Linux commands

From Organic Design wiki
Info.svg This is the start of a list of useful Linux shell commands (generally "one liners") we use a lot
Bash Tricks.jpg


Contents

Debian package management

The package management system used on Debian and the "downstream" distros based on it such as Ubuntu and Mint.

Searching for an installed package

Use dpkg and grep;

dpkg -l | grep java

will list all installed packages and filter to only those with "java" in the name

Searching for installable packages

apt-cache performs a variety of operations on APT´s package cache

apt-cache search java

lists all packages in the cache with java in the name that are installable

SSH & SCP

See also SSH for more specific uses.

Screen

Screen is an essential utility to use during an SSH session over dodgy connections that can drop or when doing something mission-critical. Just use the screen command without any parameters and another shell session will start (if you exit you'll be back in the original shell session again). This new shell session will remain active even if the connection drops. To get back into the session again later, use screen -R. There are many other options for using multiple screen sessions and multiple windows onto a single session etc, see this screen cheatsheet for more details.

Note: One annoying issue with screen is that the normal scroll-back doesn't work, but you can user CTRL+A then ESC to activate "copy mode" which then allows you to scroll back using the cursor keys or page up/down. To exit "copy mode" use ESC again.

Basic SCP syntax

Example of sending a file to a remote server:

scp -P 2222 /my/local/file.txt USER@example.com:/home/USER

Example of retrieving a file from a remote server:

scp -P 2222 USER@example.com:/home/USER/file.txt ./

Note using port forwarding for commonly accessed sites you can define non standard ports in your .ssh/config so you never need to explicitly state them above.

Recovering from an interrupted transfer

This ability is included natively in Linux and used to be very useful for splitting large backups up so they could fit onto small media such as floppy disks. But there's one time when it's very useful nowadays too which is when a large file transfer gets interupted and there's no option for continuation such as when using SCP.

When this happens, go onto the target machine, check how many bytes were transferred of the target file and rename it to "xaa". Then on the local machine, do the following command to split the source file into two parts, the first being of the size of the number of bytes that have already been transferred (in this example 1234567 bytes).

split -b 1234567 foo.tar.gz

The resulting files are called "xaa" and "xab", and the latter is the containing the remaining content that needs to be transferred to the target server. Once you've transferred it across, you can then join the two files (remember you renamed the first part to "xaa" so there's no need to transfer that) together using cat as follows, and then remove all the xa* files from noth source and target servers.

cat xa* > foo.tar.gz

Tar pipes

## From a local to remote machine
tar -zcvf - directory | ssh remote 'cd somewhere; tar -zxvf -'
## From remote machine to local machine
ssh remote 'cd somewhere; tar -zcvf - directory' | tar -zxf -
## remote tar and pipe to tgz
ssh remote 'cd somewhere; tar -zcf - directory' | cat - > directory.tar.gz

Port-forwarding with SSH

SSH allows you to forward ports on one machine to another using the SSH pipes.

For example, using a local port-forward, you could create a local connection into a remote SQL server that's not available to external connections if you have SSH access to machine with running the SQL server:

ssh -nNTL 3333:localhost:3306 USER@SERVER

Now you can access the database locally on port 3333.

Or in the opposite direction you can use a remote port-forward you could give SSH access to a machine that's behind a firewall or router by putting its SSH port onto a remote machine:

ssh -nNTR 2222:localhost:22 USER@SERVER

You can now ssh into the local machine from within the remote server on port 2222 instead.

Note that by default the forwarded port is only accessible locally, but you can change this behaviour with the GatewayPorts SSH option.

Lets say you're doing some maintenance on your site and you'd like to redirect all the requests on port 80 to another web-server (SERVER) on port 8080. You could set up your temporary web-server on 8080 on a remote server and then after you've stopped the local web-server, forward all requests for port 80 to 8080 on the remote machine with a local port-forward. By using the GatewayPorts option, the forwarded port 80 is available externally.

ssh -nNTL 80:SERVER:8080 -o GatewayPorts=yes USER@SERVER

This option can be useful for remote forwards too, for example what if we wanted our machine behind the firewall that we want accessible via SSH to be accessible externally? In this case we need to set the GatewayPorts option in sshd_config because it applies to the remote machine, not to the one running the command. If it's set to yes then the forwarded ports will be available externally as well, or you can set it to clientspecified to restrict the access to an external IP defined in the command:

ssh -nNTR 1.2.3.4:2222:localhost:22 USER@SERVER

Now the host at 1.2.3.4 is able to SSH into our firewalled machine on port 2222 of USER@SERVER. See also this post regarding security for port-forwarding accounts.

