之前发布的一篇博文 "ES中获取AD账号锁定日志" ,在后续的使用中有发送重复消息的问题,因此对脚本进行了进一步优化。 #!/usr/bin/python # -*- coding: UTF-8 -*- #author: shizhenning 20240828 from elasticsearch import Elasticsearch import json from d
一个随机生成复杂性密码的python脚本:!/usr/bin/envpython3importstringimportrandomstr1='!@%^&'src=string.ascii_letters+string.digits+str1pwd_list=random.choices(src,k=4)pwd_list.extend(random.sample(string.ascii_upper
最近机房迁移,有一批机器下线了,下线的这些机器需要在saltstack中删掉,闲着没事,写个脚本删。先通过特征过滤出来要删除的机器比如:saltkeyLgrepi".dx."dx脚本删除key!/bin/pythonimportoscontent=open("/root/shi/dx",'r').readlines()printcontentforiincontent:h=i.strip("\n"
要求邮件发件人别名为“安全中心”邮件内容为网址https://www.163.com,收件人点击后跳转到Google。!/usr/bin/envpython3importsmtplibfromemail.mime.textimportMIMETextfromemail.mime.multipartimportMIMEMultipartimportgetpassdefsend_email():mai
使用smtp.163.com发送:#!/usr/bin/envpython#-*-coding:utf8-*-importsmtplibfromemail.mime.textimportMIMETextdefsend_email():mail_host='smtp.163.com'mail_user='zhenningxxx'mail_pwd='12345678'sender='zhenning@
测试使用python的matplotlib将数据图形化。测试脚本:#!/usr/bin/envpython3importosimportmatplotlib.pyplotaspltx=[]y=[]fp=open("score.txt",'r')data=fp.readlines()foriindata:tempx=(i.split())[0]tempy=(i.split())[1]x.append
使用while输出1234568910。#!/usr/bin/envpythonnum=0whilenum<=10:ifnum!=7:print(num)num+=1输出1-100内所有数的和。#!/usr/bin/envpythonsum=0num=1whilenum<=100:sum=sum+numnum=num+1print(sum)输出1-100所有的奇数num=1whilen
打印出在文件test1中存在而test2中不存在的用户BJ$cattest1shizhenningzhangsanlisiyanjunBJ$cattest2zhangsanlisiyanjunBJ$catdiff.py#!/usr/bin/pythonwithopen('/Users/momo/test1','r')asx:list1=x.readlines()withopen('/Users/m
Copyright © 2005-2024 51CTO.COM 版权所有 京ICP证060544号