首先運行easy_install pymongo
命令安裝pymongo驅動。然后執行操作:
創建連接
1 In [1]: import pymongo 2 3 In [2]: connection = pymongo.Connection('localhost', 27017)
切換到數據庫malware
In [3]: db = connection.malware
獲取collection
1 In [4]: collection = db.malware
注意:db和collection都是延時創建的,在添加Document時才真正創建
Document添加,_id會自動創建
1 In [6]: post = {"name":"a.privacy.GingerMaster.a", "family":"GingMaster", "category":"隱私竊取", "behavior":"非法獲取手機root權限,強制開機自啟動、強制聯網、竊 取並上傳用戶手機中的IMEI、IMSI、SIM卡信息等隱私內容,還會將病毒組件偽裝成PNG圖片,從后台靜默下載、安裝惡意軟件,消耗用戶流量"} 2 3 In [7]: malinfo = db.posts 4 5 In [9]: malinfo.insert(post) 6 Out[9]: ObjectId('52727c5b3387e31671aa91b1')
獲取所有collection(相當於SQL的show tables)
1 In [10]: db.collection_names() 2 Out[10]: [u'system.indexes', u'posts']
獲取單個文檔
1 In [11]: malinfo.find_one() 2 Out[11]: 3 {u'_id': ObjectId('52727c5b3387e31671aa91b1'), 4 u'behavior': u'\u975e\u6cd5\u83b7\u53d6\u624b\u673aroot\u6743\u9650\uff0c\u5f3a\u5236\u5f00\u673a\u81ea\u542f\u52a8\u3001\u5f3a\u5236\u8054\u7f51\u3001\u7a83\u53d6\u5e76\u4e0a\u4f20\u7528\u6237\u624b\u673a\u4e2d\u7684IMEI\u3001IMSI\u3001SIM\u5361\u4fe1\u606f\u7b49\u9690\u79c1\u5185\u5bb9\uff0c\u8fd8\u4f1a\u5c06\u75c5\u6bd2\u7ec4\u4ef6\u4f2a\u88c5\u6210PNG\u56fe\u7247\uff0c\u4ece\u540e\u53f0\u9759\u9ed8\u4e0b\u8f7d\u3001\u5b89\u88c5\u6076\u610f\u8f6f\u4ef6\uff0c\u6d88\u8017\u7528\u6237\u6d41\u91cf', 5 u'category': u'\u9690\u79c1\u7a83\u53d6', 6 u'family': u'GingMaster', 7 u'name': u'a.privacy.GingerMaster.a'}
批量插入
1 In [12]: new_posts = [{"name":"a.payment.FakeInst.a", "family":"FakeInst", "category":"惡意扣費", "behavior":"后台發送扣費短信"}, {"name":"a.payment.Umeng.a", "family":"Umeng", "category":"惡意扣費", "behavior":"1. 后台從服務器端獲取指令, 自動發送短信,訂制扣費服務,並攔截指定號碼短信。 2. 后台從服務器端獲取指令,自動模擬訪問廣告,消耗用戶流量"}] 2 3 In [13]: malinfo.insert(new_posts) 4 Out[13]: [ObjectId('527281323387e31671aa91b2'), ObjectId('527281323387e31671aa91b3')]
獲取所有collection(相當於SQL的show tables)
1 In [14]: db.collection_names() 2 Out[14]: [u'system.indexes', u'posts']
查詢多個文檔
1 In [18]: for info in malinfo.find(): 2 ....: print info 3 ....: 4 {u'category': u'\u9690\u79c1\u7a83\u53d6', u'_id': ObjectId('52727c5b3387e31671aa91b1'), u'name': u'a.privacy.GingerMaster.a', u'family': u'GingMaster', u'behavior': u'\u975e\u6cd5\u83b7\u53d6\u624b\u673aroot\u6743\u9650\uff0c\u5f3a\u5236\u5f00\u673a\u81ea\u542f\u52a8\u3001\u5f3a\u5236\u8054\u7f51\u3001\u7a83\u53d6\u5e76\u4e0a\u4f20\u7528\u6237\u624b\u673a\u4e2d\u7684IMEI\u3001IMSI\u3001SIM\u5361\u4fe1\u606f\u7b49\u9690\u79c1\u5185\u5bb9\uff0c\u8fd8\u4f1a\u5c06\u75c5\u6bd2\u7ec4\u4ef6\u4f2a\u88c5\u6210PNG\u56fe\u7247\uff0c\u4ece\u540e\u53f0\u9759\u9ed8\u4e0b\u8f7d\u3001\u5b89\u88c5\u6076\u610f\u8f6f\u4ef6\uff0c\u6d88\u8017\u7528\u6237\u6d41\u91cf'} 5 {u'category': u'\u6076\u610f\u6263\u8d39', u'_id': ObjectId('527281323387e31671aa91b2'), u'name': u'a.payment.FakeInst.a', u'family': u'FakeInst', u'behavior': u'\u540e\u53f0\u53d1\u9001\u6263\u8d39\u77ed\u4fe1'} 6 {u'category': u'\u6076\u610f\u6263\u8d39', u'_id': ObjectId('527281323387e31671aa91b3'), u'name': u'a.payment.Umeng.a', u'family': u'Umeng', u'behavior': u'1. \u540e\u53f0\u4ece\u670d\u52a1\u5668\u7aef\u83b7\u53d6\u6307\u4ee4\uff0c\u81ea\u52a8\u53d1\u9001\u77ed\u4fe1\uff0c\u8ba2\u5236\u6263\u8d39\u670d\u52a1\uff0c\u5e76\u62e6\u622a\u6307\u5b9a\u53f7\u7801\u77ed\u4fe1\u3002 2. \u540e\u53f0\u4ece\u670d\u52a1\u5668\u7aef\u83b7\u53d6\u6307\u4ee4\uff0c\u81ea\u52a8\u6a21\u62df\u8bbf\u95ee\u5e7f\u544a\uff0c\u6d88\u8017\u7528\u6237\u6d41\u91cf'}
加條件的查詢
1 In [19]: malinfo.find_one({"family":"FakeInst"}) 2 Out[19]: 3 {u'_id': ObjectId('527281323387e31671aa91b2'), 4 u'behavior': u'\u540e\u53f0\u53d1\u9001\u6263\u8d39\u77ed\u4fe1', 5 u'category': u'\u6076\u610f\u6263\u8d39', 6 u'family': u'FakeInst', 7 u'name': u'a.payment.FakeInst.a'}
統計數量
1 In [20]: malinfo.count() 2 Out[20]: 3