python 命令行模块
from optparse import OptionParserparser = OptionParser()parser.add_option("-u","--user",action="store_true",dest="users",default=False,help="user names")parser.add_option("-p","--port",dest="ports",help="user ports")(options,args) = parser.parse_args() if options.users==True: print("user names is true")if options.ports==True: print("passwd is true")
Python 批量遍历目录文件,并修改访问时间
>>> path="D:/UASM64/include/">>> dirs = os.Listdir(path)>>> for file in dirs:... print(os.path.join(path,file))import ospath = "D:/UASM64/include/"dirs = os.Listdir(path)temp=[];for file in dirs: temp.append(os.path.join(path,file))for x in temp: os.utime(x,(1577808000,1577808000))
遍历目录和文件
import osdef List_all_files(rootdir): import os _files = [] List = os.Listdir(rootdir) #列出文件夹下所有的目录与文件 for i in range(0,len(List)): path = os.path.join(rootdir,List[i]) if os.path.isdir(path): _files.extend(List_all_files(path)) if os.path.isfile(path): _files.append(path) return _filesa=List_all_files("C:/Users/LyShark/Desktop/a")print(a)
python检测指定端口状态
import socketsk = socket.socket(socket.AF_INET,socket.soCK_STREAM)sk.settimeout(1)for ip in range(0,254): try: sk.connect(("192.168.1."+str(ip),443)) print("192.168.1.%d server open \n"%ip) except Exception: print("192.168.1.%d server not open"%ip)sk.close()
python实现批量执行CMD命令
import sysimport osimport paramikossh = paramiko.SSHClIEnt()ssh.set_missing_host_key_policy(paramiko.autoAddPolicy())print("------------------------------>\n")print("使用说明,在当前目录创建ip.txt写入ip地址")print("------------------------------>\n")user=input("输入用户名:")passwd=input("输入密码:")port=input("输入端口:")cmd=input("输入执行的命令:")file = open("./ip.txt","r")line = file.readlines()for i in range(len(line)): print("对IP: %s 执行"%line[i].strip('\n')) ssh.connect(hostname=line[i].strip('\n'),port=port,username=user,password=passwd) stdin,stdout,stderr = ssh.exec_command(cmd) result = stdout.read() if not result: result=stderr.read() ssh.close() print(result.decode())
python3-实现钉钉报警
import requestsimport sysimport Jsondingding_url = 'https://oAPI.dingtalk.com/robot/send?access_token=6d11af3252812ea50410c2ccb861814a6ed11b2306606934a5d4ca9f2ec8c09'data = {"msgtype": "markdown","markdown": {"Title": "监控","text": "apche异常"}}headers = {'Content-Type':'application/Json;charset=UTF-8'}send_data = Json.dumps(data).encode('utf-8')requests.post(url=dingding_url,data=send_data,headers=headers)
#Coding: utf-8import psutilimport requestsimport timeimport osimport Jsonmonitor_name = set(['httpd','cobblerd']) # 用户指定监控的服务进程名称proc_dict = {}proc_name = set() # 系统检测的进程名称monitor_map = { 'httpd': 'systemctl restart httpd','cobblerd': 'systemctl restart cobblerd' # 系统在进程down掉后,自动重启}dingding_url = 'https://oAPI.dingtalk.com/robot/send?access_token=b5258c4335ed8ab792075013c965efcbf4f8940f92e7bd936cdc7842d3bf9405'# 钉钉机器人token使用参考文档:http://www.pc6.com/infovIEw/Article_108931.HTMLwhile True: for proc in psutil.process_iter(attrs=['pID','name']): proc_dict[proc.info['pID']] = proc.info['name'] proc_name.add(proc.info['name']) proc_stop = monitor_name - proc_name # 通过集合的形式来找出停掉的进程名,前者有但是后者没有的 if proc_stop: # 如果确实有监控的进程停掉了,那么我们需要告警以及自动重启功能 for p in proc_stop: p_status = '停止' p_name = p data = { "msgtype": "markdown","markdown": { "Title": "监控信息","text": "### %s\n" % time.strftime("%Y-%m-%d %X") + "> #### 服务名:%s \n\n" % p_name + "> #### 状态:%s \n\n" % p_status + "> #### 正在尝试启动" },} headers = {'Content-Type':'application/Json;charset=UTF-8'} send_data = Json.dumps(data).encode('utf-8') requests.post(url=dingding_url,headers=headers) os.system(monitor_map[p_name]) # 执行重启命令,然后判断是否重启成功 proc_set = set() for proc_again in psutil.process_iter(attrs=['pID','name']): proc_set.add(proc_again.info['name']) if p in proc_set: # 如果进程启动成功,p是以前停掉的进程,proc_set是已经重启过一次后的所有进程集合 p_status = '成功' p_name = p data = { "msgtype": "markdown","markdown": { "Title": "监控信息","text": "### %s\n" % time.strftime("%Y-%m-%d %X") + "> #### 服务名:%s \n\n" % p_name + "> #### 状态:%s \n\n" % p_status + "> #### 已经启动成功,服务正在运行!" },} headers = {'Content-Type':'application/Json;charset=UTF-8'} send_data = Json.dumps(data).encode('utf-8') requests.post(url=dingding_url,headers=headers) else: p_status = '重启失败' p_name = p data = { "msgtype": "markdown","text": "### %s\n" % time.strftime("%Y-%m-%d %X") + "> #### 服务名:%s \n\n" % p_name + "> #### 状态:%s \n\n" % p_status + "> #### Sorry,服务启动失败鸟!" },headers=headers) time.sleep(5)
