使用python通过SSH登陆linux并操作
用的昨天刚接触到的库,在windows下通过paramiko来登录linux系统并执行了几个命令,基本算是初试成功,后面会接着学习的。
代码:
>>> import paramiko
>>> ssh = paramiko.SSHClient()
>>> ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
>>> ssh.connect('10.104.6.8',username = 'xiaopeng',password='******')
>>> cmd = 'cd' #进入用户目录home
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> cmd = 'ls >test' #管道,ls命名的输出到文件test里面
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> cmd = 'cat test' # 显示test的内容,即ls命名的结果
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> print stdout.readlines() #结果 汉字用的字符显示
['code\n', 'Desktop\n', 'order.cpp\n', 'python\n', 'test\n', '\xe5\x85\xac\xe5\x85\xb1\xe7\x9a\x84\n', '\xe6\xa8\xa1\xe6\x9d\xbf\n', '\xe8\xa7\x86\xe9\xa2\x91\n', '\xe5\x9b\xbe\xe7\x89\x87\n', '\xe6\x96\x87\xe6\xa1\xa3\n', '\xe4\xb8\x8b\xe8\xbd\xbd\n', '\xe9\x9f\xb3\xe4\xb9\x90\n']
这里我们都会发现,使用exec_command('cd dirname')时并不会切换目录,execute_command() 是a single session,每次执行完后都要回到缺省目录。所以可以 .execute_command('cd /var; pwd')。
python里面的paramiko模块,用这个实现ssh登录更加简单。看下面的代码:
- #-*- coding: utf-8 -*-
- #!/usr/bin/python
- import paramiko
- import threading
- def ssh2(ip,username,passwd,cmd):
- try:
- ssh = paramiko.SSHClient()
- ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
- ssh.connect(ip,22,username,passwd,timeout=5)
- for m in cmd:
- stdin, stdout, stderr = ssh.exec_command(m)
- # stdin.write("Y") #简单交互,输入 ‘Y’
- out = stdout.readlines()
- #屏幕输出
- for o in out:
- print o,
- print '%s\tOK\n'%(ip)
- ssh.close()
- except :
- print '%s\tError\n'%(ip)
- if __name__=='__main__':
- cmd = ['cal','echo hello!']#你要执行的命令列表
- username = "" #用户名
- passwd = "" #密码
- threads = [] #多线程
- print "Begin......"
- for i in range(1,254):
- ip = '192.168.1.'+str(i)
- a=threading.Thread(target=ssh2,args=(ip,username,passwd,cmd))
- a.start()
上面的程序还是有些技巧的:
1.利用多线程,同时发出登录请求,同时去连接电脑,这样速度快很多,我试了一下,如果不用多线程,直接一个一个挨着执行的话,大约5~10秒钟才能对一台电脑操作完,具体时间要根据命令的来决定,如果是软件安装或者卸载时间要更长一些。这样下来怎么也要一二十分钟,用多线程后就快多了,所有的命令执行完用了不到2分钟!
2.最好用root用户登录,因为安装或者卸载软件的时候如果用普通用户又会提示输入密码,这样又多了一次交互,处理起来就比较麻烦!安装软件时apt-get install xxx 最好加上“-y”参数,因为有时安装或删除软件时提示是否继续安装或卸载,这又是一次自动交互!加上那个参数后就没有人机交互了。
3. 循环时循环所有ip,因为计算机的ip是路由器自动分配的,保险起见,最好全部都执行,保证没有遗漏的主机
4.远端执行命令时如果有交互,可以这样用 stdin.write("Y")来完成交互,“Y”就是输入“Y”。
5.把所有的命令放到一个列表里面,遍历列表可以依次执行列表里面的命令
6.为了更好的进行控制,最好在电脑上提前把root用户打开,装好ssh服务器并让其开机自动执行。
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh.connect('10.111.43.18',22,'root','12345',timeout=5)
stdin, stdout, stderr = ssh.exec_command('cd /root/epoll/')
stdin, stdout, stderr = ssh.exec_command('pwd')
上边的代码输出应该是 /root/epoll/,但结果却是 /root ,即使用root登陆的缺省目录
原因是exec_command为单个会话,执行完成之后会回到登录时的缺省目录
修改为这样执行结果则为预期的 /root/epoll 目录
stdin, stdout, stderr = ssh.exec_command('cd /root/epoll/;pwd')
最近闲着学习python,看到有个paramiko模块,貌似很强大,学着写了个一个小程序,可以直接在window下登录到linux,执行并返回执行结果。
下面直接贴代码:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
#!/usr/bin/env python
import
paramiko
#hostname='192.168.0.102'
hostname
=
'172.28.102.250'
username
=
'root'
password
=
'abc'
#port=22
if
__name__
=
=
'__main__'
:
paramiko.util.log_to_file(
'paramiko.log'
)
s
=
paramiko.SSHClient()
#s.load_system_host_keys()
s.set_missing_host_key_policy(paramiko.AutoAddPolicy())
s.connect(hostname
=
hostname,username
=
username, password
=
password)
stdin,stdout,stderr
=
s.exec_command(
'ifconfig;free;df -h'
)
print
stdout.read()
s.close()
|
下面看下效果,呵呵:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
s501914252.HCA
-
FW9CX2XDesktop学习资料python paramiko
-
ssh.py"
eth0 Link encap:Ethernet HWaddr
00
:
24
:
01
:
01
:EA:
5C
inet addr:
172.32
.
