


Summary of how to use sed command in linux
sed command in linux:
1 First introduction to sed
The sed editor is called a stream editor. It is different from interactive text editors such as vim. It processes data in the data stream according to commands. The following operations will be performed:
Read one row of data from the input at a time (repeat this operation until all rows have been read)
According to Editor command matches data
Modify the data in the data stream according to the command
-
Output the new data to STDOUT (standard output)
The sed command can be entered from the command line or read from a command file.
sed -e script 添加script中指定的命令 sed -f file 添加file中指定的命令
1.1 Define the sed command on the command line [Recommended learning: linux video tutorial]
Let’s look at a simple text replacement example:
echo "hi,my name is xxx" | sed 's/xxx/kinsomy/' #修改文件 sed 's/xxx/kinsomy/' data.txt #执行多个命令 用-e选项,分号隔开 sed 's/xxx/kinsomy/; s/***/hhh/' data.txt
Input the data output by echo into sed through the pipeline, and then use the s command to replace the matching data after the first slash with the data after the second slash.
Note: sed operates the data in the text file and only outputs the modified data to STDOUT, but does not modify the data in the file itself
1.2 Reading commands from the file
Define a series of commands in a file script.sed to facilitate reuse.
s/*/a s/x/b s/-/+
# -f选项指定命令文件 sed -f script.sed data.txt
2 sed basics
2.1 Replacement tags
The above example echo "hi,my name is xxx" | sed 's/ xxx/kinsomy/' will only replace the first matched data in each row, but if there are multiple matches in a row of data, they cannot all be replaced.
echo "hi,my name is xxx, i am xxx" | sed 's/xxx/kinsomy/' #输出 hi,my name is kinsomy, i am xxx
At this time, you can use some substitution flags to set the replacement mode. The replacement token follows the replacement string.
s/pattern/replacement/flags
Number, indicating at which matched data will be replaced
echo "hi,my name is xxx, i am xxx" | sed 's/xxx/kinsomy/2' #输出 第二个xxx被替换成kinsomy hi,my name is xxx, i am kinsomy
g, indicating replacement of all matched data
echo "hi,my name is xxx, i am xxx" | sed 's/xxx/kinsomy/g' #输出 第二个xxx被替换成kinsomy hi,my name is kinsomy, i am kinsomy
p, Indicates that the matched lines will be printed out
echo "hi,my name is xxx, i am xxx" | sed 's/xxx/kinsomy/p' #输出 hi,my name is kinsomy, i am xxx hi,my name is kinsomy, i am xxx
w,将替换后输出保存到指定文件 echo "hi,my name is xxx, i am xxx" | sed 's/xxx/kinsomy/w output.txt'
2.3 Line addressing
As mentioned above, the sed command reads text line by line and performs matching operation data until all lines are After traversing, if we want to operate on a specific row at this time, we must use row addressing. There are two forms of line addressing:
The numeric form represents the line
# 操作单行 $ sed '2s/xxx/***/' data.txt # 操作一定行区间[2,4] $ sed '2,4s/xxx/***/' data.txt # 操作某行开始到最后[2,endline] $ sed '2,$s/xxx/***/' data.txt
Text mode filter
First find the kinsomy record in /etc/passwd, and then Replace bash with csh. Text pattern filters can be very powerful when paired with regular expressions.
sed '/kinsomy/s/bash/csh/' /etc/passwd
2.4 Delete lines
Use the delete command d to delete the text.
# 删除所有文本 sed 'd' data.txt # 删除单行 sed '2d' data.txt # 删除行区间[2,3] sed '2,3d' data.txt # 删除行区间[2,endline] sed '2,$d' data.txt # 删除匹配文本aa的行 sed '/aa/d' data.txt # 删除两个匹配文本之间的文本 匹配到1和3的行之间的文本全部被删除 sed '/1/,/3/d' data.txt
2.5 Insert and append text
Insert command i adds a new line before the specified line
Append command a adds a new line after the specified line
# 追加 echo "Line 2" | sed 'a\ pipe quote> Line 1' #插入 echo "Line 2" | sed 'i\ pipe quote> Line 1'
2.6 Modify a line
c command is used to modify a line of data
# 修改第三行文本 sed '3c\ pipe quote> change line ' data.txt
2.7 Conversion command
Command format sed 'y/inchar/outchar'
will Characters in inchar are converted into outchar characters in one-to-one correspondence
echo "This 1 is a test of 1 try." | sed 'y/123/456/' # 输出 This 4 is a test of 4 try.
The above is the detailed content of Summarize the use of sed command in Linux. For more information, please follow other related articles on the PHP Chinese website!

Maintenance mode is used for system maintenance and repair, allowing administrators to work in a simplified environment. 1. System Repair: Repair corrupt file system and boot loader. 2. Password reset: reset the root user password. 3. Package management: Install, update or delete software packages. By modifying the GRUB configuration or entering maintenance mode with specific keys, you can safely exit after performing maintenance tasks.

Linux network configuration can be completed through the following steps: 1. Configure the network interface, use the ip command to temporarily set or edit the configuration file persistence settings. 2. Set up a static IP, suitable for devices that require a fixed IP. 3. Manage the firewall and use the iptables or firewalld tools to control network traffic.

Maintenance mode plays a key role in Linux system management, helping to repair, upgrade and configuration changes. 1. Enter maintenance mode. You can select it through the GRUB menu or use the command "sudosystemctlisolaterscue.target". 2. In maintenance mode, you can perform file system repair and system update operations. 3. Advanced usage includes tasks such as resetting the root password. 4. Common errors such as not being able to enter maintenance mode or mount the file system, can be fixed by checking the GRUB configuration and using the fsck command.

The timing and reasons for using Linux maintenance mode: 1) When the system starts up, 2) When performing major system updates or upgrades, 3) When performing file system maintenance. Maintenance mode provides a safe and controlled environment, ensuring operational safety and efficiency, reducing impact on users, and enhancing system security.

Indispensable commands in Linux include: 1.ls: list directory contents; 2.cd: change working directory; 3.mkdir: create a new directory; 4.rm: delete file or directory; 5.cp: copy file or directory; 6.mv: move or rename file or directory. These commands help users manage files and systems efficiently by interacting with the kernel.

In Linux, file and directory management uses ls, cd, mkdir, rm, cp, mv commands, and permission management uses chmod, chown, and chgrp commands. 1. File and directory management commands such as ls-l list detailed information, mkdir-p recursively create directories. 2. Permission management commands such as chmod755file set file permissions, chownuserfile changes file owner, and chgrpgroupfile changes file group. These commands are based on file system structure and user and group systems, and operate and control through system calls and metadata.

MaintenanceModeinLinuxisaspecialbootenvironmentforcriticalsystemmaintenancetasks.Itallowsadministratorstoperformtaskslikeresettingpasswords,repairingfilesystems,andrecoveringfrombootfailuresinaminimalenvironment.ToenterMaintenanceMode,interrupttheboo

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

SublimeText3 Chinese version
Chinese version, very easy to use

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
