动态获取远程目录列表

摘要:[root@node110 fabric]# cat simple2.py#!/usr/bin/env pythonfrom fabric.api import * env.user='root'env.hosts=['192.168.2.110','192.168.2.120']env.password="123456"@runs_oncedef input_raw():    return prompt("please input directory name:",default="/home")def worktask(dirname):    run("ls -l

 查看本地与远程主机信息

摘要:[root@node110 fabric]# cat simple1.py#!/usr/bin/env pythonfrom fabric.api import *env.user='root'env.hosts=['192.168.2.110','192.168.2.120']env.password='123456'@runs_once #只有第一台主机触发此函数(192.168.2.110)def local_task():    local("uname -a")def remote_task():    with cd("/tmp"):      &

 直接在命令行上批量执行命令

摘要:[root@node110 fabric]# fab -p 123456 -H 192.168.2.120,192.168.2.121 -- 'uname -s'[192.168.2.120] Executing task '<remainder>'[192.168.2.120] run: uname -s[192.168.2.120] out: Linux[192.168.2.120] out: [root@node110 fabric]# fab -p 123456 -H 192.168.2.120,192.168.2.121 -- 'uname -a'[192.168.2.120] Executing task '<remainder>'[192.16

 fabfile.py

摘要:[root@node110 fabric]# cat fabfile.py#!/usr/bin/env pythonfrom fabric.api import rundef host_type():    run('uname -s')结果:[root@node110 fabric]# fab -H 192.168.2.120 host_type[192.168.2.120] Executing task 'host_type'[192.168.2.120] run: uname -s[192.168.2.120] out: Linux[192.168.2.120] out: 

 实现堡垒机模式下的远程文件上传

摘要:[root@node110 paramiko]# cat simple4.py #!/usr/bin/env pythonimport paramikoimport os,sys,timehostname="192.168.2.121"username="root"password="123456"blip="192.168.2.120"bluser="root"blpasswd="123456"tmpdir="/tmp"remotedir="/data"localpath="/home/nginx_access.

 实现堡垒机模式下的远程命令执行

摘要:[root@node110 paramiko]# cat simple3.py #!/usr/bin/env pythonimport paramikoimport os,sys,timehostname="192.168.2.121"username="root"password="123456"blip="192.168.2.120"bluser="root"blpasswd="123456"port=22passinfo='\'s password: 'paramiko.util.log_to_file('syslogin.log')ssh=paramiko

 通过密钥方式登录远程主机

摘要:[root@node110 paramiko]# cat simple2.py #!/usr/bin/env pythonimport paramikoimport oshostname='192.168.2.120'username='root'paramiko.util.log_to_file('syslogin.log')ssh=paramiko.SSHClient()ssh.load_system_host_keys()#privatekey = os.path.expanduser('/home/key/id_rsa')privatekey = os.path.expanduser('/root/.ssh/id_rsa')key = paramiko.RSAKey.fro

 SFTPclient

摘要:#!/usr/bin/env pythonimport paramikousername="root"password="123456"hostname="192.168.2.120"port=22try:    t=paramiko.Transport((hostname,port))    t.connect(username=username,password=password)    sftp=paramiko.SFTPClient.from_transport(t)    sftp.put("/root/test.sql",

 登录远程SSH并返回执行结果SSHClient

摘要:[root@node110 paramiko]# cat simple1.py #!/usr/bin/env pythonimport paramikohostname='192.168.2.120'username='root'password='123456'paramiko.util.log_to_file('syslogin.log')ssh=paramiko.SSHClient()ssh.load_system_host_keys()ssh.connect(hostname=hostname,username=username,password=password)stdin,stdout,stderr=ssh.exec_command('free -m')print st

 pxssh

摘要:[root@node110 pexpect]# cat simple1-pxssh.py import pxsshimport getpasstry:    s = pxssh.pxssh()    hostname = raw_input('hostname: ')    username = raw_input('username: ')    password = getpass.getpass('password: ')    s.login (hostname, username, password)    s.sendline ('uptime') &

