06-17-2008
extract data from file
Hello again, how do you extract data from a file? I have created a file with PID #s in it, I need to be able to take the PID from each line and kill it. How is this done?
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
My file in ksh consists of message data of varying lengths (lines), separated with headers.
I would like to find a string from this file, and print out the whole message data including the headers.
my plan of attack is to search the strings, print the top header, and print the whole message... (2 Replies)
Discussion started by: apalex
2 Replies
2. Shell Programming and Scripting
Dear All ,
I am posting first time in this forum . Please ignore my mistakes .
I am learning Unix and i need help to extract specific data from file .
1. I want to grep number of fails from log . The file contains "fails" word in line if test cases are failed .
2. The log contains... (20 Replies)
Discussion started by: getdpg
20 Replies
3. Shell Programming and Scripting
I m new to shell scripting & i need a help....
i have file like....
Name := sachin
address:=something
phone:=111
...
Note: There might be or not space between Name & := and between := & sachin. I need to extract the data from each line of file as
var1=Name
value1=sachin
same for... (13 Replies)
Discussion started by: ps_sach
13 Replies
4. Shell Programming and Scripting
I need to create a script to extract some specific data from a file. I locate the file using the find command:
find . -name "rpbol*" -print | xargs grep -li
Once I locate the file I need using the above command, I would like to extract some data from that file. The data is always located... (2 Replies)
Discussion started by: jevaba
2 Replies
5. Shell Programming and Scripting
My input file:
data_5 Ali 422 2.00E-45 102/253 140/253 24
data_3 Abu 202 60.00E-45 12/23 140/23 28
data_1 Ahmad 256 7.00E-45 120/235 140/235 22
data_4 Aman 365 8.00E-45 15/65 140/65 20
data_10 Jones 869 9.00E-45 65/253 140/253 18... (12 Replies)
Discussion started by: patrick87
12 Replies
6. Shell Programming and Scripting
Hello,
Hope you are doing fine. I have been struggling with it for some time now and I would really appreciate your help.
Following is file format:
Currency,Name,Date, Term
USD, ABC, 2011/11/11, T0, S1, S2, S3, S4
, , ,T1, 5.6, 2.3, 6.5, 4.5
, ... (5 Replies)
Discussion started by: srattani
5 Replies
7. Shell Programming and Scripting
Hi, Great minds, I have some files, in fact header files, of CTD profiler, I tried a lot C programming, could not get output as I was expected, because my programming skills are very poor, finally, joined unix forum with the hope that, I may get what I want, from you people,
Here I have attached... (17 Replies)
Discussion started by: nex_asp
17 Replies
8. Shell Programming and Scripting
Hello All,
I have a small xml file which looks like below:
<Check:defaultval Val="crash" value="crash_report_0013
generate_check_0020 generate_check_0022

This is where the fault is."/>
<Check:defaultval Val="crash" value="crash_report_1001
generate_check_1001... (9 Replies)
Discussion started by: suvendu4urs
9 Replies
9. Shell Programming and Scripting
I have a text file that contains the following data. For example, aa.txt has some numbers. I need to extract the continuous numbers(minimum 3 numbers) from it.How can I do this with awk?
>aa.txt
31
35
36
37
38
39
44
169
170
173
174
175
177
206
>1a.txt
39 (5 Replies)
Discussion started by: rahmanabdulla
5 Replies
10. Shell Programming and Scripting
Hi ,
I am having a file which is PIPE delimited like this :
file.txt
aus|start|10:00:00
nz|start|11:00:00
aus|end|10:10:00
us|start|10:00:00
nz|end|11:10:00
us|end|11:00:00
.
.
.
I want to extract an output file like this based on start time and end time for each countries: (9 Replies)
Discussion started by: rohit_shinez
9 Replies
LEARN ABOUT MOJAVE
shlock
SHLOCK(1) BSD General Commands Manual SHLOCK(1)
NAME
shlock -- create or verify a lock file for shell scripts
SYNOPSIS
shlock [-du] [-p PID] -f lockfile
DESCRIPTION
The shlock command can create or verify a lock file on behalf of a shell or other script program. When it attempts to create a lock file, if
one already exists, shlock verifies that it is or is not valid. If valid, shlock will exit with a non-zero exit code. If invalid, shlock
will remove the lock file, and create a new one.
shlock uses the link(2) system call to make the final target lock file, which is an atomic operation (i.e. "dot locking", so named for this
mechanism's original use for locking system mailboxes). It puts the process ID ("PID") from the command line into the requested lock file.
shlock verifies that an extant lock file is still valid by using kill(2) with a zero signal to check for the existence of the process that
holds the lock.
The -d option causes shlock to be verbose about what it is doing.
The -f argument with lockfile is always required.
The -p option with PID is given when the program is to create a lock file; when absent, shlock will simply check for the validity of the lock
file.
The -u option causes shlock to read and write the PID as a binary pid_t, instead of as ASCII, to be compatible with the locks created by
UUCP.
EXIT STATUS
A zero exit code indicates a valid lock file.
EXAMPLES
BOURNE SHELL
#!/bin/sh
lckfile=/tmp/foo.lock
if shlock -f ${lckfile} -p $$
then
# do what required the lock
rm ${lckfile}
else
echo Lock ${lckfile} already held by `cat ${lckfile}`
fi
C SHELL
#!/bin/csh -f
set lckfile=/tmp/foo.lock
shlock -f ${lckfile} -p $$
if ($status == 0) then
# do what required the lock
rm ${lckfile}
else
echo Lock ${lckfile} already held by `cat ${lckfile}`
endif
The examples assume that the file system where the lock file is to be created is writable by the user, and has space available.
HISTORY
shlock was written for the first Network News Transfer Protocol (NNTP) software distribution, released in March 1986. The algorithm was sug-
gested by Peter Honeyman, from work he did on HoneyDanBer UUCP.
AUTHORS
Erik E. Fair <fair@clock.org>
BUGS
Does not work on NFS or other network file system on different systems because the disparate systems have disjoint PID spaces.
Cannot handle the case where a lock file was not deleted, the process that created it has exited, and the system has created a new process
with the same PID as in the dead lock file. The lock file will appear to be valid even though the process is unrelated to the one that cre-
ated the lock in the first place. Always remove your lock files after you're done.
BSD
June 29, 1997 BSD