03-01-2012
If the user selects a grouping field, would a grep be sufficient?
Can you give us some examples of what the user could select?
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi all,
I have a problem where i have several files in a directory which I SCP from a server to my local machine and i would like to periodically tar/gzip them based on their naming convention.
Here is the scenario:
I SCP files (which all end with the same ending) periodically across to a... (3 Replies)
Discussion started by: muay_tb
3 Replies
2. Shell Programming and Scripting
Hello Friends,
I have .tar files which exists under different directories after the below code is run:
find . -name "*" -type f -print | grep .tar > tmp.txt
cat tmp.txt
./dir1/subdir1/subdir2/database-db1_28112009.tar
./dir2/subdir3/database-db2_28112009.tar... (2 Replies)
Discussion started by: EAGL€
2 Replies
3. Shell Programming and Scripting
Hi,
i want to compare two files by one field say $3 in file1 needs to compare with $2 in file2.
sample file1 - reqd_charge_code
2263881188,24570896,439
2263881964,24339077,439
2263883220,22619162,228
2263884224,24631840,442
2263884246,22612161,442
sample file2 - rg_j
... (2 Replies)
Discussion started by: raghavendra.cse
2 Replies
4. Shell Programming and Scripting
I have a file, which is really large but i shortened it:
A3059GVS 1 A 01 Plate_1 40 25.37016 14.6298
A3059GVS 2 A 01 Plate_2 40 26.642002 13.3583
A3059GVS 3 A 02 Plate_1 40 25.381462 ... (4 Replies)
Discussion started by: mykey242
4 Replies
5. Shell Programming and Scripting
Hi everybody (first time posting here)
I have a file1 that looks like >
1,101,0.1,0.1
1,26,0.1,0.1
1,3,0.1,0.1
1,97,0.5,0.5
1,98,8.1,0.218919
1,99,6.2,0.248
2,101,0.1,0.1
2,24,3.1,0.147619
2,25,23.5,0.559524
2,26,34,0.723404with 762 lines..
I have another 'similar' file2 >
... (10 Replies)
Discussion started by: murpholinox
10 Replies
6. UNIX for Dummies Questions & Answers
Please help me to find out maximum value of a field based on grouping of other fields, as we do in SQL.
Like in SQL if we are having below records :
Client_Name Associate_Name Date1 Value
C1111 A1111 2012-01-17 10
C1111 A1111 ... (1 Reply)
Discussion started by: KamalKumarKalra
1 Replies
7. Shell Programming and Scripting
Hi,
I need the most efficient way of comparing the following and arriving at the result
I have a file which has entries like,
File1:
1|2|5|7|8|2|3|6|3|1
File2:
1|2|3|1|2|7|9|2
I need to compare the entries in these two file with those of a general file,
1|2|3|5|2|5|6|9|3|1... (7 Replies)
Discussion started by: pradebban
7 Replies
8. Shell Programming and Scripting
I have my log file as below
00:18:02 - Nothing normal; Garbage Collection kicked off & running from last 3 min...
00:19:02 - Nothing normal; Garbage Collection kicked off & running from last 4 min...
00:19:02 - Nothing normal; Garbage Collection kicked off & running from last 4 min...... (11 Replies)
Discussion started by: manas_ranjan
11 Replies
9. Shell Programming and Scripting
I have this Requirement where i have to group the files,
I have a folder say "temp" where many files resides...files are like this;
010020001_S-ABC-Sort-DEFAW_YYYYMMDD_HHMMSS.txt
010020004_S-PQR-Sort-DRTON_YYYYMMDD_HHMMSS.txt
010020009_S-JKL-Sort_MNOLO_YYYYMMDD_HHMMSS.txt... (8 Replies)
Discussion started by: gnnsprapa
8 Replies
10. UNIX for Beginners Questions & Answers
Hi,
Below are the sample files. x.txt is from an Excel file that is a list of users from Windows and y.txt is a list of database account.
$ head -500 x.txt y.txt
==> x.txt <==
TEST01 APP_USER_PROFILE
USER03 APP_USER_PROFILE
TEST02 APP_USER_EXP_PROFILE
TEST04 APP_USER_PROFILE
USER01 ... (3 Replies)
Discussion started by: newbie_01
3 Replies
PWCK(1) General Commands Manual PWCK(1)
NAME
pwck - verify integrity of password files
SYNOPSIS
pwck [-sr] [passwd shadow]
DESCRIPTION
pwck verifies the integrity of the system authentication information. All entries in the /etc/passwd and /etc/shadow are checked to see
that the entry has the proper format and valid data in each field. The user is prompted to delete entries that are improperly formatted or
which have other incorrectable errors.
Checks are made to verify that each entry has
- the correct number of fields
- a unique user name
- a valid user and group identifier
- a valid primary group
- a valid home directory
- a valid login shell
The checks for correct number of fields and unique user name are fatal. If the entry has the wrong number of fields, the user will be
prompted to delete the entire line. If the user does not answer affirmatively, all further checks are bypassed. An entry with a dupli-
cated user name is prompted for deletion, but the remaining checks will still be made. All other errors are warning and the user is
encouraged to run the usermod command to correct the error.
The commands which operate on the /etc/passwd file are not able to alter corrupted or duplicated entries. pwck should be used in those
circumstances to remove the offending entry.
OPTIONS
By default, pwck operates on the files /etc/passwd and /etc/shadow. The user may select alternate files with the passwd and shadow parame-
ters. Additionally, the user may execute the command in read-only mode by specifying the -r flag. This causes all questions regarding
changes to be answered no without user intervention. pwck can also sort entries in /etc/passwd and /etc/shadow by UID. To run it in sort
mode pass it -s flag. No checks are performed then, it just sorts.
FILES
/etc/passwd - user account information
/etc/shadow - encrypted password information
/etc/group - group information
SEE ALSO
group(5), passwd(5), shadow(5), usermod(8)
DIAGNOSTICS
The pwck command exits with the following values:
0 Success
1 Syntax Error
2 One or more bad password entries
3 Cannot open password files
4 Cannot lock password files
5 Cannot update password files
AUTHOR
Julianne Frances Haugh (jockgrrl@ix.netcom.com)
PWCK(1)