判断指定端口是否开放
import socketport_number = [135,443,80]for index in port_number: sock = socket.socket(socket.AF_INET,socket.soCK_STREAM) result = sock.connect_ex(('127.0.0.1',index)) if result == 0: print("Port %d is open" % index) else: print("Port %d is not open" % index) sock.close()
判断指定端口并且实现钉钉轮询报警
#By LySharkimport requestsimport sysimport Jsonimport socketimport timedef dingding(Title,text): dingding_url = 'https://oAPI.dingtalk.com/robot/send?access_token=6d11af3252812ea50410c2ccb861814a69ed11b2306606934a5d4ca9f2c8c09' data = {"msgtype": "markdown","markdown": {"Title": Title,"text": text}} headers = {'Content-Type':'application/Json;charset=UTF-8'} send_data = Json.dumps(data).encode('utf-8') requests.post(url=dingding_url,headers=headers)def net_scan(): port_number = [80,135,443] for index in port_number: sock = socket.socket(socket.AF_INET,socket.soCK_STREAM) result = sock.connect_ex(('127.0.0.1',index)) if result == 0: print("Port %d is open" % index) else: return index sock.close()while True: dingding("Warning",net_scan()) time.sleep(60)
python-实现SSH批量CMD执行命令
# By:LySharkimport sysimport osimport paramikossh = paramiko.SSHClIEnt()ssh.set_missing_host_key_policy(paramiko.autoAddPolicy())def ssh_cmd(user,passwd,port,userfile,cmd): file = open(userfile,"r") line = file.readlines() for i in range(len(line)): print("对IP: %s 执行"%line[i].strip('\n')) ssh.connect(hostname=line[i].strip('\n'),password=passwd) cmd=cmd stdin,stderr = ssh.exec_command(cmd) result = stdout.read() if not result: result=stderr.read() ssh.close() print(result.decode())ssh_cmd("lyshark","123","22","./ip.txt","free -h |grep 'Mem:' |awk '{print }'")
用python写一个列举当前目录以及所有子目录下的文件,并打印出绝对路径
import sysimport osfor root,dirs,files in os.walk("C://"): for name in files: print(os.path.join(root,name))os.walk()
按照这样的日期格式(xxxx-xx-xx)每日生成一个文件,例如今天生成的文件为2013-09-23.log, 并且把磁盘的使用情况写到到这个文件中。
import osimport sysimport timenew_time = time.strftime("%Y-%m-%d")disk_status = os.popen("df -h").readlines()str1 = ''.join(disk_status)f = open(new_time+'.log','w')f.write("%s"%str1)f.flush()f.close()
统计出每个IP的访问量有多少?(从日志文件中查找)
import sysList = []f = open("/var/log/httpd/access_log","r")str1 = f.readlines()f.close()for i in str1: ip=i.split()[0] List.append(ip)List_num=set(List)for j in List_num: num=List.count(j) print("%s -----> %s" %(num,j))
写个程序,接受用户输入数字,并进行校验,非数字给出错误提示,然后重新等待用户输入。
#根据用户输入数字,输出从0到该数字之间所有的素数。(只能被1和自身整除的数为素数)import tabimport syswhile True: try: num=int(input("输入数字:").strip()) for x in range(2,num+1): for y in range(2,x): if x % y == 0: break else: print(x) except ValueError: print("您输入的不是数字") except KeyboardInterrupt: sys.exit("\n")
ps 可以查看进程的内存占用大小,写一个脚本计算一下所有进程所占用内存大小的和。
#(提示,使用ps aux 列出所有进程,过滤出RSS那列,然后求和)import sysimport osList=[]sum=0str1=os.popen("ps aux","r").readlines()for i in str1: str2=i.split() new_RSS=str2[5] List.append(new_RSS)for i in List[1:-1]: num=int(i) sum=sum+numprint("%s ---> %s"%(List[0],sum))
关于Python 命令行参数argv
import sysif len(sys.argv) < 2: print ("没有输入任何参数") sys.exit()if sys.argv[1].startswith("-"): option = sys.argv[1][1:] if option == "version": print ("版本信息") elif option == "help": print ("帮助菜单") elif option == "option": print("配置菜单") else: print ("异常") sys.exit()
利用random生成6位数字加字母随机验证码
import sysimport randomrand=[]for x in range(6): y=random.randrange(0,5) if y == 2 or y == 4: num=random.randrange(0,9) rand.append(str(num)) else: temp=random.randrange(65,91) c=chr(temp) rand.append(c)result="".join(rand)print(result)
