01-27-2012
Grep command to return all the lines between one matched pattern to another.
14:15:00-
abcdefghijkl.
14:30:00-
abcdefghijkl.
14:35:00-
abcdefghijkl.
123456789.
123456789.
14:45:00-
abcdefghijkl.
14:50:00-
abcdefghijkl.
123456789.
15:30:00-abcdefghijkl.
16:00:00-abcdefghijkl.
The log file has timestamp when it is appended.Now I want a command that returns all the lines between14:30:00 to 15:30:00. That means I want to check all the logs stored in this time range.Grep command is preferable,anything else will do as well.Thanks
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi all,
I have the following data in a file x.csv:
> ,this is some text here
> ,,,,,,,,,,,,,,,,2006/11/16,0.23
> ,,,,,,,,,,,,,,,,2006/12/16,0.88
< ,,,,,,,,,,,,,,,,this shouldnt be deleted
I need to use SED to match anything with a > in the line and delete that line, can someone help... (7 Replies)
Discussion started by: not4google
7 Replies
2. Shell Programming and Scripting
frnd,
Is there any way to print only the string that matched the pattern instead printing the whole line?
thanks in advance. (3 Replies)
Discussion started by: clx
3 Replies
3. Shell Programming and Scripting
Hi
I have a myfile.txt contains the following:
CONTEXT {
AAAAA
}
...
CONTEXT {
BBBBB
}
I want to extract the lines in between CONTEXT { ... }, one by one.
Hence I wrote a command like the following,
sed -n '/^CONTENT/,/^}/ {
w a.txt
}' myfile.txt
The problem with this... (5 Replies)
Discussion started by: hezjing
5 Replies
4. Shell Programming and Scripting
I have an ugly conf file that has the string I'm interested in searching for in the middle of a block of code that's relevant, and I'm trying to find a way to remove that entire block based on the matched line.
I've googled for this problem, and most people helping are only interested in... (9 Replies)
Discussion started by: tamale
9 Replies
5. Shell Programming and Scripting
would like to print word between matched patterns using sed
for example :
create INDEX SCOTT.OR_PK ON table_name(....)
would like to print between SCOTT. and ON which is OR_PK
Please help me out
Thanks (4 Replies)
Discussion started by: jhonnyrip
4 Replies
6. Solaris
For example a log file looks like below-
13:30:00-
abcdefghijklhjghjghjhskj.
abcdefghijkl.
14:15:00-
abcdefghijkl.
14:30:00-
abcdefghijkl.
14:35:00-
abcdefghijkl.
123456789.
123456789.
14:45:00-
abcdefghijkl. (0 Replies)
Discussion started by: dev_shivv
0 Replies
7. Linux
Hi all,
I have a text data file. My aim here is to find line called *FIELD* AV for every record and print lines after that till *FIELD* RF. But here I want first 3 to four lines for very record as well. FIELD AV is some where in between for very record. SO I am not sure how to retrieve lines in... (2 Replies)
Discussion started by: kaav06
2 Replies
8. Shell Programming and Scripting
Hi,
i need help to delete all the lines between 2 matched patterns and the first pattern must be deleted too. sample as follows:
inputfile.txt
>kump_1
...........................
...........................
>start_0124
dgfhghgfh
fgfdgfh
fdgfdh
>kump_2
............................. (7 Replies)
Discussion started by: redse171
7 Replies
9. Shell Programming and Scripting
hello everyone,
im new here, and also programming with awk, sed and grep commands on linux.
In my text i have many lines with this config:
1 1 4 3 1 1 2 5
2 2 1 1 1 3 1 2
1 3 1 1 1 2 2 2
5 2 4 1
3 2 1 1 4 1 2 1
1 1 3 2 1 1 5 4
1 3 1 1... (3 Replies)
Discussion started by: satir
3 Replies
10. Shell Programming and Scripting
Hello.
Question 1 :
I want to comment out all lines of a cron file which are not already commented out for each full path pattern matched.
Example 1 nothing to do because line is already commented out; pattern = '/usr/bin/munin-cron'
# */5 * * * * munin test -x... (3 Replies)
Discussion started by: jcdole
3 Replies
LEARN ABOUT MOJAVE
request-key.conf
REQUEST-KEY.CONF(5) Linux Key Management Utilities REQUEST-KEY.CONF(5)
NAME
request-key.conf - Instantiation handler configuration file
DESCRIPTION
This file is used by the /sbin/request-key program to determine which program it should run to instantiate a key.
request-key works scans through the file a line at a time until it finds a match, which it will then use. If it doesn't find a match, it'll
return an error and the kernel will automatically negate the key.
Any blank line or line beginning with a hash mark '#' is considered to be a comment and ignored.
All other lines are assumed to be command lines with a number of white space separated fields:
<op> <type> <description> <callout-info> <prog> <arg1> <arg2> ...
The first four fields are used to match the parameters passed to request-key by the kernel. op is the operation type; currently the only
supported operation is "create".
type, description and callout-info match the three parameters passed to keyctl request2 or the request_key() system call. Each of these may
contain one or more asterisk '*' characters as wildcards anywhere within the string.
Should a match be made, the program specified by <prog> will be exec'd. This must have a fully qualified path name. argv[0] will be set
from the part of the program name that follows the last slash '/' character.
If the program name is prefixed with a pipe bar character '|', then the program will be forked and exec'd attached to three pipes. The
callout information will be piped to it on it's stdin and the intended payload data will be retrieved from its stdout. Anything sent to
stderr will be posted in syslog. If the program exits 0, then /sbin/request-key will attempt to instantiate the key with the data read from
stdout. If it fails in any other way, then request-key will attempt to execute the appropriate 'negate' operation command.
The program arguments can be substituted with various macros. Only complete argument substitution is supported - macro substitutions can't
be embedded. All macros begin with a percent character '%'. An argument beginning with two percent characters will have one of them dis-
carded.
The following macros are supported:
%o Operation type
%k Key ID
%t Key type
%d Key description
%c Callout information
%u Key UID
%g Key GID
%T Requestor's thread keyring
%P Requestor's process keyring
%S Requestor's session keyring
There's another macro substitution too that permits the interpolation of the contents of a key:
%{<type>:<description>}
This performs a lookup for a key of the given type and description on the requestor's keyrings, and if found, substitutes the contents for
the macro. If not found an error will be logged and the key under construction will be negated.
EXAMPLE
A basic file will be installed in the /etc. This will contain two debugging lines that can be used to test the installation:
create user debug:* negate /bin/keyctl negate %k 30 %S
create user debug:loop:* * |/bin/cat
create user debug:* * /usr/share/keyutils/request-key-debug.sh %k %d %c %S
negate * * * /bin/keyctl negate %k 30 %S
This is set up so that something like:
keyctl request2 user debug:xxxx negate
will create a negative user-defined key, something like:
keyctl request2 user debug:yyyy spoon
will create an instantiated user-defined key with "Debug spoon" as the payload, and something like:
keyctl request2 user debug:loop:zzzz abcdefghijkl
will create an instantiated user-defined key with the callout information as the payload.
FILES
/etc/request-key.conf
SEE ALSO
keyctl(1), request-key.conf(5)
Linux 11 July 2005 REQUEST-KEY.CONF(5)