Extract multiple line text from log between special words
Hi all,
I have a text file (log), it prints some SQL statements in the log. It is a bit irregular, I need to extract SQL statement into as separate file.
1. Some statements are printed as just SQL statements, in multiple lines.
2. Some SQL statements are printed line by line but after log details at the beginning of the line. So somehow I need to ignore the first part of the line but need to keep query.
What I found as a pattern is, all SQL statements have "DISTINCT" keyword in the beginning
and after each statement there are "quit;" statements.
This doesn't have to be at the beginning of the lines, it's enough for me to extract text between DISTINCT and quit.
This is where I confused and couldn't find a way to solve it with sed or awk.
hi,
I have few text templates
as a simple ex:
template 1
city Name:
zip code:
state Name:
template2:
employee Name:
Phone number:
I wish to grep on given text file and make sure the text file matches one of these templates. Please give your ideas. (6 Replies)
Hi..
How to search for multiple words in a single line using grep?.
Eg: Jack and Jill went up the hill
Jack and Jill were best friends
Humpty and Dumpty were good friends too
----------
I want to extract the 2nd statement(assuming there are several statements with... (11 Replies)
The file contains one line of text followed by a number. I want to take the number X at the end, take it out and display the last X words. X is the key telling me how many words from the end that I want and X will always be less than the number of words, so no problem there.
Example input and... (4 Replies)
Hi Guys,
Can someone help me with a way to extract text between two words on a single line.
For example if the file has below content I want to extract all text between b and f inclusive of b and f. Aparently sed does this but does it line by line and I guess it cannot read word by word.
... (11 Replies)
Hi again
I have figured out how to be able to sort through lines in a file with multiple words in any order and display them using this command:
cat file | grep -i $OPTION1 | grep -i $OPTION2 | grep -i $OPTION3 OPTION1 is 2008, OPTION2 is Mar, OPTION 3 is Tue
Result:
Tue Mar 25... (4 Replies)
I can't decide if I should use AWK or PERL after pouring over these forums for hours today I decided I'd post something and see if I couldn't get some advice.
I've got a text file full of hundreds of events in this format:
Record Number : 1
Records in Seq : ... (3 Replies)
Hi
I use sed comnand to remove occurance of one workd from a line.
However I need to removed occurance of dufferent words in ne line.
Original-1 Hi this is the END of my begining
Comand sed s/"END"/"start"/g
Output-1 Hi this is the start of my beginig
But I have more... (9 Replies)
Hi All
I have to search servers name say like 1000+ "unique names" line by line in child.txt files in another file that is a master file where all server present say "master.txt",if child.txt's server name matches with master files then it print yes else no with server name. (4 Replies)
hi I made this simple script to extract data and pretty much is a list and would like to extract data of two words separated by commas and I would like to make a new text file that would list these extracted data into a list and each in a new line.
Example that worked for me with text file... (5 Replies)
Discussion started by: dandaryll
5 Replies
LEARN ABOUT NETBSD
veriexec
VERIEXEC(8) BSD System Manager's Manual VERIEXEC(8)NAME
veriexec -- file integrity subsystem
DESCRIPTION
Veriexec is an in-kernel, real-time, file-system independent, file integrity subsystem. It can be used for a variety of purposes, including
defense against trojaned binaries, indirect attacks via third-party remote file-systems, and malicious configuration file corruption.
CONFIGURATION
Signatures Database
Veriexec requires a signatures database -- a list of monitored files, along with their digital fingerprint and (optionally) access modes.
The format of this file is described by veriexec(5).
NetBSD provides a tool, veriexecgen(8), for generating the signatures database. Example usage:
# veriexecgen
Although it should be loaded on system boot (see ``RC Configuration'' below), this list can be loaded manually using veriexecctl(8):
# veriexecctl load
Kernel Configuration
Veriexec requires a pseudo-device to run:
pseudo-device veriexec 1
Additionally, one or more options for digital fingerprint algorithm support:
options VERIFIED_EXEC_FP_SHA256
options VERIFIED_EXEC_FP_SHA512
Some kernels already enable Veriexec by default. See your kernel's config file for more information.
RC Configuration
Veriexec also allows loading signatures and setting the strict level (see below) during the boot process using the following variables set in
rc.conf(5):
veriexec=YES
veriexec_strict=1 # IDS mode
STRICT LEVELS
Veriexec can operate in four modes, also referred to as strict levels:
Learning mode (strict level 0)
The only level at which the fingerprint tables can be modified, this level is used to help fine-tune the signature database. No
enforcement is made, and verbose information is provided (fingerprint matches and mismatches, file removals, incorrect access, etc.).
IDS mode (strict level 1)
IDS (intrusion detection system) mode provides an adequate level of integrity for the files it monitors. Implications:
- Monitored files cannot be removed
- If raw disk access is granted to a disk with monitored files on it, all monitored files' fingerprints will be invalidated
- Access to files with mismatched fingerprints is denied
- Write access to monitored files is allowed
- Access type is not enforced
IPS mode (strict level 2)
IPS (intrusion prevention system) mode provides a high level of integrity for the files it monitors. Implications:
- All implications of IDS mode
- Write access to monitored files is denied
- Access type is enforced
- Raw disk access to disk devices with monitored files on them is denied
- Execution of non-monitored files is denied
- Write access to kernel memory via /dev/mem and /dev/kmem is denied
Lockdown mode (strict level 3)
Lockdown mode provides high assurance integrity for the entire system. Implications:
- All implications of IPS mode
- Access to non-monitored files is denied
- Write access to files is allowed only if the file was opened before the strict level was raised to this mode
- Creation of new files is denied
- Raw access to system disks is denied
RUNTIME INFORMATION
Veriexec exports runtime information that may be useful for various purposes.
It reports the currently supported fingerprinting algorithms, for example:
# /sbin/sysctl kern.veriexec.algorithms
kern.veriexec.algorithms = RMD160 SHA256 SHA384 SHA512 SHA1 MD5
It reports the current verbosity and strict levels, for example:
# /sbin/sysctl kern.veriexec.{verbose,strict}
kern.veriexec.verbose = 0
kern.veriexec.strict = 1
It reports a summary of currently loaded files and the mount-points they're on, for example:
# /sbin/sysctl kern.veriexec.count
kern.veriexec.count.table0.mntpt = /
kern.veriexec.count.table0.fstype = ffs
kern.veriexec.count.table0.nentries = 33
Other information may be retrieved using veriexecctl(8).
SEE ALSO options(4), veriexec(5), sysctl(7), sysctl(8), veriexecctl(8), veriexecgen(8)AUTHORS
Elad Efrat <elad@NetBSD.org>
BSD February 18, 2008 BSD