 before_after

摘要:[root@node110 pexpect]# cat simple9_before_after.py #1/usr/bin/env pythonimport pexpectimport syschild = pexpect.spawn('ssh root@192.168.198.121')fout = file('mylog.txt','w')child.logfile = foutchild.expect(["password:"])child.sendline("123456")print "before:"+child.beforeprint "after:"+child.after

 ssh自动登录

摘要:[root@node110 pexpect]# cat simple8_ssh_auto_login.py #!/usr/bin/env pythonimport pexpectimport syschild = pexpect.spawn('ssh root@192.168.198.121')fout = file('mylog.txt','w')child.logfile=foutchild.expect("password:")child.sendline("123456")child.expect("#")child.sendline("ls /home")child.expect("

 日志输出到终端

摘要:[root@node110 pexpect]# cat simple7-output-sys_stdout.py #!/usr/bin/env pythonimport pexpectimport sysshell_cmd='ls -l'child = pexpect.spawn('/bin/bash',['-c',shell_cmd])child.logfile=sys.stdoutchild.expect(pexpect.EOF)

 日志输出到文件

摘要:[root@node110 pexpect]# cat simple6-output-logfile.py #!/usr/bin/env pythonimport pexpectimport sysshell_cmd='ls -l'child = pexpect.spawn('/bin/bash',['-c',shell_cmd])fout = file('mylog.txt','w')child.logfile=fout#child.logfile=sys.stdoutchild.expect(pexpect.EOF)

 pexpect.EOF

摘要:[root@node110 pexpect]# cat simple4.py #!/usr/bin/env pythonimport pexpectchild = pexpect.spawn('/bin/bash -c "ls -l > logs.txt"')child.expect(pexpect.EOF) #匹配数据的最后,表示数据传输完成#!/usr/bin/env pythonimport pexpectshell_cmd='ls -l>logs1.txt'child = pexpect.spawn('/bin/bash',['-c',shell_cmd])child.expect(pexpect.EOF)

 远程打包文件并备份到本地

摘要:[root@node110 pexpect]# cat simple3.py import pexpectimport sysip="192.168.198.121"user="root"passwd="123456"target_file="/etc/passwd"child = pexpect.spawn('/usr/bin/ssh', [user+'@'+ip])fout = file('mylog.txt','w')child.logfile = fouttry:    child.expect('(?i)password')    child.sendl

 ftp_login.py

摘要:[root@node110 pexpect]# cat ftp_login.py from __future__ import unicode_literalsimport pexpectimport syschild = pexpect.spawnu('ftp ftp.openbsd.org')child.expect('(?i)name .*: ')child.sendline('anonymous')child.expect('(?i)password')child.sendline('pexpect@sourceforge.net')child.expect('ftp> ')child.sendline('bin')child.expect('ftp> ')ch

 pexpect_spawn_auto_ssh_login.py

摘要:[root@node110 pexpect]# cat pexpect_spawn_auto_ssh_login.py #!/usr/bin/env pythonimport pexpectchild = pexpect.spawn('scp /usr/local/src/python/pexpect/pexpect-3.0.tar.gz  root@192.168.198.121:/root/')#child.expect("root@192.168.198.121's password:")child.expect("password:")child.sendline('123456')

 win7无法启动防火墙

摘要:点击windows 7控制面板中防火墙的“推荐配置”没有反应,打开“服务”,无法启动windows firewall,并报错,具体的解决方法如下,感兴趣的朋友可以参考下哈,希望对大家有所帮助问题: 1.点击windows 7控制面板中防火墙的“推荐配置”没有反应 2.打开“服务”,无法启动windows firewall,并报错 3.打开“事件查看器”,选择“Windows 日志”-“系统”,找到最近

 windows2003更改远程桌面端口号

摘要:运行--regedit --打开注册表, 1.进入以下路径: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\ Wds\rdpwd\Tds\tcp],看见PortNamber值了吗?其默认值是3389,修改成所希望的端口即可,例如3777。 2.再打开[HKEY_LOCAL_MACHINE\SYSTEM\CurrentContro1Set\Control\Tenninal Server\WinStations\RDP\Tcp],将PortNumber的值(默认是338
分页:« 43 44 45 46 47 48 49 50 51 52 »
Powered by AKCMS