使用 Perl實現系統管理自動化(第2版)(影印版)》內容簡介:如果你從事任何系統管理方面的工作,就必須應對日益復雜的工作環境以及對你的時間不斷增加的需求。《使用Perl實現系統管理自動化 第二版》不僅提供了可用于工作的恰當工具,還給出了許多建議,幫助你解決特定問題以及安全地自動處理重復事務。這一版的"書"經過更新和擴充,涵蓋了的操作系統、技術和Perl模塊,將會幫助你:
管理用戶賬戶
監測文件系統和進程
處理XML和YAML等格式的配置文件
使用DBI管理數據庫,包括MySQL、MS SQL和Oracle
處理LDAP和Active Directory等目錄服務
編寫腳本管理電子郵件協議和垃圾郵件
高效地創建、處理和分析日志文件
管理網絡名稱和配置服務,包括NIS、DNS和DHCP
維護、監測和映射網絡服務
提高文件系統、進程和網絡的安全性
這一版的附錄中還包含了額外內容,幫助你快速掌握XML/XPath、LDAP、SNMP和SQL等技術。《使用 Perl實現系統管理自動化(第2版)(影印版)》在手并結合Perl,你將花費更少的資源,付出更少的勞動,大大減少煩惱,讓你事半功倍。
David N.Blank-Edelman是美國東北大學計算機與信息科學學院的技術主任,擁有25年在多種平臺上的系統/網絡管理員經驗。
Preface
1. Introduction
Automation Is a Must
How Perl Can Help You
This Book Will Show You How
What You Need
Some Notes About the Perl Versions Used for This Book
What About Perl 5.10?
What About Strawberry Perl?
What About Perl 6?
Some Notes About Using Vista with the Code in This Book
Locating and Installing Modules
Installing Modules on Unix
Installing Modules on Win32
It`s Not Easy Being Omnipotent
Don`t Do It
Drop Your Privileges As Soon As Possible
Be Careful When Reading Data
Be Careful When Writing Data
Avoid Race Conditions
.Enjoy
References for More Information
2. Filesystems
Perl to the Rescue
Filesystem Differences
Unix
Windows-Based Operating Systems
Mac OS X
Filesystem Differences Summary
Dealing with Filesystem Differences from Perl
Walking or Traversing the Filesystem by Hand
Walking the Filesystem Using the File::Find Module
Walking the Filesystem Using the File::Find::Rule Module
Manipulating Disk Quotas
Editing Quotas with edquota Trickery
Editing Quotas Using the Quota Module
Editing NTFS Quotas Under Windows
Querying Filesystem Usage
Module Information for This Chapter
References for More Information
3. User Accounts
Unix User Identities
The Classic Unix Password File
Changes to the Password File in BSD 4.4 Systems
Shadow Passwords
Windows-Based Operating System User Identities
Windows User Identity Storage and Access
Windows User ID Numbers
Windows Passwords Don`t Play Nice with Unix Passwords
Windows Groups
Windows User Rights
Building an Account System to Manage Users
The Backend Database
The Low-Level Component Library
The Process Scripts
Account System Wrap-Up
Module Information for This Chapter
References for More Information
Unix Password Files
Windows User Administration
4. User Activity
Process Management
Windows-Based Operating System Process Control
Unix Process Control
File and Network Operations
Tracking File Operations on Windows
Tracking Network Operations on Windows
Tracking File and Network Operations in Unix
Module Information for This Chapter
Installing Win32::Setupsup
References for More Information
5. TCP/IP Name and Configuration Services
Host Files
Generating Host Files
Error-Checking the Host File Generation Process
Improving the Host File Output
Incorporating a Source Code Control System
NIS, NIS+, and WINS
NIS+
Windows Internet Name Server (WINS
Domain Name Service (DNS
Generating DNS (BIND) Configuration Files
DNS Checking: An Iterative Approach
DHCP
Active Probing for Rogue DHCP Servers
Monitoring Legitimate DHCP Servers
Module Information for This Chapter
References for More Information
6. Working with Configuration Files
Configuration File Formats
Binary
Naked Delimited Data
Key/Value Pairs
Markup Languages
All-in-One Modules
Advanced Configuration Storage Mechanisms
Module Information for This Chapter
References for More Information
XML and YAML
7. SQL Database Administration
Interacting with a SQL Server from Perl
Using the DBI Framework
Using ODBC from Within DBI
Server Documentation
MySQL Server via DBI
Oracle Server via DBI
Microsoft SQL Server via ODBC
Database Logins
Monitoring Space Usage on a Database Server
Module Information for This Chapter
References for More Information
DBI
Microsoft SQL Server
ODBC
Oracle
8. Email
Sending Mail
Getting sendmail (or a Similar Mail Transport Agent
Using the OS-Specific IPC Framework to Drive a Mail Client
Speaking the Mail Protocols Directly
Common Mistakes in Sending Email
Overzealous Message Sending
Subject Line Waste
Insufficient Information in the Message Body
Fetching Mail
Talking POP3 to Fetch Mail
Talking IMAP4rev1 to Fetch Mail
Processing Mail
Dissecting a Single Message
Dissecting a Whole Mailbox
Dealing with Spam
Support Mail Augmentation
Module Information for This Chapter
References for More Information
9. Directory Services
What`s a Directory?
