【9.24】日常运维——常用命令(下)、网络相关
10.6 监控io性能
1、iostat 查看磁盘使用情况
[root@arslinux-01 ~]# iostat
Linux 3.10.0-957.el7.x86_64 (arslinux-01) 2019年09月23日 _x86_64_ (1 CPU)
avg-cpu: %user %nice %system %iowait %steal %idle
0.25 0.00 0.39 0.01 0.00 99.35
Device: tps kB_read/s kB_wrtn/s kB_read kB_wrtn
sda 0.92 23.78 9.09 219756 84010
sdb 0.02 0.47 0.00 4336 0
scd0 0.00 0.11 0.00 1028 0
dm-0 0.00 0.11 0.00 1036 0
每隔一秒查看一次磁盘使用情况
[root@arslinux-01 ~]# iostat 1
每隔一秒查看磁盘情况一次,共查看两次
[root@arslinux-01 ~]# iostat 1 2
Linux 3.10.0-957.el7.x86_64 (arslinux-01) 2019年09月23日 _x86_64_ (1 CPU)
avg-cpu: %user %nice %system %iowait %steal %idle
0.25 0.00 0.39 0.01 0.00 99.36
Device: tps kB_read/s kB_wrtn/s kB_read kB_wrtn
sda 0.91 23.38 8.94 219756 84073
sdb 0.02 0.46 0.00 4336 0
scd0 0.00 0.11 0.00 1028 0
dm-0 0.00 0.11 0.00 1036 0
avg-cpu: %user %nice %system %iowait %steal %idle
0.00 0.00 0.00 0.00 0.00 100.00
Device: tps kB_read/s kB_wrtn/s kB_read kB_wrtn
sda 0.00 0.00 0.00 0 0
sdb 0.00 0.00 0.00 0 0
scd0 0.00 0.00 0.00 0 0
dm-0 0.00 0.00 0.00 0 0
- iostat -x
[root@arslinux-01 ~]# iostat -x
Linux 3.10.0-957.el7.x86_64 (arslinux-01) 2019年09月23日 _x86_64_ (1 CPU)
avg-cpu: %user %nice %system %iowait %steal %idle
0.25 0.00 0.38 0.01 0.00 99.36
Device: rrqm/s wrqm/s r/s w/s rkB/s wkB/s avgrq-sz avgqu-sz await r_await w_await svctm %util
sda 0.00 0.02 0.64 0.26 23.28 8.91 71.10 0.00 0.87 0.62 1.47 0.47 0.04
sdb 0.00 0.00 0.02 0.00 0.46 0.00 46.13 0.00 0.38 0.38 0.00 0.28 0.00
scd0 0.00 0.00 0.00 0.00 0.11 0.00 114.22 0.00 1.56 1.56 0.00 1.22 0.00
dm-0 0.00 0.00 0.00 0.00 0.11 0.00 48.19 0.00 0.30 0.30 0.00 0.23 0.00
%util 表示一秒内 IO 操作所占的比例,数字很大,说明磁盘很忙
如果数字很大,那么磁盘读写也会很大;但是如果读写不大,而 %util 很大,那么磁盘可能存在故障
2、iotop
- iotop 默认需要安装
[root@arslinux-01 ~]# yum install -y iotop
iotop 和 top 命令类似,都是动态显示
[root@arslinux-01 ~]# iotop
10.7 free命令
- free 查看内存使用情况
[root@arslinux-01 ~]# free
total used free shared buff/cache available
Mem: 995896 130944 710480 7800 154472 694244
Swap: 1999868 0 1999868
- free -m 指定以 M 为单位,查看内存使用情况
[root@arslinux-01 ~]# free -m
total used free shared buff/cache available
Mem: 972 127 693 7 150 677
Swap: 1952 0 1952
- free -h 自动以合适的单位,并显示单位,方便查看,更人性化
[root@arslinux-01 ~]# free -h
total used free shared buff/cache available
Mem: 972M 127M 693M 7.6M 150M 677M
Swap: 1.9G 0B 1.9G
buffer 缓冲:CPU——>内存(buffer)——>磁盘
cache 缓存:磁盘——>内存(cache)——>CPU
total = used + free + buff/cache
available = free + buff/cache剩余部分
请注意,这只是一个很理想的计算方式,实际中的数据往往有较大的误差。
10.8 ps命令
- ps aux 查看系统进程
[root@arslinux-01 ~]# ps aux
- ps aux | grep 关键字 查看某个进程是否在运行
[root@arslinux-01 ~]# ps aux |grep mysql
root 7793 0.0 0.0 112724 988 pts/0 R+ 22:52 0:00 grep --color=auto mysql
[root@arslinux-01 ~]# ps aux |grep nginx
root 7795 0.0 0.0 112724 988 pts/0 S+ 22:53 0:00 grep --color=auto nginx
- ps -elf 查看系统所有进程(和 ps aux 差不多)
PID 的用处:
1,kill进程用 kill + 进程号
2,查看进程所在目录 ll /proc/数字
STAT部分说明:
字符 | 含义 |
---|---|
D | 不能中断的进程 |
R | run状态的进程(某个时间段内在使用) |
S | sleep状态进程 (vmstat运行时间很短,运行一下就sleep,并不会消耗CPU资源) |
