八周三次课
10.32/10.33 rsync经过服务同步
10.34 linux系统日志
10.35 screen工具linux
10.32/10.33 rsync经过服务同步shell
port=873 //监听端口默认为873,也能够是别的端口 数据库
log file=/var/log/rsync.log //指定日志vim
pid file=/var/run/rsyncd.pid //指定pid安全
address=192.168.202.130 #能够定义绑定的ip服务器
[test] #为模块名,自定义网络
path=/root/rsync // 指定该模块对应在哪一个目录下session
use chroot=true //是否限定在该目录下,默认为true,当有软链接时,须要改成fasle,若是为true就限定为模块默认目录架构
max connections=4 //指定最大能够链接的客户端数less
read only=no //是否为只读,若是是no的话,客服端推送给服务端的时候不成功,这时候要改为yes list=true //是否能够列出模块名 rsync --port 8730 172.16.37.139:: 若是为yes的话会列出客户端全部的模块名字。
uid=root //以哪一个用户的身份来传输
gid=root //以哪一个组的身份来传输
auth users=test //指定验证用户名,能够不设置,不设置默认不用密码,设置的话安全性更高点
secrets file=/etc/rsyncd.passwd //指定密码文件,若是设定验证用户,这一项必须设置,设定密码权限为400.
hosts allow=192.168.133.132 1.1.1.1 2.2.2.2 192.168.133.0/24 //设置能够容许访问的主机,能够是网段,多个Ip地址用空格隔
1. 首先在虚拟机CentOS7.4上打开/etc/rsyncd.conf文件
[root@tianqi ~]# vi /etc/rsyncd.conf
2.而后将上述代码复制到 /etc/rsyncd.conf 文件中——>在打开文件的文件时候,会看到全部文件都存在的,但被注释掉的,咱们能够另起一行,粘贴进去
port=873 #监听端口默认为873,也能够是别的端口
log file=/var/log/rsync.log
pid file=/var/run/rsyncd.pid
address=192.168.11.136
[test]
path=/root/rsync
use chroot=true
max connections=4
read only=no
list=true
uid=root
gid=root
auth users=test
secrets file=/etc/rsyncd.passwd
hosts allow=192.168.11.137
3.启动服务rsync --daemon
[root@tianqi ~]# rsync --daemon
[root@tianqi ~]#
4.在CentOS7.4虚拟机上检查服务是否已经启动
[root@tianqi-01 ~]# ps aux | grep rsync
root 2041 0.0 0.0 114652 528 ? Ss 14:11 0:00 rsync --daemon
root 2043 0.0 0.0 112660 984 pts/0 R+ 14:11 0:00 grep --color=auto rsync
[root@tianqi-01 ~]#
5. 在CentOS7.4虚拟机上检查监听的端口是否为873
[root@tianqi-01 ~]# netstat -lntp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1051/sshd
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 1136/master
tcp 0 0 192.168.11.136:873 0.0.0.0:* LISTEN 1253/rsync
tcp6 0 0 :::22 :::* LISTEN 1051/sshd
tcp6 0 0 ::1:25 :::* LISTEN 1136/master
[root@tianqi-01 ~]#
6.在CentOS7.4虚拟机上检查path指定的路径
[root@tianqi-01 ~]# vim /etc/rsyncd.conf
//将path=/root/rsync改成path=/tmp/rsync
[root@tianqi-01 ~]# mkdir /tmp/rsync
[root@tianqi-01 ~]#
7. 在CentOS7.4虚拟机上设置权限——>这里设置的777权限是为了方便测试
[root@tianqi-01 ~]# chmod 777 !$
chmod 777 /tmp/rsync
[root@tianqi-01 ~]#
8.在另外一台虚拟机CentOS7.2上,运行
[root@tianqi-02 ~]# rsync -avP /tmp/aming.txt 192.168.11.136::test/aming-02.txt
rsync: failed to connect to 192.168.11.136 (192.168.11.136): No route to host (113)
rsync error: error in socket IO (code 10) at clientserver.c(122) [sender=3.0.9]
[root@tianqi-02 ~]#
9. 在CentOS7.2虚拟机上,会提示没有路由到远程机器上去,遇到这种问题,首先在CentOS7.2虚拟机上检查网络连通性
[root@tianqi-02 ~]# ping 192.168.11.136
PING 192.168.11.136 (192.168.11.136) 56(84) bytes of data.