Finger: A Simple Directory Service
The WHOIS Directory Service
LDAP: A Sophisticated Directory Service
LDAP Programming with Perl
The Initial LDAP Connection
Performing LDAP Searches
Entry Representation in Perl
Adding Entries with LDIF
Adding Entries with Standard LDAP Operations
Deleting Entries
Modifying Entry Names
Modifying Entry Attributes
Deeper LDAP Topics
Putting It All Together
Active Directory Service Interfaces
ADSI Basics
Using ADSI from Perl
Dealing with Container/Collection Objects
Identifying a Container Object
So How Do You Know Anything About an Object?
Searching
Performing Common Tasks Using the WinNT and LDAP Namespaces
Working with Users via ADSI
Working with Groups via ADSI
Working with File Shares via ADSI
Working with Print Queues and Print Jobs via ADSI
Working with Windows-Based Operating System Services via ADSI
Module Information for This Chapter
References for More Information
LDAP
ADSI
10. Log Files
Reading Text Logs
Reading Binary Log Files
Using unpack
Calling an OS (or Someone Else`s) Binary
Using the OS`s Logging API
Structure of Log File Data
Dealing with Log File Information
Space Management of Logging Information
Log Parsing and Analysis
Writing Your Own Log Files
Logging Shortcuts and Formatting Help
Basic/Intermediate Logging Frameworks
Advanced Logging Framework
Module Information for This Chapter
References for More Information
11. Security
Noticing Unexpected or Unauthorized Changes
Local Filesystem Changes
Changes in Data Served Over the Network
Noticing Suspicious Activities
Local Signs of Peril
Finding Problematic Patterns
Danger on the Wire, or "Perl Saves the Day"
Preventing Suspicious Activities
Suggest Better Passwords
Reject Bad Passwords
Module Information for This Chapter
References for More Information
12. SNMP
Using SNMP from Perl
Sending and Receiving SNMP Traps, Notifications, and Informs
Alternative SNMP Programming Interfaces
Module Information for This Chapter
References for More Information
13. Network Mapping and Monitoring
Network Mapping
Discovering Hosts
Discovering Network Services
Physical Location
Presenting the Information
Textual Presentation Tools
Graphical Presentation Tools
Monitoring Frameworks
Extending Existing Monitoring Packages
What`s Left?
Module Information for This Chapter
References for More Information
14. Experiential Learning
Playing with Timelines
Task One: Parsing crontab Files
Task Two: Displaying the Timeline
Task Three: Writing Out the Correct XML File
Putting It All Together
Summary: What Can We Learn from This?
Playing with Geocoding
Geocoding from Postal Addresses
Geocoding from IP Addresses
Summary: What Can We Learn from This?
Playing with an MP3 Collection
Summary: What Can We Learn from This?
One Final Exploration
Part One: Retrieving the Wiki Page with WWW::Mechanize
Part Two: Extracting the Data
Part Three: Geocoding and Mapping the Data
Summary: What Can We Learn from This?
