10-08-2014
You are welcome. Sometimes a new pair of eyes see something you have been looking at for ages. Glad we could all help.
Robin
This User Gave Thanks to rbatte1 For This Post:
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I am trying to write a script which emails the status of the job to the client. I am using bash script. I tried using mailx and the shell throws an error that 'command not found'. is mailx not supported in bash. Alternatively, is there any command that i can use for sending email in bash?
... (5 Replies)
Discussion started by: borncrazy
5 Replies
2. Shell Programming and Scripting
Dear unix forum members,
I'm working on a script that will parse a mail machine's logs and print a list of email addresses in this format:
sender@domain,recipient@domain
The logs look something like this:
06:50:04 0048317AC863: client=localhost.com
06:50:04 0048317AC863:... (7 Replies)
Discussion started by: jjamd64
7 Replies
3. Red Hat
Hello all,
I recently deleted some lines from the messages and secure files, in /var/log and now they are not keeping a log anymore. The last update shows the date of when I deleted the lines.
I had to delete some failed login attempts to stop denyhosts from blocking the ips (probably not the... (3 Replies)
Discussion started by: z1dane
3 Replies
4. Cybersecurity
Hello everyone. I'm a newbie and this is my first post, and I'm hoping to get some help understanding what happened on my server. I did as much research as I could, but now I turn to the forums for help :)
I've set up a VPS server and I "thought" I had good enough security on it, but all of a... (2 Replies)
Discussion started by: antondev
2 Replies
5. Shell Programming and Scripting
Dear unix forum members,
I'm working on a script that will parse a mail machine's logs and print a list of email addresses in this format:
authen@domain.com | sender@domain | recipient@domain
exam
account1@domain1.com | sender2@domain2.com |... (3 Replies)
Discussion started by: puka
3 Replies
6. Cybersecurity
Today the problem of hacking is increasing day by day so in this situation how can i secure my personal data and E-mail id? Please reply me soon. (1 Reply)
Discussion started by: andrepitt77
1 Replies
7. Solaris
How do i find if audit logs is secured inside Solaris 10?
· Verify that that audit log files are secured and owned appropriately.
this is the question (1 Reply)
Discussion started by: werbotim
1 Replies
8. Shell Programming and Scripting
Hi ,
I am trying to create shell script which will help me to compare file name in two folder.
There is a multiple file store in 2 folder.I want to compare that with the name.
If all the file are same then send a mail that "all date is same"
if not then create one log file which contain... (4 Replies)
Discussion started by: san_dy123
4 Replies
9. Shell Programming and Scripting
Hello,
I'm a beginner in shell scripting. I would really appreciate some help from the forum.
I want to write a small script that will look in apache error log. If it finds the appropriate word. It would execute some commands.
In my case the apache error log is situated in:... (2 Replies)
Discussion started by: ajaysingh99
2 Replies
10. UNIX for Beginners Questions & Answers
hello everyone,
I am new to linux and got this deliverable to write a script that should check for error in multiple log file (count is approx 2500 log files on single server) and once error is found, it should mail that error
My logic says:
we can put all log files path/location in one... (2 Replies)
Discussion started by: Pratik_CTS
2 Replies
LEARN ABOUT OSF1
cdslinvchk
cdslinvchk(8) System Manager's Manual cdslinvchk(8)
NAME
cdslinvchk - Checks the CDSL inventory of the base operating system and layered applications.
SYNOPSIS
/usr/sbin/cdslinvchk [log_file_path]
OPTIONS
The path name to a location for the log file. By default this will be /var/adm/cdsl_check_list.
DESCRIPTION
Use the cdslinvchk script to verify the current inventory of Context Dependent Symbolic Links (CDSLs) on a running system. CDSLs are spe-
cial symbolic links that enable a system to work in a cluster. If CDSLs are accidentally removed, your system will not function correctly
in a cluster. While this is not a problem for stand-alone systems, you may not be able to add the system as a member of a working cluster
at some future time. You can run this script at any time or configure it to run at system start-up, or as a cron task.
When you invoke the script, it checks the CDSLs on the running system against CDSLs of the installed inventory in /usr/.smdb and the addi-
tional entries in /var/adm/cdsl_admin.inv, and ensures that each target file exists on the system as a properly-constituted CDSL. If the
check is successful, the following message is displayed and the script terminates: Successful CDSL inventory check
If the script finds inconsistencies in the inventory, warning messages are displayed on your terminal and logged to the default log file at
/var/adm/cdsl_check_list. You can specify an alternate location for the log fill if required. The script locates any modified, missing,
or replaced CDSLs. Note that the previous copy of the log file is renamed and retained for reference and is renamed by appending to the
filename.
Refer to the System Administration guide for information on recreating any missing or broken CDSLs. Refer to the hier(5) reference page
for an inventory of CDSLs.
MESSAGES
One or more of the following messages may be displayed and logged to the log file: Unable to create <pathname> report file -- the script
was not able to create a log file. Check the target directory and security. Expected CDSL: <cdsl_pathname> -> <pathname> CDSL Target has
been modified to: <pathname> CDSL has been replaced with <pathname> CDSL is missing Failed CDSL inventory check. See details in <log file>
FILES
Additional inventory file entries. This file will not exist on all systems. The current and previous log files for inventory errors and
messages
SEE ALSO
Commands: cron(8)
Others: hier(5)
See also the System Administration guide for details of CDSLs
cdslinvchk(8)