自动化-使用pexpect非交互登陆系统
import pexpectimport sysssh = pexpect.spawn('ssh lyshark@59.110.167.239')fout = file('sshlog.txt','w')ssh.logfile = foutssh.expect("lyshark@59.110.167.239's password:")ssh.sendline("密码")ssh.expect('#')ssh.sendline('ls /home')ssh.expect('#')
Python-取系统时间
import sysimport timetime_str = time.strftime("日期:%Y-%m-%d",time.localtime())print(time_str)time_str= time.strftime("时间:%H:%M",time.localtime())print(time_str)
psutil-获取内存使用情况
import sysimport osimport psutil#获取系统内存使用情况memory_convent = 1024 * 1024mem =psutil.virtual_memory()print("内存容量为:"+str(mem.total/(memory_convent))+"MB\n")print("已使用内存:"+str(mem.used/(memory_convent))+"MB\n")print("可用内存:"+str(mem.total/(memory_convent)-mem.used/(1024*1024))+"MB\n")print("buffer容量:"+str(mem.buffers/( memory_convent ))+"MB\n")print("cache容量:"+str(mem.cached/(memory_convent))+"MB\n")
Python-通过SNMP协议监控cpu
注意:被监控的机器上需要支持snmp协议 yum install -y net-snmP*
#!/usr/bin/pythonimport osdef getAllitems(host,oID): sn1 = os.popen('snmpwalk -v 2c -c public ' + host + ' ' + oID + '|grep Raw|grep cpu|grep -v Kernel').read().split('\n')[:-1] return sn1def getDate(host): items = getAllitems(host,'.1.3.6.1.4.1.2021.11') date = [] rate = [] cpu_total = 0 #us = us+ni,sy = sy + irq + sirq for item in items: float_item = float(item.split(' ')[3]) cpu_total += float_item if item == items[0]: date.append(float(item.split(' ')[3]) + float(items[1].split(' ')[3])) elif item == item[2]: date.append(float(item.split(' ')[3] + items[5].split(' ')[3] + items[6].split(' ')[3])) else: date.append(float_item) #calculate cpu usage percentage for item in date: rate.append((item/cpu_total)*100) mean = ['%us','%ni','%sy','%ID','%wa','%cpu_irq','%cpu_sIRQ'] #calculate cpu usage percentage result = map(None,rate,mean) return resultif __name__ == '__main__': hosts = ['192.168.1.17','192.168.1.17'] for host in hosts: print '==========' + host + '==========' result = getDate(host) print 'cpu(s)',#print result for i in range(5): print ' %.2f%s' % (result[i][0],result[i][1]),print print
Python-通过SNMP协议监控系统负载
注意:被监控的机器上需要支持snmp协议 yum install -y net-snmP*
#!/usr/bin/pythonimport osimport sysdef getAllitems(host,oID): sn1 = os.popen('snmpwalk -v 2c -c public ' + host + ' ' + oID).read().split('\n') return sn1def getload(host,loID): load_oIDs = '1.3.6.1.4.1.2021.10.1.3.' + str(loID) return getAllitems(host,load_oIDs)[0].split(':')[3]if __name__ == '__main__': hosts = ['192.168.1.17','192.168.1.17'] print ('==============System Load==============') for host in hosts: load1 = getload(host,1) load10 = getload(host,2) load15 = getload(host,3) print ('%s load(1min): %s,load(10min): %s,load(15min): %s' % (host,load1,load10,load15))
Python-通过SNMP协议监控内存
注意:被监控的机器上需要支持snmp协议 yum install -y net-snmP*
#!/usr/bin/pythonimport osdef getAllitems(host,oID): sn1 = os.popen('snmpwalk -v 2c -c public ' + host + ' ' + oID).read().split('\n')[:-1] return sn1def getSwapTotal(host): swap_total = getAllitems(host,'UCD-SNMP-MIB::memTotalSwap.0')[0].split(' ')[3] return swap_totaldef getSwapUsed(host): swap_avail = getAllitems(host,'UCD-SNMP-MIB::memAvailSwap.0')[0].split(' ')[3] swap_total = getSwapTotal(host) swap_used = str(round(((float(swap_total)-float(swap_avail))/float(swap_total))*100,2)) + '%' return swap_useddef getMemTotal(host): mem_total = getAllitems(host,'UCD-SNMP-MIB::memTotalReal.0')[0].split(' ')[3] return mem_totaldef getMemUsed(host): mem_total = getMemTotal(host) mem_avail = getAllitems(host,'UCD-SNMP-MIB::memAvailReal.0')[0].split(' ')[3] mem_used = str(round(((float(mem_total)-float(mem_avail))/float(mem_total))*100,2)) + '%' return mem_usedif __name__ == '__main__': hosts = ['192.168.1.17','192.168.1.17'] print ("Monitoring Memory Usage") for host in hosts: mem_used = getMemUsed(host) swap_used = getSwapUsed(host) print ('==========' + host + '==========') print ('Mem_Used = %-15s Swap_Used = %-15s' %(mem_used,swap_used)) print()
