2019-11-06 00:52:26 +08:00
|
|
|
|
[#]: collector: (lujun9972)
|
2019-11-11 09:02:45 +08:00
|
|
|
|
[#]: translator: (geekpi)
|
2019-11-16 10:14:32 +08:00
|
|
|
|
[#]: reviewer: (wxy)
|
2019-11-16 10:15:14 +08:00
|
|
|
|
[#]: publisher: (wxy)
|
|
|
|
|
[#]: url: (https://linux.cn/article-11580-1.html)
|
2019-11-06 00:52:26 +08:00
|
|
|
|
[#]: subject: (Bash Script to Generate Patching Compliance Report on CentOS/RHEL Systems)
|
|
|
|
|
[#]: via: (https://www.2daygeek.com/bash-script-to-generate-patching-compliance-report-on-centos-rhel-systems/)
|
|
|
|
|
[#]: author: (Magesh Maruthamuthu https://www.2daygeek.com/author/magesh/)
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
在 CentOS/RHEL 系统上生成补丁合规报告的 Bash 脚本
|
2019-11-06 00:52:26 +08:00
|
|
|
|
======
|
|
|
|
|
|
2019-11-16 10:14:32 +08:00
|
|
|
|
![](https://img.linux.net.cn/data/attachment/album/201911/16/101428n1nsj74wifp4k1dz.jpg)
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-16 10:14:32 +08:00
|
|
|
|
如果你运行的是大型 Linux 环境,那么你可能已经将 Red Hat 与 Satellite 集成了。如果是的话,你不必担心补丁合规性报告,因为有一种方法可以从 Satellite 服务器导出它。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-16 10:14:32 +08:00
|
|
|
|
但是,如果你运行的是没有 Satellite 集成的小型 Red Hat 环境,或者它是 CentOS 系统,那么此脚本将帮助你创建该报告。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-16 10:14:32 +08:00
|
|
|
|
补丁合规性报告通常每月创建一次或三个月一次,具体取决于公司的需求。根据你的需要添加 cronjob 来自动执行此功能。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
此 [bash 脚本][1] 通常适合于少于 50 个系统运行,但没有限制。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
保持系统最新是 Linux 管理员的一项重要任务,它使你的计算机非常稳定和安全。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
以下文章可以帮助你了解有关在红帽 (RHEL) 和 CentOS 系统上安装安全修补程序的更多详细信息。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-16 10:14:32 +08:00
|
|
|
|
* [如何在 CentOS 或 RHEL 系统上检查可用的安全更新?][2]
|
|
|
|
|
* [在 RHEL 和 CentOS 系统上安装安全更新的四种方法][3]
|
|
|
|
|
* [在 RHEL 和 CentOS 上检查或列出已安装的安全更新的两种方法][4]
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-16 10:14:32 +08:00
|
|
|
|
此教程中包含四个 [shell 脚本][5],请选择适合你的脚本。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
### 方法 1:为 CentOS / RHEL 系统上的安全修补生成补丁合规性报告的 Bash 脚本
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
此脚本只会生成安全修补合规性报告。它会通过纯文本发送邮件。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# vi /opt/scripts/small-scripts/sec-errata.sh
|
|
|
|
|
|
|
|
|
|
#!/bin/sh
|
|
|
|
|
/tmp/sec-up.txt
|
|
|
|
|
SUBJECT="Patching Reports on "date""
|
|
|
|
|
MESSAGE="/tmp/sec-up.txt"
|
|
|
|
|
TO="[email protected]"
|
|
|
|
|
echo "+---------------+-----------------------------+" >> $MESSAGE
|
|
|
|
|
echo "| Server_Name | Security Errata |" >> $MESSAGE
|
|
|
|
|
echo "+---------------+-----------------------------+" >> $MESSAGE
|
|
|
|
|
for server in `more /opt/scripts/server.txt`
|
|
|
|
|
do
|
|
|
|
|
sec=`ssh $server yum updateinfo summary | grep 'Security' | grep -v 'Important|Moderate' | tail -1 | awk '{print $1}'`
|
|
|
|
|
echo "$server $sec" >> $MESSAGE
|
|
|
|
|
done
|
|
|
|
|
echo "+---------------------------------------------+" >> $MESSAGE
|
|
|
|
|
mail -s "$SUBJECT" "$TO" < $MESSAGE
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
添加完上面的脚本后运行它。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# sh /opt/scripts/small-scripts/sec-errata.sh
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
你会看到下面的输出。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# cat /tmp/sec-up.txt
|
|
|
|
|
|
|
|
|
|
+---------------+-------------------+