64 bytes from 192.168.11.136: icmp_seq=1 ttl=64 time=0.643 ms
64 bytes from 192.168.11.136: icmp_seq=2 ttl=64 time=0.299 ms
^C
--- 192.168.11.136 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1000ms
rtt min/avg/max/mdev = 0.299/0.471/0.643/0.172 ms
[root@tianqi-02 ~]#
10.这时在CentOS7.2虚拟机上,检查是否为端口的问题
[root@tianqi-02 ~]# telnet 192.168.11.136 873
Trying 192.168.11.136...
telnet: connect to address 192.168.11.136: No route to host
[root@tianqi-02 ~]#
11. 这时候会发现873端口是不通的
12. 首先检查是否为iptables的问题
[root@tianqi-02 ~]# iptables -nvL
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
5700 16M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
35 11105 INPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0
35 11105 INPUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
35 11105 INPUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
34 11053 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_direct all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_IN_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_IN_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_OUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FORWARD_OUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT 4560 packets, 432K bytes)
pkts bytes target prot opt in out source destination
4560 432K OUTPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD_IN_ZONES (1 references)
pkts bytes target prot opt in out source destination
0 0 FWDI_public all -- eno33554984 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDI_public all -- eno16777736 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDI_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_IN_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain FORWARD_OUT_ZONES (1 references)
pkts bytes target prot opt in out source destination
0 0 FWDO_public all -- * eno33554984 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDO_public all -- * eno16777736 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 FWDO_public all -- * + 0.0.0.0/0 0.0.0.0/0 [goto]
Chain FORWARD_OUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain FORWARD_direct (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public (3 references)
pkts bytes target prot opt in out source destination
0 0 FWDI_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDI_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDI_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FWDI_public_allow (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain FWDI_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public (3 references)
pkts bytes target prot opt in out source destination
0 0 FWDO_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDO_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 FWDO_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FWDO_public_allow (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain FWDO_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain INPUT_ZONES (1 references)
pkts bytes target prot opt in out source destination
33 10824 IN_public all -- eno33554984 * 0.0.0.0/0 0.0.0.0/0 [goto]
2 281 IN_public all -- eno16777736 * 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 IN_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto]
Chain INPUT_ZONES_SOURCE (1 references)
pkts bytes target prot opt in out source destination
Chain INPUT_direct (1 references)
pkts bytes target prot opt in out source destination
Chain IN_public (3 references)
pkts bytes target prot opt in out source destination
35 11105 IN_public_log all -- * * 0.0.0.0/0 0.0.0.0/0
35 11105 IN_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0
35 11105 IN_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0
Chain IN_public_allow (1 references)
pkts bytes target prot opt in out source destination
1 52 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW
Chain IN_public_deny (1 references)
pkts bytes target prot opt in out source destination
Chain IN_public_log (1 references)
pkts bytes target prot opt in out source destination
Chain OUTPUT_direct (1 references)
pkts bytes target prot opt in out source destination
[root@tianqi-02 ~]#
13. 会看到是iptables的问题,咱们须要停掉firewalld 服务停掉
[root@tianqi-02 ~]# systemctl stop firewalld
[root@tianqi-02 ~]# iptables -nvL
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
[root@tianqi-02 ~]#
看一下CentOS7.4的iptables,也有问题,须要停掉firewalld。
14.这时会发现端口通了
[root@tianqi-02 ~]# telnet 192.168.11.136 873
Trying 192.168.11.136...
Connected to 192.168.11.136.
Escape character is '^]'.
@RSYNCD: 30.0
^]
telnet> quit
Connection closed.