T | 暂停的进程 |
+ | 前台进程 |
Z | 僵尸进程(很少会有,但也会有) |
< | 高优先级进程 |
N | 低优先级进程(不急) |
L | 内存中被锁了内存分页(不常见) |
s | 主进程 |
l | 多线程进程(一个进程中有多个线程) |
线程和进程的区别:
https://www.cnblogs.com/zhehan54/p/6130030.html
https://baijiahao.baidu.com/s?id=1611925141861592999&wfr=spider&for=pc
10.9 查看网络状态
- netstat 查看网络状态(tcp/ip通讯状态)
[root@arslinux-01 ~]# netstat
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 52 arslinux-01:ssh 192.168.19:contamac_icm ESTABLISHED
Active UNIX domain sockets (w/o servers)
Proto RefCnt Flags Type State I-Node Path
unix 2 [ ] DGRAM 34934 /var/run/chrony/chronyd.sock
unix 2 [ ] DGRAM 21364 /run/systemd/shutdownd
unix 3 [ ] DGRAM 8926 /run/systemd/notify
unix 2 [ ] DGRAM 8928 /run/systemd/cgroups-agent
unix 5 [ ] DGRAM 8945 /run/systemd/journal/socket
unix 13 [ ] DGRAM 8947 /dev/log
unix 3 [ ] STREAM CONNECTED 34979
unix 3 [ ] STREAM CONNECTED 34088
unix 3 [ ] STREAM CONNECTED 39375
unix 3 [ ] STREAM CONNECTED 35794
unix 3 [ ] STREAM CONNECTED 39376
只列举部分
- netstat -lnp 查看监听端口
[root@arslinux-01 ~]# netstat -lnp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 7038/sshd
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 7174/master
tcp6 0 0 :::22 :::* LISTEN 7038/sshd
tcp6 0 0 ::1:25 :::* LISTEN 7174/master
udp 0 0 127.0.0.1:323 0.0.0.0:* 6395/chronyd
udp6 0 0 ::1:323 :::* 6395/chronyd
raw6 0 0 :::58 :::* 7 6558/NetworkManager
Active UNIX domain sockets (only servers)
Proto RefCnt Flags Type State I-Node PID/Program name Path
unix 2 [ ACC ] STREAM LISTENING 39411 7174/master public/showq
unix 2 [ ACC ] STREAM LISTENING 39381 7174/master private/rewrite
unix 2 [ ACC ] STREAM LISTENING 35359 6376/VGAuthService /var/run/vmware/guestServicePipe
unix 2 [ ACC ] STREAM LISTENING 39378 7174/master private/tlsmgr
unix 2 [ ACC ] STREAM LISTENING 21378 1/systemd /run/lvm/lvmetad.socket
unix 2 [ ACC ] STREAM LISTENING 33953 1/systemd /run/dbus/system_bus_socket
unix 2 [ ACC ] STREAM LISTENING 39384 7174/master private/bounce
unix 2 [ ACC ] STREAM LISTENING 21183 1/systemd /run/systemd/private
unix 2 [ ACC ] STREAM LISTENING 39387 7174/master private/defer
unix 2 [ ACC ] STREAM LISTENING 39390 7174/master private/trace
unix 2 [ ACC ] STREAM LISTENING 39393 7174/master private/verify
unix 2 [ ACC ] STREAM LISTENING 39399 7174/master private/proxymap
unix 2 [ ACC ] STREAM LISTENING 39402 7174/master private/proxywrite
unix 2 [ ACC ] STREAM LISTENING 39405 7174/master private/smtp
unix 2 [ ACC ] STREAM LISTENING 39408 7174/master private/relay
unix 2 [ ACC ] STREAM LISTENING 39414 7174/master private/error
unix 2 [ ACC ] STREAM LISTENING 39417 7174/master private/retry
unix 2 [ ACC ] STREAM LISTENING 39420 7174/master private/discard
unix 2 [ ACC ] STREAM LISTENING 39367 7174/master public/pickup
unix 2 [ ACC ] STREAM LISTENING 39423 7174/master private/local
unix 2 [ ACC ] STREAM LISTENING 39371 7174/master public/cleanup
unix 2 [ ACC ] STREAM LISTENING 39426 7174/master private/virtual
