The pingoutput is surrounded by statistical et al. information which you will have to eliminate. By sorting at the beginning, you get those listed last. Try
Code:
ping -c10 google.com | sort -t= -k4,4rn |
awk ' # {print > "DBG"} # use for debug/control purposes only
!NF {exit}
{split ($(NF-1), T, "=")
CB[(++CNT)%3]=T[2]
}
SLOW && NR==3 {exit}
END {for (i=1; i<=3; i++) print CB[(++CNT)%3]}
' SLOW="0" # ; cat DBG # use for debug/control purposes only
Set SLOW to 1 for slowest responses (I assume that's your "bottom"s), and to 0 for the fastest.
a simple question,
how can i use cut (after using grep) to extract the last four digits on a line.
so say i had a string http://blabla:9020, how would I extract the port??
-Fez (4 Replies)
hi guys i need to extract information from log files generated by an application.
log file has the following lines for each process..
----------------------------------------------
Fri Aug 03 12:06:43 WST 2007 INFO: Running project PROJECT1
Fri Aug 03 12:06:43 WST 2007 INFO: Source Files... (7 Replies)
Anyone have a better idea to automate extraction of info like ...
"uname"
"ifconfig"
"ps efl"
"netstat -ao"
etc.
from several hundred aix, solaris, red hat boxes? without logging into each box and manually performing these tasks and dumping them to individual files?
thanks for any input (1 Reply)
Hi all,
I am working on a networking project that requires me to find out the NIC on that particular machine and many more things.
Now Given the IP and the subnet.
I would like to know how we can extract such informations?
I am talking in exclusivity to Solaris boxes!!
The required... (6 Replies)
I have some input file, which contains some lines which are comma separated. Eg.
a,b,id=999],d
d,f,g,id=345],x
x,y,x,s,id=677],y
I run a loop to read the lines one by one. What i want is to extract the value on the right of id=. I cannot do it by Awk, since the column number is not fixed.... (5 Replies)
Dear all
I have a file call interfaces.txt
Filename: interfaces.txt
How can I extract the information at below?
ABC_DB_001 hostname1 20901
ABC_DB_002 hostname2 20903
ABC_DB_003 hostname3 20905
Currently I am using a very stupid method
grep ^ABC interfaces.txt > name.txt
grep... (3 Replies)
Hi,
I have a text file with member information...
B]Name is in H1 tag
Title is in H2 tag
Email is in <a id="ctl00_ContentPlaceHolder3_repeaterItems_ctl01_lbnEmailMe" href="javascript:__doPostBack('ctl00$ContentPlaceHolder3$repeaterItems$ctl01$lbnEmailMe','')">someone@company.com</a>
Location:... (6 Replies)
Hello,
I have two files which look like this
File 1
Name test1 status P
Gene1 0.00236753 1 1.00E-01
Gene2 0.134187 2 2.00E-01
Gene3 0.000608716 2 3.00E-01
Gene4 0.0016234 1 4.00E-01
Gene5 0.000665868 2 5.00E-01and file 2
No Pos ... (2 Replies)
Hi
I use multipath linux command to get LUNs info and find out if any failed.
# multipath -ll >/tmp/mpfail
# cat /tmp/mpfail
multipath.conf line 109, invalid keyword: user_friendly_names
multipath.conf line 153, invalid keyword: user_friendly_names
multipath.conf line 193, invalid... (4 Replies)
Discussion started by: prvnrk
4 Replies
LEARN ABOUT DEBIAN
sa-check_spamd
SA-CHECK_SPAMD.RAW(1) User Contributed Perl Documentation SA-CHECK_SPAMD.RAW(1)NAME
sa-check_spamd - spamd monitoring script for use with Nagios, etc.
SYNOPSIS
sa-check_spamd [options]
Options:
-c secs, --critical=secs Critical ping response threshold
-h, -?, --help Print usage message
-H hostname, --hostname=hostname Hostname of spamd service to ping
-p port, --port=port Port of spamd service to ping
--socketpath=path Connect to given UNIX domain socket
-t secs, --timeout=secs Max time to wait for a ping response
-v, --verbose Verbose debug output
-V, --version Output version info
-w secs, --warning=secs Warning ping response threshold
DESCRIPTION
The purpose of this program is to provide a tool to monitor the status of "spamd" server processes. spamd is the daemonized version of the
spamassassin executable, both provided in the SpamAssassin distribution.
This program is designed for use, as a plugin, with the Nagios service monitoring software available from http://nagios.org. It might be
compatible with other service monitoring packages. It is also useful as a command line utility or as a component of a custom shell script.
OPTIONS
Options of the long form can be shortened as long as the remain unambiguous (i.e. --host can be used instead of --hostname).
-c secs, --critical=secs
Critical ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds) the program
will exit with a value of 2 to indicate the critical status.
This value must be at least as long as the value specified for warning and less than the value specified for timeout.
-h, -?, --help
Prints this usage message and exits.
-H hostname, --hostname=hostname
The hostname, or IP address, of the spamd service to ping. By default the hostname localhost is used. If --socketpath is set this
value will be ignored.
-p port, --port=port
The port of the spamd service to ping. By default port 783 (the spamd default port number) is used. If --socketpath is set this value
will be ignored.
--socketpath=path
Connect to given UNIX domain socket. Use instead of a hostname and TCP port. When set, any hostname and TCP port specified will be
ignored.
-t secs, --timeout=secs
The maximum time to wait for a ping response. Once exceeded the program will exit with a value of 2 to indicate the critical status.
The default timeout value is 45 seconds. The timeout must be no less than 1 second.
This value must be greater than the values specified for both the critical and warning values.
-v, --verbose
Display verbose debug output on STDOUT.
-V, --version
Display version info on STDOUT.
-w secs, --warning=secs
Warning ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds), and does not
exceed the critical threshold value, the program will exit with a value of 1 to indicate the warning staus.
This value must be no longer than the value specified for critical and less than the value specified for timeout.
EXIT CODES
The program will indicate the status of the spamd process being monitored by exiting with one of these values:
0 OK: A spamd ping response was received within all threshold times.
1 WARNING: A spamd ping response exceeded the warning threshold but not the critical threshold.
2 CRITICAL: A spamd ping response exceeded either the critical threshold or the timeout value.
3 UNKNOWN: An error, probably caused by a missing dependency or an invalid configuration parameter being supplied, occurred in the
sa-check_spamd program.
SEE ALSO spamc(1)spamd(1)spamassassin(1)PREREQUISITES
"Mail::SpamAssassin" version 3.1.1 or higher (3.1.6 or higher recommended)
AUTHOR
Daryl C. W. O'Shea, DOS Technologies <spamassassin@dostech.ca>
LICENSE
sa-check_spamd is distributed under the Apache License, Version 2.0, as described in the file "LICENSE" included with the Apache
SpamAssassin distribution and available at http://www.apache.org/licenses/LICENSE-2.0
perl v5.14.2 2014-02-14 SA-CHECK_SPAMD.RAW(1)