given a sample file myFile:
running awk -F= '{printf("%s%s",$2,($1=="OutUName_2")?ORS:OFS)}' OFS=, myFile
produces:
There's either your real file is not what you quoted above OR you're not following the suggested solution.
Trying giving a REAL sample input file AGAIN - please do use code tags.
If you created a file under Windows, make sure there're no ^M-s.
Hello all,
I want to transpose the rows of a file to the columns (every characters include spaces), i.e.:
input:
abcdefg
123 456
output:
a1
b2
c3
d
e4
f5
g6
I wrote a script:
#!/bin/csh -f (15 Replies)
Hi ALL
I have one input file say FILE1 which looks as below.
a=1
b=2
c=3
a=4
b=5
c=6
.
.
.
Here a,b,c...etc are variable names.
The output file(FILE2) should look like
1,2,3
4,5,6
.....
..... (5 Replies)
Hi I have an input file and I want to transpose it but I need to take care that if any field is missing for a record it should be popoulated with space for that field - using a shell script
INFILE
----------
emp=1
sal=2
loc=abc
emp=2
sal=21
sal=22
loc=xyz
emp=5
loc=abc
OUTFILE... (10 Replies)
Hi,
I have a file like this
a b c
d e f
g h i
j k l
Case1:
I want to transpose the whole file
Output1
a d g j
b e h k
c f i l
Case2
Transpose a specific column - Say 3rd (6 Replies)
Hi Friends,
I have a file with a structure like this:
<file1.csv>
field1,field2,field3,field4,field5,field6,field7,field8,field9,field10,field11,field12
Few Salient points on the file's structure
(1)The fields from field1 to field6 is fixed and they would always be present in the file... (2 Replies)
Hello,
I have a text file with 148 rows and 2532691 columns. I need to transpose the data. The command that I am using is
awk '
{
for (i=1; i<=NF; i++) {
a = $i
}
}
NF>p { p = NF }
END {
for(j=1; j<=p; j++) {
str=a
for(i=2; i<=NR; i++){
... (6 Replies)
Hello,
I have a file which looks like this
Input:
Sample Genotype Assay Well plate
Sample1 T xx A01 1
Sample2 T xx A01 2
Sample3 T xx A01 3
Sample4 T xx A02 4
Sample5 T xx A02 5
Sample6 T xx A02 ... (4 Replies)
Discussion started by: nans
4 Replies
LEARN ABOUT PHP
audit_class
audit_class(4) File Formats audit_class(4)NAME
audit_class - audit class definitions
SYNOPSIS
/etc/security/audit_class
DESCRIPTION
/etc/security/audit_class is a user-configurable ASCII system file that stores class definitions used in the audit system. Audit events in
audit_event(4) are mapped to one or more of the defined audit classes. audit_event can be updated in conjunction with changes to
audit_class. See audit_control(4) and audit_user(4) for information about changing the preselection of audit classes in the audit system.
Programs can use the getauclassent(3BSM) routines to access audit class information.
The fields for each class entry are separated by colons. Each class entry is a bitmap and is separated from each other by a newline.
Each entry in the audit_class file has the form:
mask:name:description
The fields are defined as follows:
mask class mask
name class name
description class description
Each class is represented as a bit in the class mask which is an unsigned integer. Thus, there are 32 different classes available. Meta-
classes can also be defined. These are supersets composed of multiple base classes, and thus will have more than 1 bit in its mask. See
EXAMPLES. Two special meta-classes are also pre-defined: all, and no.
all Represents a conjunction of all allowed classes, and is provided as a shorthand method of specifying all classes.
no Is the invalid class, and any event mapped solely to this class will not be audited. Turning auditing on to the all meta class
will not cause events mapped solely to the no class to be written to the audit trail. This class is also used to map obsolete
events which are no longer generated. Obsolete events are retained to process old audit trails files.
EXAMPLES
Example 1: Using an audit_class File
The following is an example of an audit_class file:
0x00000000:no:invalid class
0x00000001:fr:file read
0x00000002:fw:file write
0x00000004:fa:file attribute access
0x00000008:fm:file attribute modify
0x00000010:fc:file create
0x00000020:fd:file delete
0x00000040:cl:file close
0x00000100:nt:network
0x00000200:ip:ipc
0x00000400:na:non-attribute
0x00001000:lo:login or logout
0x00004000:ap:application
0x000f0000:ad:old administrative (meta-class)
0x00070000:am:administrative (meta-class)
0x00010000:ss:change system state
0x00020000:as:system-wide administration
0x00040000:ua:user administration
0x00080000:aa:audit utilization
0x00300000:pc:process (meta-class)
0x00100000:ps:process start/stop
0x00200000:pm:process modify
0x20000000:io:ioctl
0x40000000:ex:exec
0x80000000:ot:other
0xffffffff:all:all classes (meta-class)
FILES
/etc/security/audit_class
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability | See below |
+-----------------------------+-----------------------------+
The file format stability is evolving. The file content is unstable.
SEE ALSO bsmconv(1M), au_preselect(3BSM), getauclassent(3BSM), audit_control(4), audit_event(4), audit_user(4), attributes(5)NOTES
It is possible to deliberately turn on the no class in the kernel, in which case the audit trail will be flooded with records for the audit
event AUE_NULL.
This functionality is available only if the Basic Security Module (BSM) has been enabled. See bsmconv(1M) for more information.
SunOS 5.10 6 Jan 2003 audit_class(4)