Solved

using findstr to output

Posted on 2010-11-13
4
1,875 Views
Last Modified: 2012-05-10
The other day I used a command that worked fine, but its output required me to do some hands-on work in Excel to get exactly the output I wanted to copy/paste into an email.

Here was the command (sample IP)...

ping -a 10.10.10.10 | findstr /i "Pinging" >> .\hostnames.txt

I am looking for a way to grep or findstr only the hostname. Do you know if I can do this simply using the old CMD tools?

Thanks!
JohnD
0
Comment
Question by:johndarby
  • 2
  • 2
4 Comments
 
LVL 7

Accepted Solution

by:
fhmc earned 500 total points
Comment Utility
could try the following via batch or command line:

ping -a 10.10.10.10| find /i "pinging" > %temp%\pingtest.txt
for /f "tokens=2" %a in (%temp%\pingtest.txt) do echo %a >> .\hostnames.txt


or

you could try:

ping -a 10.10.10.10| for /f "tokens=1,2" %a in ('find /i "Pinging"') do echo %b >> .\hostnames.txt

note1 -  a double quotation mark followed by a single quotation mark follows the word Pinging.
note2 - if you plan to execute either suggestion above via a batch file you will need to add an extra % in front of the 'for' variables.

ex.  for /f "tokens=2" %%a...  etc.
0
 
LVL 7

Assisted Solution

by:fhmc
fhmc earned 500 total points
Comment Utility
you could also directly pipe the command line output to the clipboard:

ping -a 10.10.10.10| for /f "tokens=1,2" %a in ('find "Pinging"') do echo %b| "clip"

you could then create a new e-mail message and CTRL-V or SHIFT-INS the hostname directly into the body.
0
 
LVL 1

Author Comment

by:johndarby
Comment Utility
The clipboard...never knew how to do that. Thanks bro!
0
 
LVL 1

Author Closing Comment

by:johndarby
Comment Utility
You rock, my friend...thank you!
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
mergeTwo  challenge 13 70
countX 22 68
mapBully challenge 6 88
SQL400 max size 5 52
This is an explanation of a simple data model to help parse a JSON feed
This is about my first experience with programming Arduino.
The viewer will be introduced to the member functions push_back and pop_back of the vector class. The video will teach the difference between the two as well as how to use each one along with its functionality.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now