04-14-2016
many thanks - it's been a while since I have done unix stuff - it's all coming back to me 0
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi all,
I have a script that scan files, find old templet and replace it with new one.
#!/bin/ksh
file_name=$1
old_templet=$2
new_templet=$3
# Loop through every file like this
for file in file_name
do
cat $file | sed "s/old_templet/new_templet/g" > $file.new
#do a global searce and... (8 Replies)
Discussion started by: amir_yosha
8 Replies
2. Shell Programming and Scripting
Hi....can you guys help me out in this script??
Below is a portion text file and it contains these:
GEF001 000093625 MKL002510 000001 000000 000000 000000 000000 000000 000001
GEF001 000093625 MKL003604 000001 000000 000000 000000 000000 000000 000001
GEF001 000093625 MKL005675 000001... (1 Reply)
Discussion started by: pallavishetty
1 Replies
3. Shell Programming and Scripting
Hi
I am new to Unix shell scripting. But i need help to slove the below issue.
Issue description:
I want to read table, view names and package names in a file
my plan to find the table name is : search "From" key word find the table or view
To find the packge name : Search "Package... (5 Replies)
Discussion started by: sboss
5 Replies
4. Shell Programming and Scripting
Hi ,
I Have following requirement:
DB2 Sql query to pass from a parameter file
for example, I would create a parameter file with (SELECT column 1, column 2 FROM Table name) then job would read it and create a file with the contents named table.txt
How to write/modify below ksh script to... (10 Replies)
Discussion started by: developer.dwh9
10 Replies
5. Shell Programming and Scripting
Hi,
I want to replace a chain of if-else statement in an old AWK file with values from Db2 table or CSV file. The part of code is below...
if (start_new_rec=="true"){
exclude_user="false";
user=toupper($6);
match(user, "XXXXX.");
if (RSTART ==2 ) {
... (9 Replies)
Discussion started by: asandy1234
9 Replies
6. Shell Programming and Scripting
I have a test file that I want to read and insert only certain lines into the
the table based on a filter.
1. Rread the log file 12 Hours back Getdate() -12 Hours
2. Extract the following information on for lines that say "DUMP is
complete"
A. Date
B. Database Name
C.... (2 Replies)
Discussion started by: JolietJake
2 Replies
7. Shell Programming and Scripting
Hello Forum.
I have a file called abc.sed with the following commands;
s/1/one/g
s/2/two/g
...
I also have a second file called abc.dat and would like to substitute all occurrences of "1 with one", "2 with two", etc and create a new file called abc_new.dat
sed -f abc.sed abc.dat >... (10 Replies)
Discussion started by: pchang
10 Replies
8. UNIX for Beginners Questions & Answers
HELLO
I need your help please , i need to read a file that contain a table like :
Name | Status
------------------
DB 1 | UP
DB 2 | UP
DB 3 | DOWN
DB 4 | UP
DB 5 | UP
the objective to read each line and check if DB is UP or Down and give me the name of Down database.... (10 Replies)
Discussion started by: Abdellah
10 Replies
9. UNIX for Beginners Questions & Answers
We have 100 linux servers, All send logs to both centralize server(server1 and serverb).
all send logs every day and stores in /syslog folder with hostname.log file.
I need to prepare script to check every day from both centralize server(server1 and serverb) and send mail in table format.
... (1 Reply)
Discussion started by: yash_message
1 Replies
LEARN ABOUT DEBIAN
node.perms
NODE.PERMS(5) Linux Programmer's Manual NODE.PERMS(5)
NAME
node.perms - LinuxNode permissions file.
DESCRIPTION
Node.perms file is read at program startup with the knowledge of users username (call), connection type (AX.25, NET/ROM, ROSE, TCP/IP),
peers IP address (for TCP/IP) and port name (for AX.25). The first entry matching this information is taken and user is asked for password
and given permissions according to it.
The lines within node.perms must either be a comment line, which starts with a # in the first column, or a permission entry in the follow-
ing format, each field being delimited by white space:
username type portname password permissions
The field descriptions are:
username This is matched against users username (call) without SSID. An asterisk (*) matches any username.
type This is matched against the type of the connection to user. Possible values for this field are:
* matches any type of connection.
ax25 matches users coming in with AX.25.
netrom matches users coming in with NET/ROM.
rose matches users coming in with ROSE.
local matches TCP/IP connections where users host is in "local" network as defined in node.conf(5).
ampr matches TCP/IP connections where users host is in amprnet (44.0.0.0/8).
inet matches TCP/IP connections where users host is neither in "local" network nor in amprnet.
host matches users starting LinuxNode from shell.
portname If user is coming in with AX.25 this field is matched against the local port name the user is coming in via. An asterisk (*)
matches any port name.
password If the previous tree fields match and this field is not a single asterisk (*) the user is asked for a password. The password
is then matched against this field.
permissions This field represents a a bitmask of operations the user is permitted to do. It is a sum of the values listed here:
1 permits logging in even if no other permissions are given.
2 permits outgoing AX.25 connects.
4 permits outgoing NET/ROM connects.
8 permits telneting to hosts in the "local" network as defined in node.conf(5).
16 permits telneting to hosts in amprnet.
32 permits telneting to hosts neither in the "local" network nor in amprnet.
64 permits using hidden ports in outgoing AX.25 connections. (See HiddenPorts command in node.conf(5).)
128 permits outgoing ROSE connects.
256 The no-escape flag. Disables the escape mechanism for this user.
FILES
/etc/ax25/node.perms
SEE ALSO
node(8), node.conf(5), axports(5), ax25(4).
Linux 16 June 1999 NODE.PERMS(5)