LDAP source server IP address
Starting context in target eDirectory tree
The program will use the IP address and context entered to extract the schema naming attributes and all object RDNs from the context entered and below. The schema naming values are then used with ‘regular expressions’ (regex) to identify all collisioned objects in the extracted data.
The collisioned object data is then ‘context reversed’ and sorted to produce all collisioned objects in container order.
The main results output file is called ‘sorted_collisions.txt’.
The program should run on any Linux/Unix OS that supports ldapsearch, grep, egrep, awk, sed and cut. It has been tested on SLED10, SLES10/OES2 SP1 and SLES11.
- Untar the code to a new directory.
- Use chmod to make sure you can execute the perl program and the shell scripts (e.g. chmod 755 *).
- Verify connectivity to the intended LDAP source by pinging the LDAP server.
- Execute the program using: perl getcolls.pl
The code will correctly handle white space in any context entered (e.g. ‘ou=IT Dept.o=MyCo’).
Working files created (these are retained for debug purposes and can be deleted at will):
collisions.txt dnfixed.txt dnlist.txt getdn.pl revcolls.txt schema.pl schema.txt schema2.txt schema3.txt schema4.txt schema5.txt