首页 > 系统服务 > 详细

linux常见命令

时间:2019-02-28 18:24:03      阅读:180      评论:0      收藏:0      [点我收藏+]

cat /usr/local/nginx/logs/access.log|grep \.apk|awk ‘{print $10}‘|awk ‘{sum += $1} END {print sum}‘

 

cat /usr/local/nginx/logs/access.log-201604011|sed -n "/2016:09:00:00/,/2016:10:00:00/"p|grep "200"|awk ‘{print $10}‘|awk ‘{sum += $1} END {print sum}‘


ansible zixun_WWW -m copy -a "src=/usr/local/src/zabbix-3.0.1.tar.gz dest=/usr/local/src/ mode=755 owner=root"


cat /usr/local/nginx/logs/access.log|sed -n "/2016:09:00:00/,/2016:10:00:00/"p|awk ‘{print $NF}‘ |sed ‘s/"/" /‘g|awk ‘{print $2}‘|sed ‘s/"/ "/‘g|awk ‘{if ($1>3)print $1}‘|wc -l

 

查找删除 sudo find . -name "ERROR.log*" -mmin +720 -exec rm -f {} \;

 

curl -H ‘host:183.131.2.238‘ http://fund.10jqka.com.cn


ping -f -i 0.01 -c 10000 1.1.1.1


traceroute -m 10 -I www.baidu.com


ls /etc/www/*.tar.gz|xargs tar zxf

 

tcpdump -i eth0 -X -s0 -vnn dst host 183.131.12.145 and dst port 5666
(抓去目的ip和目的端口的数据包)
tcpdump -i eth0 -X -s0 -vnn host 54.223.140.178

tcpdump -i eth0 -X -s0 -vnn src host 192.168.205.187 or port 5666
(抓去源ip和端口的数据包)

tcpdump -i eth0 -nn port 8443 -w 1111.log 抓本机端口包

(抓取端口和ip10.143.130.108访问的数据包)
sudo tcpdump -nn port 80 and host 10.143.130.108


tcpdump -i ${NIC} -s 0 -n -vv -c ${NUM} src host ${IP} and dst net 10.142.194.0/24 or dst host 10.20.48.11 -w ${FILE

 

制定sock文件
mysql -uroot -pyunwei2011_postscan -S /data/mysql/mysql.sock

dd 写入磁盘测试

time dd if=/dev/zero of=/test.dbf bs=8k count=300000


tail -f /usr/local/nginx/logs/comment.access.log|awk ‘$9~/500/‘


cpu个数:cat /proc/cpuinfo|grep ‘physical id‘|sort|uniq|wc -l
cat /proc/cpuinfo | grep physical | uniq -c

物理核心数:cat /proc/cpuinfo|grep ‘cpu cores‘|uniq
逻辑核心数:cat /proc/cpuinfo|grep ‘processor‘|wc -l
查看硬盘大小:smartctl --all /dev/sda

 

查看网卡流量
watch cat /proc/net/dev

查看端口联通情况
nc -z -w 1 $ip $port
临时加端口
nc -l $port

netstat -anlp|grep java|awk ‘/^tcp/ && /ESTABLISHED/{t++}END{print t}‘

0 5,9,13,17,20,23 * * * /usr/sbin/ntpdate 10.142.132.33 && /sbin/hwclock -w &>/dev/null

 

导堆栈

jstack -l 3845 > stack0826.txt
jmap -dump:live,format=b,file=p0826.bin 3845

 


0 5,9,13,17,20,23 * * * /usr/sbin/ntpdate 10.142.132.33 && /sbin/hwclock -w &>/dev/null
*/5 * * * * /usr/sbin/ntpdate 10.142.130.69 && /sbin/hwclock -w
*/5 * * * * /usr/sbin/ntpdate 10.142.130.62 && /sbin/hwclock -w

*/5 * * * * /usr/sbin/ntpdate 132.35.101.11 && /sbin/hwclock -w
*/5 * * * * /usr/sbin/ntpdate 132.35.101.12 && /sbin/hwclock -w

 

ls -la /proc/ID 根据进程id查看程序启动文件位置

 

抓tcp网络包
tcpdump -i eth0 port 1883 -w 1883.iptrace.171119
scp -r dispatcher@192.168.3.215:/home/dispatcher/1883.iptrace.1711177 .

 

 

批量修改用户密码:
chpasswd
语法1:echo 用户名:密码 |chpasswd
语法2:chpasswd > user.txt (文件内容格式为:[user1:passwd]) 普通用户没有权限可以修改755

 

linux常见命令

原文:https://www.cnblogs.com/zhangan/p/10452147.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!