Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- import glob
- import gzip
- import os
- import pymysql
- import logging
- import subprocess
- # path to gz directory
- GZ_DIR = '/Users/mani/Desktop/mysql/csv'
- # Database Infomation
- DB_HOST='10.1.1.38'
- DB_USER='diaguser'
- DB_PASS='Password'
- DB_NAME='PADIAGDB'
- LOGFILE="exception.log"
- def csv_reader(file, header=False):
- import csv
- with open(file, "r") as f:
- reader = csv.reader(f)
- if header:
- next(reader)
- for row in reader:
- yield row
- def import_sql(filename, dbHostName, dbUser, dbPassword, databaseName):
- db = pymysql.connect(host=dbHostName,
- user=dbUser,
- password=dbPassword,
- db=databaseName,
- charset='utf8')
- for row in csv_reader(filename, False):
- # prepare a cursor object using cursor() method
- with db.cursor() as cursor:
- if row[3] == "THREAT" and row[4] == "url":
- sql = ("INSERT INTO PADIAGDB.url ("
- "Domain,Receive_Time,Serial,Type,Threat_Content_Type,"
- "Config_Version,Generate_Time,Source_address,Destination_address,"
- "NAT_Source_IP,NAT_Destination_IP,Rule,Source_User,"
- "Destination_User,Application,Virtual_System,Source_Zone,"
- "Destination_Zone,Inbound_Interface,Outbound_Interface,Log_Action,"
- "Time_Logged,Session_ID,Repeat_Count,Source_Port,Destination_Port,"
- "NAT_Source_Port,NAT_Destination_Port,Flags,IP_Protocol,Action,"
- "URL_Filename,Threat_Content_Name,Category,Severity,Direction,"
- "Sequence_Number,Action_Flags,Source_Country,Destination_Country,"
- "cpadding,contenttype,pcap_id,filedigest,cloud,url_idx,user_agent,"
- "filetype,xff,referer,sender,subject,recipient,reportid,"
- "dg_hier_level_1,dg_hier_level_2,dg_hier_level_3,dg_hier_level_4,"
- "Virtual_System_Name,Device_Name,file_url )"
- ""
- "VALUES (%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,"
- "%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,"
- "%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s"
- "); ")
- elif row[3] == "SYSTEM":
- sql = ("INSERT INTO PADIAGDB.system ("
- "Domain,Receive_Time,Serial,Type,Threat_Content_Type,Config_Version,"
- "Generate_Time,Virtual_System,Event_ID,Object,fmt,id,module,Severity,"
- "Description,Sequence_Number,Action_Flags,dg_hier_level_1,"
- "dg_hier_level_2,dg_hier_level_3,dg_hier_level_4,Virtual_System_Name,"
- "Device_Name )"
- ""
- "VALUES (%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,%s,"
- "%s,%s,%s );")
- else:
- continue
- try:
- cursor.execute('SET foreign_key_checks = 0')
- # Execute the SQL command
- r = cursor.execute(sql, row)
- #Commit your changes in the database
- cursor.execute('SET foreign_key_checks = 1')
- db.commit()
- except Exception as e:
- logging.exception(e)
- db.rollback()
- # disconnect from server
- db.close()
- # List of all gz files
- gz_files = (gz for gz in glob.glob(os.path.join(GZ_DIR, '*.gz')))
- # Loop through all gz files
- for gz_file in gz_files:
- cmd = ['gz', 'a', 'Test.7z', 'Test', '-mx9']
- subprocess.call(cmd)
- # Step 1
- with gzip.open(gz_file, 'rb') as in_file:
- s = in_file.read()
- # store the uncompressed data
- sql_file = gz_file[:-3]
- # Convert to csv
- sql_file = sql_file[:-4] + '.csv'
- with open(sql_file, 'wb') as out_file:
- out_file.write(s)
- # Step 2: import to sql
- import_sql(out_file, DB_HOST, DB_USER, DB_PASS, DB_NAME)
- # Step 3: remove uncompresed file
- os.remove(sql_file)
Add Comment
Please, Sign In to add comment