unix 2 [ ACC ] STREAM LISTENING 39374 7174/master public/qmgr
unix 2 [ ACC ] STREAM LISTENING 39429 7174/master private/lmtp
unix 2 [ ACC ] STREAM LISTENING 39432 7174/master private/anvil
unix 2 [ ACC ] STREAM LISTENING 39435 7174/master private/scache
unix 2 [ ACC ] STREAM LISTENING 8942 1/systemd /run/systemd/journal/stdout
unix 2 [ ACC ] STREAM LISTENING 21232 1/systemd /run/lvm/lvmpolld.socket
unix 2 [ ACC ] SEQPACKET LISTENING 21235 1/systemd /run/udev/control
unix 2 [ ACC ] STREAM LISTENING 39396 7174/master public/flush
- netstat -an 查看所有连接状态
[root@arslinux-01 ~]# netstat -an
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN
tcp 0 52 192.168.194.130:22 192.168.194.1:4846 ESTABLISHED
tcp6 0 0 :::22 :::* LISTEN
tcp6 0 0 ::1:25 :::* LISTEN
udp 0 0 127.0.0.1:323 0.0.0.0:*
udp6 0 0 ::1:323 :::*
raw6 0 0 :::58 :::* 7
Active UNIX domain sockets (servers and established)
Proto RefCnt Flags Type State I-Node Path
unix 2 [ ACC ] STREAM LISTENING 39411 public/showq
unix 2 [ ACC ] STREAM LISTENING 39381 private/rewrite
unix 2 [ ACC ] STREAM LISTENING 35359 /var/run/vmware/guestServicePipe
unix 2 [ ACC ] STREAM LISTENING 39378 private/tlsmgr
unix 2 [ ] DGRAM 34934 /var/run/chrony/chronyd.sock
unix 2 [ ] DGRAM 21364 /run/systemd/shutdownd
unix 2 [ ACC ] STREAM LISTENING 21378 /run/lvm/lvmetad.socket
unix 2 [ ACC ] STREAM LISTENING 33953 /run/dbus/system_bus_socket
unix 2 [ ACC ] STREAM LISTENING 39384 private/bounce
unix 2 [ ACC ] STREAM LISTENING 21183 /run/systemd/private
unix 2 [ ACC ] STREAM LISTENING 39387 private/defer
unix 2 [ ACC ] STREAM LISTENING 39390 private/trace
unix 2 [ ACC ] STREAM LISTENING 39393 private/verify
unix 2 [ ACC ] STREAM LISTENING 39399 private/proxymap
unix 2 [ ACC ] STREAM LISTENING 39402 private/proxywrite
只列举部分
- netstat -lntp 只查看 tcp 的连接状态
[root@arslinux-01 ~]# netstat -lntp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 7038/sshd
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 7174/master
tcp6 0 0 :::22 :::* LISTEN 7038/sshd
tcp6 0 0 ::1:25 :::* LISTEN 7174/master
- netstat -lntup 查看 tcp 和 udp 的连接状态
[root@arslinux-01 ~]# netstat -lntup
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 7038/sshd
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 7174/master
tcp6 0 0 :::22 :::* LISTEN 7038/sshd
tcp6 0 0 ::1:25 :::* LISTEN 7174/master
udp 0 0 127.0.0.1:323 0.0.0.0:* 6395/chronyd
udp6 0 0 ::1:323 :::* 6395/chronyd
- netstat -an | awk ‘/^tcp/ {++sta[$NF]} END {for(key in sta) print key,"\t",sta[key]}’
查看所有状态的数字
[root@arslinux-01 ~]# netstat -an | awk '/^tcp/ {++sta[$NF]} END {for(key in sta) print key,"\t",sta[key]}'
LISTEN 4
ESTABLISHED 1
★关注 ESTABLISHED,数字越大,越忙
- ss -an 显示连接状态
[root@arslinux-01 ~]# ss -an
- ss -an |grep -i listen 查看 listen 状态的连接(-i 忽略大小写)
[root@arslinux-01 ~]# ss -an | grep -i listen
u_str LISTEN 0 100 public/showq 39411 * 0
u_str LISTEN 0 100 private/rewrite 39381 * 0
u_str LISTEN 0 32 /var/run/vmware/guestServicePipe 35359 * 0
u_str LISTEN 0 100 private/tlsmgr 39378 * 0