Python-通过SNMP协议监控磁盘
注意:被监控的机器上需要支持snmp协议 yum install -y net-snmP*
#!/usr/bin/pythonimport reimport osdef getAllitems(host,oID): sn1 = os.popen('snmpwalk -v 2c -c public ' + host + ' ' + oID).read().split('\n')[:-1] return sn1def getDate(source,newitem): for item in source[5:]: newitem.append(item.split(':')[3].strip()) return newitemdef getRealDate(item1,item2,Listname): for i in range(len(item1)): Listname.append(int(item1[i])*int(item2[i])/1024) return Listnamedef caculatediskUsedrate(host): hrStorageDescr = getAllitems(host,'HOST-RESOURCES-MIB::hrStorageDescr') hrStorageUsed = getAllitems(host,'HOST-RESOURCES-MIB::hrStorageUsed') hrStorageSize = getAllitems(host,'HOST-RESOURCES-MIB::hrStorageSize') hrStorageAllocationUnits = getAllitems(host,'HOST-RESOURCES-MIB::hrStorageAllocationUnits') disk_List = [] hrsused = [] hrsize = [] hrsaunits = [] #get disk_List for item in hrStorageDescr: if re.search('/',item): disk_List.append(item.split(':')[3]) #print disk_List getDate(hrStorageUsed,hrsused) getDate(hrStorageSize,hrsize) #print getDate(hrStorageAllocationUnits,hrsaunits) #get hrstorageAllocationUnits for item in hrStorageAllocationUnits[5:]: hrsaunits.append(item.split(':')[3].strip().split(' ')[0]) #caculate the result #disk_used = hrStorageUsed * hrStorageAllocationUnits /1024 (KB) disk_used = [] total_size = [] disk_used = getRealDate(hrsused,hrsaunits,disk_used) total_size = getRealDate(hrsize,total_size) diskused_rate = [] for i in range(len(disk_used)): diskused_rate.append(str(round((float(disk_used[i])/float(total_size[i])*100),2)) + '%') return diskused_rate,disk_List if __name__ == '__main__': hosts = ['192.168.1.17','192.168.1.17'] for host in hosts: result = caculatediskUsedrate(host) diskused_rate = result[0] partition = result[1] print ("==========",host,'==========') for i in range(len(diskused_rate)): print ('%-20s used: %s' %(partition[i],diskused_rate[i])) print()
Python-通过SNMP协议监控网卡流量
注意:被监控的机器上需要支持snmp协议 yum install -y net-snmP*
#!/usr/bin/pythonimport reimport os#get SNMP-MIB2 of the devicesdef getAllitems(host,oID): sn1 = os.popen('snmpwalk -v 2c -c public ' + host + ' ' + oID).read().split('\n')[:-1] return sn1#get network devicedef getDevices(host): device_mib = getAllitems(host,'RFC1213-MIB::ifDescr') device_List = [] for item in device_mib: if re.search('eth',item): device_List.append(item.split(':')[3].strip()) return device_List#get network datedef getDate(host,oID): date_mib = getAllitems(host,oID)[1:] date = [] for item in date_mib: byte = float(item.split(':')[3].strip()) date.append(str(round(byte/1024,2)) + ' KB') return dateif __name__ == '__main__': hosts = ['192.168.1.17','192.168.1.17'] for host in hosts: device_List = getDevices(host) insIDe = getDate(host,'IF-MIB::ifInOctets') outsIDe = getDate(host,'IF-MIB::ifOutOctets') print '==========' + host + '==========' for i in range(len(insIDe)): print '%s : RX: %-15s TX: %s ' % (device_List[i],insIDe[i],outsIDe[i]) print
Python-实现多级菜单
import osimport sysps="[None]->"ip=["192.168.1.1","192.168.1.2","192.168.1.3"]flage=1while True: ps="[None]->" temp=input(ps) if (temp=="test"): print("test page !!!!") elif(temp=="user"): while (flage == 1): ps="[User]->" temp1=input(ps) if(temp1 =="exit"): flage=0 break elif(temp1=="show"): for i in range(len(ip)): print(i)
Python实现一个没用的东西
import sysps="[root@localhost]# "ip=["192.168.1.1","192.168.1.3"]while True: temp=input(ps) temp1=temp.split() try: if(temp=="show"): for i in range(len(ip)): print(ip[i]) elif( temp1[0] == "user" and temp1[1] != "" ): print("您的执行参数是:"+temp1[1]) except Exception: continue
检查各个进程读写的磁盘IO