34.240
Bcast:
172.32
.
255.255
Mask:
255.255
.
255.0
UP BROADCAST RUNNING MULTICAST MTU:
1500
Metric:
1
RX packets:
1428
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
2
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
1000
RX bytes:
190928
(
186.4
KiB) TX bytes:
128
(
128.0
b)
Interrupt:
20
eth1 Link encap:Ethernet HWaddr
00
:
1F
:
29
:
03
:
54
:
3D
inet addr:
172.28
.
102.250
Bcast:
172.28
.
255.255
Mask:
255.255
.
0.0
UP BROADCAST RUNNING MULTICAST MTU:
1500
Metric:
1
RX packets:
99698
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
12305
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
36420324
(
34.7
MiB) TX bytes:
923630
(
901.9
KiB)
lo Link encap:Local Loopback
inet addr:
127.0
.
0.1
Mask:
255.0
.
0.0
UP LOOPBACK RUNNING MTU:
16436
Metric:
1
RX packets:
0
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
0
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
0
(
0.0
b) TX bytes:
0
(
0.0
b)
peth1 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
99686
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
12333
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
1000
RX bytes:
36818715
(
35.1
MiB) TX bytes:
1006230
(
982.6
KiB)
Interrupt:
20
Memory:f3000000
-
f3010000
vif0.
1
Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
12305
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
99702
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
923630
(
901.9
KiB) TX bytes:
36420811
(
34.7
MiB)
vif1.
0
Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
5
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
85175
errors:
0
dropped:
542
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
500
RX bytes:
140
(
140.0
b) TX bytes:
20377326
(
19.4
MiB)
vif2.
0
Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
5
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
84859
errors:
0
dropped:
411
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
500
RX bytes:
140
(
140.0
b) TX bytes:
20301953
(
19.3
MiB)
vif3.
0
Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
5
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
84337
errors:
0
dropped:
546
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
500
RX bytes:
140
(
140.0
b) TX bytes:
20174994
(
19.2
MiB)
virbr0 Link encap:Ethernet HWaddr
00
:
00
:
00
:
00
:
00
:
00
inet addr:
192.168
.
122.1
Bcast:
192.168
.
122.255
Mask:
255.255
.
