UpFront

The UpFront Section

UpFront

Tech Tip

Here's the problem. We need to remove duplicate lines from unsorted text from within the shell. This normally would be the job of sort -u or sort | uniq, except that in either case, we lose the input order. For example, if this is the input file:


$ cat >/tmp/numbers <<EOF
one
two
three
one
three
four
EOF

Running it through sort -u would get this:

$ sort -u /tmp/numbers
four
one
three
two

The solution:

$ nl /tmp/numbers | sort -k2 -u | sort -n | cut -f2-
one
two
three
four

For platforms where the nl command is not available, awk could be used to simulate this behavior:

$ awk -v 'OFS=\t' '{print NR, $0}' /tmp/numbers | sort -k2 -u 
 ↪| sort -n | cut -f2-
one
two
three
four

What it does is pretty simple—it adds a record number field, sorts the input ignoring that field, restores the original order using the record numbers and then strips that field out.

Tech Tip

There is nothing worse than when you boot up your Linux machine to show Windows users a neat feature, such as your slick 3-D Compiz desktop, and while booting, you get the message that one of your partitions needs to be force-checked because it hasn't been checked in 23 boots. So while e2fsck trudges through that giant partition scanning for errors, the people you were attempting to convert are rolling their eyes and trying to contain their laughter about your so-called superior OS.

You can tweak the conditions under which the filesystem check will run at boot time using the command tune2fs. Using a -c option allows you to tweak the number of boots that will trigger a forced check, and using -i allows you to change the time interval between checks in the format: [days|weeks|months].

If you want to initiate disk checks manually only (a risky idea if you forget—proceed at your own risk!), use this variant of the command:

tune2fs -c 0 - i 0

Tech Tip

Do you need to give passwordless SSH access to users but also need to restrict what can be run? Here I give interactive and non-interactive examples.

First, you need to generate authentication keys (no passphrase) using ssh-keygen. In this tip, I generated rsa keys. The keys, by default, are saved as ~/.ssh/id_rsa and ~/.ssh/id_rsa.pub.

You need to append the public key as follows:

suman@shri:~/.ssh$ cat id_rsa.pub >> authorized_keys

Prepend the command (that you want to be executed automatically) to the signature. For example, if uptime is the command to be executed automatically whenever an SSH request comes from the user for which you generated the key, the key entry in authorized_keys file should look like this:


command="/usr/bin/uptime" ssh-rsa <LONG ENCRYPTED STRING>

Now, you can use the private key to execute the uptime command automatically. The private key in this example, by default, was saved as ~/.ssh/id_rsa. I copied it to the remote host and saved it as uptime.key. Make sure this file has 600 permissions. Then, you can do the following (from the remote machine):

suman@strangeloop:~ % ssh -T -i uptime.key suman@shri
 15:11:46 up 4 days, 3 min,  3 users,  load average: 0.00, 0.00, 0.00

This technique also can be used for interactive programs. Below is a simple interactive shell script:

#!/bin/sh
echo -n "Hi! Enter your fav distro: "
read DISTRO
echo "Your fav distro is $DISTRO"

Here I have created another set of keys as I did above. I saved the private key as distro.key. Prepend command="<full_path_to_script>" to the public key in the authorized_keys file, and you will be able to do:

suman@strangeloop:~ % ssh -T -i distro.key suman@shri
Hi! Enter your fav distro: Debian
Your fav distro is Debian

______________________

Webinar
One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Webinar
Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix