Solved

KSH scripting question

Posted on 2013-06-12
7
235 Views
Last Modified: 2013-06-12
I am looking over the ksh script and there is a line

sqlplus "/ as sysdba" <<!


I was wondering what is <<! part of it? What does it do?

I know that >> appends output to a file and that < is a standard input, but what about << in a conjunction with !
0
Comment
Question by:YZlat
7 Comments
 
LVL 31

Accepted Solution

by:
farzanj earned 250 total points
Comment Utility
Just processes output until it sees ! in a line.

So it will process all lines below this command until it sees !

command << END_TAG
abc
def
adf
END_TAG

Your end tag is !
0
 
LVL 35

Author Comment

by:YZlat
Comment Utility
I see. But there isn't any ! anywhere in my script
0
 
LVL 23

Expert Comment

by:nemws1
Comment Utility
farzanj is 100% correct.  Just tested this on my box with ksh:

$cat <<!
> what
> is 
> up
> man
> !
what
is
up
man
$

Open in new window

0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 5

Expert Comment

by:DOSLover
Comment Utility
This says the input begins after the next new line and continues until there is a line containing only the delimiter. In your case the delimiter is !

Here is a link that might help: http://pic.dhe.ibm.com/infocenter/aix/v7r1/index.jsp?topic=%2Fcom.ibm.aix.baseadmn%2Fdoc%2Fbaseadmndita%2Fkorn_shell_inout_redir.htm
0
 
LVL 84

Expert Comment

by:ozo
Comment Utility
if there is no terminating ! then ksh may just read to the end of the script
0
 
LVL 23

Expert Comment

by:nemws1
Comment Utility
ozo is correct.  bash prints out an error, ksh does not and happily accepts an end-of-file terminator:

$cat <<!
> hey
> there
> man
> ^Dhey
there
man
$
0
 
LVL 35

Author Closing Comment

by:YZlat
Comment Utility
Thanks, got it!
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Background Still having to process all these year-end "csv" files received from all these sources (including Government entities), sometimes we have the need to examine the contents due to data error, etc... As a "Unix" shop, our only readily …
Active Directory replication delay is the cause to many problems.  Here is a super easy script to force Active Directory replication to all sites with by using an elevated PowerShell command prompt, and a tool to verify your changes.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now