[root@tianqi-02 ~]#
15. 这时在CentOS7.2虚拟机上,执行rsync -avP /tmp/aming.txt 192.168.11.136::test/aming-02.txt命令,会看到提示要输出密码——由于在/etc/rsyncd.conf文件中,有定义密码
[root@tianqi-02 ~]# rsync -avP /tmp/aming.txt 192.168.11.136::test/aming-02.txt
Password:
@ERROR: auth failed on module test
rsync error: error starting client-server protocol (code 5) at main.c(1516) [sender=3.0.9]
[root@tianqi-02 ~]#
16. 这时能够在CentOS7.4虚拟机中的/etc/rsyncd.conf文件中,注释掉输入密码
#auth users=test
#secrets file=/etc/rsyncd.passwd
17.这时在CentOS7.2虚拟机上,执行rsync -avP /tmp/aming.txt 192.168.11.136::test/aming-02.txt
[root@tianqi-02 ~]# rsync -avP /tmp/aming.txt 192.168.11.136::test/aming-02.txt
sending incremental file list
aming.txt
834 100% 0.00kB/s 0:00:00 (xfer#1, to-check=0/1)
sent 907 bytes received 27 bytes 1868.00 bytes/sec
total size is 834 speedup is 0.89
[root@tianqi-02 ~]#
18. 在CentOS7.4虚拟机中,检查文件
[root@tianqi-01 ~]# ls /tmp/rsync/
aming-02.txt
[root@tianqi-01 ~]#
19. 这时就表示实验成功了
[root@tianqi-02 ~]# rsync -avP 192.168.11.136::test/aming-02.txt /tmp/123.txt
receiving incremental file list
aming-02.txt
834 100% 814.45kB/s 0:00:00 (xfer#1, to-check=0/1)
sent 45 bytes received 941 bytes 1972.00 bytes/sec
total size is 834 speedup is 0.85
[root@tianqi-02 ~]#
• port:指定在哪一个端口启动rsyncd服务,默认是873端口。
• log file:指定日志文件。
• pid file:指定pid文件,这个文件的做用涉及服务的启动、中止等进程管理操做。
• address:指定启动rsyncd服务的IP。假如你的机器有多个IP,就能够指定由其中一个启动rsyncd服务,若是不指定该参数,默认是在所有IP上启动。
• []:指定模块名,里面内容自定义。
• path:指定数据存放的路径。
• use chroot true|false:表示在传输文件前首先chroot到path参数所指定的目录下。这样作的缘由是实现额外的安全防御,但缺点是须要以root权限,而且不能备份指向外部的符号链接所指向的目录文件。默认状况下chroot值为true,若是你的数据当中有软链接文件,阿铭建议你设置成false。
•max connections:指定最大的链接数,默认是0,即没有限制。
• read only ture|false:若是为true,则不能上传到该模块指定的路径下。
• list:表示当用户查询该服务器上的可用模块时,该模块是否被列出,设定为true则列出,false则隐藏。
• uid/gid:指定传输文件时以哪一个用户/组的身份传输。
• auth users:指定传输时要使用的用户名。
• secrets file:指定密码文件,该参数连同上面的参数若是不指定,则不使用密码验证。注意该密码文件的权限必定要是600。格式:用户名:密码
• hosts allow:表示被容许链接该模块的主机,能够是IP或者网段,若是是多个,中间用空格隔开。
• 当设置了auth users和secrets file后,客户端连服务端也须要用用户名密码了,若想在命令行中带上密码,能够设定一个密码文件
• rsync -avL test@192.168.133.130::test/test1/ /tmp/test8/ --password-file=/etc/pass
• 其中/etc/pass内容就是一个密码,权限要改成600
[root@tianqi-01 ~]# cat /var/log/rsync.log
2018/01/29 14:11:02 [2041] rsyncd version 3.0.9 starting, listening on port 873
2018/01/29 15:54:18 [1253] rsyncd version 3.0.9 starting, listening on port 873
2018/01/29 16:45:09 [1606] name lookup failed for 192.168.11.137: Name or service not known
2018/01/29 16:45:09 [1606] connect from UNKNOWN (192.168.11.137)
2018/01/29 16:45:17 [1606] rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
2018/01/29 16:45:17 [1606] rsync error: error in rsync protocol data stream (code 12) at io.c(605) [Receiver=3.0.9]
2018/01/29 16:47:46 [1614] name lookup failed for 192.168.11.137: Name or service not known
2018/01/29 16:47:46 [1614] connect from UNKNOWN (192.168.11.137)
2018/01/29 16:47:49 [1614] auth failed on module test from unknown (192.168.11.137): unauthorized user
2018/01/29 16:51:22 [1622] name lookup failed for 192.168.11.137: Name or service not known
2018/01/29 16:51:22 [1622] connect from UNKNOWN (192.168.11.137)
2018/01/29 08:51:22 [1622] rsync to test/aming-02.txt from unknown (192.168.11.137)
2018/01/29 08:51:22 [1622] receiving file list
2018/01/29 08:51:22 [1622] sent 54 bytes received 926 bytes total size 834
