I have a very large file and each line has a pattern and it is not position specific. I need to extract the string after the pattern
****MI* is the pattern in the red color
12 digit number is the sting value in the green color and it ends with ~
e.g.
... (1 Reply)
Dear All,
I have a file with the syntax below (composed of several <log ..... </log> stanzas)
I need to search this file for a number e.g. 2348022225919, and if it is found in a stanza, copy the whole stanza/section (<log .... </log>) to another output file.
The numbers to search for are... (0 Replies)
Hi All
I have 3 files as listed below and highlighted in bold the portions of the filenames I need to extract:
TOS_TABIN218_20090323.200903231830
TOS_TABIN219_1_20090323.200903231830
TOS_TABIN219_2_20090323.200903231830
I tried
source_tabin_name=`echo $fname | sed 's/_.*//'`
but I... (6 Replies)
Hi All,
I posted something similar before but I now have a another problem.
I have filenames as below
TOP_TABIN240_20090323.200903231830
TOP_TABIN235_1_20090323.200903231830
i need to extract the dates as in bold. Using bash v 3.xx
Im trying to using the print sed command but... (11 Replies)
I have following string in a variable:
str="sstring garbage adfsdf tab.col1 lkad rjfj tab2.col2 adja tab2.col4 garbage"
I want to filter "word.word" pattern from it. I assume the pattern won't occur in start or end of the string. Output shoud be:
tab.col1 tab2.col2 tab2.col4
Can this be... (7 Replies)
Hi,
I want to extract data b/w two words with the help of sed..
Eg: In "Anna said that she would fetch the bucket", I want to display data b/w "Anna" and "would"
O/P: said that she
I have tried with below code, but unable to get desired o/p
echo "Anna said that she would fetch the... (5 Replies)
I am working with the ksh shell in HP UNIX and I am attempting to extract a word, beginning with a particular string and ending at the first space. for example I want to extract the word or string MS_RECENT_ACTIVITY from the following string
" This has been entered in MS_RECENT_ACTIVITY the... (2 Replies)
Hi,
I have the following string and I need to extract the date from it:
TextHere,2012/07/11,1
I tried using sed:
sed -n 's#^.*\({4}/{2}/{2}\).*$#\1#p'
But it doesn't return anything. The following line doesn't even return '2012':
sed -n 's/^.*\({4}\).*$/\1/p'
I used to use grep -o... (6 Replies)
i need to extract the string between two tags,
input file is
<PersonInfoShipTo AddressID="446311709" AddressLine1="" AddressLine2="" AddressLine3="" AddressLine4="" AddressLine5="" AddressLine6="" AlternateEmailID="" Beeper="" City="" Company="" Country="" DayFaxNo="" DayPhone="" Department=""... (5 Replies)
Hi -
i have one file with content as below.
***** BEGIN 123 *****
BASH is awesome
***** END *****
***** BEGIN 365 *****
KSH is awesome
***** END *****
***** BEGIN 157 *****
KSH is awesome
***** END *****
***** BEGIN 7123 *****
C is awesome
***** END *****
I am trying to find all... (4 Replies)
Discussion started by: reldb
4 Replies
LEARN ABOUT CENTOS
ipsec_klipsdebug
IPSEC_KLIPSDEBUG(5) [FIXME: manual] IPSEC_KLIPSDEBUG(5)NAME
ipsec_klipsdebug - list KLIPS (kernel IPSEC support) debug features and level
SYNOPSIS
ipsec klipsdebug
cat/proc/net/ipsec_klipsdebug
DESCRIPTION
/proc/net/ipsec_klipsdebug lists flags that control various parts of the debugging output of KLIPS and MAST, two of the IPsec stacks
supported by Libreswan. At this point it is a read-only file.
A table entry consists of:
+
a KLIPS debug variable
+
a '=' separator for visual and automated parsing between the variable name and its current value
+
hexadecimal bitmap of variable's flags.
The variable names roughly describe the scope of the debugging variable. Currently, no flags are documented or individually accessible yet
except tunnel-xmit.
The variable names are:
tunnel
tunnelling code
netlink
userspace communication code (obsolete)
xform
transform selection and manipulation code
eroute
eroute table manipulation code
spi
SA table manipulation code
radij
radij tree manipulation code
esp
encryptions transforms code
ah
authentication transforms code
rcv
receive code
ipcomp
ip compression transforms code
verbose
give even more information, beware this will probably trample the 4k kernel printk buffer giving inaccurate output
All KLIPS debug output appears as kernel.info messages to syslogd(8). Most systems are set up to log these messages to /var/log/messages.
EXAMPLES
debug_tunnel=00000010.
debug_netlink=00000000.
debug_xform=00000000.
debug_eroute=00000000.
debug_spi=00000000.
debug_radij=00000000.
debug_esp=00000000.
debug_ah=00000000.
debug_rcv=00000000.
debug_pfkey=ffffffff.
means that one tunnel flag has been set (tunnel-xmit), full pfkey sockets debugging has been set and everything else is not set.
FILES
/proc/net/ipsec_klipsdebug, /usr/local/bin/ipsec
SEE ALSO ipsec(8), ipsec_manual(8), ipsec_tncfg(8), ipsec_eroute(8), ipsec_spi(8), ipsec_spigrp(8), ipsec_klipsdebug(5), ipsec_version(5),
ipsec_pf_key(5)HISTORY
Written for the Linux FreeS/WAN project <http://www.freeswan.org/> by Richard Guy Briggs.
[FIXME: source] 10/06/2010 IPSEC_KLIPSDEBUG(5)