This document provides 10 examples for viewing huge log files in Unix systems. The examples demonstrate how to use commands like sed, head, tail, and grep to view specific lines, ranges of lines, growing logs in real-time, and search for patterns within logs. Commands like head and tail can display the first or last few lines, while sed, head, and tail together can view a range of lines. Grep can search for patterns and show matching lines plus surrounding context.
I am Simon M. I am a C Homework Expert at programminghomeworkhelp.com. I hold a Ph.D. in Programming, from Glasgow University, UK. I have been helping students with their homework for the past 10 years. I solve homework related to C.
Visit programminghomeworkhelp.com or email support@programminghomeworkhelp.com.
You can also call on +1 678 648 4277 for any assistance with C Homework.
I am Simon M. I am a C Homework Expert at programminghomeworkhelp.com. I hold a Ph.D. in Programming, from Glasgow University, UK. I have been helping students with their homework for the past 10 years. I solve homework related to C.
Visit programminghomeworkhelp.com or email support@programminghomeworkhelp.com.
You can also call on +1 678 648 4277 for any assistance with C Homework.
This presentation was presented at IT Audit & IT Security Meetup #4 at Indonesian Cloud, Jakarta.
The exploit development process was quite challenging and we think that it's worth to share.
For educational purposes only.
Exploit Development: EzServer Buffer Overflow oleh Tom Gregoryzakiakhmad
EzServer adalah video server yang dapat melakukan stream dengan kualitas full HD ke berbagai mesin. Buffer overflow ditemukan pada aplikasi EzServer yang berjalan pada port 8000. Attacker dapat mengirimkan sejumlah kode berbahaya ke port 8000 dan mendapatkan akses setara dengan hak akses aplikasi EzServer. Pada kesempatan ini, penulis akan memaparkan proses pembuatan exploit terhadap aplikasi EzServer menggunakan Python.
Tom Gregory: Security consultant at Spentera, Metasploit exploit developer/contributor.
http://www.python.or.id/2013/04/kopi-darat-komunitas-python-indonesia.html
The term "connected device” is typically used to mean a device or machine that is capable of connecting to a network - i.e. it can send and receive data via cellular, WiFi, or bluetooth connections. But is this really a connected device? Integration and interoperability are required for a device to be relevant in the Internet of Things, and Web APIs are the de facto standard enabling true connectivity. By looking at some successful implementations around connected “things”, we’ll understand the key requirements for an API First approach to IoT - including backend integration, mediation and security.
With Twilio, you can use the power of Whispir to go beyond SMS and build an engaging, memorable experiences using HTML5 apps in minutes. Who needs code when you can use Whispir's Rich Message Templates to create apps x10 faster.
Axway Managed Services for Exchange and Integration PlatformJean-Claude Bellando
Methods, tooling, highly skilled and experimented staff help Axway customers to increase productivity and maximize quality of service of the interaction layer.
How API became key to Whispir's growth strategy - Gartner AADI 2016Jordan Walsh
In 2012, Whispir launched the first version of an API to market. Visioned by the Product team, this project had no immediate customers, limited forecastable revenue model, and a huge knowledge gap in the wider team. Four years on, Whispir’s API has become a key element to helping Whispir customers solve business challenges, and ultimately helped Whispir achieve success in the market. Hear Jordan discuss Whispir’s journey with TIBCO Mashery to achieve their API success.
Slides for the talk on API Management given at jBCNConf 2016, the Java User Group Barcelona conference. Explanation about what are those tools and some explanations on Axway, 3Scale, Apigee, WSO2 and CA, with some final reflections about the proper focus for better API organisation.
This presentation was presented at IT Audit & IT Security Meetup #4 at Indonesian Cloud, Jakarta.
The exploit development process was quite challenging and we think that it's worth to share.
For educational purposes only.
Exploit Development: EzServer Buffer Overflow oleh Tom Gregoryzakiakhmad
EzServer adalah video server yang dapat melakukan stream dengan kualitas full HD ke berbagai mesin. Buffer overflow ditemukan pada aplikasi EzServer yang berjalan pada port 8000. Attacker dapat mengirimkan sejumlah kode berbahaya ke port 8000 dan mendapatkan akses setara dengan hak akses aplikasi EzServer. Pada kesempatan ini, penulis akan memaparkan proses pembuatan exploit terhadap aplikasi EzServer menggunakan Python.
Tom Gregory: Security consultant at Spentera, Metasploit exploit developer/contributor.
http://www.python.or.id/2013/04/kopi-darat-komunitas-python-indonesia.html
The term "connected device” is typically used to mean a device or machine that is capable of connecting to a network - i.e. it can send and receive data via cellular, WiFi, or bluetooth connections. But is this really a connected device? Integration and interoperability are required for a device to be relevant in the Internet of Things, and Web APIs are the de facto standard enabling true connectivity. By looking at some successful implementations around connected “things”, we’ll understand the key requirements for an API First approach to IoT - including backend integration, mediation and security.