255.0
UP BROADCAST RUNNING MULTICAST MTU:
1500
Metric:
1
RX packets:
0
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
0
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
0
(
0.0
b) TX bytes:
0
(
0.0
b)
xenbr1 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
86405
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
0
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
19498121
(
18.5
MiB) TX bytes:
0
(
0.0
b)
total used free shared buffers cached
Mem:
3359744
464724
2895020
0
31096
246296
-
/
+
buffers
/
cache:
187332
3172412
Swap:
5406712
0
5406712
Filesystem Size Used Avail Use
%
Mounted on
/
dev
/
mapper
/
VolGroup00
-
LogVol00
221G
25G
185G
12
%
/
/
dev
/
sda1
99M
22M
73M
23
%
/
boot
tmpfs
1.8G
0
1.8G
0
%
/
dev
/
shm
none
1.8G
152K
1.8G
1
%
/
var
/
lib
/
xenstored<br><br><br><br><br>
|
1
|
<br><br><br>-、执行远程命令:<br>
#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br>port =22<br>ssh = paramiko.SSHClient()<br>ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())<br>ssh.connect("*.*.*.*",port,"username", "password")<br>stdin, stdout, stderr = ssh.exec_command("你的命令")<br>print stdout.readlines()<br>ssh.close()<br><br>二、上传文件到远程<br>#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br><br>port =22<br>t = paramiko.Transport(("IP",port))<br>t.connect(username = "username", password = "password")<br>sftp = paramiko.SFTPClient.from_transport(t)<br>remotepath='/tmp/test.txt'<br>localpath='/tmp/test.txt'<br>sftp.put(localpath,remotepath)<br>t.close()<br><br>三、从远程下载文件<br>#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br><br>port =22<br>t = paramiko.Transport(("IP",port))<br>t.connect(username = "username", password = "password")<br>sftp = paramiko.SFTPClient.from_transport(t)<br>remotepath='/tmp/test.txt'<br>localpath='/tmp/test.txt'<br>sftp.get(remotepath, localpath)<br>t.close()<br><br>四、执行多个命令<br>#!/usr/bin/python<br>#coding:utf-8<br><br>import sys<br>sys.stderr = open('/dev/null') # Silence silly warnings from paramiko<br>import paramiko as pm<br>sys.stderr = sys.__stderr__<br>import os<br><br>class AllowAllKeys(pm.MissingHostKeyPolicy):<br> def missing_host_key(self, client, hostname, key):<br> return<br><br>HOST = '127.0.0.1'<br>USER = ''<br>PASSWORD = ''<br><br>client = pm.SSHClient()<br>client.load_system_host_keys()<br>client.load_host_keys(os.path.expanduser('~/.ssh/known_hosts'))<br>client.set_missing_host_key_policy(AllowAllKeys())<br>client.connect(HOST, username=USER, password=PASSWORD)<br><br>channel = client.invoke_shell()<br>stdin = channel.makefile('wb')<br>stdout = channel.makefile('rb')<br><br>stdin.write('''<br>cd tmp<br>ls<br>exit<br>''')<br>print stdout.read()<br><br>stdout.close()<br>stdin.close()<br>client.close()<br><br>五、获取多个文件<br>#!/usr/bin/python<br>#coding:utf-8<br><br>import paramiko<br>import os<br><br>ssh = paramiko.SSHClient()<br>ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())<br>ssh.connect('localhost',username='****') <br><br>apath = '/var/log'<br>apattern = '"*.log"'<br>rawcommand = 'find {path} -name {pattern}'<br>command = rawcommand.format(path=apath, pattern=apattern)<br>stdin, stdout, stderr = ssh.exec_command(command)<br>filelist = stdout.read().splitlines()<br><br>ftp = ssh.open_sftp()<br>for afile in filelist:<br> (head, filename) = os.path.split(afile)<br> print(filename)<br> ftp.get(afile, './'+filename)<br>ftp.close()<br>ssh.close()<br><br><br>
|
1
|
|
paramiko模块是基于Python实现的ssh远程安全链接,实现命令远程、文件传输、SSH代理等功能。本文详细介绍了paramiko模块常用的方法,且实用价值非常高,稍作修改就能做出一个实用的运维工具。
安装
letong@me:~$ sudo pip install paramiko
简单的远程执行命令实例
