02-08-2008
Why compare as text?
Why not perform the comparisons as numeric?
#! /bin/bash
THOLD=5
KKY6=403
if [ $KKY6 -gt $THOLD ]
then
echo $KKY6 "threshold exceeded"
fi
if [ $KKY6 -eq $THOLD ]
then
echo $KKY6 "threshold equaled"
fi
if [ $KKY6 -lt $THOLD ]
then
echo $KKY6 "threshold not yet reached"
fi
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Script
#!/bin/sh
hardware=PC
os=WindowsNET
for i in `cat newservers`
do
x=`sudo /opt/openv/netbackup/bin/admincmd/bpplclients |grep $i |head -40 |grep $i|awk '{print $3;exit}'`
if
then
echo "$i is already added"
else
echo "Need to add"
fi
done
O/p in debug mode
bash-2.05$... (3 Replies)
Discussion started by: rajip23
3 Replies
2. Shell Programming and Scripting
I have two computers with dynamic IP addresses and am using dyndns so that they are identifiable as the same computer even if their IPs change (we'll call them host1.dyndns.com and host2.dyndns.com). I also have a remote server which I would like to store my computers' IP addresses on. There is a... (9 Replies)
Discussion started by: kerpm
9 Replies
3. Shell Programming and Scripting
Hi.
I have three arrays.
@a=('AB','CD','EF');
@b=('AB,'DG',HK');
@c=('DD','TT','MM');
I want to compare the elements of the first two array and if they match then so some substition.
I tried using the if statement using the scalar value of the array but its not giving me any output.
... (7 Replies)
Discussion started by: kamitsin
7 Replies
4. UNIX for Dummies Questions & Answers
im trying to compare ipaddresses. i loop through an array to see if the ip is already is in the array and if it is it should set a flag and then i wont add it to the array. but its just adding all the ipaddresses to the array
if ]
then
... (3 Replies)
Discussion started by: magnia
3 Replies
5. Shell Programming and Scripting
Hi!
I've come up with a ksh-script that produces one or more lists of hosts.
At the and of the script, I would like to print only those hosts that exists in all the lists.
Ex.
HOSTS="host1 host2 host3 host11"
HOSTS="host1 host2 host4"
HOSTS="host2 host11"
HOSTS="host2 host5 host6 host7... (1 Reply)
Discussion started by: Bugenhagen
1 Replies
6. Shell Programming and Scripting
Hi,
I am a noob at shell scripting.
basically I am trying to compare row counts from 8 tables in different databases. I have managed to get the row counts using awk from the spool files for both databases.
now I have 16 variables with me
for database 1 :
$A
$B
$C
$D
$E
$F
$G... (3 Replies)
Discussion started by: smallville
3 Replies
7. Shell Programming and Scripting
I have very abstract need of "comparing two variables" and take subsequent actions.
please refer to image below
https://lh3.googleusercontent.com/-frNk5iA3q1c/TjI3lE0sWOI/AAAAAAAAAIE/fxzB1w07gas/script_block.JPG
I have a part of script which reads a file and generates variables based on... (4 Replies)
Discussion started by: animesharma
4 Replies
8. UNIX for Dummies Questions & Answers
hi
i am writing a hangman script and am having trouble checking the correct letters against the word
i need the script to compare the word against the letters guessed that are correct so once all the letters within the word have been guessed it will alow me to create a wining senario
eg
... (13 Replies)
Discussion started by: lsecer
13 Replies
9. Shell Programming and Scripting
I have a script like this. Just couldn't get the comparison part work. Any thought? thanks,
#!/usr/bin/ksh -x
STEP=`echo $(basename $0 .ksh) | tr "" ""`
log=/skip.log
while read LINE
do
if
then
echo `date`: STEP $STEP skipped by user >> $log
exit 0
fi
done < $1
echo... (0 Replies)
Discussion started by: ghostmic
0 Replies
10. UNIX for Beginners Questions & Answers
Hi,
I have 2 variables as given below. How can i compare them and say its matching ? Appreciate your help
VAR1=describe/read/write
VAR2=read/write/describeThanks,
Please use CODE tags as required by forum rules! (4 Replies)
Discussion started by: prince1987
4 Replies
LEARN ABOUT OSF1
db_checkpoint
db_checkpoint(8) System Manager's Manual db_checkpoint(8)
NAME
db_checkpoint - Periodically checkpoint the security database log (Enhanced Security)
SYNOPSIS
/usr/tcb/bin/db_checkpoint [-1v] [-h home]
[-k bytes] [-L file] [-p min]
FLAGS
Checkpoint the log once, and then exit. Specify a home directory for the database. The correct directory for enhanced security is
/var/tcb/files. Checkpoint the database at least as often as every kbytes of log file written. Log the execution of the db_checkpoint
utility to the specified file in the following format, where ### is the process ID, and the date is the time the utility starting running.
db_checkpoint: ### Wed Jun 15 01:23:45 EDT 1995
This file is removed if the db_checkpoint utility exits gracefully. Checkpoint the database at least every min minutes. Write the time of
each checkpoint to the standard output.
At least one of the -1, -k and -p options must be specified.
DESCRIPTION
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide high-performance database sup-
port for critical security files. The DB includes full transactional support and database recovery, using write-ahead logging and check-
pointing to record changes.
The db_checkpoint utility is a daemon process that monitors the database log and periodically checkpoints it. Since other database func-
tions also cause checkpoint records to be written to the log, db_checkpoint is normally used as a one-time function to guarantee a check-
point before archiving the database.
The db_checkpoint utility utility attaches to one or more of the Berkeley DB shared memory regions. In order to avoid region corruption,
it should always be given the chance to detach and exit gracefully. To cause db_checkpoint to clean up after itself and exit, send it an
interrupt signal (SIGINT).
The db_checkpoint utility does not attempt to create the Berkeley DB shared memory regions if they do not already exist. The application
which creates the region should be started first, and then, once the region is created, the db_checkpoint utility should be started.
RETURN VALUES
The db_checkpoint utility exits 0 on success, and >0 if an error occurs.
ENVIRONMENT VARIABLES
If the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home. The home
directory for security is /var/tcb/files.
FILES
/var/tcb/files/auth.db
/var/tcb/files/dblogs/*
RELATED INFORMATION
Commands: db_archive(8), db_printlog(8), db_recover(8), db_stat(8), secconfig(8) delim off
db_checkpoint(8)