#!/usr/bin/env python# -*- Coding=utf-8 -*- import sysimport osimport timeimport signalimport re class diskIO: def __init__(self,pname=None,pID=None,reads=0,writes=0): self.pname = pname self.pID = pID self.reads = 0 self.writes = 0 def main(): argc = len(sys.argv) if argc != 1: print ("usage: please run this script like [./lyshark.py]") sys.exit(0) if os.getuID() != 0: print ("Error: This script must be run as root") sys.exit(0) signal.signal(signal.SIGINT,signal_handler) os.system('echo 1 > /proc/sys/vm/block_dump') print ("TASK PID READ WRITE") while True: os.system('dmesg -c > /tmp/diskio.log') l = [] f = open('/tmp/diskio.log','r') line = f.readline() while line: m = re.match(\ '^(\S+)(\d+)(\d+): (READ|WRITE) block (\d+) on (\S+)',line) if m != None: if not l: l.append(diskIO(m.group(1),m.group(2))) line = f.readline() continue found = False for item in l: if item.pID == m.group(2): found = True if m.group(3) == "READ": item.reads = item.reads + 1 elif m.group(3) == "WRITE": item.writes = item.writes + 1 if not found: l.append(diskIO(m.group(1),m.group(2))) line = f.readline() time.sleep(1) for item in l: print ("%-10s %10s %10d %10d" % \ (item.pname,item.pID,item.reads,item.writes))def signal_handler(signal,frame): os.system('echo 0 > /proc/sys/vm/block_dump') sys.exit(0)if __name__=="__main__": main()
利用Pexpect实现自动非交互登陆linux
#!/usr/bin/env python# -*- Coding: utf-8 -*-import pexpectimport sysssh = pexpect.spawn('ssh root@59.110.167.239')fout = file('sshlog.log','w')ssh.logfile = foutssh.expect("root@59.110.167.239's password:")ssh.sendline("密码")ssh.expect('#')ssh.sendline('ls /home')ssh.expect('#')
利用psutil模块获取系统的各种统计信息
import sysimport psutilimport timeimport os #获取当前时间time_str = time.strftime( "%Y-%m-%d",time.localtime( ) )file_name = "./" + time_str + ".log" if os.path.exists ( file_name ) == False : os.mknod( file_name ) handle = open ( file_name,"w" )else : handle = open ( file_name,"a" ) #获取命令行参数的个数if len( sys.argv ) == 1 : print_type = 1else : print_type = 2 def isset ( List_arr,name ) : if name in List_arr : return True else : return False print_str = ""; #获取系统内存使用情况if ( print_type == 1 ) or isset( sys.argv,"mem" ) : memory_convent = 1024 * 1024 mem = psutil.virtual_memory() print_str += " 内存状态如下:\n" print_str = print_str + " 系统的内存容量为: "+str( mem.total/( memory_convent ) ) + " MB\n" print_str = print_str + " 系统的内存以使用容量为: "+str( mem.used/( memory_convent ) ) + " MB\n" print_str = print_str + " 系统可用的内存容量为: "+str( mem.total/( memory_convent ) - mem.used/( 1024*1024 )) + "MB\n" print_str = print_str + " 内存的buffer容量为: "+str( mem.buffers/( memory_convent ) ) + " MB\n" print_str = print_str + " 内存的cache容量为:" +str( mem.cached/( memory_convent ) ) + " MB\n" #获取cpu的相关信息if ( print_type == 1 ) or isset( sys.argv,"cpu" ) : print_str += " cpu状态如下:\n" cpu_status = psutil.cpu_times() print_str = print_str + " user = " + str( cpu_status.user ) + "\n" print_str = print_str + " nice = " + str( cpu_status.nice ) + "\n" print_str = print_str + " system = " + str( cpu_status.system ) + "\n" print_str = print_str + " IDle = " + str ( cpu_status.IDle ) + "\n" print_str = print_str + " iowait = " + str ( cpu_status.iowait ) + "\n" print_str = print_str + " irq = " + str( cpu_status.irq ) + "\n" print_str = print_str + " softirq = " + str ( cpu_status.softirq ) + "\n" print_str = print_str + " steal = " + str ( cpu_status.steal ) + "\n" print_str = print_str + " guest = " + str ( cpu_status.guest ) + "\n" #查看硬盘基本信息if ( print_type == 1 ) or isset ( sys.argv,"disk" ) : print_str += " 硬盘信息如下:\n" disk_status = psutil.disk_partitions() for item in disk_status : print_str = print_str + " "+ str( item ) + "\n" #查看当前登录的用户信息if ( print_type == 1 ) or isset ( sys.argv,"user" ) : print_str += " 登录用户信息如下:\n " user_status = psutil.users() for item in user_status : print_str = print_str + " "+ str( item ) + "\n" print_str += "---------------------------------------------------------------\n"print ( print_str )handle.write( print_str )handle.close()
