12-17-2009
Call lsof once, save its output, and check its output for the files you want. You could also craft a fixed list of files to avoid. Or simply send the services that refuse to give up their log files a signal to reopen them after.
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
On my application there are lots of users are doing there work or tasks? ...In my SSH or in 'Putty' i am observing logs?
Hot to observe one particular 'user' logs.. even through there are lots of users working on it?
For EX: i am log in with use rid:nikhil@in.com. another one log in with... (4 Replies)
Discussion started by: ksr.test
4 Replies
2. Shell Programming and Scripting
Does anyone have a good script to move log files from a cron?
There are a lot of logs, about 100 or more and they are constantly
being written too. (7 Replies)
Discussion started by: photon
7 Replies
3. Shell Programming and Scripting
Hi people,
i need you help on this if you can.
I have a script that does the move command when it searches for a that doesn't match the pattern. This Pattern is on a list.
When it run's and doesn´t found no files but it haves 2 more folders it moves the folders too.
Ex:... (1 Reply)
Discussion started by: osramos
1 Replies
4. Programming
I'm programming in C with lots of sockets, (asynchronous handling), and for a while it goes ok, but after a while it starts to hang, or not get complete connections anymore.
checking my router, i see that i get nat tables overflow and even my DNS cacher seems to be having serious issues...
... (4 Replies)
Discussion started by: alien999999999
4 Replies
5. Solaris
Hi,
I installed solaris 10 x86 on my local system. it was working fine. today when i started the system, it started up without any problem. when i tried to open the terminal it didn't open any terminal.
Plz help me (0 Replies)
Discussion started by: malikshahid85
0 Replies
6. Shell Programming and Scripting
Hi
I have to list of words file1 and file2, I want to compare both lists and remove from file2 all the words that don't exist in file1.
How can I do this?
Many thanks (4 Replies)
Discussion started by: noliveira
4 Replies
7. Shell Programming and Scripting
Hello Experts,
I need to write a shell script to check if a file is open and something is being written to it. I want to know how OS handles it. I checked with lsof command but it is not working. For a test I did this.
while true; do echo `date` >>abc.txt; done
then I checked
lsof |... (5 Replies)
Discussion started by: shekhar_4_u
5 Replies
8. Shell Programming and Scripting
Appreciate help for the below issue.
Im using below code.....I dont want to attach the logs when I ran the perl twice...I just want to take backup with today date and generate new logs...What I need to do for the below scirpt..............
1)if logs exist it should move the logs with extention... (1 Reply)
Discussion started by: Sanjeev G
1 Replies
9. Shell Programming and Scripting
Hi,
I have a text file with thousands of questions in it. Each question (multiple lines) with multiple choice options, Answer and Explanation (optional). I need to delete Answer & explanation parts for all Questions and insert a blank line before net question. Each question starts with NO.
I... (4 Replies)
Discussion started by: prvnrk
4 Replies
LEARN ABOUT OSF1
db_checkpoint
db_checkpoint(8) System Manager's Manual db_checkpoint(8)
NAME
db_checkpoint - Periodically checkpoint the security database log (Enhanced Security)
SYNOPSIS
/usr/tcb/bin/db_checkpoint [-1v] [-h home]
[-k bytes] [-L file] [-p min]
FLAGS
Checkpoint the log once, and then exit. Specify a home directory for the database. The correct directory for enhanced security is
/var/tcb/files. Checkpoint the database at least as often as every kbytes of log file written. Log the execution of the db_checkpoint
utility to the specified file in the following format, where ### is the process ID, and the date is the time the utility starting running.
db_checkpoint: ### Wed Jun 15 01:23:45 EDT 1995
This file is removed if the db_checkpoint utility exits gracefully. Checkpoint the database at least every min minutes. Write the time of
each checkpoint to the standard output.
At least one of the -1, -k and -p options must be specified.
DESCRIPTION
A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide high-performance database sup-
port for critical security files. The DB includes full transactional support and database recovery, using write-ahead logging and check-
pointing to record changes.
The db_checkpoint utility is a daemon process that monitors the database log and periodically checkpoints it. Since other database func-
tions also cause checkpoint records to be written to the log, db_checkpoint is normally used as a one-time function to guarantee a check-
point before archiving the database.
The db_checkpoint utility utility attaches to one or more of the Berkeley DB shared memory regions. In order to avoid region corruption,
it should always be given the chance to detach and exit gracefully. To cause db_checkpoint to clean up after itself and exit, send it an
interrupt signal (SIGINT).
The db_checkpoint utility does not attempt to create the Berkeley DB shared memory regions if they do not already exist. The application
which creates the region should be started first, and then, once the region is created, the db_checkpoint utility should be started.
RETURN VALUES
The db_checkpoint utility exits 0 on success, and >0 if an error occurs.
ENVIRONMENT VARIABLES
If the -h option is not specified and the environment variable DB_HOME is set, it is used as the path of the database home. The home
directory for security is /var/tcb/files.
FILES
/var/tcb/files/auth.db
/var/tcb/files/dblogs/*
RELATED INFORMATION
Commands: db_archive(8), db_printlog(8), db_recover(8), db_stat(8), secconfig(8) delim off
db_checkpoint(8)