2018/01/29 16:55:39 [1644] name lookup failed for 192.168.11.137: Name or service not known
2018/01/29 16:55:39 [1644] connect from UNKNOWN (192.168.11.137)
2018/01/29 08:55:39 [1644] rsync on test/aming-02.txt from unknown (192.168.11.137)
2018/01/29 08:55:39 [1644] building file list
2018/01/29 08:55:39 [1644] sent 956 bytes received 46 bytes total size 834
[root@tianqi-01 ~]#
[root@tianqi-01 ~]# rsync --port=873 192.168.11.136::
test
[root@tianqi-01 ~]#
[root@tianqi-01 ~]# rsync --port=873 192.168.11.136::
[root@tianqi-01 ~]#
rsync传输时设置密码
在/etc/rsyncd.passwd文件中编辑
而后修改权限为600
rsync -avP /tmp/test/ test@192.168.11.136::test/
在rsync传输文件的时候,在写shell脚本输入密码很差,好比天天凌晨半夜更新数据库文件啥的,那就会很麻烦
10.34 linux系统日志
[root@tianqi-01 ~]# ls /var/log/messages
/var/log/messages
[root@tianqi-01 ~]# less !$
less /var/log/messages
Jan 29 09:49:57 tianqi-01 dhclient[683]: DHCPREQUEST on ens33 to 192.168.11.254 port 67 (xid=0x3f2161bf)
Jan 29 09:49:57 tianqi-01 dhclient[683]: DHCPACK from 192.168.11.254 (xid=0x3f2161bf)
Jan 29 09:49:57 tianqi-01 NetworkManager[558]: <info> [1517190597.5342] dhcp4 (ens33): address 192.168.11.136
Jan 29 09:49:57 tianqi-01 NetworkManager[558]: <info> [1517190597.5342] dhcp4 (ens33): plen 24 (255.255.255.0)
Jan 29 09:49:57 tianqi-01 NetworkManager[558]: <info> [1517190597.5342] dhcp4 (ens33): gateway 192.168.11.2
Jan 29 09:49:57 tianqi-01 NetworkManager[558]: <info> [1517190597.5342] dhcp4 (ens33): lease time 1800
Jan 29 09:49:57 tianqi-01 NetworkManager[558]: <info> [1517190597.5342] dhcp4 (ens33): nameserver '192.168.11.2'
Jan 29 09:49:57 tianqi-01 NetworkManager[558]: <info> [1517190597.5342] dhcp4 (ens33): domain name 'localdomain'
Jan 29 09:49:57 tianqi-01 NetworkManager[558]: <info> [1517190597.5342] dhcp4 (ens33): state changed bound -> bound
等等,只截取了一部分
[root@tianqi-01 ~]# du -sh !$
du -sh /var/log/messages
504K /var/log/messages
[root@tianqi-01 ~]#
在查看日志的时候,会发现日志自动切割了
[root@tianqi-01 ~]# ls /var/log/messages*
/var/log/messages /var/log/messages-20180129
[root@tianqi-01 ~]#
查看日志文件cat /etc/logrotate.conf
[root@tianqi-01 ~]# cat /etc/logrotate.conf
# see "man logrotate" for details //会告诉你查看logrotate的帮助文档
# rotate log files weekly
weekly //每周切割一次
# keep 4 weeks worth of backlogs
rotate 4 //切割四个
# create new (empty) log files after rotating old ones
create //建立一个新的文件
# use date as a suffix of the rotated file
dateext //这是它的后缀名
# uncomment this if you want your log files compressed
#compress //是否须要压缩,压缩成 .tar.gz
# RPM packages drop log rotation information into this directory
include /etc/logrotate.d //这个目录下还有一些文件
# no packages own wtmp and btmp -- we'll rotate them here
/var/log/wtmp { //切割该文件,每月切割一次
monthly
create 0664 root utmp
minsize 1M
rotate 1 //只保留一个
}
/var/log/btmp { //切割该文件,指定权限,属主,属组
missingok
monthly
create 0600 root utmp
rotate 1
}
# system-specific logs may be also be configured here.
[root@tianqi-01 ~]#
[root@tianqi-01 ~]# ls /etc/logrotate.d
bootlog syslog wpa_supplicant yum
[root@tianqi-01 ~]# cat /etc/logrotate.d/syslog
/var/log/cron
/var/log/maillog
/var/log/messages
/var/log/secure
/var/log/spooler
{
missingok
sharedscripts
postrotate
/bin/kill -HUP `cat /var/run/syslogd.pid 2> /dev/null` 2> /dev/null || true
endscript
}
[root@tianqi-01 ~]#
logrotate就介绍这么多,用的也很少
[root@tianqi-01 ~]# last
