Sunday, July 12, 2020

Catatan AWK

#cat a
1 = a
2 = b
3 = c
4 = d
5 = e
6 = f
7 = g
8 = h
9 = i

#cat b
a - one
c - three
e - five
g - seven
i - nine


#awk '{print $0,"FNR"FNR,"NR="NR}' a b
1 = a FNR1 NR=1
2 = b FNR2 NR=2
3 = c FNR3 NR=3
4 = d FNR4 NR=4
5 = e FNR5 NR=5
6 = f FNR6 NR=6
7 = g FNR7 NR=7
8 = h FNR8 NR=8
9 = i FNR9 NR=9
a - one FNR1 NR=10
c - three FNR2 NR=11
e - five FNR3 NR=12
g - seven FNR4 NR=13
i - nine FNR5 NR=14

#awk '{print $0,"FNR"FNR,"NR="NR}' b a
a - one FNR1 NR=1
c - three FNR2 NR=2
e - five FNR3 NR=3
g - seven FNR4 NR=4
i - nine FNR5 NR=5
1 = a FNR1 NR=6
2 = b FNR2 NR=7
3 = c FNR3 NR=8
4 = d FNR4 NR=9
5 = e FNR5 NR=10
6 = f FNR6 NR=11
7 = g FNR7 NR=12
8 = h FNR8 NR=13
9 = i FNR9 NR=14

FNR=number of row of the current file which have been read
 NR=total number of rows which have been read

FNR==NR will get the first input file
#awk 'FNR==NR {print $0,"FNR"FNR,"NR="NR}' a b
1 = a FNR1 NR=1
2 = b FNR2 NR=2
3 = c FNR3 NR=3
4 = d FNR4 NR=4
5 = e FNR5 NR=5
6 = f FNR6 NR=6
7 = g FNR7 NR=7
8 = h FNR8 NR=8
9 = i FNR9 NR=9
#awk 'FNR==NR {print $0,"FNR="FNR,"NR="NR}' b a
a - one FNR=1 NR=1
c - three FNR=2 NR=2
e - five FNR=3 NR=3
g - seven FNR=4 NR=4
i - nine FNR=5 NR=5

FNR<NR will get the second input file
#awk 'FNR<NR {print $0,"FNR="FNR,"NR="NR}' a b
a - one FNR=1 NR=10
c - three FNR=2 NR=11
e - five FNR=3 NR=12
g - seven FNR=4 NR=13
i - nine FNR=5 NR=14
#awk 'FNR<NR {print $0,"FNR"FNR,"NR="NR}' b a
1 = a FNR1 NR=6
2 = b FNR2 NR=7
3 = c FNR3 NR=8
4 = d FNR4 NR=9
5 = e FNR5 NR=10
6 = f FNR6 NR=11
7 = g FNR7 NR=12
8 = h FNR8 NR=13
9 = i FNR9 NR=14


#awk 'FNR==NR {x[$1]=$1;print x[$1]}' a b
1
2
3
4
5
6
7
8
9
#awk 'FNR==NR {x[$1]=$2;print x[$1]}' a b
=
=
=
=
=
=
=
=
=
#awk 'FNR==NR {x[$1]=$3;print x[$1]}' a b
a
b
c
d
e
f
g
h
i
#awk 'FNR<NR {x[$1]=$1;print x[$1]}' a b
a
c
e
g
i
#awk 'FNR<NR {x[$1]=$2;print x[$1]}' a b
-
-
-
-
-
#awk 'FNR<NR {x[$1]=$3;print x[$1]}' a b
one
three
five
seven
nine


{x[$3];next} stores in x[]  the third column of the first file (FNR==NR) and goes to the next line.
$1 in x is evaluated column 1 of second file when looping. It checks if the current line is within the x[] array.
#awk 'FNR==NR{x[$3];next} $1 in x' a b
a - one
c - three
e - five
g - seven
i - nine

{x[$1];next} stores in x[]  the first column of the first file (FNR==NR) and goes to the next line.
$3 in x is evaluated column 3 of second file when looping. It checks if the current line is within the x[] array.
#awk 'FNR==NR{x[$1];next} $3 in x' b a
1 = a
3 = c
5 = e
7 = g
9 = i


