1、首先模拟python类似shell命令行操作的接口:
python安装subprocess(本地)、paramiko(SSH远程)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
#-*- coding: UTF-8 -*- #!/usr/bin/python import os, sys import subprocess import paramiko import settings class RunCmd( object ): def __init__( self ): self .cmd = 'ls' @staticmethod def local_run(cmd): print ( 'start executing...' ) print ( 'cmd is -------> %s' % str (cmd)) s = subprocess.Popen( str (cmd), shell = True , stdin = subprocess.PIPE, stdout = subprocess.PIPE, stderr = subprocess.PIPE) out, err = s.communicate() print ( "outinfo is -------> %s" % out) print ( "errinfo is -------> %s" % err) print ( 'finish executing...' ) print ( 'result:------> %s' % s.returncode) return s.returncode @staticmethod def remote_run(host, username, password, port, cmd): client = paramiko.SSHClient() client.set_missing_host_key_policy(paramiko.AutoAddPolicy()) client.connect(hostname = host, port = int (port), username = username, password = password, timeout = 5 ) stdin, stdout, stderr = client.exec_command(cmd) result = stdout.read() client.close() return result @staticmethod def krb_run(cmd): print ( 'krb_run start...' ) print ( 'cmd is -------> %s' % str (cmd)) result = RunCmd.remote_run(settings.KRB_HOST, settings.USERNAME, settings.PASSWORD, settings.PORT, cmd) print ( 'result:------> %s' % result) print ( 'krb_run finish...' ) return result |
2、Kerberos常用的命令操作封装成接口,其他简单。但需要交互的是删除 principal
1
2
3
4
5
6
7
8
9
10
11
12
|
def delete_user( self , username): cmd = r """ expect -c " set timeout 1; spawn kadmin.local -q \"delete_principal {principal}\" ; expect yes/no {{ send \"yes\r\" }} ; expect *\r expect \r expect eof " """ . format (principal = username) RunCmd.krb_run(cmd) |
补充知识:python操作有Kerberos认证的hive库
之前访问hive都比较简单,直接用pyhive连接即可。
但是最近遇到了一个问题,hive有了Kerberosren认证。
最终经过各种尝试和灵感迸发,终于解决了这个问题,遂记录之。
代码
1
2
3
4
5
6
7
8
|
from pyhive.hive import connect con = connect(host = 'XXXX' ,port = 10000 ,auth = 'KERBEROS' ,kerberos_service_name = "hive" ) cursor = con.cursor() cursor.execute( 'select * from tmp.pricing_calculate_result_spark where time_id="201907171355" limit 10,1' ) datas = cursor.fetchall() print (datas) cursor.close() con.close() |
端口和ip都换成自己的,auth和kerberos_service_name不要改
运行效果
以上为个人经验,希望能给大家一个参考,也希望大家多多支持服务器之家。如有错误或未考虑完全的地方,望不吝赐教。
原文链接:https://blog.csdn.net/ZhouyuanLinli/article/details/78617484