With Twilio, you can use the power of Whispir to go beyond SMS and build an engaging, memorable experiences using HTML5 apps in minutes. Who needs code when you can use Whispir's Rich Message Templates to create apps x10 faster.
Axway Managed Services for Exchange and Integration PlatformJean-Claude Bellando
Methods, tooling, highly skilled and experimented staff help Axway customers to increase productivity and maximize quality of service of the interaction layer.
How API became key to Whispir's growth strategy - Gartner AADI 2016Jordan Walsh
In 2012, Whispir launched the first version of an API to market. Visioned by the Product team, this project had no immediate customers, limited forecastable revenue model, and a huge knowledge gap in the wider team. Four years on, Whispir’s API has become a key element to helping Whispir customers solve business challenges, and ultimately helped Whispir achieve success in the market. Hear Jordan discuss Whispir’s journey with TIBCO Mashery to achieve their API success.
Slides for the talk on API Management given at jBCNConf 2016, the Java User Group Barcelona conference. Explanation about what are those tools and some explanations on Axway, 3Scale, Apigee, WSO2 and CA, with some final reflections about the proper focus for better API organisation.
Open API and API Management - Introduction and Comparison of Products: TIBCO ...Kai Wähner
In October 2014, I had a talk at Jazoon in Zurich, Switzerland: "A New Front for SOA: Open API and API Management as Game Changer"
Open API represent the leading edge of a new business model, providing innovative ways for companies to expand brand value and routes to market, and create new value chains for intellectual property. In the past, SOA strategies mostly targeted internal users. Open APIs target mostly external partners.
This session introduces the concepts of Open API, its challenges and opportunities. API Management will become important in many areas, no matter if business-to-business (B2B) or business-to-customer (B2C) communication. Several real world use cases will discuss how to gain leverage due to API Management. The end of the session shows and compares API management products from different vendors such as TIBCO API Exchange, IBM, Apigee, 3scale, WSO2, MuleSoft, Mashery, Layer 7, Vordel
Critical Communications as a Service - Moving Whispir to the CloudAmazon Web Services
Whispir is transforming the way businesses communicate, from government departments, to banks and financial institutions, transport and logistics, global mining companies, retail stores and national fire and emergency services. Where lives are at risk, organisations around the world depend on Whispir. Consequently when Whispir was looking to move its infrastructure into the cloud, it had to find a solution that was immensely reliable, provided flexibility for its customers as they transitioned to new methodologies such as Apps and APIs and allowed Whispir to scale as it went through immense growth. Learn about Whispir’s two year journey as it moved to the cloud and delivered Critical Communication solutions at a global level, particularly throughout the ASEAN market.
Vijay Rangarajan, Partner Solutions Architect, Amazon Web Services, APAC
Anthony Russell, Director of iO, Whispir
Practical Example of grep command in unixJavin Paul
Grep command is one of most useful command in unix. having mastery in Grep and find means your productivity will be very high in unix. these grep command tutorials contains some examples of grep command in unix. It teaches how to leverage power of grep command in unix or linux. This presentation contains some of most useful example of grep command in unix.
for more tutorial see my blog
http://javarevisited.blogspot.com/2011/03/10-find-command-in-unix-examples-basic.html
http://javarevisited.blogspot.com/2011/06/10-examples-of-grep-command-in-unix-and.html
Coming from UNIX System V (IBM AIX & Sun Solaris) System Programmer background, I find Linux has become the defacto choice for many computing workload, from embedded device, mobile phone, mission critical systems, all the way to the largest Super Computer Cluster in the world.
While Linux has tried to maintain its UNIX design philosophy, its foundation has radically changed departing its UNIX root (bye init, hi systemd), towards modern Operating Systems which many of its features have equivalent of its UNIX counterparts - if not better (Linux Container vs AIX WPAR/Solaris Zones, Solaris ZFS vs Stratis, and many more).
This document is not meant to beat Red Hat comprehensive online manual, instead it was written to help me memorize many of advanced RHEL features and to help me pass hands on performance based EX200 exam.
This document is compiled from many sources, and written for anyone who would like to learn Red Hat Enterprise Linux 8, through taking EX200 exam in order to showing off RHCSA title to your friend :D
Happy Learning and may the force be with you!
Workshop on command line tools - day 1Leandro Lima
Slides of the I Workshop on command-line tools with the collaboration of CAG (Center for Applied Genomics - Children's Hospital of Philadelphia) bioinformatics analysts.
1st day
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
10 awesome examples for viewing huge log files in unix
1. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
Home
About
Free
eBook
Archives
Best
of
the
Blog
Contact
10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix
by
Ramesh
Natarajan
on
August
12,
2009
10 Like 7 Tweet 25
Viewing
huge
log
files
for
trouble
shooEng
is
a
mundane
rouEne
tasks
for
sysadmins
and
programmers.
