10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi all,
i'm trying to gether multiple pattern on remote hosts, and trying to print hostname and the pattern,
ssh remoteserver1 -C 'hostname 2>&1;cat /var/log/server1.log | awk -F ";" '"'"'{ print " "$2" "$5}'"'"'| sort | uniq -c | sort -g -r '
The output is the following,
remoteserver1
... (8 Replies)
Discussion started by: charli1
8 Replies
2. Solaris
Am trying to copy a tar file onto a series of remote hosts and untar it at the destination. Need to do this without having to do multiple ssh.
Actions to perform within a single ssh session via shell script
- copy a file
- untar at destination (remote host)
OS : Linux RHEL6 (3 Replies)
Discussion started by: sankasu
3 Replies
3. Shell Programming and Scripting
Hi There,
I have a file contaning some 100 servers names one by one the file called redhat_servers.txt
I want to prepare a script where it should give me the host name and kernal version.
I wrote like this,
#!/bin/bash
while read line
do
ssh $line "uname -nr"
done <... (3 Replies)
Discussion started by: kumar85shiv
3 Replies
4. UNIX for Advanced & Expert Users
I monitor all my servers using Nagios. Now, for Nagios to run certain checks, it has to connect to remote hosts via a certain port. Lets say the port is 8090.
Now, when Nagios connects to a remote host (for an example) via port 8090, and it has to run 6 checks (scripts) on that remote host, i... (2 Replies)
Discussion started by: SkySmart
2 Replies
5. UNIX for Advanced & Expert Users
Hello forum:
I am curious about some output that I get using an alias <command> on a remote host and I wondered if someone could point me in the right direction.
Symptoms:
Using "ssh -qi /path/to/key root@som.ipa.ddr.ess mail" (or variation of via alias)
only gives a partial textual... (7 Replies)
Discussion started by: Habitual
7 Replies
6. Solaris
Hello,
Is there any way to check which user and from which IP executed a command to the server.I need something like the history but with information also from which IP the command executed.
Thanks in advance (8 Replies)
Discussion started by: @dagio
8 Replies
7. UNIX for Dummies Questions & Answers
Hi gurus of unix!!!!, I have a little question. I nedd your helps
The scenarios is the following
I have tree equipment that are installed in different places. I use a carrier to interconnect the equipment.
Some Port's (TCP) need to be open for an application that must be function correctly.
For... (3 Replies)
Discussion started by: andresguillen
3 Replies
8. UNIX for Advanced & Expert Users
Hi all,
Have used ftp to transfer files from remote host to localhost.
I was wondering how can I ftp into remote hosts.
for example from a unix box, connect to an external server and then ftp that file into mainframe ? I would like to avoid pulling it to unix box and then ftping to mainframe.... (1 Reply)
Discussion started by: kodermanna
1 Replies
9. UNIX for Dummies Questions & Answers
Don't know if its correct to write into this topic but how can I copy files from a Windows machine to a UNIX system? (2 Replies)
Discussion started by: agasamapetilon
2 Replies
10. Shell Programming and Scripting
Hi,
I am working on HPUX11 systems.
I intend to achieve following:
Need to write a shell script that will launch a program on remote UNIX machine. It will be gr8 if in addition, the remote process can be monitored using some feedback.
I donno how to use rsh / ssh for this. (specifying... (1 Reply)
Discussion started by: mrx
1 Replies
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)