04-14-2011
filtering print output
I have these data below and i want my output to print only the 3rd files. For example, in /opt/home/nyfix/.k5login, i want to print only "nyfix".
/opt/home/nyfix/.k5login
/opt/home/security/.k5login
/opt/home/noc/.k5login
what is the appropriate command in shell scripting ?
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
i'd like to grep a range of ports on a netstat -nt output, localaddress, say :1 to :1023. how do i do it via sed/awk/grep?
Thanks,
Marc (1 Reply)
Discussion started by: marcpascual
1 Replies
2. Shell Programming and Scripting
We have a program which create sar output files which has a weeks data...
To read file we use sar -f sa15 command which has multiple days data( a weeks data)....we need to only get last 48 hours data and email it to different users....
I guess we can use combination of sar -o or even awk.... (3 Replies)
Discussion started by: noorm
3 Replies
3. Shell Programming and Scripting
The output of
du -b file* | awk '{print $1}'
is:
1501090
1500538
I want the result to be a sum of this column. ie the o/p should be
3001628
Any idea? (3 Replies)
Discussion started by: xs2punit
3 Replies
4. Shell Programming and Scripting
Hello,
II did a grep and got a lot of values
i.e
aa bb cc dd ee
and i want to print first only aa and afterward only bb etc...
help! (8 Replies)
Discussion started by: LiorAmitai
8 Replies
5. Shell Programming and Scripting
Hi All,
I have around 900 Select Sql's which I would like to run in an awk script and print the output of those sql's in an txt file.
Can you anyone pls let me know how do I do it and execute the awk script? Thanks. (4 Replies)
Discussion started by: adept
4 Replies
6. Shell Programming and Scripting
Hi Team,
I have input file like below.
UNDEF :
SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION : PROCR_CREATE_SUB_KEY, OTHER_PERMISSION : PROCR_READ, USER_NAME : oracle, GROUP_NAME : dba}
UNDEF :
SECURITY : {USER_PERMISSION : PROCR_ALL_ACCESS, GROUP_PERMISSION :... (4 Replies)
Discussion started by: kamauv234
4 Replies
7. UNIX for Dummies Questions & Answers
hi guys, i have a long output and cant figure out a flexible way to show the meta members from a device. please help. some device have 2,4 or 8 meta members but for this example i have 4 meta members, what is a flexible way to pull them out from this output? need your inputs thanks.
... (4 Replies)
Discussion started by: prodigy06
4 Replies
8. UNIX for Dummies Questions & Answers
Hi All,
I have a input file as below. Input file may contain more hostlists.
sample Input file
$ cat hostlist.lst
cs18-db1-1-sjl
cs22-db1-1-was
na88-db1-1-chi
na21-db1-2-was
I want the output like below format. Pls help. Thanks !
Output format:
... (4 Replies)
Discussion started by: kamauv234
4 Replies
9. Shell Programming and Scripting
Hi,
I have this command on my linux jmap -heap $pid | grep '%\|:' the output of which is like below:
I need a smart way to check if any of these memory usage crosses 95%, 90% and 85% i need to triggerAlert accordingly.
I know how to trigger email alerts however I need a good way to... (3 Replies)
Discussion started by: mohtashims
3 Replies
10. UNIX for Beginners Questions & Answers
Hi All,
I am trying to collect the listen ports info from netstat command in centos 7
From that info i am trying to collect all the foreign address IP for those ports.
I am using below script to do the same.
netstat -an |grep -w "LISTEN" |grep -v "127.0.0.1" |awk '{print $4}' >... (3 Replies)
Discussion started by: sravani25
3 Replies
LEARN ABOUT REDHAT
k5login
.K5LOGIN(5) File Formats Manual .K5LOGIN(5)
NAME
.k5login - Kerberos V5 acl file for host access.
DESCRIPTION
The .k5login file, which resides in a user's home directory, contains a list of the Kerberos principals. Anyone with valid tickets for a
principal in the file is allowed host access with the UID of the user in whose home directory the file resides. One common use is to place
a .k5login file in root's home directory, thereby granting system administrators remote root access to the host via Kerberos.
EXAMPLES
Suppose the user "alice" had a .k5login file in her home directory containing the following line:
bob@FUBAR.ORG
This would allow "bob" to use any of the Kerberos network applications, such as telnet(1), rlogin(1), rsh(1), and rcp(1), to access alice's
account, using bob's Kerberos tickets.
Let us further suppose that "alice" is a system administrator. Alice and the other system administrators would have their principals in
root's .k5login file on each host:
alice@BLEEP.COM
joeadmin/root@BLEEP.COM
This would allow either system administrator to log in to these hosts using their Kerberos tickets instead of having to type the root pass-
word. Note that because "bob" retains the Kerberos tickets for his own principal, "bob@FUBAR.ORG", he would not have any of the privileges
that require alice's tickets, such as root access to any of the site's hosts, or the ability to change alice's password.
SEE ALSO
telnet(1), rlogin(1), rsh(1), rcp(1), ksu(1), telnetd(8), klogind(8)
.K5LOGIN(5)