DevOps Cloud (ADM)
Cybersecurity
IT Operations Management
This utility can take an LDAP log file and execute the exact search commands in it.
This utility is useful when you are trying to exactly recreate an LDAP problem. First, you would create a test lab that contains a copy of the data on the production servers. After that, you would grab a trace of the typical LDAP traffic. Finally, you can simulate the exact searches, using this utility.
This utility has two modes - interactive and non-interactive. In interactive mode, the utility does each search, as it reads it from the trace. In non-interactive mode, the utility creates a temporary perl program that contains each search. You run the temporary perl program to execute the searches.
Here's the syntax of the command:
Interactive mode
Example:
Non-interactive mode
Example:
Notes
12/08/05 Update (Version 1.5)
This version has 2 bug fixes and 1 enhancement:
- It correctly handles search bases that contain spaces, e.g. cn=Domain Users,o=novell.
- It correctly reports the number of searches found in the input file.
- It's been enhanced to work with iMonitor log files. Previously, the script only worked with those from dstrace.