Reads file b, storing all into an string-indexed array (eg x["a"] == "one" ; x["c"] == "three" )
if X[?] not blank, replace column 3 of second file with the x[?] value
while read second file (FNR<NR) print it

REPLACE
#awk 'FNR==NR{x[$1]=$3}(x[$3]!=""){$3=x[$3]} FNR<NR { print}' b a
1 = one
2 = b
3 = three
4 = d
5 = five
6 = f
7 = seven
8 = h
9 = nine

MERGE
#awk 'FNR==NR{x[$1]=$0} FNR<NR {print $0,x[$3]}' b a
1 = a a - one
2 = b
3 = c c - three
4 = d
5 = e e - five
6 = f
7 = g g - seven
8 = h
9 = i i - nine

Mengambil Tanggal dan Waktu pada batch file.


OPSI 1:
@echo off

::Previous Windows %DATE% was "MM/DD/YYYY" -not- "DAY MM/DD/YYYY", so get it from Right to left first.
set WJ_date=%date:~-10%
set WJ_date=%WJ_date:~6,4%%WJ_date:~0,2%%WJ_date:~3,2%
echo WJ_date=%WJ_date%

:: Replace ' ' with '0' before 10am
set WJ_time=%TIME: =0%
set WJ_time=%WJ_time:~0,2%%WJ_time:~3,2%%WJ_time:~6,2%
echo WJ_time=%WJ_time%

echo.
pause

OPSI 2:
@echo off

::Previous Windows %DATE% was "MM/DD/YYYY" -not- "DAY MM/DD/YYYY" !
::for /f "tokens=1,2,3,4 delims=/ " %%a in ("%DATE%")  do set MM=%%b&set DD=%%c&set YYYY=%%d
for   /f "tokens=1,2,3,4 delims=/ " %%a in ('date /t') do set MM=%%b&set DD=%%c&set YYYY=%%d
set  WJ_date=%YYYY%%MM%%DD%
echo WJ_date=%WJ_date%

for /f "tokens=1,2,3,4 delims=:." %%a in ("%TIME: =0%")  do set hh=%%a&set nn=%%b&set ss=%%c
set WJ_time=%hh%%nn%%ss%
echo WJ_time=%WJ_time%

echo.
pause


Reff: https://www.dostips.com/DtTipsStringManipulation.php

Sunday, February 18, 2018

Perubahan konfigurasi oleh TELKOM

Per Desember 2017, TELKOM telah melakukan perubahan konfigurasi dengan mengaktifkan filter port Telnet (23) dengan diikuti penggantian password admin-nya.
Hal tsb menyebabkan sistem monitoring menggunakan Cacti yang pernah dimuat dalam blog ini tidak dapat digunakan. Artinya, sekarang kita tidak dapat lagi memantau penggunaan bandwidth Speedy/Indihome yang kita digunakan.

Pada gambar dibawah terlihat port Telnet yang difilter.


Dibawah ini perbandingan menu ZTE F660 sebelum dan sesudah dilakukan filtering.
Terlihat, sejak filter diaktifkan ada menu yang 'hilang' yakni : Service Control.
Hal ini membuat kita tidak dapat mengakses telnet service pada perangkat tsb.




Terima Kasih sudah mampir.

Monday, November 21, 2016

Mengambil informasi IP Address pada ZTE F660 melalui service HTTP

Sebelumnya saya sudah pernah menulis Update Dynamic DNS menggunakan cron pada Linux .
Pada tulisan tersebut saya menggunakan perintah telnet untuk mengambil informasi IP public pada ZTE F660.
Ternyata service telnet tsb 'kurang' reliable, karena seringkali tidak merespon perintah telnet.
Timbul pemikiran mengapa tidak mengambil informasi melalui service web (http) saja ?
Tantangannya adalah : Bagaimana cara mengambil data tsb menggunakan bash script ?
ZTE F660 yang saya miliki menggunakan  Mini web server 1.0 ZTE corp 2005.

Ada yang menarik pada fasilitas web ini : Saat ada login yang aktif, maka kita dapat langsung mengambil data dengan memasukan URL tanpa perlu otentikasi meskipun dengan browser yang berbeda. Hal ini dapat dilakukan karena sistem otentikasi ZTE memanfaatkan Token.