Browsing the net through a remote server with SSH

Sometimes you need to browse using an IP address that's in another location, for example if the content you want to access is only available to local users or if you're buying something and the prices are based on the buyers location. If you have access to a server in the required location, or someone you know in that location is willing to temporarily set up an SSH server that you can access, the you can use the following syntax to set up a local port that your browser can use as a proxy server.

ssh -fnNTCD 1080 USER@SERVER
  • The f option means to Fork off into the background after successful connection
  • The nNT options mean to use this SSH session only for tunnelling, prevent reading STDIN, no pseudo terminal and not to use open up a shell session.
  • The C option means to compress the data in the tunnel which is a good idea if you're on a slow connection
  • The D option is the main one that tells SSH to set up a tunnel connected to a local port with the port number specified

Next you need to configure your browser to connect via this local port. Chromium allows you to specify the proxy details as a command-line option, so there's no need to change the network configuration and then change it back afterwards. Simply open a shell window and use the following syntax (make sure there are no other Chromium windows open when you do this).

chromium-browser --proxy-server="socks5://localhost:1080"

In Firefox you need to change the Network Proxy setting in Preferences/General. The changes take effect instantly without needing a restart or anything, but you'll need to remember to change the setting back after the SSH connection is closed.

FF-proxy.jpg


Files & Devices

Clear the contents of a file

> /path/to/file

List all the storage devices and partitions attached to the system (even if they're unformatted or unmounted)

cat /proc/partitions

To check what filesystem a device has on it use file, e.g.

file -s /dev/sda1

Get the size of a directory and its contents

du -sh /home/foo


Use this more specific version to find the size of a users Maildir folder:

du -sh /home/*/Maildir|sed 's|/home/||'|sed 's|/Maildir||'


Here's another version of du that accounts for dotfiles and sorts the results:

du -sch .[!.]* * | sort -h

Search for file content recursively

Here's an example looking for a phrase within a specific file type recursively through a directory structure, and printing the file names and line numbers of the resulting matches.

grep -rn "Foo" *.php

There are other tips at stackoverflow.com.

Search for file content recursively and tar

## Find and tar
find . -name "*.R" -print0 | xargs -0 tar -cvf Rfiles.tar
## check contents
tar -tvf Rfiles.tar

## Find and tar.gz
find . -name "*.R" -print0 | xargs -0 tar -zcvf Rfiles.tar.gz
## check contents
tar -ztvf Rfiles.tar.gz

Search for file by name recursively

find . -name "*.R"

Count occurrences of a word in a file or files

grep -roh "WORD" file*.txt | wc -

Count the number of lines in a file or output

wc -l <FILE>
cat <FILE> grep foo | wc -l

Search and replace content in files

You could also use find and sed, but I find that this little line of perl works nicely.

perl -pi -w -e 's/SEARCH/REPLACE/g;' *.php
  • -e means execute the following line of code.
  • -i means edit in-place
  • -w write warnings
  • -p loop

EXTS="7z t7z"

Search for files that contain the windows BOM character (&#65279;)

Windows editors often add a BOM character to the beginning of UTF-8 encoded text files, these cause a lot of trouble for many types of scripts such as PHP and the problem can be very hard to track down. This short shell one-liner I found here searches the current directory recursively showing what files have a BOM, you can then use a decent editor like Geany to remove them.

grep -rlI $'\xEF\xBB\xBF' .

Mass renaming

mmv is a mass move/copy/renaming tool that uses standard wildcards to perform its functions. According to the manual the “;” wildcard is useful for matching files at any depth in the directory tree (ie it will go below the current directory, recursively).

Example
mmv \*.JPG \#1.jpg

The first pattern matches anything with a “.JPG” and renames each file (the “#1” matches the first wildcard) to “.jpg”. Each time you use a \(wildcard) you can use a #x to get that wildcard. Where x is a positive number starting at 1. Copied off: http://tldp.org/LDP/GNU-Linux-Tools-Summary/html/mass-rename.html

Compare two directory structures for differences

This is very handy if you need to know if two directory structures are the same or not including file content. It uses the diff command with the r switch to work recursively and the x switch to allow skipping of the .svn directories.

diff -qrx .svn DIR1 DIR2

Mount a .iso and .img files

See this for ISO files and this for IMG files.

