02-08-2008
Why compare as text?
Why not perform the comparisons as numeric?
#! /bin/bash
THOLD=5
KKY6=403
if [ $KKY6 -gt $THOLD ]
then
echo $KKY6 "threshold exceeded"
fi
if [ $KKY6 -eq $THOLD ]
then
echo $KKY6 "threshold equaled"
fi
if [ $KKY6 -lt $THOLD ]
then
echo $KKY6 "threshold not yet reached"
fi
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Script
#!/bin/sh
hardware=PC
os=WindowsNET
for i in `cat newservers`
do
x=`sudo /opt/openv/netbackup/bin/admincmd/bpplclients |grep $i |head -40 |grep $i|awk '{print $3;exit}'`
if
then
echo "$i is already added"
else
echo "Need to add"
fi
done
O/p in debug mode
bash-2.05$... (3 Replies)
Discussion started by: rajip23
3 Replies
2. Shell Programming and Scripting
I have two computers with dynamic IP addresses and am using dyndns so that they are identifiable as the same computer even if their IPs change (we'll call them host1.dyndns.com and host2.dyndns.com). I also have a remote server which I would like to store my computers' IP addresses on. There is a... (9 Replies)
Discussion started by: kerpm
9 Replies
3. Shell Programming and Scripting
Hi.
I have three arrays.
@a=('AB','CD','EF');
@b=('AB,'DG',HK');
@c=('DD','TT','MM');
I want to compare the elements of the first two array and if they match then so some substition.
I tried using the if statement using the scalar value of the array but its not giving me any output.
... (7 Replies)
Discussion started by: kamitsin
7 Replies
4. UNIX for Dummies Questions & Answers
im trying to compare ipaddresses. i loop through an array to see if the ip is already is in the array and if it is it should set a flag and then i wont add it to the array. but its just adding all the ipaddresses to the array
if ]
then
... (3 Replies)
Discussion started by: magnia
3 Replies
5. Shell Programming and Scripting
Hi!
I've come up with a ksh-script that produces one or more lists of hosts.
At the and of the script, I would like to print only those hosts that exists in all the lists.
Ex.
HOSTS="host1 host2 host3 host11"
HOSTS="host1 host2 host4"
HOSTS="host2 host11"
HOSTS="host2 host5 host6 host7... (1 Reply)
Discussion started by: Bugenhagen
1 Replies
6. Shell Programming and Scripting
Hi,
I am a noob at shell scripting.
basically I am trying to compare row counts from 8 tables in different databases. I have managed to get the row counts using awk from the spool files for both databases.
now I have 16 variables with me
for database 1 :
$A
$B
$C
$D
$E
$F
$G... (3 Replies)
Discussion started by: smallville
3 Replies
7. Shell Programming and Scripting
I have very abstract need of "comparing two variables" and take subsequent actions.
please refer to image below
https://lh3.googleusercontent.com/-frNk5iA3q1c/TjI3lE0sWOI/AAAAAAAAAIE/fxzB1w07gas/script_block.JPG
I have a part of script which reads a file and generates variables based on... (4 Replies)
Discussion started by: animesharma
4 Replies
8. UNIX for Dummies Questions & Answers
hi
i am writing a hangman script and am having trouble checking the correct letters against the word
i need the script to compare the word against the letters guessed that are correct so once all the letters within the word have been guessed it will alow me to create a wining senario
eg
... (13 Replies)
Discussion started by: lsecer
13 Replies
9. Shell Programming and Scripting
I have a script like this. Just couldn't get the comparison part work. Any thought? thanks,
#!/usr/bin/ksh -x
STEP=`echo $(basename $0 .ksh) | tr "" ""`
log=/skip.log
while read LINE
do
if
then
echo `date`: STEP $STEP skipped by user >> $log
exit 0
fi
done < $1
echo... (0 Replies)
Discussion started by: ghostmic
0 Replies
10. UNIX for Beginners Questions & Answers
Hi,
I have 2 variables as given below. How can i compare them and say its matching ? Appreciate your help
VAR1=describe/read/write
VAR2=read/write/describeThanks,
Please use CODE tags as required by forum rules! (4 Replies)
Discussion started by: prince1987
4 Replies
LEARN ABOUT OSF1
db_archive
db_archive(8) System Manager's Manual db_archive(8)
NAME
db_archive - displays security database log files no longer involved in active transactions (Enhanced Security)
SYNOPSIS
/usr/tcb/bin/db_archive [-alsv] [-h home]
FLAGS
Write all pathnames as absolute pathnames, instead of relative to the database home directories. Specify a home directory for the data-
base. The correct directory for enhanced security is /var/tcb/files. Write out the pathnames of all of the database log files, whether or
not they are involved in active transactions. Write the pathnames of all of the database files that need to be archived in order to
recover the database from catastrophic failure. If any of the database files have not been accessed during the lifetime of the current log
files, db_archive does not include them in this output.
It is possible that some of the files referenced in the log have since been deleted from the system. In this case, db_archive ignores
them. When db_recover is run, any files referenced in the log that are not present during recovery are assumed to have been deleted and
are not be recovered. Run in verbose mode, listing the checkpoints in the log files as they are reviewed.
DESCRIPTION
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide high-performance database sup-
port for critical security files. The DB includes full transactional support and database recovery, using write-ahead logging and check-
pointing to record changes.
The db_archive utility is provided for maintenance of the log files associated with the security database. It writes the pathnames of log
files that are no longer in use (that is, no longer involved in active transactions), to the standard output, one pathname per line. These
log files should be written to backup media to provide for recovery in the case of catastrophic failure (which also requires a snapshot of
the database files), but they may then be deleted from the system to reclaim disk space. You should perform a db_checkpoint -1 before
using db_archive.
The secconfig utility can create a cron job that periodically checks the security log files and deletes those no longer in use, as deter-
mined by db_archive. Be sure to coordinate this with the site backup schedule.
The db_archive utility attaches to one or more of the Berkeley DB shared memory regions. In order to avoid region corruption, it should
always be given the chance to detach and exit gracefully. To cause db_archive to clean up after itself and exit, send it an interrupt sig-
nal (SIGINT).
RETURN VALUES
The db_archive utility exits 0 on success, and >0 if an error occurs.
ENVIRONMENT VARIABLES
If the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home. The home
directory for security is /var/tcb/files.
FILES
/var/tcb/files/auth.db
/var/tcb/files/dblogs/*
RELATED INFORMATION
Commands: db_checkpoint(8), db_dump(8), db_load(8), db_printlog(8), db_recover(8), db_stat(8), secconfig(8) delim off
db_archive(8)