u_str LISTEN 0 128 /run/lvm/lvmetad.socket 21378 * 0
u_str LISTEN 0 128 /run/dbus/system_bus_socket 33953 * 0
u_str LISTEN 0 100 private/bounce 39384 * 0
u_str LISTEN 0 128 /run/systemd/private 21183 * 0
u_str LISTEN 0 100 private/defer 39387 * 0
u_str LISTEN 0 100 private/trace 39390 * 0
u_str LISTEN 0 100 private/verify 39393 * 0
u_str LISTEN 0 100 private/proxymap 39399 * 0
u_str LISTEN 0 100 private/proxywrite 39402 * 0
u_str LISTEN 0 100 private/smtp 39405 * 0
u_str LISTEN 0 100 private/relay 39408 * 0
u_str LISTEN 0 100 private/error 39414 * 0
u_str LISTEN 0 100 private/retry 39417 * 0
u_str LISTEN 0 100 private/discard 39420 * 0
u_str LISTEN 0 100 public/pickup 39367 * 0
u_str LISTEN 0 100 private/local 39423 * 0
u_str LISTEN 0 100 public/cleanup 39371 * 0
u_str LISTEN 0 100 private/virtual 39426 * 0
u_str LISTEN 0 100 public/qmgr 39374 * 0
u_str LISTEN 0 100 private/lmtp 39429 * 0
u_str LISTEN 0 100 private/anvil 39432 * 0
u_str LISTEN 0 100 private/scache 39435 * 0
u_str LISTEN 0 128 /run/systemd/journal/stdout 8942 * 0
u_str LISTEN 0 128 /run/lvm/lvmpolld.socket 21232 * 0
u_seq LISTEN 0 128 /run/udev/control 21235 * 0
u_str LISTEN 0 100 public/flush 39396 * 0
tcp LISTEN 0 128 *:22 *:*
tcp LISTEN 0 100 127.0.0.1:25 *:*
tcp LISTEN 0 128 :::22 :::*
tcp LISTEN 0 100 ::1:25 :::*
缺点:不会显示进程名称
10.10 linux下抓包
-
tcpdump 抓包工具
[root@arslinux-01 ~]# tcpdump
-bash: tcpdump: 未找到命令 -
tcpdump 安装:
[root@arslinux-01 ~]# yum install -y tcpdump
- tcpdump -nn 抓包
[root@arslinux-01 ~]# tcpdump -nn
tcpdump: packet printing is not supported for link type NFLOG: use -w
因为网卡名称 ens33 , tcpdump 默认识别 eth0,因此需要指定才能使用
- tcpdump -nn -i 网卡名 指定网卡名抓包
[root@arslinux-01 ~]# tcpdump -nn -i ens33
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
21:14:49.377177 IP 192.168.194.1.4846 > 192.168.194.130.22: Flags [P.], seq 1:53, ack 105604, win 2049, length 52
21:14:49.377216 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 106356:106520, ack 53, win 304, length 164
^C
687 packets captured
687 packets received by filter
0 packets dropped by kernel
-nn 的第一个n表示IP用数字显示出来,如果不加n,则会显示主机名
-nn 用数字显示,比较直观
时间,IP,源IP.端口>方向IP.端口:数据包信息
- tcpdump -nn port 端口号 指定端口号
[root@arslinux-01 ~]# tcpdump -nn -i eth0 port 22
- tcpdump -nn not port 端口号 and host IP地址 同时指定不需要的端口号和只要看的host IP
[root@arslinux-01 ~]# tcpdump -nn -i ens33 not port 22
[root@arslinux-01 ~]# tcpdump -nn -i ens33 not port 22 and host 192.168.194.1
- tcpdump -nn -c 个数 指定抓包个数
[root@arslinux-01 ~]# tcpdump -nn -c 20 -i ens33
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
21:32:20.322745 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 201793328:201793524, ack 1738012548, win 304, length 196
21:32:20.322908 IP 192.168.194.1.4846 > 192.168.194.130.22: Flags [.], ack 196, win 2052, length 0
21:32:20.323167 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 196:472, ack 1, win 304, length 276
21:32:20.323432 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 472:636, ack 1, win 304, length 164
