Operation and Maintenance
Linux Operation and Maintenance
What are the methods of editing file commands in Linux?
This article is not only written for novices to learn, but also for me to learn Linux. When I write this article, I am also learning and understanding Keep these basic commands for future reference.
sed command to view/edit file content
Introduction parameters:
##-i: After the operation, the application is saved to the original file (if this parameter is not added, any modification will not affect the content of the original file, only the result will be output) -e: Only display the processed results# To be written...# More commands You can use sed --help to view it. use:
# View the content of line 3 of log.txtsed -n '3p' log.txt# View the contents of lines 2-8 of log.txtsed -n '2,8p' log.txt# Delete line 1 (first line) of log.txt sed -i '1d' log.txt# Delete log .txt Lines 3-7sed -i '3,7d' log.txt# Delete the last line of log.txt (Last line) sed -i '$d' log.txt# Delete all blank lines in log.txtsed -i '/^$/d' log.txt Delete the line starting with doubi in log.txtsed -i '/^doubi/'d log.txt Delete the line ending with doubi in log.txtsed -i '/doubi$/'d log.txt Delete all lines containing 233 content in the log.txt filesed -i '/233/d' log.txt# Delete the first 233 text in the log.txt file sed -i 's/233//' log.txt# Delete all 233 text in the log.txt file (g represents the text that operates all matching rules)sed -i 's/233//g' log.txt Delete all the fifth 233 text in the log.txt file (5g represents the Text of five matching rules)sed -i 's/233//5g' log.txt# Replace log.txt The first 233 in the file is 666##sed -i 's/233/666/' log.txt# replace log. All 233 in the txt file are 666 (g represents the text of all matching rules in the operation)sed -i 's/233/666/g' log.txt # Replace all /ver in the log.txt file with doubi/. Because there are slashes, you need to use \ to escape. However, single quotes will make it impossible to escape, so you need to change them to double quotes.sed -i "s/\/ver/doubi\//" log.txt# Display the log.txt file Odd or even linessed -n 'p;n' log.txt #Odd linessed -n 'n;p ' log.txt #Even numbered lines# You can use sed --help to view more commands.
##VI, VIM, Nano Edit file content
VI Introduction:
VI is a great text editor for Linux, but it also has some shortcomings, such as troublesome operation. . Vim is equivalent to an enhanced version of VI, mainly introducing VIM.
VIM Introduction
# Open the log.txt file in the current directory. If there is no log.txt file, a new log.txt file will be created (after installing vim, there is no difference between using vi and vim to open the file) vi log.txtvim log.txt# In command line mode, directly enter the following Symbols and letters (case sensitive)## Enter edit mode (insert mode, press Esc key to return to command line mode)i## Delete the line where the cursor is currently located dd## Delete All contents in the filedddG## Copy the line where the cursor is currently locatedyy ## Paste the line you just copiedp## Undo the previous one Operation (misoperation can be restored with this) u## Save the current file ( : is an English colon) :w## Save the current file content as log2.txt:w log2.txt## Exit the current file :q## Do not save and force exit the current file File:q!## Save and exit the current file:wq# You can use vi --help / vim --help to view more commands.
#Nano Introduction
Nano is more suitable for novices than VIM.
# Open the log.txt file in the current directory. If there is no log.txt file, a new log.txt file will be created. nano log.txt# After entering, you can directly enter and modify the text content. After modification, we can use this key to save the contentCtrl O# If you no longer need to edit, you can use this key to exit the current file Ctrl X If you If you have modified but not saved before exiting, you will be prompted whether to save. If you want to save, enter y. If not, enter n# and then you will be asked to enter the file name to be saved. (The default is the original file name, so just press Enter, unless you want to save as another file name) Enter# Update Many commands can be viewed by pressing the F1 key in the nano editing interface.
For more Linux-related technical articles, please visit the Linux Tutorial column to learn!
The above is the detailed content of What are the methods of editing file commands in Linux?. For more information, please follow other related articles on the PHP Chinese website!
How to use loops in bash for whileJul 24, 2025 am 12:47 AMIn Bash scripts, for and while loops have applicable scenarios: 1. For is more suitable for cases where the number of loops is known, such as traversing a list or range; 2. While is more suitable for continuous execution according to conditions, such as waiting for the state to change; 3. The two can also be used in combination to improve script flexibility. The For loop is implemented through the "variable in list" structure, which is suitable for tasks such as printing numbers and processing files; the While loop is based on conditional judgment and is often used to read input or poll status; when used in mixed use, while can control the process, for can process data, such as reading line by line and traversing the skill list. When writing, you need to pay attention to avoiding dead loops and test small samples first to ensure the logic is correct.