|
|
|
|
|
| Server_Name | Security Errata |
|
|
|
|
|
+---------------+-------------------+
|
|
|
|
|
server1
|
|
|
|
|
server2
|
|
|
|
|
server3 21
|
|
|
|
|
server4
|
|
|
|
|
+-----------------------------------+
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-16 10:14:32 +08:00
|
|
|
|
添加下面的 cronjob 来每个月得到一份补丁合规性报告。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# crontab -e
|
|
|
|
|
|
|
|
|
|
@monthly /bin/bash /opt/scripts/system-uptime-script-1.sh
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
### 方法 1a:为 CentOS / RHEL 系统上的安全修补生成补丁合规性报告的 Bash 脚本
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
脚本会为你生成安全修补合规性报告。它会通过 CSV 文件发送邮件。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# vi /opt/scripts/small-scripts/sec-errata-1.sh
|
|
|
|
|
|
|
|
|
|
#!/bin/sh
|
|
|
|
|
echo "Server Name, Security Errata" > /tmp/sec-up.csv
|
|
|
|
|
for server in `more /opt/scripts/server.txt`
|
|
|
|
|
do
|
|
|
|
|
sec=`ssh $server yum updateinfo summary | grep 'Security' | grep -v 'Important|Moderate' | tail -1 | awk '{print $1}'`
|
|
|
|
|
echo "$server, $sec" >> /tmp/sec-up.csv
|
|
|
|
|
done
|
|
|
|
|
echo "Patching Report for `date +"%B %Y"`" | mailx -s "Patching Report on `date`" -a /tmp/sec-up.csv [email protected]
|
|
|
|
|
rm /tmp/sec-up.csv
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
添加完上面的脚本后运行它。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# sh /opt/scripts/small-scripts/sec-errata-1.sh
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
你会看到下面的输出。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
![][6]
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
### 方法 2:为 CentOS / RHEL 系统上的安全修补、bugfix、增强生成补丁合规性报告的 Bash 脚本
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
脚本会为你生成安全修补、bugfix、增强的补丁合规性报告。它会通过纯文本发送邮件。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# vi /opt/scripts/small-scripts/sec-errata-bugfix-enhancement.sh
|
|
|
|
|
|
|
|
|
|
#!/bin/sh
|
|
|
|
|
/tmp/sec-up.txt
|
|
|
|
|
SUBJECT="Patching Reports on "`date`""
|
|
|
|
|
MESSAGE="/tmp/sec-up.txt"
|
|
|
|
|
TO="[email protected]"
|
|
|
|
|
echo "+---------------+-------------------+--------+---------------------+" >> $MESSAGE
|
|
|
|
|
echo "| Server_Name | Security Errata | Bugfix | Enhancement |" >> $MESSAGE
|
|
|
|
|
echo "+---------------+-------------------+--------+---------------------+" >> $MESSAGE
|
|
|
|
|
for server in `more /opt/scripts/server.txt`
|
|
|
|
|
do
|
|
|
|
|
sec=`ssh $server yum updateinfo summary | grep 'Security' | grep -v 'Important|Moderate' | tail -1 | awk '{print $1}'`
|
|
|
|
|
bug=`ssh $server yum updateinfo summary | grep 'Bugfix' | tail -1 | awk '{print $1}'`
|
|
|
|
|
enhance=`ssh $server yum updateinfo summary | grep 'Enhancement' | tail -1 | awk '{print $1}'`
|
|
|
|
|
echo "$server $sec $bug $enhance" >> $MESSAGE
|
|
|
|
|
done
|
|
|
|
|
echo "+------------------------------------------------------------------+" >> $MESSAGE
|
|
|
|
|
mail -s "$SUBJECT" "$TO" < $MESSAGE
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
添加完上面的脚本后运行它。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# sh /opt/scripts/small-scripts/sec-errata-bugfix-enhancement.sh
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
你会看到下面的输出。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# cat /tmp/sec-up.txt
|
|
|
|
|
|
|
|
|
|
+---------------+-------------------+--------+---------------------+
|
|
|
|
|