21:32:20.323540 IP 192.168.194.1.4846 > 192.168.194.130.22: Flags [.], ack 636, win 2050, length 0
21:32:20.323689 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 636:896, ack 1, win 304, length 260
21:32:20.323842 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 896:1060, ack 1, win 304, length 164
21:32:20.323921 IP 192.168.194.1.4846 > 192.168.194.130.22: Flags [.], ack 1060, win 2048, length 0
21:32:20.324016 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 1060:1320, ack 1, win 304, length 260
21:32:20.324167 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 1320:1484, ack 1, win 304, length 164
21:32:20.324236 IP 192.168.194.1.4846 > 192.168.194.130.22: Flags [.], ack 1484, win 2053, length 0
21:32:20.324321 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 1484:1744, ack 1, win 304, length 260
21:32:20.324432 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 1744:1908, ack 1, win 304, length 164
21:32:20.324493 IP 192.168.194.1.4846 > 192.168.194.130.22: Flags [.], ack 1908, win 2051, length 0
21:32:20.324604 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 1908:2168, ack 1, win 304, length 260
21:32:20.324721 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 2168:2332, ack 1, win 304, length 164
21:32:20.324787 IP 192.168.194.1.4846 > 192.168.194.130.22: Flags [.], ack 2332, win 2049, length 0
21:32:20.324873 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 2332:2592, ack 1, win 304, length 260
21:32:20.324985 IP 192.168.194.130.22 > 192.168.194.1.4846: Flags [P.], seq 2592:2756, ack 1, win 304, length 164
21:32:20.325048 IP 192.168.194.1.4846 > 192.168.194.130.22: Flags [.], ack 2756, win 2048, length 0
20 packets captured
20 packets received by filter
0 packets dropped by kernel
- tcpdump -nn -c 个数 -w 文件绝对路径 指定个数抓包保存到指定文件中
[root@arslinux-01 ~]# tcpdump -nn -i ens33 -c 100 -w /tmp/1.cap
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
100 packets captured
100 packets received by filter
0 packets dropped by kernel
★1.cap 是无法 cat 的
- tcpdump -r 目标文件 查看 .cap 文件信息
[root@arslinux-01 ~]# tcpdump -r /tmp/1.cap
reading from file /tmp/1.cap, link-type EN10MB (Ethernet)
21:35:18.927071 IP arslinux-01.ssh > 192.168.194.1.contamac_icm: Flags [P.], seq 201800192:201800324, ack 1738015824, win 304, length 132
21:35:18.927369 IP 192.168.194.1.contamac_icm > arslinux-01.ssh: Flags [.], ack 132, win 2049, length 0
21:35:26.000391 IP 192.168.194.1.5758 > arslinux-01.ssh: Flags [P.], seq 3165712486:3165712538, ack 2941816606, win 251, length 52
21:35:26.000710 IP arslinux-01.ssh > 192.168.194.1.5758: Flags [P.], seq 1:53, ack 52, win 279, length 52
不全部列举
tshark 工具
tshark 安装:
[root@arslinux-01 ~]# yum install -y wireshark
查看指定端口 web 访问情况
[root@arslinux-01 ~]# tshark -n -t a -R http.request -T fields -e "frame.time" -e "ip.src" -e "http.host" -e "http.request.method" -e "http.request.uri"
tshark: -R without -2 is deprecated. For single-pass filtering use -Y.