#!/usr/bin/env python import paramiko hostname='127.0.0.1' username='root' password='123456' port=2222 ssh=paramiko.SSHClient() ssh.load_system_host_keys() ssh.connect(hostname=hostname,port=port,username=username,password=password) stdin,stdout,stderr=ssh.exec_command('ls /') print stdout.read() ssh.close()
SSHClient类
SSHClient类是SSH服务会话的高级表示,封装了传输、通道以及SFTPClient的校验、建立方法,通常用于执行命令。
connect方法
connect(self, hostname, port=22, username=None, password=None, pkey=None, Key_filename=None, timeout=None, allow_agent=True, look_for_keys=True, compress=False)
参数说明:
hostname,连接目标的主机地址 port,连接目标的端口,默认22 username,用户名 password,用户密码 pkey,私钥方式用户验证 key_filename,私钥文件名 timeout,超时时间 allow_agent,是否允许ssh代理 look_for_keys,是否允许搜索私钥文件 compress,打开时是否压缩
exec_command方法
exec_command(self, command, bufzise=-1)
参数说明:
command,执行的命令 bufsize,文件缓冲区大小,-1不限制
load_system_host_keys方法
load_system_host_keys(self, filename=None)
参数说明:
filename,指定远程主机公钥文件
set_missing_host_key_policy方法
ssh=paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
参数说明:
AutoAddPolicy,自动添加主机名及密钥到本地并保存,不依赖load_system_host_keys()配置 RejectPolicy,自动拒绝未知主机名和密钥,依赖load_system_host_keys()配置 WarnningPolicy,功能与AutoAddPolicy相同,但是未知主机会报警
SFTPClient类
根据SSH传输协议的sftp会话,实现远程文件上传、下载等操作。
from_transport方法
from_transport(cls, t)
参数说明:
t,一个已通过验证的传输对象
例:
>>> import paramiko >>> a = paramiko.Transport((“127.0.0.1″,2222)) >>> a.connect(username=”root”, password=’123456′) >>> sftp = paramiko.SFTPClient.from_transport(a)
put方法
put(self, localpath, remotepath, callback=None, confirm=True)
参数说明:
localpath,上传源文件的本地路径 remotepath,目标路径 callback,获取接收与总传输字节数 confirm,上传完毕后是否调用stat()方法,以便确认文件大小
例:
>>> localpath=’ftp-test.log’ >>> remotepath=’/data/ftp-test.log’ >>> sftp.put(localpath,remotepath)
get方法
get(self, remotepath, localpath, callback=None)
参数说明:
remotepath,需要下载的远程文件 localpath,本地存储路径 callback,同put方法
其他方法
mkdir,用于创建目录 remove,删除目录 rename,重命名 stat,获取文件信息 listdir,获取目录列表
用的昨天刚接触到的库,在windows下通过paramiko来登录linux系统并执行了几个命令,基本算是初试成功,后面会接着学习的。
代码:
>>> import paramiko
>>> ssh = paramiko.SSHClient()
>>> ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
>>> ssh.connect('10.104.6.8',username = 'xiaopeng',password='******')
>>> cmd = 'cd' #进入用户目录home
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> cmd = 'ls >test' #管道,ls命名的输出到文件test里面
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> cmd = 'cat test' # 显示test的内容,即ls命名的结果
>>> stdin,stdout,stderr = ssh.exec_command(cmd)
>>> print stdout.readlines() #结果 汉字用的字符显示
['code\n', 'Desktop\n', 'order.cpp\n', 'python\n', 'test\n', '\xe5\x85\xac\xe5\x85\xb1\xe7\x9a\x84\n', '\xe6\xa8\xa1\xe6\x9d\xbf\n', '\xe8\xa7\x86\xe9\xa2\x91\n', '\xe5\x9b\xbe\xe7\x89\x87\n', '\xe6\x96\x87\xe6\xa1\xa3\n', '\xe4\xb8\x8b\xe8\xbd\xbd\n', '\xe9\x9f\xb3\xe4\xb9\x90\n']
这里我们都会发现,使用exec_command('cd dirname')时并不会切换目录,execute_command() 是a single session,每次执行完后都要回到缺省目录。所以可以 .execute_command('cd /var; pwd')。
python里面的paramiko模块,用这个实现ssh登录更加简单。看下面的代码:
- #-*- coding: utf-8 -*-
- #!/usr/bin/python
- import paramiko
- import threading
- def ssh2(ip,username,passwd,cmd):
- try:
- ssh = paramiko.SSHClient()
- ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
- ssh.connect(ip,22,username,passwd,timeout=5)
- for m in cmd:
- stdin, stdout, stderr = ssh.exec_command(m)
- # stdin.write("Y") #简单交互,输入 ‘Y’
- out = stdout.readlines()
- #屏幕输出
- for o in out:
- print o,
- print '%s\tOK\n'%(ip)
- ssh.close()
- except :
- print '%s\tError\n'%(ip)
- if __name__=='__main__':
- cmd = ['cal','echo hello!']#你要执行的命令列表
- username = "" #用户名
- passwd = "" #密码
- threads = [] #多线程
- print "Begin......"