Setlah googling sana-sini saya mendapatkan titik terang bahwa script yang saya buat harus melakukan 3 hal :
1. Mengambil nilai Token.
2. Melakukan login menggunakan User, Password dan Token yang valid
3. Mengabil data IP saat login session diatas masih valid.

Biasanya, Telkom memasang perangkat ONT tsb dengan IP standar : 192.168.1.1.
Sehingga buat yang sudah tidak sabar, berikut ini script bash-nya:

WJ_USR=admin
WJ_PWD=password
WJ_OUT=/tmp/wjgetip.out
# Ambil Nilai Token dan memasukkan dalam variable
WJ_TKN=`lynx -dump -source -connect_timeout=10 'http://192.168.1.1/' | grep 'getObj("Frm_Logintoken"'|cut -d'"' -f4`
sleep 1
# Melakukan login dengan menggunakan User,Password dan Token yang valid
echo "frashnum=&Frm_Logintoken=$WJ_TKN&Username=$WJ_USR&Password=$WJ_PWD" | lynx -post_data -connect_timeout=10 -dump http://192.168.1.1 > $WJ_OUT
sleep 1
# Mengabil data IP saat login session diatas masih valid.
lynx -connect_timeout=10 -dump "http://192.168.1.1/getpage.gch?pid=1002&nextpage=PON_status_wan_if_t.gch" >> $WJ_OUT
# Memasukkan IP yang diperoleh pada variable dan menampilkannya
WJ_IPCURR=`grep "IP Address " $WJ_OUT | awk '{print $3}'`
echo "Current IP : $WJ_IPCURR"

Ada hal yang perlu diperhatikan bila password anda menggunakan karakter spesial.
Maka variable WJ_PWD (password) harus dikonversi menggunakan ASCII Code  terlebih dahulu.
Misalnya, bila password anda adalah (tanpa tanda kutip) "!23#" maka variable WJ_PWD="%2123%23"

Pada tulisan mendatang, saya akan menggabungkan scipt ini dengan script yang sebelumnya sudah saya ulas (wjdynDNS.sh).
Selamat mencoba.

Sunday, September 25, 2016

Catatan IPTALBES

Di bawah ini catatan /etc/sysconfig/iptables yang pernah saya gunakan.
# Firewall configuration written by system-config-securitylevel
# Manual customization of this file is not recommended.
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
#==========================================================================================================
#RFC 1918
-A INPUT -i eth0 -s 10.0.0.0/24        -j DROP
-A INPUT -i eth0 -s 172.16.0.0/12      -j DROP
-A INPUT -i eth0 -s 192.168.0.0/16     -j DROP
-A INPUT -i eth0 -s 224.0.0.0/4        -j DROP
-A INPUT -i eth0 -s 240.0.0.0/5        -j DROP
#Multicast
-A INPUT -i eth0 -d 127.0.0.0/8        -j DROP
-A INPUT -i eth0 -s 169.254.0.0/16     -j DROP
-A INPUT -i eth0 -s 0.0.0.0/8          -j DROP
-A INPUT -i eth0 -s 240.0.0.0/4        -j DROP
-A INPUT -i eth0 -s 255.255.255.255/32 -j DROP
-A INPUT -i eth0 -s 168.254.0.0/16     -j DROP
-A INPUT -i eth0 -s 248.0.0.0/5        -j DROP
# Drop invalid packets.
-A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP
-A INPUT -p tcp -m tcp --tcp-flags SYN,FIN SYN,FIN              -j DROP
-A INPUT -p tcp -m tcp --tcp-flags SYN,RST SYN,RST              -j DROP
-A INPUT -p tcp -m tcp --tcp-flags FIN,RST FIN,RST              -j DROP
-A INPUT -p tcp -m tcp --tcp-flags ACK,FIN FIN                  -j DROP
-A INPUT -p tcp -m tcp --tcp-flags ACK,URG URG                  -j DROP
# ICMP
#-A RH-Firewall-1-INPUT -p icmp --icmp-type destination-unreachable -j ACCEPT
#-A RH-Firewall-1-INPUT -p icmp --icmp-type time-exceeded           -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type echo-reply              -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type echo-request            -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any                     -j DROP
# LOG
# <0>KERN_EMERG:system is unusable               |<3>KERN_ERR:error conditions        |<6>KERN_INFO:informational
# <1>KERN_ALERT:action must be taken immediately |<4>KERN_WARNING:warning conditions  |<7>KERN_DEBUG:debug-level messages
# <2>KERN_CRIT:critical conditions               |<5>KERN_NOTICE:normal but significant condition
#-A RH-Firewall-1-INPUT  -m limit --limit 15/minute -j LOG --log-level 6 --log-prefix "FW_INPUT_DROPPED: "
#-A OUTPUT -m limit --limit 15/minute -j LOG --log-level 7 --log-prefix "FW_OUTPUT_DROPPED: "
#-A INPUT  -m limit --limit 10/second --limit-burst 20 -j LOG --log-level 7 --log-prefix "FW_INPUT_DROPPED: "
#==========================================================================================================
# Open Port : 25(SMTP), 80(HTTP), 443(HTTPS)
#==========================================================================================================
-A RH-Firewall-1-INPUT -m state --state NEW                             -m tcp -p tcp --dport 80  -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW                             -m tcp -p tcp --dport 443 -j ACCEPT
#==========================================================================================================
# Open Port 22(SSH) for Internal IP Only
#==========================================================================================================
-A RH-Firewall-1-INPUT -m state --state NEW -s 10.10.10.0/255.255.255.0 -m tcp -p tcp --dport 22  -j ACCEPT
#==========================================================================================================
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
-A RH-Firewall-1-INPUT -j REJECT -p tcp --reject-with tcp-reset
-A RH-Firewall-1-INPUT -j LOG
-A RH-Firewall-1-INPUT -j DROP
COMMIT

