How to Append Text to a File Using Bash
We can use the redirection ( >>
) operator and tee
the command to append text to a file.
We have to make sure we have enough permissions to add text to the file. If we don't have enough permissions, we may get a permission denied error.
Use the redirection operator >>
to append text to a file
The redirection operator takes the output >>
from bash
the command and appends it to another file. There are many ways to print text to standard output, but echo
and printf
are the most commonly used commands.
To append text to a file, we write a command that prints the text using any of the output commands and then append >>
the command with the operator followed by the name of the file to which the text needs to be appended.
echo "Hello World" >> abc.txt
This will abc.txt
add the text to the end of the file Hello World
.
If the file does not exist in the current working directory, the command will create an empty file and Hello World
write the text to it.
To interpret escape sequence characters, such as \n
, we use the -e option echo
of the command -e
.
echo -e "Hello World! \nThis is DelftStack" >> abc.txt
This will append the text
Hello World!
This is DelftStack
to the file abc.txt
.
To verify that the text was added, we can use cat
the command to view the contents of the file.
cat abc.txt
Output:
Hello World!
This is DelftStack
If the text has been added, we can see the text at the end of the file.
If we want more formatted text, we can use printf
the command to produce more formatted output.
printf "The path of shell interpreter is %s\n" $SHELL >> abc.txt
The path of shell interpreter is /bin/bash
It adds text to the file abc.txt
.
Use tee
the command to add text to the file
tee
is a command-line utility that takes input from standard input and writes it simultaneously to one or more files and to standard output.
By default, tee
the command overwrites the contents of the file. If we just want to append the text at the end of the file, we use the -p -a
or --append
-p option in the command.
echo "Hello World!" | tee -a abc.txt
Output:
Hello World!
It Hello World!
appends abc.txt
to the file and writes the text to the terminal's standard output.
If we get permission denied error while appending text to the file, we can tee
add sudo
the keyword in front of the command.
echo "Hello World!" | sudo tee -a abc.txt
If we don't want to see standard output, we can redirect the output to /dev/null
.
echo "Hello World!" | tee -a abc.txt >/dev/null
One benefit of using tee
the command is that we can use tee
the command to write text to multiple files at the same time. To write text to multiple files, we just need to separate all the files with spaces.
echo "Hello World!" | sudo tee -a abc.txt backup.txt
It appends the text to both abc.txt and backup.txt files.
For reprinting, please send an email to 1244347461@qq.com for approval. After obtaining the author's consent, kindly include the source as a link.
Related Articles
How to decompress x.tar.xz format files under Linux
Publish Date:2025/04/08 Views:186 Category:OPERATING SYSTEM
-
A lot of software found today is in the tar.xz format, which is a lossless data compression file format that uses the LZMA compression algorithm. Like gzip and bzip2, it supports multiple file compression, but the convention is not to compr
Summary of vim common commands
Publish Date:2025/04/08 Views:115 Category:OPERATING SYSTEM
-
In Linux, the best editor should be vim. However, the complex commands behind vim's powerful functions also make us daunted. Of course, these commands do not need to be memorized by rote. As long as you practice using vim more, you can reme
Detailed explanation of command return value $? in Linux
Publish Date:2025/04/08 Views:58 Category:OPERATING SYSTEM
-
? is a special variable. This variable represents the return value of the previous command. That is to say, when we run certain commands, these commands will return a code after running. Generally, if the command is successfully run, the re
Common judgment formulas for Linux script shell
Publish Date:2025/04/08 Views:159 Category:OPERATING SYSTEM
-
In shell script programming, predicates are often used. There are two ways to use predicates, one is to use test, and the other is to use []. Let's take a look at how to use these two methods through two simple examples. Example 1 # test –
Shell script programming practice - specify a directory to delete files
Publish Date:2025/04/08 Views:98 Category:OPERATING SYSTEM
-
Usually, in Linux system we need to frequently delete some temporary files or junk files. If we delete them one by one manually, it will be quite troublesome. I have also been learning shell script programming recently, so I tried to write
Use of Linux command at - set time to execute command only once
Publish Date:2025/04/08 Views:158 Category:OPERATING SYSTEM
-
This article mainly involves a knowledge point, which is the atd service. Similar to this service is the crond service. The functions of these two services can be similar to the two functional functions of javascript. Those who have learned
Use of Linux command crontab - loop execution of set commands
Publish Date:2025/04/08 Views:170 Category:OPERATING SYSTEM
-
Compared with at , which executes a command only once, crontab, which we are going to talk about in this article, executes the set commands in a loop. Similarly, the use of crontab requires the support of the crond service. The service is s
Linux practice - regularly delete files under the directory
Publish Date:2025/04/08 Views:198 Category:OPERATING SYSTEM
-
Since we want to delete the files under the directory regularly, we need to use the Linux crontab command. And the content format of each work routine is also introduced in the format of each crontab work. Similarly, we need to use shell sc
How to use the Linux file remote copy command scp
Publish Date:2025/04/08 Views:151 Category:OPERATING SYSTEM
-
Scp copies files between two hosts over the network, and the data is encrypted during transmission. Its underlying layer uses ssh for data transmission. And it has the same authentication mechanism and the same security level as ssh. When u