- for i in range(1,254):
- ip = '192.168.1.'+str(i)
- a=threading.Thread(target=ssh2,args=(ip,username,passwd,cmd))
- a.start()
上面的程序还是有些技巧的:
1.利用多线程,同时发出登录请求,同时去连接电脑,这样速度快很多,我试了一下,如果不用多线程,直接一个一个挨着执行的话,大约5~10秒钟才能对一台电脑操作完,具体时间要根据命令的来决定,如果是软件安装或者卸载时间要更长一些。这样下来怎么也要一二十分钟,用多线程后就快多了,所有的命令执行完用了不到2分钟!
2.最好用root用户登录,因为安装或者卸载软件的时候如果用普通用户又会提示输入密码,这样又多了一次交互,处理起来就比较麻烦!安装软件时apt-get install xxx 最好加上“-y”参数,因为有时安装或删除软件时提示是否继续安装或卸载,这又是一次自动交互!加上那个参数后就没有人机交互了。
3. 循环时循环所有ip,因为计算机的ip是路由器自动分配的,保险起见,最好全部都执行,保证没有遗漏的主机
4.远端执行命令时如果有交互,可以这样用 stdin.write("Y")来完成交互,“Y”就是输入“Y”。
5.把所有的命令放到一个列表里面,遍历列表可以依次执行列表里面的命令
6.为了更好的进行控制,最好在电脑上提前把root用户打开,装好ssh服务器并让其开机自动执行。
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh.connect('10.111.43.18',22,'root','12345',timeout=5)
stdin, stdout, stderr = ssh.exec_command('cd /root/epoll/')
stdin, stdout, stderr = ssh.exec_command('pwd')
上边的代码输出应该是 /root/epoll/,但结果却是 /root ,即使用root登陆的缺省目录
原因是exec_command为单个会话,执行完成之后会回到登录时的缺省目录
修改为这样执行结果则为预期的 /root/epoll 目录
stdin, stdout, stderr = ssh.exec_command('cd /root/epoll/;pwd')
最近闲着学习python,看到有个paramiko模块,貌似很强大,学着写了个一个小程序,可以直接在window下登录到linux,执行并返回执行结果。
下面直接贴代码:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
#!/usr/bin/env python
import
paramiko
#hostname='192.168.0.102'
hostname
=
'172.28.102.250'
username
=
'root'
password
=
'abc'
#port=22
if
__name__
=
=
'__main__'
:
paramiko.util.log_to_file(
'paramiko.log'
)
s
=
paramiko.SSHClient()
#s.load_system_host_keys()
s.set_missing_host_key_policy(paramiko.AutoAddPolicy())
s.connect(hostname
=
hostname,username
=
username, password
=
password)
stdin,stdout,stderr
=
s.exec_command(
'ifconfig;free;df -h'
)
print
stdout.read()
s.close()
|
下面看下效果,呵呵:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
s501914252.HCA
-
FW9CX2XDesktop学习资料python paramiko
-
ssh.py"
eth0 Link encap:Ethernet HWaddr
00
:
24
:
01
:
01
:EA:
5C
inet addr:
172.32
.
34.240
Bcast:
172.32
.
255.255
Mask:
255.255
.
255.0
UP BROADCAST RUNNING MULTICAST MTU:
1500
Metric:
1
RX packets:
1428
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
2
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
1000
RX bytes:
190928
(
186.4
KiB) TX bytes:
128
(
128.0
b)
Interrupt:
20
eth1 Link encap:Ethernet HWaddr
00
:
1F
:
29
:
03
:
54
:
3D
inet addr:
172.28
.
102.250
Bcast:
172.28
.
255.255
Mask:
255.255
.
0.0
UP BROADCAST RUNNING MULTICAST MTU:
1500
Metric:
1
RX packets:
99698
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
12305
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
36420324
(
34.7
MiB) TX bytes:
923630
(
901.9
KiB)
lo Link encap:Local Loopback
inet addr:
127.0
.
0.1
Mask:
255.0
.
0.0
UP LOOPBACK RUNNING MTU:
16436
Metric:
1
RX packets:
0
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
0
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
0
(
0.0
b) TX bytes:
0
(
0.0
b)
peth1 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
99686
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
12333
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
1000
RX bytes:
36818715
(
35.1
MiB) TX bytes:
1006230
(
982.6
KiB)
Interrupt:
20
Memory:f3000000
-
f3010000
vif0.