Sunday, September 18, 2016

Memantau penggunaan bandwidth Indihome dengan perangkat ZTE F660

Sehubungan perangkat ZTE F660 tidak dapat dipantau menggunakan SNMP seperti perangkat sebelumnya (ZTE-ZXV10W300), maka saya mencoba memataunya menggunakan bash script.
Hasilnya saya tampilkan menggunakan Cacti.
Berikut ini data Cacti yang saya gunakan :

Cacti Version : 0.8.8a
Cacti OS : unix (Linux version 2.6.18-164.el5)
SNMP Version  : NET-SNMP version: 5.3.2.2
RRDTool Version  : RRDTool 1.4.x

Urutan pembuatannya sbb :

1. Tempatkan script di bawah pada folder '<path_cacti>/scripts/wjspeed.sh'
Pastikan ownernya dan attribut file tsb dapat dieksekusi (chmod 555/755) 
 
#!/bin/bash
#
export WJ_FILETMP=/tmp/wjspeed.tmp
export WJ_FILELOG=/tmp/wjspeed.log

export WJ_TARGET=192.168.1.1
export WJ_USER=root
export WJ_PASS=Zte521
export WJ_INTR=ppp0

echo -n "`date`" > $WJ_FILETMP
# Start the expect script
(expect -c "
set timeout 10
# Start the session with the input variable and the rest of the hostname
spawn telnet $WJ_TARGET
expect \"*ogin:\"
send   \"$WJ_USER\r\"
expect \"*assword:\"
send   \"$WJ_PASS\r\"
expect \"*#\"
send   \"ifconfig $WJ_INTR | grep bytes\r\"
expect \"*#\"
send   \"exit\r\"
#
# stop the expect script once the telnet session is closed
exit
") | grep RX | sed -e 's/^       //g' | sed -e 's/:/=/g' >> $WJ_FILETMP

if [ "`grep RX $WJ_FILETMP`" ]
then
   head -1 $WJ_FILELOG >> $WJ_FILETMP
   cat     $WJ_FILETMP  > $WJ_FILELOG
fi
#echo "   RX bytes=0 (0 MiB)  TX bytes=0 (0 MiB)" >> $WJ_FILETMP


if [ "`wc -l $WJ_FILELOG | cut -d' ' -f1`" = "2" ]
then
   R2=`head -1 $WJ_FILELOG | cut -d'=' -f2 | awk '{print  $1}'`
   T2=`head -1 $WJ_FILELOG | cut -d'=' -f3 | awk '{print  $1}'`

