


How to use ssh command to count distributed cluster information in Linux Shell
1. Ideas for statistics of distributed cluster information
Use password-free remote login commands to enable one machine to access machines in other clusters. Therefore, there are several important steps to achieve:
Learn how to use shh
Achieve password-free login
Writing shell program
2. SSH encryption principle
Asymmetric encryption technology is an encryption method that uses different keys for encryption and decryption. Among them, RSA and DSA are asymmetric encryption methods. Of course, the asymmetric encryption algorithm has a premise, that is, there is a pair of keys that can encrypt and decrypt each other. Usually this pair of keys will become the public key and private key of the holder. The public key is a key that others can know, while the private key can only be known by the holder. Of course, if the private key is leaked to outsiders, there may be information security issues.
Suppose: A wants to send encrypted data to B. The first method is: A uses his own private key to encrypt, and B uses A's public key to decrypt after obtaining the data. The second method is: A uses B's public key to encrypt the data, and B uses his own private key to decrypt the data after obtaining it.
SSH remote login uses the first method.
3. SSH command
The commonly used method is
ssh -i [private key file name] -p [port number] user@hostname [executed Command]
The private key file name defaults to $HOME/.ssh/id_rsa or $HOME/.ssh/id_dsa, and the port number defaults to 22.
For example:
ssh myname@128.180.146.89 #输入目标主机的密码后进行远程操作,exit命令退出
4. Use ssh-keygen and ssh-copy-id to achieve password-free login
ssh-keygen #直接全部回车,先都默认
Then a key pair file will be generated in the $HOME/.ssh/ directory, among which *.pub Unified into a public key file, and the other is a private key file.
Next, copy the contents of the public key file to $HOME/.ssh/authorized_keys of the target host user. The copy method can be operated manually by yourself. You can also use the following command to achieve
ssh-copy-id -i [public key file name] user$hostname
For example:
ssh-copy-id -i $HOME/.ssh/id_rsa.pub myname@128.180.146.89
And then Execute the remote login command to achieve password-free login. If a password is still required for the second login, it may be due to file and file directory permission issues. It may also be because the connected private key and public key are not a pair.
5. Linux Shell Script Implementation
sshtest.sh file:
#!/bin/bash func___setenv(){ RTS_ECT_DIR="$HOME" #..... } ###################################### # # 程序主体 ###################################### #调用环境变量 func___setenv #读取机器连接信息 while read line do ssh_cmd= ssh_linkhost=`echo ${line}` while read cmdline do #空命令行跳过 if [ -z "$cmdline" ]; then continue fi #读取的命令行拼接; if [ ! -n "$ssh_cmd" ]; then ssh_cmd=`echo ${$cmdline}` ; else ssh_cmd="${ssh_cmd};"`echo ${$cmdline}` ; fi done <${RTS_ECT_DIR}/sshcmd.cfg #执行远程命令 ssh $ssh_linkhost $ssh_cmd </dev/null done <${RTS_ECT_DIR}/sshlink.cfg
sshlink.cfg file: The key must be configured first before you can log in without a password
myname@128.180.146.89 myName@128.180.146.90 Myname@128.180.146.91
sshcmd.cfg file: fill in
ps -ef|grep java df -h
according to your own needs. Sixth, ssh only loops once.
If the penultimate line of the above code is changed to
ssh $ssh_linkhost $ssh_cmd
Then the while loop will only loop once. Because while read line will put the loop information into the standard input, and the ssh command will read all the input buffer, so while is not in the loop. So the ssh command needs to be redirected
The above is the detailed content of How to use ssh command to count distributed cluster information in Linux Shell. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

VS Code system requirements: Operating system: Windows 10 and above, macOS 10.12 and above, Linux distribution processor: minimum 1.6 GHz, recommended 2.0 GHz and above memory: minimum 512 MB, recommended 4 GB and above storage space: minimum 250 MB, recommended 1 GB and above other requirements: stable network connection, Xorg/Wayland (Linux)

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

vscode built-in terminal is a development tool that allows running commands and scripts within the editor to simplify the development process. How to use vscode terminal: Open the terminal with the shortcut key (Ctrl/Cmd). Enter a command or run the script. Use hotkeys (such as Ctrl L to clear the terminal). Change the working directory (such as the cd command). Advanced features include debug mode, automatic code snippet completion, and interactive command history.

To view the Git repository address, perform the following steps: 1. Open the command line and navigate to the repository directory; 2. Run the "git remote -v" command; 3. View the repository name in the output and its corresponding address.

Writing code in Visual Studio Code (VSCode) is simple and easy to use. Just install VSCode, create a project, select a language, create a file, write code, save and run it. The advantages of VSCode include cross-platform, free and open source, powerful features, rich extensions, and lightweight and fast.

Although Notepad cannot run Java code directly, it can be achieved by using other tools: using the command line compiler (javac) to generate a bytecode file (filename.class). Use the Java interpreter (java) to interpret bytecode, execute the code, and output the result.

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

There are six ways to run code in Sublime: through hotkeys, menus, build systems, command lines, set default build systems, and custom build commands, and run individual files/projects by right-clicking on projects/files. The build system availability depends on the installation of Sublime Text.