How to check filesystem integrity fsckJul 24, 2025 am 12:33 AMfsck is a tool for checking and repairing file system integrity, suitable for a variety of file systems, running when the system is started or suspected of file corruption. Before use, make sure that the partition is not mounted in read-write state, and it is recommended to operate in single-user mode or LiveCD/USB. Common options include -t specifying the file system type, -n only viewing reports, -y automatic repair, and -f mandatory check. When encountering error messages such as duplicate data blocks, you can choose to repair or skip; if it cannot be repaired automatically, you need to manually analyze the log or use professional tools. It is recommended to run fsck during abnormal shutdown, file access exceptions, mount errors, or regular maintenance, but SSDs and modern file systems do not need to be used frequently. When using it, you should pay attention to permission issues, and usually add sudo.
How to analyze system performance dataJul 24, 2025 am 12:26 AMThe core of analyzing system performance data is to identify bottlenecks and guide optimization. Key metrics include CPU usage, memory footprint, disk IO, network latency, and response time. For example, a CPU above 80% for a long time may mean tight resources, insufficient memory will lead to frequent swaps, and high disk IO imply storage problems. Different systems have different concerns, such as the web server pays attention to request delay and the number of concurrent connections, while the database pays attention to query response time and lock waiting. When viewing trends, you need to combine historical data, use monitoring tools to draw a trend chart, compare normal and abnormal periods, and associate multiple indicators with comprehensive analysis. When encountering sudden problems, you can quickly troubleshoot them by following the steps: first use top/htop to view the CPU occupancy process, free-m to check the memory and swap, io
How to write Puppet manifestsJul 24, 2025 am 12:10 AMThe key to writing a Puppet list is modular structure, resource relationship management, flexible application of variable conditions and standardized grammar style. 1. Use a modular structure to split the functions into modules and store them in directories, place the main class init.pp, and respond to different scenarios through subclasses to improve reusability; 2. Reasonably declare resources and manage dependencies, use before, require, and notify to control the execution order, and ensure that the service restart is triggered after the configuration file is modified; 3. Use variables and condition judgments to improve flexibility, select paths according to the system type, and manage configuration data in combination with Hiera; 4. Pay attention to the code style, unify naming specifications, align indentation, add clear annotations, and use the PuppetLint tool to ensure the correct format
How to restore Linux system from backupJul 23, 2025 am 12:25 AMTo successfully restore Linux system from backup, you must first clarify the backup type and follow the steps. 1. Confirm the backup type, such as complete system image, file-level backup or package list plus configuration files, and select the corresponding recovery method according to the type, such as decompressing data with rsync or tar. 2. Enter the recovery environment through LiveUSB, mount the root partition and backup location, and use the command to copy data. 3. When restoring user data and configuration, check permissions, ownership and hidden files, and reinstall GRUB if necessary. 4. Pay attention to details such as excluding special directories, version compatibility, and non-obvious configuration storage locations. Testing and preparation in advance is the key to ensuring a smooth recovery.
How to use the `lsmod` commandJul 23, 2025 am 12:13 AMlsmod is a command in Linux to view loaded kernel modules, and display module information in a more readable way by reading /proc/modules file. Its output contains three columns: Module (module name), Size (size, bytes), and Usedby (number of references). Combined with grep, specific modules can be filtered, such as lsmod|grepusb is used to find USB-related modules. Dependencies can be identified by Usedby columns, for example, snd\_usbmidi\_lib is dependent on snd\_usb\_audio. To view dependencies in depth, modinfomodule\_name is available. Common operations include using sudomod
How to unmount a filesystemJul 23, 2025 am 12:06 AMTo uninstall the file system, you must first confirm the mount point path and use the umount command to operate. If you encounter "deviceisbusy", you must handle the occupied process. 1. Use df-h or mount|grep/dev to confirm the mount point; 2. Execute sudoumount [mount point] uninstall; 3. If the device is prompted to be busy, close the relevant programs or use lsof to check the process and kill; 4. Use sudoumount-l to delay uninstall; 5. When uninstalling NFS, you can add the -f parameter to force uninstall. Be careful to ensure that there is no program dependency before operating to avoid exceptions.
How to manage system logs remote syslogJul 23, 2025 am 12:06 AMThe configuration steps for remote management of logs include: 1. Configure the local client to send logs, modify the rsyslog configuration file and transmit using the TCP protocol; 2. Set up the remote server to receive logs, enable network modules, and set up log classification storage; 3. Strengthen security, restrict access through firewalls, TLS encryption and log filtering; 4. Troubleshoot common problems and check port monitoring, connectivity, service status and security policies. Following the above steps can ensure the stable operation of the log system.


Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Atom editor mac version download
The most popular open source editor

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

SublimeText3 Chinese version
Chinese version, very easy to use






