search
HomeWeb Front-endJS TutorialDetailed explanation of the use of regular expressions in Linux

This time I will bring you a detailed explanation of the use of regular expressions in Linux. What are the precautions for using regular expressions in Linux? The following is a practical case. Let’s take a look. .

1. Composition

Ordinary characters: ordinary strings, no special meaning
Special characters: Special characters in regular expressions The meaning of
Common meta characters [special characters] in regular expressions

2. Meta characters found in POSIX BRE [Basic] and ERE [Extended]

\: Usually used to turn on or off the special meaning of subsequent characters, such as (...) [\ is an escape character, which removes the special meaning of the symbol. (), {}, etc. have special meanings in the shell 】
.The difference between and:

[root@localhost ~]# cat -n test.txt
1 gd
2 god
3
4 good
5 goood
6 goad
7
8 gboad

2.1, .: Match any single character (except null, which cannot be empty)

[root@localhost ~]# grep -n "." test.txt        
1:gd
2:god
4:good
5:goood
6 :goad
8:gboad
[root@localhost ~]# grep -n "go.d" test.txt
4:good
6:goad

2.2. : Match the preceding character any number of times, such as o, which can be no o, one o, or multiple o

[root@localhost ~]# grep -n "*" test .txt
[root@localhost ~]# grep -n "o*" test.txt
1:gd
2:god
3:
4:good
5: goood
6:goad
7:
8:gboad
[root@localhost ~]# echo "gbad" >>test.txt
[root@localhost ~]# echo "pbad" >>test.txt
[root@localhost ~]# echo "kgbad" >>test.txt
[root@localhost ~]# echo "poad" >>test .txt
[root@localhost ~]# grep -n "go*" test.txt [o can be omitted, the g before o must match]
1:gd
2:god
4:good
5:goood
6:goad
8:gboad
9:gbad
11:kgbad

*2.3, .: Match any character (match all), can be empty**

[root@localhost ~]# grep -n ".*" test.txt
1:gd
2:god
3:
4:good
5:goood
6:goad
7:
8:gboad
9:gbad
10:pbad
11:kgbad
12:poad
[root@localhost ~]# grep -n "go.*" test.txt
2:god
4:good
5:goood
6: goad
[root@localhost ~]# grep -n "po.*" test.txt
12:poad
[root@localhost ~]# echo "pgoad" >>test.txt
[root@localhost ~]# grep -n "go.*" test.txt [Any character exists after matching go, can be empty]
2:god
4:good
5:goood
6:goad
13:pgoad
[root@localhost ~]
#[root@localhost ~]# grep -n "o.*" test.txt
2:god
4:good
5:goood
6:goad
8:gboad
12:poad

2.4, ^: Match the following regular expression , starting with...

[root@localhost tmp]# grep "^root" /etc/passwd
root:x:0:0:root:/root:/bin /bash
[root@localhost tmp]

#2.5, $: Match the immediately preceding regular expression, ending with...

[root @localhost tmp]# grep "bash$" /etc/passwd | head -1
root:x:0:0:root:/root:/bin/bash
[root@localhost tmp]
#^$: means a blank line
"#|^$": matches comment lines and blank lines starting with

#2.6, []: matches lines in square brackets Any character

(such as [sS], matches s or matches S), where a hyphen (-) can be used to specify the range of hyphens (such as [(0-9)], matches any 0-9 character); [^0-9] If the ^ symbol appears in the first position of the square bracket, it means matching any character that is not in the list.

[root@localhost tmp]# cat hosts
192.168.200.1
192.168.200.3
a.b.123.5
23.c.56.1
1456.1.2.4
12.4 .5.6.8
[root@localhost tmp]# grep -E '([0-9]{1,3}\.){3}[0-9]{1,3}' hosts
192.168.200.1
192.168.200.3
1456.1.2.4
12.4.5.6.8
[root@localhost tmp]# grep -E '^([0-9]{1,3}\ .){3}[0-9]{1,3}$' hosts
192.168.200.1
192.168.200.3
[root@localhost tmp]

#2.7 ,?: Match zero or more times of the previous character

[root@localhost ~]# grep -E "go?d" test.txt
gd
god
[root@localhost ~]
#[root@localhost tmp]# cat test
do
does
doxy
[root@localhost tmp]# grep -E "do(es)? " test
do
does
doxy
[root@localhost tmp]

#3. Characters only found in POSIX BRE (Basic Regular)

{n,m}: Interval expression, matching the single character before it repeats [repeat, the following single character such as https{0,1}, that is, repeat s 0-1 times . {n} refers to matching n times; {n,m} refers to matching n to m times, {n,} refers to matching at least n times, and {,m} matches at most m times. [\escape characters]

4. Characters only found in POSIX ERE (extended regular)

4.1. {n,m}: {n with BRE ,m} has the same function

[root@localhost tmp]# grep -E '^([0-9]{1,3}\.){3}[0-9]{1 ,3}$' hosts
192.168.200.1
192.168.200.3

4. 2. : Match one or more times of the previous regular expression

[root@localhost ~]# egrep "go d" test.txt
god
good
goood
[root@localhost ~]

#4.3, | : Indicates matching multiple strings [or relationship]

[root@localhost ~]# grep -E "3306|1521" /etc/services
mysql 3306/tcp # MySQL
mysql 3306/udp 3306/udp # MySQL
ncube-lm 1521/tcp # nCube License Manager
ncube-lm 1521/udp             # nCube License Manager
[root@localhost ~]

#4.4, (): Group filtering, Back reference

Group filtering

[root@localhost ~]# echo "glad" > > test.txt
[root@localhost ~]# egrep "(la|oo)" test.txt
good
goood
glad

() Direct reference; when the previous matching part uses parentheses, the content of the first bracket can be output with \1 in the later part; and so on.

