日常工作中常用的磁盘、内存清理命令和数据备份脚本整理如下。
磁盘/内存 清理 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 df -Thdu -sh /*du -sh /*/*du -hrm -rf /docker/zentao/www/zentaopms/tmprm -rf /usr/tmprm -rf /var/logfree -m echo 3 > /proc/sys/vm/drop_caches/usr/local/repository/maven_repo/com jps -l jmap -heap PID号
数据备份 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 mysqldump 逻辑备份 mysqldump -u用户 -p密码 库名 [表名] > xxx.sql mysql -u用户 -p密码 库名 < xxx.sql [root@figure ~]# ls mul_java mysql_db nexus.log nexus.tar nohup.out [root@figure ~]# cd mysql_db/ [root@figure mysql_db]# mysqldump -uroot -p'Qingfeng@123' zj_shops_dev > zj_shops_dev.sql [root@figure mysql_db]# ls dev.sql mysql.sql nacos.sql test.sql zj_shops_beta.sql zj_shops_dev.sql zj_shops_test.sql zj_shops_uat.sql 示例: mysql> show databases; [root@localhost cha]# mysqldump -uroot -p'1' ku > ku.sql [root@localhost cha]# vim ku.sql create database ku; use ku; //看是否需要添加以上两行 DROP TABLE IF EXISTS `biao`; mysql> drop database ku; mysql> show databases; //再查看下 [root@localhost cha]# mysql -uroot -p'1' < ku.sql //回复数据 mysql> show databases; [root@uat ~]# ls jarfile [root@uat ~]# cp jarfile/ jarfile_bak/ -r [root@uat ~]# tar czvf jarfile.tar.gz ./jarfile [root@uat ~]# ls jarfile jarfile_bak jarfile.tar.gz
MySQL数据每日全量备份 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 [root@localhost ~]# mkdir /opt/mysql_back/backup [root@localhost ~]# mkdir /opt/mysql_back/back_log [root@localhost mysql_back]# cat /opt/mysql_back/mysql_db_back.sh user="root" password="Qingfeng@123" beginTime=$(date +"%Y年%m月%d日 %H:%M:%S" ) endTime=$(date +"%Y年%m月%d日 %H:%M:%S" ) bakDir="/opt/mysql_back/backup" logFile="/opt/mysql_back/back_log/fullybak.log" mkdir -p "$bakDir " cd "$bakDir " echo "全量备份开始: $beginTime " >> "$logFile " nowDate=$(date +"%Y%m%d_%H%M%S" ) dumpFile="${nowDate} _alldb.sql" gzDumpFile="${nowDate} _alldb.sql.tgz" mysqldump -u"$user " -p"$password " -A -E -q --flush-privileges --single-transaction > "$dumpFile " if [ $? -eq 0 ]; then tar -zvcf "$gzDumpFile " "$dumpFile " rm "$dumpFile " echo "全量备份结束: $endTime , 备份文件: $gzDumpFile ! SUCCESS !" >> "$logFile " else echo "全量备份结束: $endTime , 备份文件: $gzDumpFile ! ERROR !" >> "$logFile " fi find "$bakDir " -name "*.sql.tgz" -type f -mtime +7 -exec rm -rf {} \; > /dev/null 2>&1 exit 0[root@localhost mysql_back]# chmod +x /opt/mysql_back/mysql_db_back.sh [root@localhost mysql_back]# crontab -e 0 1 * * * /bin/bash -x /opt/mysql_back/mysql_db_back.sh >/dev/null 2>&1
挖矿程序清理 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 systemctl disable c3pool_miner.service systemctl status c3pool_miner.service systemctl stop c3pool_miner.service systemctl status c3pool_miner.service rm -rf /etc/systemd/system/c3pool_miner.servicesystemctl list-units --type =service systemctl list-units --type =service | grep c3pool htop ps -ef ps -ef |grep xmrig find / -name xmrig ls -lahrm -rf c3pool/find / -name xmrig iptables -A OUTPUT -p tcp -d *.c3pool.org --dport 80 -j DROP iptables -A OUTPUT -p tcp -d '*.c3pool.org' --dport 80 -j DROP iptables -A OUTPUT -p tcp -d "*.c3pool.org" --dport 80 -j DROP iptables -A OUTPUT -p tcp -d download.c3pool.org --dport 80 -j DROP iptables -A OUTPUT -p tcp -d c3pool.org --dport 80 -j DROP ping c3pool.org iptables save service iptables save iptables -I INPUT -m string --string "setup_c3pool_miner.sh" --algo bm -j DROP service iptables save iptables -L iptables-save > /etc/sysconfig/iptables vim /etc/rc.d/rc.local iptables-restore < /etc/sysconfig/iptables vim /etc/sysconfig/iptables -A INPUT -m string --string "setup_c3pool_miner.sh" --algo bm --to 65535 -j DROP -A OUTPUT -d 154.201.90.241/32 -p tcp -m tcp --dport 80 -j DROP -A OUTPUT -d 154.12.21.70/32 -p tcp -m tcp --dport 80 -j DROP
阿里云漏洞恢复,禁用api的访问 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 Spring Boot Actuator 未授权访问远程代码执行漏洞【远程扫描】RASP支持实时防护 uat 47.116.200.165 公 172.31.141.179 私 漏洞地址:http://47.116.200.165:8090/actuator 返回特征:nv-toMatch":{" href":" http://47.116.200.165:8090/actuator/env/{toMatch}"," templated":true}," env ":{" href":" htt [root@prod-network conf.d]# cat prd-api.conf server { listen 881; location / { proxy_pass http://172.31.141.180:8090/; proxy_set_header Host $host :$server_port ; proxy_set_header X-Real-IP $remote_addr ; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for ; } location /doc.html { return 403; } location ^~ /actuator/ { deny all; } location ^~ /actuator { deny all; } } fastjson <= 1.2.80 反序列化任意代码执行漏洞 RASP支持实时防护 路径:/root/jarfile/portal/zj-shop-portal.jar(BOOT-INF/lib/fastjson-1.2.7.jar) 后端更代码漏洞