The thing that we need to be able to do is:
- Scanning tapes from failed backup jobs with bscan (a bacula command)
- loading the next tape with the mtx command
Bscan does unload tapes but does not load them.
Bscan comes with this message when it's done with a tape:
Mount Volume... (0 Replies)
Hi all,
I am just trying to read the contents of a file. basically this file has a list of dat files. then i want to access these dat files n execute a script on them one by one using a loop.
i hav e written like this
ls -l | cut -c 58-88 > file1.txt
while
do
arr1="$( sed -n '1p'... (7 Replies)
Hi SSHers,
I have embedded this below code in my shell script..
/usr/bin/ssh -t $USER@$SERVER1 /usr/bin/ssh $USER2@S$SERVER2 echo uptime:`/opt/OV/bin/snmpget -r 0 -t 60 $nodeName system.3.0 | cut -d: -f3-5`
SSH to both these servers are public-key authenticated, so things run... (13 Replies)
Hi,
I work on a jumpserver and I wrote a script to transfer a file from source server to destination server.
#!/bin/ksh
echo "\nEnter the file name:\n"
read name
echo "\nSelect the Source server\n"
echo "1. ODS PROD "
echo "2. ODS DROPBOX"
echo "3. ODS STE"
echo "4. ODS STE DROPBOX"... (6 Replies)
Hi,
I have a question here. Please suggest.
I have a file which has some unix commands to be executed through shell scripting. The number of commands will be different every time based on some external instructions i received. I manually keep the instuctions in this file.
i need to execute... (1 Reply)
I would like to execute a commands in four different servers through ssh at a single instance(simultaneously).
Below are the details with examples,
ssh user1@server1 "grep xxxx logs"
ssh user1@server2 "grep xxxx logs"
ssh user1@server3 "grep xxxx logs"
Each statement will take some... (4 Replies)
I have a file that has about 3000 commands , listed one below the other. I would like to execute them all in one go. Is there a simpler way to do it - like a batch file processing, than executing one line at a time? (3 Replies)
I have a script that checks if the script has been ran with sudo.
If the script is not ran as sudo, the current script is being executed with exec sudo bash.
You are asked for a password, you type in the password, success. Everything is perfect - the commands inside the script are ran as sudo.... (1 Reply)
Discussion started by: boqsc
1 Replies
LEARN ABOUT DEBIAN
sc_tracediff
SC_TRACEDIFF(1) BSD General Commands Manual SC_TRACEDIFF(1)NAME
sc_tracediff -- display traceroute paths where the path has changed.
SYNOPSIS
sc_tracediff [-a] [-m method] [-n] file1.warts file2.warts
DESCRIPTION
The sc_tracediff utility displays pairs of traceroutes to a destination where the path has changed. It takes two warts files as input and
displays paths where a hop differs by its address. The options are as follows:
-a dump all traceroute pairs regardless of whether they have changed.
-m method
specifies the method used to match pairs of traceroutes together. If dst is specified, traceroutes are matched if the destination IP
address of both traces are the same. If userid is specified, traceroutes are matched if the userid field of both traces are the
same. If dstuserid is specified, traceroutes are matched if the destination IP address and userid fields are the same. By default,
the destination IP address is used.
-n names should be reported instead of IP addresses, where possible.
sc_tracediff can be useful in network monitoring to identify when a forward IP path has changed. In this scenario, it is recommended that
Paris traceroute is used with the same UDP source and destination ports for each execution of scamper so that only paths that have changed
are identified, not merely alternate paths visible due to per-flow load-balancing. By default scamper uses a source port based on the
process ID, which will change with each execution of scamper.
EXAMPLES
The command:
scamper -O warts -o file1.warts -c 'trace -P udp-paris -s 31337' -f list.txt
collects the forward IP paths towards a set of IP addresses found in list.txt using 31337 as the UDP source port value. If the above command
is adjusted to subsequently collect file2.warts, then we can identify paths that have subsequently changed with the command:
sc_tracediff file1.warts file2.warts
If Paris traceroute with ICMP probes is preferred, then the following invocation of scamper is appropriate:
scamper -O warts -o file1.warts -c 'trace -P icmp-paris -d 31337' -f list.txt
In this case, scamper uses 31337 as the ICMP checksum value in each probe.
SEE ALSO scamper(1),
B. Augustin, X. Cuvellier, B. Orgogozo, F. Viger, T. Friedman, M. Latapy, C. Magnien, and R. Teixeira, Avoiding traceroute anomalies with
Paris traceroute, Proc. ACM/SIGCOMM Internet Measurement Conference 2006.
AUTHOR
sc_tracediff is written by Matthew Luckie <mjl@luckie.org.nz>.
BSD April 21, 2011 BSD