its hostname component is converted to lower case and matched against value,
which may be a pattern using shell wildcards.
If the server principal matches the constraints of multiple lines in the .k5identity file, the principal from the first matching
line is used. If no line matches, credentials will be selected some other way, such as the realm heuristic or the current primary
cache.
EXAMPLE
The following example .k5identity file selects the client principal alice@KRBTEST.COM if the server principal is within that realm, the
principal alice/root@EXAMPLE.COM if the server host is within a servers subdomain, and the principal alice/mail@EXAMPLE.COM when accessing
the IMAP service on mail.example.com:
alice@KRBTEST.COM realm=KRBTEST.COM
alice/root@EXAMPLE.COM host=*.servers.example.com
alice/mail@EXAMPLE.COM host=mail.example.com service=imap
SEE ALSO
kerberos(1), krb5.conf(5)
AUTHOR
MIT
COPYRIGHT
1985-2013, MIT
1.11.3 K5IDENTITY(5)