Overview #Originally obtained from DupeTrace. (2012-11-24)
This utility can take an LDAP log file and execute the exact search commands in it.
This utility is useful when you are trying to exactly recreate an LDAP problem. First, you would create a test lab that contains a copy of the data on the production servers. After that, you would grab a trace of the typical LDAP traffic. Finally, you can simulate the exact searches, using this utility.
This utility has two modes - interactive and non-interactive. In interactive mode, the utility does each search, as it reads it from the trace. In non-interactive mode, the utility creates a temporary perl program that contains each search. You run the temporary perl program to execute the searches.
Here's the syntax of the command:
$ ./dupetrace.pl -i -h -D -w tracefileExample:
$ ./dupetrace.pl -i -h scruffy -D cn=admin,o=novell -w novell trace1.htm
$ ./dupetrace.pl -h -D -w -f temp.pl tracefileExample:
$ ./dupetrace.pl -h scruffy -D cn=admin,o=novell -w novell -f temp.pl trace1.htm $ ./temp.pl
Notes#To use the interactive mode, you need to install the perl-ldap package. You can easily do this through YaST or Red Carpet. If you really want to run it on Windows, you can get perl-ldap from www.cpan.org.
In non-interactive mode, there's a problem when the password has a '@' symbol in it. You'll have to change the password to remove this character.