I am not sure what is wrong with my output. It is the output that I want.
Quote:
src ip dest ip #of flows total bytes
192.168.6.0 88.0.33.2 12 128
192.168.6.0 88.0.33.2 1 168
192.168.6.0 111.22.35.0 2 364
192.168.5.0 88.0.33.2 1 125
.....I want to count the unique destination, total flows and total bytes per sorce ip. The output that I want it to be is this
192.168.6.0 2 15 660
192.168.5.0 1 1 125
.....
From here, source 192.168.6.0 has 2 unique destination (88.0.33.22 and 111.22.35.0). and total of the flows is 12 (12+1+2) and total bytes 660 (128+168+364). So. from your code, I am trying to fit with my code. I am using awk -f count.awk. This are the lines in the count.awk file.
Code:
{src[$1,$2]++
total[$1,$2]=total[$1,$2]+$3
bytes[$1,$2]=bytes[$1,$2]+$4
}
END{
for (i in src) print src " " src[i] "\t" total[i] "\t" bytes[i]
}
However, I got an error said that the src array is an illegal reference. Please help me. Need to solve this problem
Hi all,
I have some doubts in selecting the interface to transfer packets and receive the packets.
--> Multiple interfaces :
--------------------
1) 0.0.0.0 --------> wild card address.
2) x.x.x.x --------> valid address.(192.168.1.156)
3) ff.ff.ff.ff -------->... (0 Replies)
Move all files starting with a specific name to different directory.
This shell script program should have three parameters
File Name
Source Directory
Destination Directory
User should be able to enter ‘AB_CD*' in file name parameter. In this case all the files starting with AB_CD will... (1 Reply)
I'd like to specify a different build and deployment path for files, by default the same path is used for both build and install, I wasn't able to find a way to make these different. With Solaris pkgadd, one can specify different paths in prototype, so I would assume something like that is possible... (0 Replies)
Hi Everyone,
I am using solaris 10.I am facing a different problem here with tlsftp.I have intalled all steps for tlsftp and able to connect to the destination server from the source server.It worked for some days.But recently when i am connectin it is giving below error.I am... (0 Replies)
hi All,
i have 2 server setup now for Rsync, i configured Rsync on both of the server and it worked well when i did run from source to destination. and while running back from destination to source it produced this error:
bash-3.2$ ksh rsync_bravo_db.ksh usa0300uz1247.apps.mc.xerox.com... (0 Replies)
hi All, Any one answer my requirement.
I have source location
src_dir="/home/oracle/arun/IRMS-CM"
My Target location
dest_dir="/home/oracle/arun/LiveLink/IRMS-CM/$dc/$pc/$ct"
my source text files check with below example.text file content
$fn "\t" $dc "\t" $pc "\t" ... (3 Replies)
Hi Guys,
how to count number of files successfully copied while coping files from source to destination path
ex:10 files from source to target location copying
if 8 files copied successfully then
echo successfully copied=8
failure=2 files
if two files get error to coping files from... (23 Replies)
Is there a way to find out all the ports open between source IP & destination IP in any way ? (12 Replies)
Discussion started by: UnknownGuy
12 Replies
LEARN ABOUT REDHAT
strcpy
STRCPY(3) Linux Programmer's Manual STRCPY(3)NAME
strcpy, strncpy - copy a string
SYNOPSIS
#include <string.h>
char *strcpy(char *dest, const char *src);
char *strncpy(char *dest, const char *src, size_t n);
DESCRIPTION
The strcpy() function copies the string pointed to by src (including the terminating ` ' character) to the array pointed to by dest. The
strings may not overlap, and the destination string dest must be large enough to receive the copy.
The strncpy() function is similar, except that not more than n bytes of src are copied. Thus, if there is no null byte among the first n
bytes of src, the result will not be null-terminated.
In the case where the length of src is less than that of n, the remainder of dest will be padded with nulls.
RETURN VALUE
The strcpy() and strncpy() functions return a pointer to the destination string dest.
BUGS
If the destination string of a strcpy() is not large enough (that is, if the programmer was stupid/lazy, and failed to check the size
before copying) then anything might happen. Overflowing fixed length strings is a favourite cracker technique.
CONFORMING TO
SVID 3, POSIX, BSD 4.3, ISO 9899
SEE ALSO bcopy(3), memccpy(3), memcpy(3), memmove(3)GNU 1993-04-11 STRCPY(3)