Mount a USB stick

If you don't know the device name of the stick, plug it in and find it with the following:

dmesg |grep SCSI

Then mount the first partition,

mkdir -p ~/memstick
mount -t vfat -o rw,users /dev/sdX1 ~/memstick

Mount a LUKS encrypted device

First find the device number for the drive with blkid | grep crypto or df -h or lsblk etc. Then unlock it as follows (note the capital O):

cryptsetup luksOpen /dev/sda2/ luksie

This makes the unlocked content available as a device /dev/mapper/luky, you can then mount this new device:

mkdir /mnt/luksie
mount /dev/mapper/luksie /mnt/luksie

Clone a device

Remember that this is a very low-level operation and so if you're cloning a live partition you may end up with partially written files or other corruption issues on the destination. Stop as many services as you can first, do an fsck afterwards and manually copy any directories that had issues.

dd if=/dev/sda of=/dev/sdb bs=32M

A good way to find more information about the devices first, for example if you have a number of unformatted devices of the same size and need more specific information about the hardware, is to use the 'lsscsi command which gives the following sample output:

[0:0:0:0]    disk    AMCC     9650SE-2LP DISK  4.10  /dev/sdb 
[1:0:0:0]    disk    ATA      Hitachi HUA72201 JP4O  /dev/sda 
[2:0:0:0]    disk    ATA      TOSHIBA MG03ACA1 FL1A  /dev/sdc

The sdb and sdc devices look identical with commands such as lsblk or fdisk -l, but one of the is a RAID pair and the other just a normal drive.

See also: Clone a live partition over SSH

Changing device UUIDs

It may sometimes be useful to change the UUIDs of partitions such as when they've been cloned with a low-level method like dd.

Note: the disk identifier should also be changed which you can do with fdisk from the expert menu.

Check what devices and UUIDs you have in the system:

# blkid
/dev/sda1: UUID="bc459b13-3aad-4017-a68b-ce8ab36275e1" SEC_TYPE="ext2" TYPE="ext3" 
/dev/sda2: UUID="86ce60b7-ad4a-44aa-88e2-2aefd5c6c396" TYPE="swap" 
/dev/sda3: UUID="b56d82f7-5817-4a52-9763-0b38aa360e2b" TYPE="ext4" 
/dev/sdc1: UUID="81d40a02-8019-4c1f-afb8-fb41d117c6d1" TYPE="ext3" 
/dev/sdc2: UUID="c57f1400-129a-402a-90f1-820a22c6a2fe" TYPE="swap" 
/dev/sdc3: UUID="c23ab65a-c32f-41e3-bd31-51ed563e0099" TYPE="ext4"

or:

# ls -l /dev/disk/by-uuid/
total 0
lrwxrwxrwx 1 root root 10 Sep  2 12:10 81d40a02-8019-4c1f-afb8-fb41d117c6d1 -> ../../sdc1
lrwxrwxrwx 1 root root 10 Sep  2 12:10 86ce60b7-ad4a-44aa-88e2-2aefd5c6c396 -> ../../sda2
lrwxrwxrwx 1 root root 10 Sep  2 12:10 b56d82f7-5817-4a52-9763-0b38aa360e2b -> ../../sda3
lrwxrwxrwx 1 root root 10 Sep  2 12:10 bc459b13-3aad-4017-a68b-ce8ab36275e1 -> ../../sda1
lrwxrwxrwx 1 root root 10 Sep  2 12:10 c23ab65a-c32f-41e3-bd31-51ed563e0099 -> ../../sdc3
lrwxrwxrwx 1 root root 10 Sep  2 12:27 c57f1400-129a-402a-90f1-820a22c6a2fe -> ../../sdc2

Check what swap partitions you have:

# cat /proc/swaps
Filename				Type		Size	Used	Priority
/dev/sda2                               partition	3999740	0	-1

Create a new UUID and assign it to and ext parition:

# uuidgen
81d40a02-8019-4c1f-afb8-fb41d117c6d1
#tune2fs /dev/sdb1 -U 81d40a02-8019-4c1f-afb8-fb41d117c6d1

Do the same for a swap partition:

# uuidgen
86ce60b7-ad4a-44aa-88e2-2aefd5c6c396
# swapoff /dev/sda2
# mkswap -U 86ce60b7-ad4a-44aa-88e2-2aefd5c6c396 /dev/sda2
Setting up swapspace version 1, size = 3999740 KiB
no label, UUID=86ce60b7-ad4a-44aa-88e2-2aefd5c6c396

Updating device partition tables without rebooting

  • partprobe /dev/sdx
  • partx -u /dev/sdx
  • echo 1 > /sys/block/sdX/device/rescan
  • check partition information before and after with cat /proc/partitions

Downloading from google drive in shell

Thanks to FrankerZ for this! The first command outputs a code which you put into the second command.