1
Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
12305
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
99702
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
923630
(
901.9
KiB) TX bytes:
36420811
(
34.7
MiB)
vif1.
0
Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
5
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
85175
errors:
0
dropped:
542
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
500
RX bytes:
140
(
140.0
b) TX bytes:
20377326
(
19.4
MiB)
vif2.
0
Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
5
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
84859
errors:
0
dropped:
411
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
500
RX bytes:
140
(
140.0
b) TX bytes:
20301953
(
19.3
MiB)
vif3.
0
Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
5
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
84337
errors:
0
dropped:
546
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
500
RX bytes:
140
(
140.0
b) TX bytes:
20174994
(
19.2
MiB)
virbr0 Link encap:Ethernet HWaddr
00
:
00
:
00
:
00
:
00
:
00
inet addr:
192.168
.
122.1
Bcast:
192.168
.
122.255
Mask:
255.255
.
255.0
UP BROADCAST RUNNING MULTICAST MTU:
1500
Metric:
1
RX packets:
0
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
0
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
0
(
0.0
b) TX bytes:
0
(
0.0
b)
xenbr1 Link encap:Ethernet HWaddr FE:FF:FF:FF:FF:FF
UP BROADCAST RUNNING NOARP MTU:
1500
Metric:
1
RX packets:
86405
errors:
0
dropped:
0
overruns:
0
frame:
0
TX packets:
0
errors:
0
dropped:
0
overruns:
0
carrier:
0
collisions:
0
txqueuelen:
0
RX bytes:
19498121
(
18.5
MiB) TX bytes:
0
(
0.0
b)
total used free shared buffers cached
Mem:
3359744
464724
2895020
0
31096
246296
-
/
+
buffers
/
cache:
187332
3172412
Swap:
5406712
0
5406712
Filesystem Size Used Avail Use
%
Mounted on
/
dev
/
mapper
/
VolGroup00
-
LogVol00
221G
25G
185G
12
%
/
/
dev
/
sda1
99M
22M
73M
23
%
/
boot
tmpfs
1.8G
0
1.8G
0
%
/
dev
/
shm
none
1.8G
152K
1.8G
1
%
/
var
/
lib
/
xenstored<br><br><br><br><br>
|
1
|
<br><br><br>-、执行远程命令:<br>
#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br>port =22<br>ssh = paramiko.SSHClient()<br>ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())<br>ssh.connect("*.*.*.*",port,"username", "password")<br>stdin, stdout, stderr = ssh.exec_command("你的命令")<br>print stdout.readlines()<br>ssh.close()<br><br>二、上传文件到远程<br>#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br><br>port =22<br>t = paramiko.Transport(("IP",port))<br>t.connect(username = "username", password = "password")<br>sftp = paramiko.SFTPClient.from_transport(t)<br>remotepath='/tmp/test.txt'<br>localpath='/tmp/test.txt'<br>sftp.put(localpath,remotepath)<br>t.close()<br><br>三、从远程下载文件<br>#!/usr/bin/python<br>#coding:utf-8<br>import paramiko<br><br>port =22<br>t = paramiko.Transport(("IP",port))<br>t.connect(username = "username", password = "password")<br>sftp = paramiko.SFTPClient.from_transport(t)<br>remotepath='/tmp/test.txt'<br>localpath='/tmp/test.txt'<br>sftp.get(remotepath, localpath)<br>t.close()<br><br>四、执行多个命令<br>#!/usr/bin/python<br>#coding:utf-8<br><br>import sys<br>sys.stderr = open('/dev/null') # Silence silly warnings from paramiko<br>import paramiko as pm<br>sys.stderr = sys.