06-07-2018
Can the user $DBUSER connect to the db and access the table directly?
In other words, does it have the necessary permissions?
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi
did any books teaching beginner to run mysql using BASH shell?
thkx (5 Replies)
Discussion started by: lijiajin
5 Replies
2. Shell Programming and Scripting
Hi,
I have a piece of shell script which will connect to mysql database and execute a load statement(which will load datas in a file to the database table).The code is working and the data is in the tables.
Now my requirement is, i need to grab the output from the load statement... (4 Replies)
Discussion started by: DILEEP410
4 Replies
3. Shell Programming and Scripting
Hi guys,
i know how to run a single query using mysql embedded in a shell script as follows:
`mysql -umyuser -pmypass --host myhost database<<SQL
${query};
quit
SQL`
However, how would i be able to run several queries within the same connection?
The reason for this is i am creating... (3 Replies)
Discussion started by: muay_tb
3 Replies
4. Shell Programming and Scripting
I heard this was possible but from my research I haven't been able to figure it out yet. Seems it should be simple enough. Basically from a high level view I'm trying to accomplish...
. $X='grep foo blah.log'
then 'mysql command SELECT foo FROM bar WHERE ' . $X
or something like that.
... (2 Replies)
Discussion started by: kero
2 Replies
5. Shell Programming and Scripting
Hi All,
I am in a problem here is the description,
Actually in my shell script i am firing a mysql query which returns multiple records and i have to process each record one by one.
So could any one please suggest me how to solve my problem?
Thanks in Advance
Ashok Sharma (4 Replies)
Discussion started by: ashok1979
4 Replies
6. Shell Programming and Scripting
Hello. I am writing a simple script that reads a text file and removes records from a mysql database. The items in the text file are of the format:
firstname.middle.lastXXX, where XXX is a 3 digit number. The table has an email field that will match the firstname.middle.last. So, I thought I... (1 Reply)
Discussion started by: bricoleur
1 Replies
7. Shell Programming and Scripting
Hi
i`m trying this script to run and i get the following error.
Enter your name
tman
Enter your surname
smith
-bash: ./500: line 20: unexpected EOF while looking for matching `"'
-bash: ./500: line 21: syntax error: unexpected end of file
... (2 Replies)
Discussion started by: mduduzi
2 Replies
8. Shell Programming and Scripting
Hi
can anyone help with my issue here. I new in linux and new in scripting. i was ask to do the following below and i`m getting errors. I managed to create the table and the database. Now i need to add the details in a shell to update the database.... (7 Replies)
Discussion started by: mduduzi
7 Replies
9. Shell Programming and Scripting
Hi,
I have a video script. it has embedded Youtube videos. I want replace them downloaded version mp4 videos.
this script has a mysql table. I want search "url_flv" field on table a youtube link if has a youtube link I want download it this command.
I want extract uniq_id field for file... (2 Replies)
Discussion started by: tara123
2 Replies
10. Shell Programming and Scripting
Dear All,
I have script.
Dest=""
IFS='
'
for translation in $(echo $MY_MAP)
do
t1=$(echo $translation | cut -d"=" -f1)
t2=$(echo $translation | cut -d"=" -f2| cut -d"," -f1)
if
then
Dest=$UNX/$u_product_path/$u_study_path/$UNXTR/$t2
break;
... (4 Replies)
Discussion started by: yadavricky
4 Replies
LEARN ABOUT FREEBSD
login.access
LOGIN.ACCESS(5) BSD File Formats Manual LOGIN.ACCESS(5)
NAME
login.access -- login access control table
DESCRIPTION
The login.access file specifies (user, host) combinations and/or (user, tty) combinations for which a login will be either accepted or
refused.
When someone logs in, the login.access is scanned for the first entry that matches the (user, host) combination, or, in case of non-networked
logins, the first entry that matches the (user, tty) combination. The permissions field of that table entry determines whether the login
will be accepted or refused.
Each line of the login access control table has three fields separated by a ':' character: permission:users:origins
The first field should be a "+" (access granted) or "-" (access denied) character. The second field should be a list of one or more login
names, group names, or ALL (always matches). The third field should be a list of one or more tty names (for non-networked logins), host
names, domain names (begin with "."), host addresses, internet network numbers (end with "."), ALL (always matches) or LOCAL (matches any
string that does not contain a "." character). If you run NIS you can use @netgroupname in host or user patterns.
The EXCEPT operator makes it possible to write very compact rules.
The group file is searched only when a name does not match that of the logged-in user. Only groups are matched in which users are explicitly
listed: the program does not look at a user's primary group id value.
FILES
/etc/login.access login access control table
SEE ALSO
login(1), pam_login_access(8)
AUTHORS
Guido van Rooij
BSD
September 13, 2006 BSD