06-12-2008
Data mining a text file.
I'm auditing UID consistency across our hosts, and have created the following datafile, consisting of four fields. I would like to get a count of the combination of the last two fields. ie: I would like to find out how many instances there are of "root 0" and how many of "uucp 5", for every line in the file. I know basic perl and basic awk, but can't get my head around how to do this.
Can anyone offer advice?
thank you in advance
akbar
UID: crfw root 0
UID: crfw daemon 1
UID: crfw bin 2
UID: crfw sys 3
UID: crfw adm 4
UID: crfw lp 71
UID: crfw uucp 5
UID: crfw nuucp 9
UID: crfw smmsp 25
UID: crfw listen 37
UID: crfw gdm 50
UID: crfw webservd 80
UID: crfw nobody 60001
UID: crfw noaccess 60002
UID: creb root 0
UID: creb daemon 1
UID: creb bin 2
UID: creb sys 3
UID: creb adm 4
UID: creb lp 71
UID: creb uucp 5
UID: creb nuucp 9
UID: creb smmsp 25
UID: creb listen 37
UID: creb gdm 50
UID: creb webservd 80
UID: creb nobody 60001
UID: creb noaccess 60003
4 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi ,
a:) i have configuration file with pattren
<Range start no>,<Range end no>,<type of records to be extracted from the data file>,<name of the file to store output>
eg:
myfile.confg
9899000000,9899999999,DATA,b.dat
9899000000,9899999999,SMS,a.dat
b:) Stucture of my data file is... (3 Replies)
Discussion started by: suparnbector
3 Replies
2. Shell Programming and Scripting
OK I will do my best to explain what I need help with.
I am trying to format an ldif file so I can import it into Oracle oid.
I need the file to look like this example. Keep in mind there are 3000 of these in the file.
changetype: modify
replace: userpassword
dn:... (0 Replies)
Discussion started by: timothyha22
0 Replies
3. Shell Programming and Scripting
I have a .kml file. So I want filter the .kml to get only the tags that have this numeric codes that they are in a text file
11951
11952
74014
11964
11965
11969
11970
11971
11972
60149
74018
74023
86378
11976
11980
11983
11984
11987 (5 Replies)
Discussion started by: pcoj33
5 Replies
4. Shell Programming and Scripting
Hi,
I need to compare 2 text files with around 60000 rows and 1 column. I need to compare these and write the mismatch data to 3rd file.
File1 - file2 = file3
wc -l file1.txt
58112
wc -l file2.txt
55260
head -5 file1.txt
101214200123
101214700300
101250030067
101214100500... (10 Replies)
Discussion started by: Divya Nochiyil
10 Replies
LEARN ABOUT LINUX
user-keyring
USER-KEYRING(7) Linux Programmer's Manual USER-KEYRING(7)
NAME
user-keyring - per-user keyring
DESCRIPTION
The user keyring is a keyring used to anchor keys on behalf of a user. Each UID the kernel deals with has its own user keyring that is
shared by all processes with that UID. The user keyring has a name (description) of the form _uid.<UID> where <UID> is the user ID of the
corresponding user.
The user keyring is associated with the record that the kernel maintains for the UID. It comes into existence upon the first attempt to
access either the user keyring, the user-session-keyring(7), or the session-keyring(7). The keyring remains pinned in existence so long as
there are processes running with that real UID or files opened by those processes remain open. (The keyring can also be pinned indefi-
nitely by linking it into another keyring.)
Typically, the user keyring is created by pam_keyinit(8) when a user logs in.
The user keyring is not searched by default by request_key(2). When pam_keyinit(8) creates a session keyring, it adds to it a link to the
user keyring so that the user keyring will be searched when the session keyring is.
A special serial number value, KEY_SPEC_USER_KEYRING, is defined that can be used in lieu of the actual serial number of the calling
process's user keyring.
From the keyctl(1) utility, '@u' can be used instead of a numeric key ID in much the same way.
User keyrings are independent of clone(2), fork(2), vfork(2), execve(2), and _exit(2) excepting that the keyring is destroyed when the UID
record is destroyed when the last process pinning it exits.
If it is necessary for a key associated with a user to exist beyond the UID record being garbage collected--for example, for use by a
cron(8) script--then the persistent-keyring(7) should be used instead.
If a user keyring does not exist when it is accessed, it will be created.
SEE ALSO
keyctl(1), keyctl(3), keyrings(7), persistent-keyring(7), process-keyring(7), session-keyring(7), thread-keyring(7),
user-session-keyring(7), pam_keyinit(8)
Linux 2017-03-13 USER-KEYRING(7)