   R1=`tail -1 $WJ_FILELOG | cut -d'=' -f2 | awk '{print  $1}'`
   T1=`tail -1 $WJ_FILELOG | cut -d'=' -f3 | awk '{print  $1}'`

   TBPS=`expr $T2 - $T1` ; TBPS=`expr $TBPS / 300`
   RBPS=`expr $R2 - $R1` ; RBPS=`expr $RBPS / 300`

   #After restart R2&T2 will be 0, R1&T1 will still using old counter
   [ "$TBPS" -ge "1250000" ] && TBPS=0
   [ "$RBPS" -ge "1250000" ] && RBPS=0

   echo "tx:$TBPS rx:$RBPS"
else
   echo "tx:0 rx:0"
fi


2. Buat 'Data Input Methods'





3. Buat 'Data Templates'




4. Buat 'Graph Templates'
 



5. Buat 'Graph Management'



Selamat Mencoba


Sunday, September 11, 2016

Update Dynamic DNS menggunakan cron pada Linux

Berikut ini script yang saya gunakan untuk mengupdate Dynamic DNS menggunakan cron pada OS Linux.
Silahkan di-co-pas dan disesuaikan dengan keperluan anda, tempatkan  pada : /u/wjdynDNS/wjdynDNS.sh
Selamat mencoba

#!/bin/bash
#
# Declare host variable as the input variable
unset  WJ_IPCURR WJ_IPLAST
export WJ_FILETMP=/tmp/wjtelnet.tmp
export WJ_LASTLOG=/u/wjdynDNS/log/wjtelnet.log.`date +%m` ; [ ! -f $WJ_LASTLOG ] && touch $WJ_LASTLOG

WJ_LOG()
{
#Menggunakan print agar keluarannya dapat diatur posisinya
  printf "%-15s %s %-25s %s\n" $WJ_IPCURR "`date '+%a %Y-%m-%d %H:%M:%S'`" $1 >> $WJ_LASTLOG
}

export WJ_TARGET=192.168.1.1
export WJ_USER=root
export WJ_PASS=Zte521
export WJ_INTR=ppp0

# Start the expect script
(expect -c "
set timeout 10
# Start the session with the input variable and the rest of the hostname
spawn telnet $WJ_TARGET
expect \"*ogin:\"
send   \"$WJ_USER\r\"
expect \"*assword:\"
send   \"$WJ_PASS\r\"
expect \"*#\"
send   \"ifconfig $WJ_INTR | grep addr\r\"
expect \"*#\"
send   \"exit\r\"
#
# stop the expect script once the telnet session is closed
exit
") | grep 'inet addr' > $WJ_FILETMP

WJ_IPCURR="`sed -e 's/:/ /g' $WJ_FILETMP | awk '{print $3}'`"

WJ_LASTLOGx=$WJ_LASTLOG ; [ ! -s $WJ_LASTLOGx ] && WJ_LASTLOGx=${WJ_LASTLOG%.*}.`date +%m -d 'yesterday' `
WJ_IPLAST="`tail -1 $WJ_LASTLOGx | awk '{print $1}'`"


if [[ $WJ_IPCURR =~ ^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$ ]]
then
   if [ "$WJ_IPCURR" = "$WJ_IPLAST" ]
   then
       WJ_LOG "_skipped_"
   else
       #Silahkan masukkan script/Dynamic DNS anda disini.
       #Contoh untuk www.noip.com
       #/u/noip/noip2 -c /u/noip/noip2.conf

       WJ_LOG "_executed_"
   fi
else
   WJ_LOG "-get_IP_failed-"
fi

Dan ini crontab-nya :

# Minute  Hour  Day of Month      Month          Day of Week      Command
# (0-59) (0-23)    (1-31)    (1-12 or Jan-Dec) (0-6 or Sun-Sat) (full path)
#-------+------+------------+-----------------+----------------+------------------------------------------------------------+
 0-59/15      *      *              *                 *        /u/wjdynDNS/wjdynDNS.sh