wget --save-cookies cookies.txt --keep-session-cookies --no-check-certificate 'https://docs.google.com/uc?export=download&id=FILEID' -O- | sed -rn 's/.*confirm=([0-9A-Za-z_]+).*/Code: \1\n/p'
wget --load-cookies cookies.txt 'https://docs.google.com/uc?export=download&confirm=CODE_FROM_ABOVE&id=FILEID' -O FILENAME

Processes

Kill processes matching a text string:

pkill -f <STRING>

Image manipulation

Resizing JPG's and changing quality setting

The first line shows how to reduce and image to 25% and quality to 50% adding "_resized" to the results filename.

convert foo.jpg -resize 25% -quality 75% foo_resized.jpg

Here's a Perl script version used to apply this same command to all JPG's (jpg, JPG, jpeg etc) in the current directory.

#!/usr/bin/perl
use File::Glob qw(:globally :nocase);
for (glob "*.jp*g") {
	my $img = $_;
	s/(....)$/_resized$1/;
	qx "convert \'$img\' -resize 25% -quality 75% \'$_\'";
}

This command rotates, normalises, greyscales and sets the output quality of set of an image:

convert FILE  -normalize -set colorspace Gray -separate -average -resize 50% -rotate "-90" -quality 75% OUT.JPG

Making a PDF from a selection of images

ImageMagick can also be used to make a PDF from many images in a directory:

convert *.jpg -resize 50% -quality 75% -gravity Center -extent 1240x1753 -units pixelsperinch -density 150x150 foo.pdf

Here all the jpeg files in the current directory will be resized to half size (in pixels) with a 75% quality setting. Then the page size and print resolution are set (note that the extent parameter is required for gravity to work to ensure the images are centered in the page. The extent is set to the size of the page in inches multiplied by the density setting.

Apply an opaque background of a specified colour to a directory of transparent PNG's

  • This command requires ImageMagick to be installed
  • It loops through all PNG's in the CWD and puts them in a directory called processed which must exist
perl -e 'qx "convert $_ -background #ff00ff -flatten foo/$_" for glob "*.png"'

Audio & Video

avconv (ffmpeg)

Note: Many operating systems including Ubuntu are now using the libav fork of ffmpeg now which means you should use the avconv command instead.

The following converts a .wav file to an mp3:

ffmpeg -i foo.wav foo.mp3

Here's a more complicated example which converts mp4 video into mp3 audio at a lower quality with only one channel at 11KHz and 32kbps.

ffmpeg -i foo.mp4 -acodec libmp3lame -ab 16k -ar 11025 -ac 1 foo.mp3

To do a whole directory you could do this:

perl -e 'qx "ffmpeg -i $_ $_.mp3" for glob "*.wav"'

Or a little more complex; a whole directory with a proper name change accounting for names with spaces in them. This

perl -e 'for (glob "*.mp4") { $i=$_; s/.mp3$/.converted.wav/; qx "ffmpeg -i \"$i\" \"$_\"" }'

Use the following commands to extract a small (5 seconds in this example) snippet out of a video (the -ar switch is only needed for outputting to flv I think).

ffmpeg -i "foo.avi" -ss 00:10:10 -t 5 -ar 22050 "foo.flv"

See also:

Downloading Youtube from shell

We use yt-dlp now, as the original youtube-dl was shutdown. It can be instanned as a single binary, or using the pip Python package manager, see the main Github project page for instructions. Run it with the -U switch to upgrade it.

Use the tool to download the video, e.g.

youtube-dl URL_OF_VIDEO_OR_PLAYIST


Music only downloading

youtube-dl -x --audio-format mp3 URL

Using a video as desktop background

This can be done with VLC from the command line. There are other ways, but one advantage of using VLC is that it's independent of the window manager or desktop environment. The only requirement is that VLC works.

cvlc --x11-display :2 --video-wallpaper --no-audio /path/to/video/file

The x11-display parameter is optional and only necessary if you want the video playing on an second screen. Note that the numbers start from 0 and go up sequentially, but the numbering used is based on the physical output, so it could be :2 or :3 even if you only have two screens connected.

You may also need to make some tweaks to your desktop settings, such as the panel.

