Centos sed -i命令使用讲解,centossed


今天在自动化安装脚本时需要防火墙配置文件开放3306端口

sed -i

在含有特定字符串的行前插入新行

sed -i '/特定字符串/i 新行字符串'

例:

[root@www ~]# vi /etc/sysconfig/iptables


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT


# Firewall configuration written by system-config-securitylevel


# Manual customization of this file is not recommended.


*filter


:INPUT ACCEPT [0:0]


:FORWARD ACCEPT [0:0]


:OUTPUT ACCEPT [0:0]


:RH-Firewall-1-INPUT - [0:0]


-A INPUT -j RH-Firewall-1-INPUT


-A FORWARD -j RH-Firewall-1-INPUT


-A RH-Firewall-1-INPUT -i lo -j ACCEPT


# Uncomment line below if you have 2 NICs and eth1 is public


#-A RH-Firewall-1-INPUT -i eth0 -j ACCEPT


-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT


-A RH-Firewall-1-INPUT -p 50 -j ACCEPT


-A RH-Firewall-1-INPUT -p 51 -j ACCEPT


-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT


-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT


-A RH-Firewall-1-INPUT -m udp -p udp --dport 5060 -j ACCEPT


-A RH-Firewall-1-INPUT -m udp -p udp --dport 4569 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT


#-A RH-Firewall-1-INPUT -m tcp -p tcp --dport 3306 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 10000 -j ACCEPT


-A RH-Firewall-1-INPUT -m udp -p udp --dport 10000:65000 -j ACCEPT


-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited


COMMIT

执行:

sed -i '/-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT/i-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT' /etc/sysconfig/iptables

[root@www ~]# vi /etc/sysconfig/iptables


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT


# Firewall configuration written by system-config-securitylevel


# Manual customization of this file is not recommended.


*filter


:INPUT ACCEPT [0:0]


:FORWARD ACCEPT [0:0]


:OUTPUT ACCEPT [0:0]


:RH-Firewall-1-INPUT - [0:0]


-A INPUT -j RH-Firewall-1-INPUT


-A FORWARD -j RH-Firewall-1-INPUT


-A RH-Firewall-1-INPUT -i lo -j ACCEPT


# Uncomment line below if you have 2 NICs and eth1 is public


#-A RH-Firewall-1-INPUT -i eth0 -j ACCEPT


-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT


-A RH-Firewall-1-INPUT -p 50 -j ACCEPT


-A RH-Firewall-1-INPUT -p 51 -j ACCEPT


-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT


-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT


-A RH-Firewall-1-INPUT -m udp -p udp --dport 5060 -j ACCEPT


-A RH-Firewall-1-INPUT -m udp -p udp --dport 4569 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 21 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 3306 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT


#-A RH-Firewall-1-INPUT -m tcp -p tcp --dport 3306 -j ACCEPT


-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 10000 -j ACCEPT


-A RH-Firewall-1-INPUT -m udp -p udp --dport 10000:65000 -j ACCEPT


-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited


COMMIT

相关内容

    暂无相关文章