__stderr__<br>import os<br><br>class AllowAllKeys(pm.MissingHostKeyPolicy):<br> def missing_host_key(self, client, hostname, key):<br> return<br><br>HOST = '127.0.0.1'<br>USER = ''<br>PASSWORD = ''<br><br>client = pm.SSHClient()<br>client.load_system_host_keys()<br>client.load_host_keys(os.path.expanduser('~/.ssh/known_hosts'))<br>client.set_missing_host_key_policy(AllowAllKeys())<br>client.connect(HOST, username=USER, password=PASSWORD)<br><br>channel = client.invoke_shell()<br>stdin = channel.makefile('wb')<br>stdout = channel.makefile('rb')<br><br>stdin.write('''<br>cd tmp<br>ls<br>exit<br>''')<br>print stdout.read()<br><br>stdout.close()<br>stdin.close()<br>client.close()<br><br>五、获取多个文件<br>#!/usr/bin/python<br>#coding:utf-8<br><br>import paramiko<br>import os<br><br>ssh = paramiko.SSHClient()<br>ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())<br>ssh.connect('localhost',username='****') <br><br>apath = '/var/log'<br>apattern = '"*.log"'<br>rawcommand = 'find {path} -name {pattern}'<br>command = rawcommand.format(path=apath, pattern=apattern)<br>stdin, stdout, stderr = ssh.exec_command(command)<br>filelist = stdout.read().splitlines()<br><br>ftp = ssh.open_sftp()<br>for afile in filelist:<br> (head, filename) = os.path.split(afile)<br> print(filename)<br> ftp.get(afile, './'+filename)<br>ftp.close()<br>ssh.close()<br><br><br>
|
1
|
|
paramiko模块是基于Python实现的ssh远程安全链接,实现命令远程、文件传输、SSH代理等功能。本文详细介绍了paramiko模块常用的方法,且实用价值非常高,稍作修改就能做出一个实用的运维工具。
安装
letong@me:~$ sudo pip install paramiko
简单的远程执行命令实例
#!/usr/bin/env python import paramiko hostname='127.0.0.1' username='root' password='123456' port=2222 ssh=paramiko.SSHClient() ssh.load_system_host_keys() ssh.connect(hostname=hostname,port=port,username=username,password=password) stdin,stdout,stderr=ssh.exec_command('ls /') print stdout.read() ssh.close()
SSHClient类
SSHClient类是SSH服务会话的高级表示,封装了传输、通道以及SFTPClient的校验、建立方法,通常用于执行命令。
connect方法
connect(self, hostname, port=22, username=None, password=None, pkey=None, Key_filename=None, timeout=None, allow_agent=True, look_for_keys=True, compress=False)
参数说明:
hostname,连接目标的主机地址 port,连接目标的端口,默认22 username,用户名 password,用户密码 pkey,私钥方式用户验证 key_filename,私钥文件名 timeout,超时时间 allow_agent,是否允许ssh代理 look_for_keys,是否允许搜索私钥文件 compress,打开时是否压缩
exec_command方法
exec_command(self, command, bufzise=-1)
参数说明:
command,执行的命令 bufsize,文件缓冲区大小,-1不限制
load_system_host_keys方法
load_system_host_keys(self, filename=None)
参数说明:
filename,指定远程主机公钥文件
set_missing_host_key_policy方法
ssh=paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
参数说明:
AutoAddPolicy,自动添加主机名及密钥到本地并保存,不依赖load_system_host_keys()配置 RejectPolicy,自动拒绝未知主机名和密钥,依赖load_system_host_keys()配置 WarnningPolicy,功能与AutoAddPolicy相同,但是未知主机会报警
SFTPClient类
根据SSH传输协议的sftp会话,实现远程文件上传、下载等操作。
from_transport方法
from_transport(cls, t)
参数说明:
t,一个已通过验证的传输对象
例:
>>> import paramiko >>> a = paramiko.Transport((“127.0.0.1″,2222)) >>> a.connect(username=”root”, password=’123456′) >>> sftp = paramiko.SFTPClient.from_transport(a)
put方法
put(self, localpath, remotepath, callback=None, confirm=True)
参数说明:
localpath,上传源文件的本地路径 remotepath,目标路径 callback,获取接收与总传输字节数 confirm,上传完毕后是否调用stat()方法,以便确认文件大小
例:
>>> localpath=’ftp-test.log’ >>> remotepath=’/data/ftp-test.log’ >>> sftp.put(localpath,remotepath)
get方法
get(self, remotepath, localpath, callback=None)
参数说明:
remotepath,需要下载的远程文件 localpath,本地存储路径 callback,同put方法
其他方法
mkdir,用于创建目录 remove,删除目录 rename,重命名 stat,获取文件信息 listdir,获取目录列表