Running as user "root" and group "root". This could be dangerous.
Capturing on 'nflog'
^C0 packets captured
类似于访问日志,可以查看什么IP访问什么链接
10.11 Linux网络相关
- ifconfig 查看网卡 IP(ip addr 也可以)
ifconfig 安装:
[root@arslinux-01 ~]# yum install -y net-tools
[root@arslinux-01 ~]# ifconfig
ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.194.130 netmask 255.255.255.0 broadcast 192.168.194.255
inet6 fe80::c905:5e78:b916:41da prefixlen 64 scopeid 0x20<link>
ether 00:0c:29:24:ea:f2 txqueuelen 1000 (Ethernet)
RX packets 111502 bytes 32260235 (30.7 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 246917 bytes 63202425 (60.2 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 32 bytes 2592 (2.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 32 bytes 2592 (2.5 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- ifconfig -a 查看所有网卡信息(包括没有启动的网卡)
[root@arslinux-01 ~]# ifconfig -a
ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.194.130 netmask 255.255.255.0 broadcast 192.168.194.255
inet6 fe80::c905:5e78:b916:41da prefixlen 64 scopeid 0x20<link>
ether 00:0c:29:24:ea:f2 txqueuelen 1000 (Ethernet)
RX packets 111521 bytes 32261789 (30.7 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 246928 bytes 63204505 (60.2 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 32 bytes 2592 (2.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 32 bytes 2592 (2.5 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
- ifup 网卡名 启动网卡
- ifdown 网卡名 关闭网卡
[root@arslinux-01 ~]# ifdown ens33 && ifup ens33
成功断开设备 'ens33'。
连接已成功激活(D-Bus 活动路径:/org/freedesktop/NetworkManager/ActiveConnection/3)
- 设置虚拟网卡
思路:拷贝一份网卡配置文件,根据需求更改参数
[root@arslinux-01 ~]# cd /etc/sysconfig/network-scripts/
[root@arslinux-01 network-scripts]# cp ifcfg-ens33 ifcfg-ens33\:0
[root@arslinux-01 network-scripts]# vim !$
vim ifcfg-ens33\:0
TYPE=Ethernet
PROXY_METHOD=none
BROWSER_ONLY=no
BOOTPROTO=static
DEFROUTE=yes
IPV4_FAILURE_FATAL=no
IPV6INIT=yes
IPV6_AUTOCONF=yes
IPV6_DEFROUTE=yes
IPV6_FAILURE_FATAL=no
IPV6_ADDR_GEN_MODE=stable-privacy
NAME=ens33:0
DEVICE=ens33:0
ONBOOT=yes
IPADDR=192.168.194.132
NETMASK=255.255.255.0
:wq
[root@arslinux-01 network-scripts]# ifdown ens33 && ifup ens33
成功断开设备 'ens33'。
连接已成功激活(D-Bus 活动路径:/org/freedesktop/NetworkManager/ActiveConnection/5)
[root@arslinux-01 network-scripts]# ifconfig
ens33: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.194.130 netmask 255.255.255.0 broadcast 192.168.194.255
inet6 fe80::c905:5e78:b916:41da prefixlen 64 scopeid 0x20<link>
ether 00:0c:29:24:ea:f2 txqueuelen 1000 (Ethernet)
RX packets 112363 bytes 32333556 (30.8 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 247469 bytes 63281547 (60.3 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
