Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.
#!/bin/bash #LOGFILE=/var/log/monitoring/cpu/util #mkdir -p $LOGFILE #mpstat -u > $LOGFILE/util UTIL="mpstat -u" #cat $LOGFILE/util | grep -Ev "Linux|%" > $LOGFILE/util1 UTIL1="mpstat -u|grep -Ev "Linux|%"" #Deleting empty lines #sed '/^$/d' $LOGFILE/util1 >> $LOGFILE/util2 UTIL2="sed '/^$/d' $UTIL1" UTIL3="cut -c 21-24 $UTIL2" echo $UTIL3
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
20 Experts available now in Live!