[root@localhost tmp]# ifconfig |sed -rn 's#.*addr:(.*)(B.*)$#\1#gp'
192.168.4.27

5. The metacharacters of regular expressions

5. 1. \b: Match a word boundary

[root@localhost tmp]# cat test
do
does
doxy
agdoeg
[root@localhost tmp]# grep "do\b" test
do
[root@localhost tmp]# grep "\bdo" test        
do
does
doxy
[root@localhost tmp]# grep "\bdoes" test                                                               ##[root@localhost tmp]# grep "\bdo\b" test
do
[root@localhost tmp]

#5. 2. \B: Match non-words Boundary, opposite to \b

[root@localhost tmp]# grep "do\B" test
does

doxy
agdoeg
[root@localhost tmp] # grep "do\b" test
do
[root@localhost tmp]
#

5.3, \d: Matches a numeric character, equivalent to [0-9]

5.4, \D: Matches a non-numeric character, equivalent to [^0-9]

5.5, \w: Matches letters, numbers, and underscores, equivalent to [A-Za-z0-9_]

There are many metacharacters, so I won’t list them all here

Case: Streamlined startup

[root@localhost ~]# chkconfig --list| egrep -v "crond|network|rsyslog|sshd|sysstat" | awk '{print " chkconfig",$1,"off"}'|bash

I believe you have mastered the method after reading the case in this article. For more exciting information, please pay attention to other related articles on the PHP Chinese website!

Recommended reading:

Detailed explanation of the steps to use the JS string method

Detailed explanation of the steps to use the JS array method

The above is the detailed content of Detailed explanation of the use of regular expressions in Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Understanding the JavaScript Engine: Implementation DetailsUnderstanding the JavaScript Engine: Implementation DetailsApr 17, 2025 am 12:05 AM

Understanding how JavaScript engine works internally is important to developers because it helps write more efficient code and understand performance bottlenecks and optimization strategies. 1) The engine's workflow includes three stages: parsing, compiling and execution; 2) During the execution process, the engine will perform dynamic optimization, such as inline cache and hidden classes; 3) Best practices include avoiding global variables, optimizing loops, using const and lets, and avoiding excessive use of closures.

Python vs. JavaScript: The Learning Curve and Ease of UsePython vs. JavaScript: The Learning Curve and Ease of UseApr 16, 2025 am 12:12 AM

Python is more suitable for beginners, with a smooth learning curve and concise syntax; JavaScript is suitable for front-end development, with a steep learning curve and flexible syntax. 1. Python syntax is intuitive and suitable for data science and back-end development. 2. JavaScript is flexible and widely used in front-end and server-side programming.

Python vs. JavaScript: Community, Libraries, and ResourcesPython vs. JavaScript: Community, Libraries, and ResourcesApr 15, 2025 am 12:16 AM

Python and JavaScript have their own advantages and disadvantages in terms of community, libraries and resources. 1) The Python community is friendly and suitable for beginners, but the front-end development resources are not as rich as JavaScript. 2) Python is powerful in data science and machine learning libraries, while JavaScript is better in front-end development libraries and frameworks. 3) Both have rich learning resources, but Python is suitable for starting with official documents, while JavaScript is better with MDNWebDocs. The choice should be based on project needs and personal interests.

From C/C   to JavaScript: How It All WorksFrom C/C to JavaScript: How It All WorksApr 14, 2025 am 12:05 AM

The shift from C/C to JavaScript requires adapting to dynamic typing, garbage collection and asynchronous programming. 1) C/C is a statically typed language that requires manual memory management, while JavaScript is dynamically typed and garbage collection is automatically processed. 2) C/C needs to be compiled into machine code, while JavaScript is an interpreted language. 3) JavaScript introduces concepts such as closures, prototype chains and Promise, which enhances flexibility and asynchronous programming capabilities.

JavaScript Engines: Comparing ImplementationsJavaScript Engines: Comparing ImplementationsApr 13, 2025 am 12:05 AM

Different JavaScript engines have different effects when parsing and executing JavaScript code, because the implementation principles and optimization strategies of each engine differ. 1. Lexical analysis: convert source code into lexical unit. 2. Grammar analysis: Generate an abstract syntax tree. 3. Optimization and compilation: Generate machine code through the JIT compiler. 4. Execute: Run the machine code. V8 engine optimizes through instant compilation and hidden class, SpiderMonkey uses a type inference system, resulting in different performance performance on the same code.

Beyond the Browser: JavaScript in the Real WorldBeyond the Browser: JavaScript in the Real WorldApr 12, 2025 am 12:06 AM

JavaScript's applications in the real world include server-side programming, mobile application development and Internet of Things control: 1. Server-side programming is realized through Node.js, suitable for high concurrent request processing. 2. Mobile application development is carried out through ReactNative and supports cross-platform deployment. 3. Used for IoT device control through Johnny-Five library, suitable for hardware interaction.

Building a Multi-Tenant SaaS Application with Next.js (Backend Integration)Building a Multi-Tenant SaaS Application with Next.js (Backend Integration)Apr 11, 2025 am 08:23 AM

I built a functional multi-tenant SaaS application (an EdTech app) with your everyday tech tool and you can do the same. First, what’s a multi-tenant SaaS application? Multi-tenant SaaS applications let you serve multiple customers from a sing

How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration)How to Build a Multi-Tenant SaaS Application with Next.js (Frontend Integration)Apr 11, 2025 am 08:22 AM

This article demonstrates frontend integration with a backend secured by Permit, building a functional EdTech SaaS application using Next.js. The frontend fetches user permissions to control UI visibility and ensures API requests adhere to role-base

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools