05-14-2018
Quote:
Originally Posted by
Peasant
And welcome to the forums
Thanks
Quote:
Originally Posted by
Peasant
So you have log management system, and you wonder how will you name logs that arrive at that central system ?
Almost
I'm developing a visibility tool and I'm planning to use DSL in similar way splunk and sumologic do. Although, not as complex.
So I need to know how to refer to "sudo", "ls", "echo" or etc. Mainly what is the most common way to call different parts of a string user typed.
I'm not interested in what command can do, but how do you name them.
---------- Post updated at 09:54 AM ---------- Previous update was at 09:52 AM ----------
Maybe this will help –
Domain specific language questionnaire
I put everything inside Google form (doesn't collect emails or personal info).
10 More Discussions You Might Find Interesting
1. IP Networking
I have a series of new machines that are internet facing (have IP's that are accessible via the 'net) and it has internal facing interfaces. I need to be able to communicate back to the internal network to a specific server which processes monitoring and e-mail traffic. I've been told that I should... (3 Replies)
Discussion started by: BOFH
3 Replies
2. UNIX for Dummies Questions & Answers
My goal was to find any directories inside of any directory called "09_Client Original" not modified in the last 30 days.
$ find /Volumes/Jobs_Volume/ -type d -name "09_Client Original" -exec find {} -mtime +30 -type d -maxdepth 1 \;
The results of this find are passed along in a perl script... (1 Reply)
Discussion started by: guriboy
1 Replies
3. UNIX for Advanced & Expert Users
Hello,
I'm wondering what is the naming conventions for *.so shared libraries in linux. For example, a library in /lib, say libcrypt-2.7.so has a symbolic link called libcrypt.so.1 pointing to it, yet libncursesw.so.5.6 has a symbolic link called libncursesw.so.5 pointing to it. What is the... (2 Replies)
Discussion started by: neked
2 Replies
4. Solaris
These are findings by me with my little experience with Solaris 10. Please correct me if wrong..
In x86 systems with ide hard disk:
c= controller
d=disk
s=slice
1.Here controller c0 means the primary ide controller ide0.
controller c1 means the secondary ide controller ide1.
... (5 Replies)
Discussion started by: saagar
5 Replies
5. UNIX for Dummies Questions & Answers
I would like to use an automated checker for adherence to CSS coding conventions. I have browsed the web, but no tool I came across checks for coding conventions, only syntax. Here is a general list of requirements:
- Style definitions should be separated by one blank line
- Indentation is 2... (0 Replies)
Discussion started by: figaro
0 Replies
6. UNIX for Dummies Questions & Answers
i was viewing the gawk's man file,checked the man faqs,didnt find anything about the char "e" meaning
.TP
.B \e`
matches the empty string at the beginning of a buffer (string).
.TP
.B \e'
matches the empty string at the end of a buffer.after convention,it should looks like thie
\` ... (2 Replies)
Discussion started by: b33713
2 Replies
7. Programming
C calling convention we all know defines a way how the parameters are pushed onto the stack.
My question is when and how does this C calling conventions matters to a user?
When the user will have to bother about the calling conventions in his project? (5 Replies)
Discussion started by: rupeshkp728
5 Replies
8. UNIX for Dummies Questions & Answers
is there a typographic convention that is followed in the man pages.
where could a description be found.
at this time i am in man stty and the author uses upper case in some places.
and my brain is just burning to a fizzle while studying a book on bash and trying to stay in scope of the... (1 Reply)
Discussion started by: cowLips
1 Replies
9. UNIX for Dummies Questions & Answers
I'm new to Unix, and just had a quick question.
I'm writing a bash script, and I was wondering what proper programming etiquette was for piping. How many pipes is too many pipes?
OLDEST=$(find . -maxdepth 1 -type d -newermt 2012-07-01 ! -newermt
2012-07-30 | xargs ls -1td | tail -2)
echo... (1 Reply)
Discussion started by: jrymer
1 Replies
10. Linux
I'm slowly hacking away at a zsh script that shows some promise as a command line tool. I want to learn more about the conventions regarding command line tool development in Unix (and/or macOS), but don't really know where to look for this information.
What is the correct way, or convention, to... (2 Replies)
Discussion started by: MonilGomes
2 Replies
LEARN ABOUT SUNOS
asadmin-create-connector-security-map
asadmin-create-connector-security-map(1AS) User Commands asadmin-create-connector-security-map(1AS)
NAME
asadmin-create-connector-security-map, create-connector-security-map - creates a security map for the named connector connection pool
SYNOPSIS
create-connector-security-map --user admin_user [--password admin_password] [--host localhost] [--port 4848] [--secure|-s] [--passwordfile
filename] [--terse=false] [--echo=false] [--interactive=true] --poolname connector_connection_pool_name --principals principal-name[, prin-
cipal-name]*|--usergroups user-group[, user-group]* --mappedusername user_name [--mappedpassword password] mapname
Creates a security map for the named connector connection pool. If the security map is not present, one is created. You must have first
created a connector connection pool using the create-connector-connection-pool command. The enterprise information system is any system
which holds the information. It can be a mainframe, a messaging system, a database system, or even an application.
The --principals option and --usergroups option are mutually exclusive; only one should be used.
This command is supported in remote mode only.
OPTIONS
--user authorized domain application server administrative username.
--password password to administer the domain application server.
--host machine name where the domain application server is running.
--port port number of the domain application server listening for administration requests.
--secure if true, uses SSL/TLS to communicate with the domain application server.
--passwordfile file containing the domain application server password.
--terse indicates that any output data must be very concise, typically avoiding human-friendly sentences and favoring well-
formatted data for consumption by a script. Default is false.
--echo setting to true will echo the command line statement on the standard output. Default is false.
--interactive if set to true (default), only the required password options are prompted.
--poolname connector connection pool name.
--principals a comma separated list of J2EE principals.
--usergroups a comma separated list of J2EE usergroups.
--mappedusername the enterprise information system username.
--mappedpassword the enterprise information system password.
OPERANDS
mapname name of the security map to be created.
Example 1: Using create-connector-security-map
It is assumed that the connector pool has already been created using the create-connector-pool command.
asadmin> create-connector-security-map --user admin --password adminadmin
poolname connector-pool1 --principals principal1,principal2
--usergroups usergroup1,usergroup2 --mappedusername backend-username
--mappedpassword backend-password securityMap1
Command create-connector-security-map executed successfully
EXIT STATUS
0 command executed successfully
1 error in executing the command
asadmin-delete-connector-security-map(1AS), asadmin-list-connector-security-maps(1), asadmin-update-connector-security-map(1AS)
J2EE 1.4 SDK March 2004 asadmin-create-connector-security-map(1AS)