Hi all,
I have a file with lines written somewhat like this.
aaaa
ccc
aa
linux
browse = no
xssxw
cdcedc
dcsdcd
csdw
police
dwed
dwd
browse = no
cdecec (2 Replies)
How do I replace only if the keyword is at the begining of a line?
Code:
--
a = “This is a print statement”
print a
--
What if I want to replace print by #print only in the second line i.e only if the line starts with that keyword.
Please help me out. I'm new to SED.
-----Post... (5 Replies)
hi dudes;
this is my file.txt:20101228-180436_Down
a 1
b 2
...
20101228-190436_Rollback
a 1 40
e 3 20
...
20101228-180436_Down
c 2
f 2
c 1
...
and i have a down.txt:a 1 aa 2 30 bb 1 40
b 2 ab 3 10
c 3 cd 4 50 ac 2 20
c 3 ad 1 0 (2 Replies)
I have a file that has the words I want to find in other files (but lets say I just want to find my words in a single file). Those words are IDs, so if my word is ZZZ4, outputs like aaZZZ4, ZZZ4bb, aaZZZ4bb, ZZ4, ZZZ, ZyZ4, ZZZ4.8 (or anything like that) WON'T BE USEFUL.
I need the whole word... (6 Replies)
Hi friends,
i just want to know the command though which i can get the next word which comes just after a particluar keyword. For example:
suppose text.out is file which contains a pl/sql procedure . i want to find out the word which falls just after the "table1" keyword.
Thank... (7 Replies)
How to catch a two word keyword which may contain a new line(may include spaces or tab) in it.
for example there is a file a.txt.
$more a.txt
create view
as
(select from
.........
..........
( select
....
(
select
......
..
select only no (((
number
( select
end (12 Replies)
Hi
I want to implement something like this:
if( keyword1 exists)
then
check if(keyword2 exists in the same line)
then replace keyword 2 with New_Keyword
else
Add New_Keyword at the end of line
end if
eg:
Check for Keyword JUNGLE and add/replace... (7 Replies)
Hi Everyone,
Need help in extracting the hostname from the below output.
Expected output:
DS-TESTB-GDS-1.TEST.ABC.COM
DS-TESTB-GDS-2.TEST.ABC.COM
....
...
/tmp $ cat -n /tmp/patchreport
1 /usr/bin/perl /admin/bin/patch/applyPatches.pl --apply_patches... (4 Replies)
I have a file where every line includes four expressions with a caret in the middle (plus some other "words" or fields, always separated by spaces). I would like to extract from this file, all those lines such that each of the four expressions containing a caret appears in at least four different... (9 Replies)
I have a csv file as shown below,
xop_thy 80 avr_njk 50 str_nyu 60
avr_irt 70 str_nhj 60 avr_ngt 50
str_tgt 80 xop_nmg 50 xop_nth 40
cyv_gty 40 cop_thl 40 vir_tyk 80
vir_plo 20 vir_thk 40 ijk_yuc 70
cop_thy 70 ijk_yuc 80 irt_hgt 80
I need to align/sort the csv file based... (7 Replies)
Discussion started by: dineshkumarsrk
7 Replies
LEARN ABOUT DEBIAN
rapolicy
RAPOLICY(1) General Commands Manual RAPOLICY(1)NAME
rapolicy - compare a argus(8) data file/stream against a Cisco Access Control List.
COPYRIGHT
Copyright (c) 2000-2003 QoSient. All rights reserved.
SYNOPSIS
rapolicy -r argus-file [ra options]
DESCRIPTION
Rapolicy reads argus data from an argus-file list, and tests the argus data stream against a Cisco access control list configuration file,
printing out records that represent activity that would violate the policy. Rapolicy can be used to indicate access control violations, as
well as test new access control definitions prior to installing them in a router.
OPTIONS
Rapolicy, like all ra based clients, supports a large number of options. Options that have specific meaning to rapolicy are:
-f <Cisco ACL file> Print records that violate the policy.
-D 0 (default) Print records that violate the policy.
-D 1 Print records and the violated ruleset.
-D 2 Print all records and the ruleset that matched.
See ra(1) for a complete description of ra options.
EXAMPLE INVOCATION
rapolicy -r argus.file
CISCO ACL SYNTAX
There does not seem to be authoritative Cisco-ACL-Documentation, nor ACL syntax standardization. Because Cisco has been know to improve
its ACL rules syntax, rapolicy is known to work with Cisco ACL router defintions up to July, 2002.
A Cisco ACL configuration file consists of a collection of any number of ACL statements, each on a separte line. The syntax of an ACL
statement is:
ACL = "access-list" ID ACTION PROTOCOL SRC DST NOTIFICATION
ID = Number
ACTION = permit | deny
PROTO = protocol name | protocol number
SRC | DST = ADDRESS [PORTMATCH]
ADDRESS = any | host HOSTADDR | HOSTADDR HOSTMASK
HOSTADDR = ipV4 address
HOSTMASK = matching-mask
PORTMATCH = PORTOP PORTNUM | range PORTRANGE
PORTOP = eq | lt | gt | neq | established
PORTRANGE = PORTNUM PORTNUM
PORTNUM = TCP or UDP port value (unsigned decimal from 0 to 65535)
EXAMPLE CONFIGURATION
This example Cisco Access Control List configuration is provided as an example only. No effort has been made to verify that this example
Access Control List enforces a useful access control policy of any kind.
#allow www-traffic to webserver
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 80
#allow ftp control connection to server
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 21
#allow normal ftp
access-list 102 permit tcp any 193.174.13.99 0.0.0.0 eq 20
#allow ftp passive conncetions in portrange 10000 to 10500
access-list 102 permit tcp any host 193.174.13.99 range 10000 10500
#dummy example
access-list 102 permit tcp host 193.174.13.1 eq 12345 host 193.174.13.2 range 12345 23456
#deny the rest
access-list 102 deny tcp any any
#same thing in other words:
access-list 102 deny tcp 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
AUTHORS
Carter Bullard (carter@qosient.com).
Olaf Gellert (gellert@pca.dfn.de).
SEE ALSO ra(1), rarc(5), argus(8)
22 July 2002 RAPOLICY(1)