# 输出内存使用情况(以字节为单位)import psutilmem = psutil.virtual_memory()print mem.total,mem.used,memprint psutil.swap_memory() # 输出获取SWAP分区信息# 输出cpu使用情况cpu = psutil.cpu_stats()printcpu.interrupts,cpu.ctx_switches psutil.cpu_times(percpu=True) # 输出每个核心的详细cpu信息psutil.cpu_times().user # 获取cpu的单项数据 [用户态cpu的数据]psutil.cpu_count() # 获取cpu逻辑核心数,默认logical=Truepsutil.cpu_count(logical=False) # 获取cpu物理核心数# 输出磁盘信息psutil.disk_partitions() # 列出全部的分区信息psutil.disk_usage('/') # 显示出指定的挂载点情况【字节为单位】psutil.disk_io_counters() # 磁盘总的IO个数psutil.disk_io_counters(perdisk=True) # 获取单个分区IO个数# 输出网卡信息psutil.net_io_counter() 获取网络总的IO,默认参数pernic=Falsepsutil.net_io_counter(pernic=Ture)获取网络各个网卡的IO# 获取进程信息psutil.pIDs() # 列出所有进程的pID号p = psutil.Process(2047)p.name() 列出进程名称p.exe() 列出进程bin路径p.cwd() 列出进程工作目录的绝对路径p.status()进程当前状态[sleep等状态]p.create_time() 进程创建的时间 [时间戳格式]p.uIDs()p.gIDs()p.cputimes() 【进程的cpu时间,包括用户态、内核态】p.cpu_affinity() # 显示cpu亲缘关系p.memory_percent() 进程内存利用率p.meminfo() 进程的RSS、VMS信息p.io_counters() 进程IO信息,包括读写IO数及字节数p.connections() 返回打开进程socket的namedutples列表p.num_threads() 进程打开的线程数#下面的例子中,Popen类的作用是获取用户启动的应用程序进程信息,以便跟踪程序进程的执行情况import psutilfrom subprocess import PIPEp =psutil.Popen(["/usr/bin/python","-c","print 'helloworld'"],stdout=PIPE)p.name()p.username()p.communicate()p.cpu_times()# 其它psutil.users() # 显示当前登录的用户,和linux的who命令差不多 # 获取开机时间psutil.boot_time() 结果是个UNIX时间戳,下面我们来转换它为标准时间格式,如下:datetime.datetime.fromtimestamp(psutil.boot_time()) # 得出的结果不是str格式,继续进行转换 datetime.datetime.fromtimestamp(psutil.boot_time()).strftime('%Y-%m-%d%H:%M:%s')
Python生成一个随机密码
#!/usr/bin/env python# -*- Coding:utf-8 -*-import random,stringdef GenPassword(length): #随机出数字的个数 numOfNum = random.randint(1,length-1) numOfLetter = length - numOfNum #选中numOfNum个数字 slcNum = [random.choice(string.digits) for i in range(numOfNum)] #选中numOfLetter个字母 slcLetter = [random.choice(string.ascii_letters) for i in range(numOfLetter)] #打乱这个组合 slcChar = slcNum + slcLetter random.shuffle(slcChar) #生成密码 genPwd = ''.join([i for i in slcChar]) return genPwdif __name__ == '__main__': print (GenPassword(6))
一个没有完成的命令行工具
import sysimport osipList=[('192.168.1.10',44123),('192.168.1.20',44125),('192.168.1.30',44126),('192.168.1.40',44127),('192.168.1.50',44130)]cmd="[Shell] # "def List(): for i in range(len(ipList)): print("主机:%s 端口号:%s"%(ipList[i][0],ipList[i][1]))def use(temp): for i in range(len(ipList)): if ipList[i][0] ==temp: x="["+str(temp)+"] #" return x return cmddef main(): while True: global cmd try: shell=str(input(cmd)) if(shell == ""): continue elif(shell == "show"): List() elif(shell.split(" ")[0].strip() == "use"): cmd=str(use(shell.split(" ")[1].strip())) elif(shell=="exit"): if cmd!="[Shell] # ": cmd="[Shell] # " else: exit(0) else: print("未知命令行") except Exception: continue
另一个简单的登录例子
import socketimport osdb=["admin","guest","lyshark"]def check(db,recv): for i in range(len(db)): if bytes(db[i],enCoding="utf-8") == bytes(recv): return 1 return 0def sock(): server=socket.socket() server.bind(("localhost",9999)) server.Listen(5) conn,addr=server.accept() recv_data=conn.recv(1024) num=check(db,recv_data) if num ==1: print("账户存在...") conn.send(bytes("账户存在....",enCoding="utf-8")) else: print("账户不存在...") conn.send(bytes("账户不存在....",enCoding="utf-8"))sock()import socketimport osclIEnt=socket.socket()clIEnt.connect(("localhost",9999))user=input("输入名称:").strip()clIEnt.send(bytes(user,enCoding="utf-8"))num=clIEnt.recv(1024)print(str(num,enCoding="utf-8"))
常用系统脚本监控系统cpu
import psutil>>> psutil.cpu_times()scputimes(user=8277.5625,system=2510.953125,IDle=31077.65625,interrupt=147.375,dpc=133.0625)>>> psutil.cpu_times().user8277.5625>>> psutil.cpu_count(logical=False)8>>> psutil.cpu_percent(interval=1,percpu=True)[18.5,14.1,4.7]
监控系统内存
>>> import psutil>>> >>> psutil.virtual_memory()svmem(total=8457035776,available=5508038656,percent=34.9,used=2948997120,free=5508038656)>>> psutil.total8457035776>>> psutil.free5508038656>>> psutil.swap_memory()sswap(total=9799213056,used=3736629248,free=6062583808,percent=38.1,sin=0,sout=0)