Remember to Play
Module Information for This Chapter
Source Material for This Chapter
A. The Eight-Minute XML Tutorial
B. The 10-Minute XPath Tutorial
C. The 10-Minute LDAP Tutorial
D. The 15-Minute SQL Tutorial
E. The Five-Minute RCS Tutorial
F. The Two-Minute VBScript-to-Perl Tutorial
G. The 20-Minute SNMP Tutorial
Index
FAT filesystems are case-insensitive. In Unix, an attempt to open a file using thewrong case (i.e., MYFAVORITEFILE versus myfavoritefile) will fail, but with FATor VFAT, this will succeed with no problem.
Instead of a forward slash, FAT uses the backward slash () as its path separator.This has a direct ramification for the Perl programmer, because the backslash is aquoting character in Perl. Paths written in single quotes with only single separators(e.g, Spathe' dirdirfilename') are just fine. However, situations in which youneed to place multiple backslashes next to each other (e.g, serverdirfile) arepotential trouble. In those cases, you have to be vigilant in doubling any multiplebackslashes. Some Perl functions and some Perl modules will accept paths withforward slashes, but you shouldn't count on this convention when programming.
It is better to bite the bullet and write winnttemp than to learn that yourcode breaks because the conversion hasn't been done for you.
FAT files and directories have special flags associated with them that are calledattributes. Example attributes include "Read-only" and "System."
The root of a FAT filesystem is specified starting with the drive letter on which thefilesystem resides. For instance, the absolute path for a file might be specified asc : homecindydocsresumecurrent.doc.
FAT32 and NTFS filesystems have the same semantics as VFAT filesystems. They sharethe same support for long filenames and use the same root designator. NTFS is moresophisticated in its name support, however, because it allows these names to be specified using Unicode. Unicode is a multibyte character encoding scheme that can be usedto represent all of the characters of all of the written languages on the planet.NTFS also has some functional differences that distinguish it from the other Windowsand basic Unix filesystems. Later in this chapter, we will write some code to take advantage of some of these differences, such as filesystem quotas. NTFS supports ACLs,which provide a fine-grained permission mechanism for file and directory access.
"直到系統管理員閱讀本書前,存在太多的任務本可以(并且應該)自動化完成但卻沒有。Peri是一種強大的工具,David向我們展示了如何讓系統管理員付出更少勞動就能將系統掌控得更好。" ——Peter Baer Galvin,Corporate Technologies 公司首席技術官、IT架構師
還不錯,英文版的,慢慢看
書很好,對系統管理員來說非常合適。
這個商品不錯~
"這種計算機一類的書,本人覺得經常是挑花眼了,一搜索,就出來一大堆,看看都差不多,也不知道哪個好,哪個不行?看得急了煩了,就隨便選一本。結果有時快遞到了,一翻,發現要不看不懂,要不不是我想學的。挺愁人的。那天又在網上到處查,碰巧 看到一個“獵豹網校”,嘿,全是計算機課程,還每門課都有本書,比如我想學網頁設計、想學點C語言了,不知道該挑什么書才合適,在獵豹網校上一搜,出來好多,老師列得挺清楚。試聽了一下,就跟坐教室機房里,看著老師在自己面前操作一樣,一步一步,可清楚了。這樣子學一下,可比自己光買本書,回來學得一個頭三個大要…
"這種計算機一類的書,本人覺得經常是挑花眼了,一搜索,就出來一大堆,看看都差不多,也不知道哪個好,哪個不行?看得急了煩了,就隨便選一本。結果有時快遞到了,一翻,發現要不看不懂,要不不是我想學的。挺愁人的。那天又在網上到處查,碰巧 看到一個“獵豹網校”,嘿,全是計算機課程,還每門課都有本書,比如我想學網頁設計、想學點C語言了,不知道該挑什么書才合適,在獵豹網校上一搜,出來好多,老師列得挺清楚。試聽了一下,就跟坐教室機房里,看著老師在自己面前操作一樣,一步一步,可清楚了。這樣子學一下,可比自己光買本書,回來學得一個頭三個大要…