root pts/0 192.168.11.1 Mon Jan 29 21:09 still logged in
reboot system boot 3.10.0-693.el7.x Mon Jan 29 20:59 - 22:15 (01:15)
root pts/1 192.168.11.1 Mon Jan 29 15:47 - 15:47 (00:00)
root pts/0 192.168.11.1 Mon Jan 29 15:47 - crash (05:11)
root tty1 Mon Jan 29 15:47 - crash (05:12)
reboot system boot 3.10.0-693.el7.x Mon Jan 29 15:46 - 22:15 (06:28)
root pts/0 192.168.11.1 Mon Jan 29 08:55 - crash (06:50)
root tty1 Mon Jan 29 08:29 - crash (07:16)
reboot system boot 3.10.0-693.el7.x Mon Jan 29 08:29 - 22:15 (13:45)
root pts/1 192.168.11.1 Sat Jan 27 16:09 - 16:10 (00:00)
root pts/0 192.168.11.1 Sat Jan 27 14:28 - crash (1+18:00)
root tty1 Sat Jan 27 14:20 - crash (1+18:08)
reboot system boot 3.10.0-693.el7.x Sat Jan 27 14:19 - 22:15 (2+07:55)
root pts/0 192.168.11.1 Sat Jan 27 08:00 - crash (06:19)
root tty1 Sat Jan 27 07:53 - crash (06:26)
reboot system boot 3.10.0-693.el7.x Sat Jan 27 07:52 - 22:15 (2+14:22)
root pts/0 192.168.11.1 Fri Jan 26 21:04 - crash (10:47)
root tty1 Fri Jan 26 21:04 - crash (10:48)
reboot system boot 3.10.0-693.el7.x Fri Jan 26 21:02 - 22:15 (3+01:12)
root pts/0 192.168.11.1 Fri Jan 26 15:48 - crash (05:13)
root tty1 Fri Jan 26 15:48 - crash (05:14)
reboot system boot 3.10.0-693.el7.x Fri Jan 26 15:47 - 22:15 (3+06:27)
root pts/1 192.168.11.1 Fri Jan 26 11:37 - crash (04:09)
root pts/1 192.168.11.1 Fri Jan 26 11:36 - 11:37 (00:01)
root pts/0 192.168.11.1 Fri Jan 26 11:36 - crash (04:10)
root pts/1 192.168.11.1 Fri Jan 26 11:36 - 11:36 (00:00)
root pts/0 192.168.11.1 Fri Jan 26 11:30 - 11:36 (00:05)
root tty1 Fri Jan 26 11:29 - 15:43 (04:13)
reboot system boot 3.10.0-693.el7.x Fri Jan 26 11:29 - 22:15 (3+10:45)
root pts/2 192.168.11.1 Fri Jan 26 10:29 - 10:30 (00:00)
root pts/1 192.168.11.1 Fri Jan 26 10:28 - 10:54 (00:25)
root pts/0 192.168.11.1 Fri Jan 26 09:50 - 10:30 (00:39)
root pts/0 192.168.11.1 Fri Jan 26 09:36 - 09:49 (00:13)
root tty1 Fri Jan 26 09:28 - crash (02:00)
reboot system boot 3.10.0-693.el7.x Fri Jan 26 09:27 - 22:15 (3+12:47)
wtmp begins Fri Jan 26 09:27:20 2018
[root@tianqi-01 ~]# ls /var/log/wtmp
/var/log/wtmp
[root@tianqi-01 ~]#
[root@tianqi-01 ~]# lastb
btmp begins Fri Jan 26 11:29:27 2018
[root@tianqi-01 ~]# ls /var/log/btmp
/var/log/btmp
[root@tianqi-01 ~]#
[root@tianqi-01 ~]# ls /var/log/secure
/var/log/secure
[root@tianqi-01 ~]#
10.35 screen工具
screen,虚拟的一个屏幕,也能够理解为一个虚拟的终端
需求,执行一个脚本,须要一天一晚上,并且脚本会输出一些东西出来,这就意味着这个脚本不能中途断开,保证脚本不中断,有两种方法:
安装screen包——>yum install -y screen
[root@tianqi-01 ~]# screen //在虚拟终端下执行了vmstat 1,同时按 ctrl+a键 ,随后再按d键,就把screen丢到后台了。
[detached from 1674.pts-0.tianqi-01]
[root@tianqi-01 ~]# screen -ls //列出当前全部的session
There is a screen on:
1674.pts-0.tianqi-01 (Detached)
1 Socket in /var/run/screen/S-root.
[root@tianqi-01 ~]# screen -r 1674 //从新回到虚拟终端——>若不须要screen了,直接杀死,按 exit 便可
[root@tianqi-01 ~]# screen -ls //再次查看,会发现没有screen
No Sockets found in /var/run/screen/S-root.
[root@tianqi-01 ~]# screen
[screen is terminating]
[root@tianqi-01 ~]# screen
[detached from 1864.pts-0.tianqi-01]
[root@tianqi-01 ~]# screen
[detached from 1889.pts-0.tianqi-01]
[root@tianqi-01 ~]# screen -ls
There are screens on:
1889.pts-0.tianqi-01 (Detached)
1864.pts-0.tianqi-01 (Detached)
1674.pts-0.tianqi-01 (Detached)
3 Sockets in /var/run/screen/S-root.
[root@tianqi-01 ~]#
友情连接:阿铭Linux