System monitoring & management

List the top 10 memory consuming processes

ps -auxf | sort -nr -k 4 | head -10


List the top 10 CPU consuming processes

ps -auxf | sort -nr -k 3 | head -10


Limit CPU resources to a process (you may need to first install the cpulimit package):

cpulimit -b -l <PERCENTAGE> -p <PID>


Disable suspend/hibernate

You need to configure the suspend and hibernate actions from the shell in order for it to apply globally even in the desktop login screen. Check the current status with the following, if they're inactive you'll see "target is masked" on all suspend/hibernate types listed.

sudo systemctl status sleep.target suspend.target hibernate.target hybrid-sleep.target


To disable (or mask) them, do the following:

sudo systemctl mask sleep.target suspend.target hibernate.target hybrid-sleep.target


And to re-enable them again,

sudo systemctl unmask sleep.target suspend.target hibernate.target hybrid-sleep.target


Configure login screen

We can configure many of the properties of the login screen in the /etc/systemd/logind.conf file. For example, the lid action is set in the HandleLidSwitch setting which can be set to suspend, poweroff, lock or ignore.

Network commands

Restart the network after changing configuration

/etc/init.d/networking restart

List all the listening sockets and their ports and programs

netstat -lp

Get current default gateway

netstat -nr

The default gateway is on the last line, it should have the U and G flags set

DHCP

Release current lease:

dhclient -r


Obtain a new lease

dhclient


Query to see if there is a DHCP server and what it responds with:

nmap --script broadcast-dhcp-discover [-e INTERFACE]


Scan a local subnet for active IP addresses

sudo nmap -sP 192.168.1.0/24

Get the MAC address and hostname of an IP on the current subnet

arp -a 192.168.1.1

Display traffic passing through a port

This is very useful for debugging interactions with services, for example the following command shows traffic going between a local elasticsearch service and a local client application.

sudo tcpdump port 9200 -qAi lo

Make the system prefer IPv4 connections

Open /etc/gai.conf and uncomment the following line:

#
# For sites which prefer IPv4 connections change the last line to
#
precedence ::ffff:0:0/96 100

Test which IPv6 address is being used for public connections

Servers can be assigned many IPv6 addresses, but which one should you assign to AAAA records pointing at the server? This command shows which address is being used to make outgoing connections which would be the best one to use for incoming connections as well. The address used to test the outgoing connection here is google's public DNS server.

ip r get to 2001:4860:4860::8888

Internet

Download an url to a local file with continuation

curl -L -O -C - http://www.foo.bar/file
wget -c http://www.foo.bar/file


Download a copy of an entire site

This will download an entire site, if the site is already downloaded, then only newer files are transferred.

wget -m http://foo.bar

Port forwarding

Port forwarding allows a remote client to gain access to a network so an intranet can be accessed.

ssh -fnNTL[PORT]:appserver:[PORT] username@sshdserver

Then point your webbrowsers proxy server to appserver:[PORT] and access the intranet etc.

To subvert a firewalled environment where outgoing ssh is allowed.

$ ssh -D 9000 username@remotehost

Then point your web browser to a SOCKS proxy @ localhost:9000

Further it's possible to get ssh through a web proxy using corkscrew.

ssh -oProxyCommand='corkscrew local_web_proxy proxy_port %h %p' username@remotehost

Monitoring network traffic

You can get daily and monthly traffic statistics that are updated every five minutes by installing the vnstat package. This is very useful if your ISP enforces a traffic limit. You can get reports on individual network interfaces.

Enable monitoring on a specific interface as follows:

vnstat --enable -i eth0

And then you can get a report for an interface as follows:

vnstat -i eth0

Example output:

monthly
                     rx      |     tx      |    total    |   avg. rate
     ------------------------+-------------+-------------+---------------
       Nov '17     82.43 MiB |   15.97 MiB |   98.40 MiB |    0.35 kbit/s
     ------------------------+-------------+-------------+---------------
     estimated        91 MiB |      16 MiB |     107 MiB |

   daily
                     rx      |     tx      |    total    |   avg. rate
     ------------------------+-------------+-------------+---------------
         today     82.43 MiB |   15.97 MiB |   98.40 MiB |   10.67 kbit/s
     ------------------------+-------------+-------------+---------------
     estimated        93 MiB |      17 MiB |     110 MiB |

Testing UDP connectivity

On the target machine being tested:

nc -ulp PORT

And on the machine sending the tests:

nc -u SERVER PORT

Then type text and hit enter, it should be echoed on the server.

If it's not, check the firewall status and disable:

ufw status
ufw disable

General

Add and remove startup items

update-rc.d ITEM defaults
update-rc.d -f ITEM remove

Date and time

Get the current (or another time specified in --date) time in UNIX timestamp format:

date +%s
date --date='01/30/2012 01:23:45' +%s


Convert a UNIX timestamp into a date/time in the current locale format:

date -d @1282368345

Specific guides

See also