This is the script that I have written so far. It does not include any code for writing the messages to the temp file, or any code for sending the email.
Code:
#!/bin/ksh
DATEmonth='date +%m'
DATEday='date +%y'
#this puts the instance names in an array
set -A instance
instance[0]="ont0"
instance[1]="qbc1"
instance[2]="jdbc0"
instance[3]="ont5"
instance[4]="qbc5"
instance[5]="jdbc5"
#this puts the file names in an array
fName[0]="nohup.out"
fName[1]="PHLog.txt"
fName[2]="PSQTlog.txt"
fName[3]="response-Log.txt"
fName[4]="access.log
fName[5]="wl-domain.log"
fName[6]="weblogic.log"
fName[7]="ServiceAddressQueryResponse.Log.txt"
#loop through the instance and back up files
function setInstance(){
for ((x=0; x<6; x++))
do
switch ($x)
case 0:
cd /opt/bea/ont0/wls6.1/config/bles/logs
backupFiles(x)
case 1:
cd /opt/bea/qbc1/wls6.1/config/bles/logs
backupFiles(x)
case 2:
cd /opt/bea/jdbc0/wls6.1/config/bles/logs
backupFiles(x)
case 3:
cd /opt/bea/ont5/wls6.1/config/bles/logs
backupFiles(x)
case 4:
cd /opt/bea/qbc5/wls6.1/config/bles/logs
backupFiles(x)
case 5:
cd /opt/bea/jdbc5/wls6.1/config/bles/logs
backupFiles(x)
done
}
function backupFiles{
for ((y=0; y<8; y++))
do
if [$fName[y] = "access.log"] || [$fName[y] = "weblogic.log"]
then
tar cvf $fName[y].$DATEmonth.tar $logfile.$DATEmonth*
mv bk$fName[y].$DATEmonth.tar $fName[y]$DATEmonth_$DATEday.tar
gzip $fName[y].$DATEmonth_$DATEday.tar
el if [$fName[y] = "wl-domain.log"]
then
tar cvf $fName[y].$DATEmonth_$DATEday.tar $fName[y]
cp /dev/null/$fName[y]
gzip $fName[y].$DATEmonth_$DATEday.tar
else
tar cvf bk$fName[y].$DATEmonth.tar $fName[y].$DATEmonth*
mv bk$fName[y].$DATEmonth.tar $fName[y].$DATEmonth_$DATEday.tar
gzip $fName[y].$DATEmonth_$DATEday.tar
fi
done
mv *.tar.gz /u01/$instance[x]/
}
setInstance
From what I can determine (using uname) this is simply a Generic version of SunOS.
Hi :)
I just wanted to ask a few basic questions really. I'm telnetting to a remote host and I've finally found out that I'm using a csh shell.
My questions are:
1. Is the somename@something, the user group logged in?
2. How do I change user?
I'm really lost so I hope someone can help... (7 Replies)
Even though I have been logging in to a UNIX shell at school to complete school projects and write programs, but I had never really worked in UNIX environment. But a couple of weeks back I got hooked on to Solaris 9OE, read a book, a tutorial, a document provided on the Sun Microsystems website,... (1 Reply)
I have been an apple customer for years now, and am not satisfied with the direction that they are going. So I just ordered my first PC notebook the other day. I have no desire to use windows, however with microsoft's hold on the market, I feel that I may have a hard time doing this. I want to... (2 Replies)
Hi Unix gurus,
I know these are some easy questions.
But i just want to be sure about them.
Hope someone can help explain the following please?
1) if ]
- What does the "-r" means?
2) isql -U $DBUSER -D $DBNAME -S $DSQUERY -w 1000 -s";" << testfile > $FILE
- What does the -s";" mean and... (1 Reply)
Hello,
I want to learn LISP, and I have a GNU/Linux OS. I first sought a LISP compiler/interpreter and was told that GNU Emacs has a LISP mode. But I couldn't get into LISP mode, nor I don't know how to use it when I get into LISP mode.
How can I run LISP code under GNU Emacs?
And if... (1 Reply)
Hello everyone, I am brand spanking new to both Solaris and Unix. I thought I would give it a go after buying a SB2500 off ebay for a few hundred dollars.
I am having some issues that I am not sure how to correct, and I am wondering if I can get a few pointers?
The first one is that my system... (2 Replies)
Hi,
So I started to learn perl a few days ago, and I have some problems...
One of my problems...
#!C:\Perl64\bin\perl.exe -w
use LWP::Simple;
print "Content-Type: Text/Plain\n\n";
sub pagelinks {
return @all = get($_) =~ /href\s*=\s*"?(+)/gis;
}
@a =... (5 Replies)
I entered a command at the prompt and it's interactive (not background). It gathers some stats and writes them to a file. I want to see this job running and what it's doing - I/O especially and maybe CPU and stuff. What can do to see this (say using a second session?)
I know it's a long job but... (3 Replies)
Hi Guys, I am new in this forum and new with AIX however not new with Power System. I have worked with iSeries for many years. Now supporting AIX on Power.
Here are some basic questions I have.
1. I am using Putty to connect from my PC to the AIX boxes. Is there any other (better) program to... (6 Replies)
Discussion started by: 300zxmuro
6 Replies
LEARN ABOUT CENTOS
pkidestroy
pkidestroy(8) PKI Instance Removal Utility pkidestroy(8)NAME
pkidestroy - Removes a subsystem from an instance of Certificate Server.
SYNOPSIS
pkidestroy -s <subsystem> -i <instance> [-u <secutiry domain username>] [-W <security domain password file>] [-h] [-v] [-p <prefix>]
DESCRIPTION
Removes a subsystem from an instance of Certificate Server. This utility removes any of the Java-based Certificate Server subsystems (CA,
KRA, OCSP, and TKS).
Note: This utility is only used for Java-based subsystems. The Apache-based Certificate Server subsystems (RA and TPS) are removed using
pkiremove.
An instance can contain multiple subsystems, although it may contain at most one of each type of subsystem. So, for example, an instance
could contain CA and KRA subsystems, but not two CA subsystems. If pkidestroy is invoked on the last subsystem in the instance, then that
instance is removed. Typically, as subsystems need to contact the CA to update the security domain, the CA instance should be the last
instance to be removed.
OPTIONS -s <subsystem>
Specifies the subsystem to be removed, where <subsystem> is CA, KRA, OCSP, or TKS. If this option is not specified, pkidestroy will
prompt for its value.
-i <instance>
Specifies the name of the instance from which the subsystem should be removed. The instance is located at /var/log/pki/<instance>.
If this option is not specified, pkidestroy will prompt for its value.
-u <security domain username>
Specifies the username of the security domain of the subsystem. This is an optional parameter.
-W <security domain password file>
Specifies the file containing the password of the security domain of the subsystem. This is an optional parameter.
-h, --help
Prints additional help information.
-v Displays verbose information about the installation. This flag can be provided multiple times to increase verbosity. See pkide-
stroy -h for details.
BUGS
Report bugs to http://bugzilla.redhat.com.
AUTHORS
Ade Lee <alee@redhat.com>. pkidestroy was written by the Certificate Server project.
COPYRIGHT
Copyright (c) 2012 Red Hat, Inc. This is licensed under the GNU General Public License, version 2 (GPLv2). A copy of this license is avail-
able at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
SEE ALSO pkispawn(8)version 1.0 December 13, 2012 pkidestroy(8)