DupeTrace 1.5

0 Likes

This utility can take an LDAP log file and execute the exact search commands in it.

This utility is useful when you are trying to exactly recreate an LDAP problem. First, you would create a test lab that contains a copy of the data on the production servers. After that, you would grab a trace of the typical LDAP traffic. Finally, you can simulate the exact searches, using this utility.



This utility has two modes - interactive and non-interactive. In interactive mode, the utility does each search, as it reads it from the trace. In non-interactive mode, the utility creates a temporary perl program that contains each search. You run the temporary perl program to execute the searches.



Here's the syntax of the command:



Interactive mode



$ ./dupetrace.pl -i -h -D -w tracefile

Example:



$ ./dupetrace.pl -i -h scruffy -D cn=admin,o=novell -w novell trace1.htm

Non-interactive mode



$ ./dupetrace.pl -h -D -w -f temp.pl tracefile

Example:



$ ./dupetrace.pl -h scruffy -D cn=admin,o=novell -w novell -f temp.pl trace1.htm
$ ./temp.pl


Notes



  1. To use the interactive mode, you need to install the perl-ldap package. You can easily do this through YaST or Red Carpet. If you really want to run it on Windows, you can get perl-ldap from www.cpan.org.


  • In non-interactive mode, there's a problem when the password has a '@' symbol in it. You'll have to change the password to remove this character.



12/08/05 Update (Version 1.5)
This version has 2 bug fixes and 1 enhancement:

- It correctly handles search bases that contain spaces, e.g. cn=Domain Users,o=novell.

- It correctly reports the number of searches found in the input file.

- It's been enhanced to work with iMonitor log files. Previously, the script only worked with those from dstrace.

Labels:

Collateral
Comment List
Related
Recommended