监控系统磁盘
>>> import psutil>>> >>> psutil.disk_usage("C:\") #获取指定分区(参数)的使用情况sdiskusage(total=115865546752,used=31459299328,free=84406247424,percent=27.2)>>> psutil.disk_io_counters() #获取硬盘总的IO个数,与读写信息sdiskio(read_count=1577844,write_count=1529528,read_bytes=71110199808,write_bytes=103924939776,read_time=6624,write_time=8764)
监控网络数据包
>>> import psutil>>> >>> psutil.net_io_counters()snetio(bytes_sent=1841534,bytes_recv=11572249,packets_sent=14450,packets_recv=16930,errin=0,errout=0,dropin=0,dropout=0)>>> psutil.net_io_counters().bytes_sent1841539
管理系统进程信息
>>> import psutil>>> >>> psutil.pIDs() #列出所有进程号[0,4,360,544,636,708,716,808,880,304,384,1028,1120]>>> >>> p=psutil.Process(1956) #实例化进程PID>>> p.name() #取进程名字>>> p.num_threads() #取进程线程数>>> p.memory_percent() #取进程利用率>>> p.status() #进程状态>>> p.exe() #取bin路径>>> p.cwd() #进程工作目录绝对路径>>> p.io_counters() #进程IO信息,包括读写IO数及字节数
文本分词
#从左到右将字符串解析为标记流(stream of tokens)In [17]: text = 'foo = 23 + 42 * 10'In [18]: tokens= [('name','foo'),('EQ','='),('NUM','23'),('PLUS','+'),'42'),('TIMES','*'),' ...: 10')]In [19]: import re#使用正则表达式InIn [20]: name = r'(?P<name>[a-zA_][a-zA-Z_0-9]*)'In [21]: NUM = r'(?P<NUM>\d+)'In [22]: PLUS = r'(?P<PLUS>\+)'In [23]: TIMES = r'(?P<TIMES>\*)'In [24]: EQ = r'(?P<EQ>=)'In [25]: WS = r'(?P<WS>\s+)'In [26]: master_pat = re.compile('|'.join([name,NUM,PLUS,TIMES,EQ,WS]))#使用模式对象的scanner()方法来完成分词 *** 作In [27]: scanner = master_pat.scanner('foo = 42')#在给定的文本中重复调用match()方法,一次匹配一个模式,下面是匹配过程In [28]: scanner.match()Out[28]: <re.Match object; span=(0,3),match='foo'>In [29]: _.lastgroup,_.group()Out[29]: ('name','foo')In [30]: scanner.match()Out[30]: <re.Match object; span=(3,4),match=' '>In [31]: _.lastgroup,_.group()Out[31]: ('WS',' ')In [32]: scanner.match()Out[32]: <re.Match object; span=(4,5),match='='>In [33]: _.lastgroup,_.group()Out[33]: ('EQ','=')In [34]: scanner.match()Out[34]: <re.Match object; span=(5,6),match=' '>In [35]: _.lastgroup,_.group()Out[35]: ('WS',' ')In [36]: scanner.match()Out[36]: <re.Match object; span=(6,8),match='42'>In [37]: _.lastgroup,_.group()Out[37]: ('NUM','42')#通过生成器函数来转化为代码的形式In [40]: from collections import namedtupleIn [41]: token = namedtuple('token',['type','value'])In [42]: def generate_tokens(pat,text): ...: scanner = pat.scanner(text) ...: for m in iter(scanner.match,None): ...: yIEld token(m.lastgroup,m.group()) ...: In [43]: for tok in generate_tokens(master_pat,'foo = 42'): ...: print(tok) ...: token(type='name',value='foo')token(type='WS',value=' ')token(type='EQ',value='=')token(type='WS',value=' ')token(type='NUM',value='42')#过滤空格标记In [45]: tokens = (tok for tok in generate_tokens(master_pat,text) if tok.type != 'WS')In [46]: for tok in tokens:print(tok)token(type='name',value='foo')token(type='EQ',value='=')token(type='NUM',value='23')token(type='PLUS',value='+')token(type='NUM',value='42')token(type='TIMES',value='*')token(type='NUM',value='10')
编写一个简单的递归下降解析器
import reimport collections#定义文本分词变量NUM = r'(?P<NUM>\d+)'PLUS = r'(?P<PLUS>\+)'MINUS = r'(?P<MINUS>-)'TIMES = r'(?P<TIMES>\*)'divIDE = r'(?P<divIDE>/)'LPAREN = r'(?P<LPAREN>\()'RPAREN = r'(?P<RPAREN>\))'WS = r'(?P<WS>\s+)'master_pat = re.compile('|'.join([NUM,MINUS,divIDE,LPAREN,RPAREN,WS]))Token = collections.namedtuple('Token','value'])#过滤文本分词def generate_tokens(text): scanner = master_pat.scanner(text) for m in iter(scanner.match,None): tok = Token(m.lastgroup,m.group()) if tok.type != 'WS': yIEld tokclass ExpressionEvaluator: def parse(self,text): self.tokens = generate_tokens(text) self.nexttok = None self.tok = None self._advance() return self.expr() def _advance(self): self.tok,self.nexttok = self.nexttok,next(self.tokens,None) def _accept(self,toktype): if self.nexttok and self.nexttok.type == toktype: self._advance() return True else: return False