ens33:0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.194.132 netmask 255.255.255.0 broadcast 192.168.194.255
ether 00:0c:29:24:ea:f2 txqueuelen 1000 (Ethernet)
lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 32 bytes 2592 (2.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 32 bytes 2592 (2.5 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
已经多了一个虚拟网卡
- mii-tool 网卡名
[root@arslinux-01 network-scripts]# mii-tool ens33
ens33: negotiated 1000baseT-FD flow-control, link ok //link ok 为连接
- ethtool 网卡名
[root@arslinux-01 network-scripts]# ethtool ens33
Settings for ens33:
Supported ports: [ TP ]
Supported link modes: 10baseT/Half 10baseT/Full
100baseT/Half 100baseT/Full
1000baseT/Full
Supported pause frame use: No
Supports auto-negotiation: Yes
Supported FEC modes: Not reported
Advertised link modes: 10baseT/Half 10baseT/Full
100baseT/Half 100baseT/Full
1000baseT/Full
Advertised pause frame use: No
Advertised auto-negotiation: Yes
Advertised FEC modes: Not reported
Speed: 1000Mb/s
Duplex: Full
Port: Twisted Pair
PHYAD: 0
Transceiver: internal
Auto-negotiation: on
MDI-X: off (auto)
Supports Wake-on: d
Wake-on: d
Current message level: 0x00000007 (7)
drv probe link
Link detected: yes //yes 为连接,no 为未连接
- hostname 文件位置:/etc/hostname
[root@arslinux-01 ~]# cat /etc/hostname
arslinux-01
- 修改 hostname 名称
[root@arslinux-01 ~]# hostnamectl set-hostname alexis
[root@arslinux-01 ~]# hostname
alexis
[root@arslinux-01 ~]# cat /etc/hostname
alexis
- DNS配置文件:/etc/resolv.conf
[root@arslinux-01 ~]# cat /etc/resolv.conf
# Generated by NetworkManager
nameserver 119.29.29.29
参数由网卡配置文件所定义,哪怕更改,再重启网卡,依然会被恢复为网卡内的参数
- /etc/hosts
[root@arslinux-01 ~]# cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
前面为IP,后面为域名
一行可以有多个域名(空格分隔)
多个相同的域名不同的IP,默认使用最后一个IP
可以设置解析
[root@arslinux-01 ~]# vim /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
192.168.194.150 www.baidu.com
[root@arslinux-01 ~]# ping www.baidu.com
PING www.baidu.com (192.168.194.150) 56(84) bytes of data.
64 bytes from www.baidu.com (192.168.194.150): icmp_seq=1 ttl=64 time=0.056 ms
64 bytes from www.baidu.com (192.168.194.150): icmp_seq=2 ttl=64 time=0.065 ms
64 bytes from www.baidu.com (192.168.194.150): icmp_seq=3 ttl=64 time=0.054 ms
^C
--- www.baidu.com ping statistics ---
6 packets transmitted, 6 received, 0% packet loss, time 5000ms
rtt min/avg/max/mdev = 0.053/0.062/0.076/0.011 ms
ping 百度,已经跳解析到192,.168.194.150
★这个仅在本机生效
如果指定不同的 IP 对应同一个网址,那么以最后一个生效
扩展
tcp三次握手四次挥手(重点) http://www.doc88.com/p-9913773324388.html
tshark几个用法:http://www.aminglinux.com/bbs/thread-995-1-1.html
修改网卡:
https://blog.csdn.net/jyusun/article/details/71513086
https://blog.csdn.net/u010039418/article/details/79260553