| Server_Name | Security Errata | Bugfix | Enhancement |
|
|
|
|
|
+---------------+-------------------+--------+---------------------+
|
|
|
|
|
server01 16
|
|
|
|
|
server02 5 16
|
|
|
|
|
server03 21 266 20
|
|
|
|
|
server04 16
|
|
|
|
|
+------------------------------------------------------------------+
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
添加下面的 cronjob 来每三个月得到补丁合规性报告。该脚本计划在一月、四月、七月、十月的 1 号运行。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# crontab -e
|
|
|
|
|
|
|
|
|
|
0 0 01 */3 * /bin/bash /opt/scripts/system-uptime-script-1.sh
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
### 方法 2a:为 CentOS / RHEL 系统上的安全修补、bugfix、增强生成补丁合规性报告的 Bash 脚本
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
脚本会为你生成安全修补、bugfix、增强的补丁合规性报告。它会通过 CSV 文件发送邮件。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# vi /opt/scripts/small-scripts/sec-errata-bugfix-enhancement-1.sh
|
|
|
|
|
|
|
|
|
|
#!/bin/sh
|
|
|
|
|
echo "Server Name, Security Errata,Bugfix,Enhancement" > /tmp/sec-up.csv
|
|
|
|
|
for server in `more /opt/scripts/server.txt`
|
|
|
|
|
do
|
|
|
|
|
sec=`ssh $server yum updateinfo summary | grep 'Security' | grep -v 'Important|Moderate' | tail -1 | awk '{print $1}'`
|
|
|
|
|
bug=`ssh $server yum updateinfo summary | grep 'Bugfix' | tail -1 | awk '{print $1}'`
|
|
|
|
|
enhance=`ssh $server yum updateinfo summary | grep 'Enhancement' | tail -1 | awk '{print $1}'`
|
|
|
|
|
echo "$server,$sec,$bug,$enhance" >> /tmp/sec-up.csv
|
|
|
|
|
done
|
|
|
|
|
echo "Patching Report for `date +"%B %Y"`" | mailx -s "Patching Report on `date`" -a /tmp/sec-up.csv [email protected]
|
|
|
|
|
rm /tmp/sec-up.csv
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
添加完上面的脚本后运行它。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
# sh /opt/scripts/small-scripts/sec-errata-bugfix-enhancement-1.sh
|
|
|
|
|
```
|
|
|
|
|
|
2019-11-14 08:51:30 +08:00
|
|
|
|
你会看到下面的输出。
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
2019-11-16 10:14:32 +08:00
|
|
|
|
![][7]
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
--------------------------------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
via: https://www.2daygeek.com/bash-script-to-generate-patching-compliance-report-on-centos-rhel-systems/
|
|
|
|
|
|
|
|
|
|
作者:[Magesh Maruthamuthu][a]
|
|
|
|
|
选题:[lujun9972][b]
|
2019-11-14 08:51:30 +08:00
|
|
|
|
译者:[geekpi](https://github.com/geekpi)
|
2019-11-16 10:14:32 +08:00
|
|
|
|
校对:[wxy](https://github.com/wxy)
|
2019-11-06 00:52:26 +08:00
|
|
|
|
|
|
|
|
|
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
|
|
|
|
|
|
|
|
|
[a]: https://www.2daygeek.com/author/magesh/
|
|
|
|
|
[b]: https://github.com/lujun9972
|
|
|
|
|
[1]: https://www.2daygeek.com/category/bash-script/
|
2019-11-16 10:14:32 +08:00
|
|
|
|
[2]: https://linux.cn/article-10938-1.html
|
2019-11-06 00:52:26 +08:00
|
|
|
|
[3]: https://www.2daygeek.com/install-security-updates-on-redhat-rhel-centos-system/
|
2019-11-16 10:14:32 +08:00
|
|
|
|
[4]: https://linux.cn/article-10960-1.html
|
2019-11-06 00:52:26 +08:00
|
|
|
|
[5]: https://www.2daygeek.com/category/shell-script/
|
2019-11-16 10:14:32 +08:00
|
|
|
|
[6]: https://www.2daygeek.com/wp-content/uploads/2019/11/bash-script-to-generate-patching-compliance-report-on-centos-rhel-systems-2.png
|
|
|
|
|
[7]: https://www.2daygeek.com/wp-content/uploads/2019/11/bash-script-to-generate-patching-compliance-report-on-centos-rhel-systems-3.png
|