Solved

how to extract lines with specific key word from a 30 G firewall log file.

Posted on 2014-03-10
1
272 Views
Last Modified: 2014-03-25
I got a ftp drop error frequently on my gentran edi server. the error is as below:

Sent: Sunday, March 09, 2014 6:08 PM
To: EDI Group
Subject: Error in BaseEDI_Get_SCNCentre PID=4976630

System of Origin: IBM Sterling B2B Integrator 5.2 .
An ERROR has occurred in process BaseEDI_Get_SCNCentre.
Process ID: 4976630
Error Description: FTPGetError_Get
.
The errored file has been written to /u1/gis5.2/install/_BaseEDI/inboundErrors with filename 4976630.FTPGetError_Get.20140309180589_089.txt.
.
More details can be found in the GIS process Monitor.


My EDI coworker doubts if the firewall blocked the ftp traffic from time to time. My firewall is an old Cisco PIX 507 firewall with PIX Version 7.2(4). I am using Cisco ASDM 5.2 for PIX to check the firewall status. I saved the firewall log file to a linux box.

When I was checking the log file, it has a size of 30 G per day, I would like to know if there is a way I can customize the log file so that I capture only the records relates to that server?

Also, if I want to process that big log file, what linux command can I use to extract the lines with specific word.

thank you.
firewall-log-file-analysis.png
0
Comment
Question by:Jason Yu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 38

Accepted Solution

by:
Gerwin Jansen, EE MVE earned 500 total points
ID: 39918882
>> Also, if I want to process that big log file, what linux command can I use to extract the >> lines with specific word.

grep word bigfile
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question