def _expect(self,toktype): if not self._accept(toktype): raise SyntaxError('Expected' + toktype) def expr(self): exprval = self.term() while self._accept('PLUS') or self._accept('MINUS'): op = self.tok.type right = self.term() if op == 'PLUS': exprval += right elif op == 'MINUS': exprval -= right return exprval def term(self): termval = self.factor() while self._accept('TIMES') or self._accept('divIDE'): op = self.tok.type right = self.factor() if op == 'TIMES': termval *= right elif op == 'divIDE': termval /= right return termval def factor(self): if self._accept('NUM'): return int(self.tok.value) elif self._accept('LPAREN'): exprval = self.expr() self._expect('RPAREN') return exprval else: raise SyntaxError('Expected NUMBER or LPAREN')if __name__ == '__main__': e = ExpressionEvaluator() print(e.parse('2')) print(e.parse('2 + 3')) print(e.parse('2 + 3 * 4')) print(e.parse('2 + (3 + 4) * 5'))
gitlab钩子脚本,实现简单自动化 *** 作
#!/usr/bin/env python3# -*- Coding: utf-8 -*-# @Time : 2018-12-18 17:41# @Author : opsonly# @Site :# @file : gitlabCi.py# @Software: PyCharmfrom flask import Flask,request,render_template,make_response,Responseimport Json,os,re,requestsimport subprocessapp = Flask(__name__)null = ""cmd = "/var/www/HTML/ladmin-devel/"@app.route('/test',methods=['POST'])def hello(): Json_dict = Json.loads(request.data) name = Json_dict['event_name'] ref = Json_dict['ref'][11:] project = Json_dict['project']['name'] if name == 'push' and ref == 'master': os.chdir(cmd) s = subprocess.getoutput('sudo -u Nginx composer install') return Response(s) else: return Response('none')if __name__ == '__main__': app.run(host='0.0.0.0',port=8080)原文链接:https://blog.csdn.net/weixin_44099558/java/article/details/85775937
下载阿里云RDS二进制日志
#!/usr/bin/env python3# -*- Coding: utf-8 -*-# @Time : 2018-12-12 13:52# @Author : opsonly# @Site : # @file : rds_binlog.py# @Software: PyCharm'''查询阿里云rds binlog日志'''import base64,urllib.requestimport hashlibimport hmacimport uuID,time,Json,wgetclass RDS_binlog_RELATE(object): def __init__(self): #阿里云的ID和key self.access_ID = '**********************' self.access_key = '**********************' #通过ID和key来进行签名 def signed(self): timestamp = time.strftime("%Y-%m-%dT%H:%M:%sZ",time.gmtime()) header = { 'Action': 'Describebinlogfiles','DBInstanceID': 'rm-wz9azm783q621n9','StartTime': '2018-07-11T15:00:00Z','EndTime': timestamp,'Format': 'JsON','Version': '2014-08-15','AccessKeyID': self.access_ID,'Signatureversion': '1.0','SignatureMethod': 'HMAC-SHA1','SignatureNonce': str(uuID.uuID1()),'TimeStamp': timestamp,} #对请求头进行排序 sortedD = sorted(header.items(),key=lambda x: x[0]) url = 'https://rds.aliyuncs.com' canstring = '' #将请求参数以#连接 for k,v in sortedD: canstring += '&' + self.percentEncode(k) + '=' + self.percentEncode(v) #对请求连接进行阿里云要的编码规则进行编码 stiingToSign = 'GET&%2F&' + self.percentEncode(canstring[1:]) bs = self.access_key + '&' bs = bytes(bs,enCoding='utf8') stiingToSign = bytes(stiingToSign,enCoding='utf8') h = hmac.new(bs,stiingToSign,hashlib.sha1) stiingToSign = base64.b64encode(h.digest()).strip() #将签名加入到请求头 header['Signature'] = stiingToSign #返回url url = url + "/?" + urllib.parse.urlencode(header) return url #按照规则替换 def percentEncode(self,store): encodeStr = store res = urllib.request.quote(encodeStr) res = res.replace('+','%20') res = res.replace('*','%2A') res = res.replace('%7E','~') return str(res) #筛选出链接下载二进制日志文件 def getbinlog(self): binlog_url = self.signed() req = urllib.request.urlopen(binlog_url) req = req.read().decode('utf8') res = Json.loads(req) for i in res['Items']['binlogfile']: wget.download(i['Downloadlink'])s = RDS_binlog_RELATE()s.getbinlog()————————————————原文链接:https://blog.csdn.net/weixin_44099558/java/article/details/85775937
总结 以上是内存溢出为你收集整理的Python运维脚本网络收集全部内容,希望文章能够帮你解决Python运维脚本网络收集所遇到的程序开发问题。
如果觉得内存溢出网站内容还不错,欢迎将内存溢出网站推荐给程序员好友。
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)