04-01-2020
Hi,
the typical questions:
- What are your operating systems?
- What have you tried so far?
For a start, write a script maybe with
awk or
sed which does the change on the server for you locally!
Regards,
stomp
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am creating a whitelist for User Input Validation. Here is a code snippet that allows alphanumeric and forward slash (/).
if ( $variable =~ /^*$/ ) #allow alphanumeric and fwd slash
{
$returnValue = 'good data';
} ... (3 Replies)
Discussion started by: mh53j_fe
3 Replies
2. Shell Programming and Scripting
This Expect script provides expect with a list of IP addresses to Cisco IPS sensors and commands to configure Cisco IPS sensors. The user, password, IP addresses, prompt regex, etc. have been anonymized. In general this script will log into the sensors and send commands successfully but there are... (1 Reply)
Discussion started by: genewolfe
1 Replies
3. Shell Programming and Scripting
Hi
Can someone give me a shell script that can ping a range of IPs and return IPs which are not pingable.
Range for example say 192.168.0.1 to 192.168.0.50 and whichever are not pingable then return the IP.
Thanks for your help (3 Replies)
Discussion started by: tannu
3 Replies
4. Shell Programming and Scripting
Dear all,
what I need to do is extract an entries list from a file and remove some entries based on a white list present on other file, then output into result.txt file.
Example:
source.txt:
12345 text1 text2 text3 text4
123 text1 text2 text3 text4
678 text1 text2 text3 text4
987 text1... (8 Replies)
Discussion started by: Lord Spectre
8 Replies
5. Cybersecurity
I have found this excellent site: NSRL Downloads
(sorry if it was already mentioned)
there are Solaris and Linux files there too.
its all in a text file, over 11Gb large. (0 Replies)
Discussion started by: orange47
0 Replies
6. Shell Programming and Scripting
Please tell me the script, if any user ping my pc so leave his ip, mac and other identity on my pc. (1 Reply)
Discussion started by: abhihot95
1 Replies
7. Shell Programming and Scripting
Hello gentlemen.
I would like to create a shell script (no perl or python please) to generate a list with those rules.
Let's suppose I've this text file:
a@A:soss(z)1.1.1.1
Opt!o:2.1.9.55
Azxk<ji>rC211.111.9.0-251.11.34.9
d=211.9.1.3
O.Oox 2.1.2.4-51.9.1.33... (6 Replies)
Discussion started by: accolito
6 Replies
8. Shell Programming and Scripting
Hello again gentlemen.
I would like to make a shell script to 'optimize' a plain text full of IPs.
Let's suppose to have this text file:
1.192.63.253-1.192.63.253
1.0.234.46/32
1.1.128.0/17
1.116.0.0/14
1.177.1.157-1.177.1.157
1.23.22.19
1.192.61.0-1.192.61.99
8.6.6.6
I want to... (2 Replies)
Discussion started by: accolito
2 Replies
9. Solaris
Hi guys, I'm creating custom package for deploying a bunch of public keys for some root servers we have. I have created script and it works but my problem is how to call this script when I want deploy package with puppet on server?
Oracle documentation provided only example for first boot script... (0 Replies)
Discussion started by: solaris_user
0 Replies
10. Hardware
I have hp dv6 and dv7 notebook pcs on which I want to upgrade the wifi cards but when I install the new cards and boot them, the they won't even boot to the bios and they both give me the same error: "104-Unsupported wireless network device detected. System Halted. Remove device and restart." When... (1 Reply)
Discussion started by: milhan
1 Replies
LEARN ABOUT CENTOS
cgsnapshot
CGSNAPSHOT(1) libcgroup Manual CGSNAPSHOT(1)
NAME
cgsnapshot - generate the configuration file for given controllers
SYNOPSIS
cgsnapshot [-h] [-s] [-t] [-b file] [-w file] [-f output_file] [controller] [...]
DESCRIPTION
cgsnapshot generates the cgconfig compatible configuration file for the given controllers. If no controller is set, then cgsnapshot shows
all mounted hierarchies. The output is in the same format as the cgconfig.conf configuration file.
-b file
Display only variables from the blacklist. The default location of the blacklist is /etc/cgsnapshot_blacklist.conf. This list con-
tains all variables which should be ignored by the cgsnapshot If the variable is blacklisted, it will not be displayed. If it is
not present on the blacklist, the whitelist is checked.
-h, --help
display this help and exit
-f, --file
Redirect the output to output_file
-s, --silent
Ignore all warnings
-t, --strict
Do not display the variables which are not on the whitelist
-w file
Set the blacklist configuration file. This list contains all variables which should be displayed by cgsnapshot If the variable is
not blacklisted, the whitelist is checked. If the variable is on the whitelist, it is displayed by cgsnapshot If the variable is
not on the whitelist, the variable is displayed and a warning message is produced. By default the whitelist is not used.
The warning message can be omitted using the -s, --silent flag. If the -t, --strict flag is used, the variable which is not on the
whitelist is not displayed.
controller
defines the controller whose hierarchies will be output
ENVIRONMENT VARIABLES
CGROUP_LOGLEVEL
controls verbosity of the tool. Allowed values are DEBUG, INFO, WARNING or ERROR.
FILES
/etc/cgsnapshot_blacklist.conf
default blacklist
/etc/cgsnapshot_whitelist.conf
default whitelist
/etc/cgconfig.conf
default libcgroup configuration file
SEE ALSO
cgconfig.conf (5)
Linux 2010-07-28 CGSNAPSHOT(1)