Learn about convert shell script to batch file online, we have the largest and most updated convert shell script to batch file online information on alibabacloud.com
Recently, you need to use Sourceinsight to view the project code developed under Linux, and we know that the default encoding format for text files in Linux systems is UTF-8, and the default encoding format for Windows Chinese is Gb2312. The coding format in the system is different, the key is sourceinsight unexpectedly do not support UTF-8, resulting in the project code in the Chinese comments all garbled!
Since Sourceinsight does not support UTF-8 encoded files, we have to find a way to
in the script to find exactly.This script is suitable for the small and medium-sized machine room without monitoring platform patrol, the host running the script is not an online business Server. This script is also suitable for me just like the beginning of the
During work, the puppet server/client certificate authentication exception is often encountered, and the certificate needs to be regenerated. Common operations are to delete the old certificates related to the server/client certificate, and then generate a new certificate. In this case, a shell script is compiled, which only needs to be periodically run on the Client side. Since the
The reason for bad interpreter:no such file or directory is the file format problem. This file is written under Windows. Line-wrapping is not the same as UNIX, but under vim if it is not set it is completely invisible.Problem Analysis:1, will be prepared under Windows shell file
A case of a batch conversion directory of File encoded shell script code.
Requirements Description:As a result of turning Linux from Windows, many original win under the GBK file needs to be converted into UTF8.
The following script
In development, we often need to change the N-file encoding, ICONV can only make changes to a single file, how to do? Let's write a shell script to solve this problem.
Example one: Using shell script to implement bulk transcoding
1 " *.pid " ` 2 for inch $head _files 3 Do 4 ' {print $} ' | Xargs Kill-95 rm-f $file6 DoneCode as aboveExplain:1. Find all the PID files in the./fmsconf Directory2. Traverse the found file3. Start traversing4. Separate explanations:1. Cat $file: Print out the contents of file files2. awk ' {print $} ': Print the first unit character3. Xargs: Use the previous output as the input for this4. kill-9:
Batch File tool (java + shell command implementation)Batch File tool (java + shell command implementation)A bunch of corpus needs to be processed before it can be used. It should have been directly processed using
1. Summary
(1). ". Bat": This is the suffix of Microsoft's first batch of processed files and can be run in almost all Windows operating systems.
(2). ". cmd": it is a command line script designed for Windows NT. It is designed for cmd.exe shell and does not have backward compatibility with command. com.
(3) what is currently known. CMD and. the difference in the
Execute the same command on multiple machines on a cluster because of actual development needs. For example, execute a specified script, delete files in the same directory (this is prudent ~ ~) and so on, the members of the group developed a ALLSCP (can execute the SCP command to synchronize the online code) very good, I also wrote a, The main is to use SSH to log on to a server, and then execute a specifie
Linux Server Batch Deployment application shell script:1. Please replace the server address (Tomcat or jetty server) within the codeserverroot=/home/undoner/java_tool/apache-tomcat-7.0.61Serverdir=/home/undoner/java_tool/apache-tomcat-7.0.61/webapps2. Please change the name of the profile to which the project belongs/web-inf/classes/install.properties3. Upload th
,--close: means to turn off the FD of a set lock before executing the command so that the child process of the command does not remain locked.-C,--command command: Executing subsequent statements in the shell
4. Implement exclusive lock in Shell to avoid repeated execution of scripts
Routine work scheduling in Linux crontab executes some scripts at timed intervals, but the execution times of the scrip
Recently, the Linux batch execution of the script is very interested in looking around the Internet for expect batch execution script, today to share a batch password modification script.
S
Script name is zk_run.shPaste the following code into the zk_run.shAdd Execute permissions chmode +x zk_run.shRun the script./zk_run.sh startIf you find that zookeeper is not starting up, try adding the following line at the top of each zookeeper zookeeper-3.4.10/bin/zkenv.sh scriptExport java_home=/opt/jdk1.8.0_92In this scenario, my script will work.If you're n
Job Four:
Write a script:
Implement Ping Class C network segment, Class B network segment and all hosts in Class A network segment;
The network segment address lets the user input, moreover uses the script to judge the network segment type;
#!/bin/bash #Author: MOS #Script name:funPing.sh #Date time:2012-10-09/21:53:09 #Version: 1.0.1 #Descri Ption: # #定义C类
Objective:
Add Linux user account, this is relatively simple, in the face of the cluster, many machines, how do we do and implement? This short article, briefly explain some ideas, as far as possible to involve some of the surrounding knowledge points. It's not just the ops people who are faced with this problem, but sometimes it's a Cluster service or software (such as a Hadoop cluster) that is based on a Linux platform.
Application Scenarios:
is the CentOS 6.4 as a demons
. No. 0 15 30 45 60 minutes per hour to execute the LS command]6 */10 * ls command is executed every 10 days each month (1, 11, 21, 31st). 6:30 executes the LS command once. ]Now to introduce my specific steps (including writing a shell script and executing the SQL file written)Open Linux terminal > enter the cat (I created myself) directory > Create Crontab fold
Currently, many websites are deployed separately on the front and back ends, which is relatively secure. Even if hackers get the foreground shell, they cannot find the background management address to increase security.
You should know the functions of the hosts file. When you access a website, you need to resolve the domain name to an IP address to connect and obtain the content, when resolving a domain
This article mainly introduces 2 methods of referencing and invoking another script file in the shell script, this article introduces the syntax of the two methods, then gives the actual usages and some places to pay attention to, the friend who needs can refer to the following
In Java,python, you can use the import m
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.