11-04-2014
Thx for help I was looking at that script for two days and didn't saw it...
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have been adding new users on a system(SOLARIS 8), and one of these 'nice'(?) users has got back to me to complain that his full name isnt showing up when he does the following at the command prompt :
$ finger <login_id>
You see when I added the users details at the command line using... (2 Replies)
Discussion started by: Kanu77
2 Replies
2. UNIX for Advanced & Expert Users
I am the administrator for a large network of HP/UX servers, about 100, this will be growing to over 200 in the next 18 months, part of my duties are to change the root passwords on these machines once month... which is a pain. I have written a script that will generate random passwords for me and... (3 Replies)
Discussion started by: PJolliffe
3 Replies
3. UNIX for Dummies Questions & Answers
hi, to do a su - user, we need to know what are the users...
so in unix
1) which file to see the list of users, passwords? (2 Replies)
Discussion started by: yls177
2 Replies
4. AIX
Hi Friends,
I am trying to write a script for finding all the users with the GID 0 i.e. Admin users. can you please help me on this. (1 Reply)
Discussion started by: anoopraok
1 Replies
5. AIX
Guy's ..
I have faced an issue in AIX server, users got expired without asking me about the expiration and did not asking me to change the old password moreover will not accept my login with old password any more until reset the ID with new password
Pls assist in this to how configure the... (3 Replies)
Discussion started by: Mr.AIX
3 Replies
6. Solaris
Hi All,
How to restrict the NIS users not to change their passwords in for NIS users??
and my NIS user is unable to login to at client location what could be the problem for this ?
Any body can help me. Thanks in advance. (1 Reply)
Discussion started by: Sharath Kumar
1 Replies
7. UNIX for Advanced & Expert Users
Hello,
I have an AIX 5.3 system. I want to check users to see whether there are users with blank passwords but i would prefer to do that without checking /etc/passwd or /etc/security/passwd files.
Also while i was searching the web for a solution i noticed that many people refer to /etc/shadow... (2 Replies)
Discussion started by: omonoiatis9
2 Replies
8. Shell Programming and Scripting
Can anyone create or give me a script that I can use to email a user automatically when I kill one of their processes?
Or
Can you give me a script to allow me to email a user (entering email manually) when a process is killed? Like showing what the PID was and a reason the admin killed it? Is... (2 Replies)
Discussion started by: JoeGazz84
2 Replies
9. Shell Programming and Scripting
hi,
i am new to shell scripts
i write a shell script to create multiple users but i need to give passwords to that users while creating users, command to write this script (1 Reply)
Discussion started by: DONFOX
1 Replies
10. UNIX and Linux Applications
Is it possible to use {SHA} with ldappasswd? I didn't find responsible option in manual page and doc (1 Reply)
Discussion started by: urello
1 Replies
LEARN ABOUT DEBIAN
make_combined_log2
make_combined_log.pl(1) General Commands Manual make_combined_log.pl(1)
NAME
make_combined_log.pl - make combined logfile from SQL database
SYNOPSIS
make_combined_log.pl <days> <virtual host>
DESCRIPTION
This perl script extracts the httpd access data from a MySQL database and formats it properly for parsing by 3rd-party log analysis tools.
The script is intended to be run out by cron. Its commandline arguments tell it how many days' worth of access records to extract, and
which virtual_host you are interested in (because many people log several virthosts to one MySQL db.) This permits you to run it daily,
weekly, every 9 days -- whatever you decide.
NOTE
By "days" I mean "chunks of 24 hours prior to the moment this script is run." So if you run it at 4:34 p.m. on the 12th, it will go back
through 4:34 p.m. on the 11th.
KNOWN ISSUES
Because GET and POST are not discriminated in the MySQL log, we'll just assume that all requests are GETs. This should have negligible
effect on any analysis software. This could be remedied IF you stored the full HTTP request in your database instead of just the URI, but
that's going to cost you a LOT of space really quickly...
Because this is somewhat of a quick hack it doesn't do the most robust error checking in the world. Run it by hand to confirm your usage
before putting it in crontab.
AUTHOR
Edward Rudd <eddie@omegaware.com>
MAN PAGE CREATED BY
Michael A. Toth <lirul.lists@gmail.com> - based on comments of script
COMMENTS
This man page was written using xml2man (1) by the same author.
Manuals User make_combined_log.pl(1)