In
this
arEcle,
let
us
review
how
to
effecEvely
view
and
manipulate
huge
log
files
using
10
awesome
examples.
Example
1:
Display
specific
lines
(based
on
line
number)
of
a
file
using
sed
command
View
only
the
specific
lines
menEoned
by
line
numbers.
Syntax: $ sed -n -e Xp -e Yp FILENAME
sed
:
sed
command,
which
will
print
all
the
lines
by
default.
-‐n
:
Suppresses
output.
-‐e
CMD
:
Command
to
be
executed
Xp:
Print
line
number
X
Yp:
Print
line
number
Y
FILENAME
:
name
of
the
file
to
be
processed.
1
of
10 18
Apr
12
7:30
pm
2. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
The
example
menEoned
below
will
print
the
lines
120,
145,
1050
from
the
syslog.
$ sed -n -e 120p -e 145p -e 1050p /var/log/syslog
In
the
following
example,
you
can
view
the
content
of
var/log/cron
from
line
number
101
to
110.
M
–
StarEng
line
number
N
–
Ending
line
number
Syntax: sed -n M,Np FILENAME
$ sed -n 101,110p /var/log/cron
Example
2:
Display
first
N
lines
of
a
file
using
head
command
This
example
displays
only
first
15
lines
of
/var/log/maillog
file.
Change
15
to
10
to
display
the
first
10
lines
of
a
log
file.
Syntax: head -n N FILENAME
$ head -n 15 /var/log/maillog
Example
3:
Ignore
last
N
lines
of
a
file
using
head
command
This
example
shows
how
to
ignore
the
last
N
lines,
and
show
only
the
remaining
lines
from
the
top
of
file.
The
following
example
will
display
all
the
lines
of
the
/var/log/secure
except
the
last
250
lines.
Syntax: head -n -N FILENAME
$ head -n -250 /var/log/secure
Example
4:
Display
last
N
lines
of
the
file
using
tail
command
This
example
displays
only
last
50
lines
of
/var/log/messages
file.
Change
50
to
100
to
display
the
last
100
lines
of
the
log
file.
Syntax: tail -n N FILENAME
$ tail -n 50 /var/log/messages
Example
5:
Ignore
first
N-‐1
lines
of
the
file
using
tail
command
This
example
shows
how
to
ignore
the
first
N-‐1
lines
and
show
only
the
remaining
of
the
lines.
The
following
example
ignores
the
1st
four
lines
of
the
/etc/xinetd.conf,
which
contains
only
the
comments.
Syntax: tail -n +N FILENAME
$ tail -n +5 /etc/xinetd.conf
defaults
{
instances = 60
log_type = SYSLOG authpriv
log_on_success = HOST PID
log_on_failure = HOST
cps = 25 30
}
includedir /etc/xinetd.d
Example
6:
View
growing
log
file
in
real
Mme
using
tail
command
2
of
10 18
Apr
12
7:30
pm
3. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
This
is
probably
one
of
the
most
used
command
by
sysadmins.To
view
a
growing
log
file
and
see
only
the
newer
contents
use
tail
-‐f
as
shown
below.
The
following
example
shows
the
content
of
the
/var/log/syslog
command
in
real-‐Eme.
Syntax: tail -f FILENAME
$ tail -f /var/log/syslog
Example
7:
Display
specific
lines
(based
on
line
number)
of
a
file
using
head
and
tail
command
The
example
below
will
display
line
numbers
101
–
110
of
/var/log/anaconda.log
file
M
–
StarEng
line
number
N
–
Ending
line
number
Syntax: cat file | tail -n +N | head -n (M-N+1)
$ cat /var/log/anaconda.log | tail -n +101 | head -n 10
cat
:
prints
the
whole
file
to
the
stdout.
tail
-‐n
+101
:
ignores
lines
upto
the
given
line
number,
and
then
start
prinEng
lines
aaer
the
given
number.
head
-‐n
10
:
prints
the
first
10
line,
that
is
101
to
110
and
ignores
the
remaining
lines.
Example
8:
Display
lines
matching
a
paPern,
and
few
lines
following
the
match.
The
following
example
displays
the
line
that
matches
“IniEalizing
CPU”
from
the
/var/log/dmesg
and
5
lines
immediately
aaer
this
match.
# grep "Initializing CPU#1" /var/log/dmesg
Initializing CPU#1
[Note: The above shows only the line matching the pattern]
# grep -A 5 "Initializing CPU#1" dmesg
Initializing CPU#1
Calibrating delay using timer specific routine.. 3989.96 BogoMIPS (lpj=1994982)
CPU: After generic identify, caps: bfebfbff 20100000 00000000 00000000
CPU: After vendor identify, caps: bfebfbff 20100000 00000000 00000000
monitor/mwait feature present.
CPU: L1 I cache: 32K, L1 D cache: 32K
[Note: The above shows the line and 5 lines after the pattern matching]
Refer
our
earlier
arEcle
Get
a
Grip
on
the
Grep!
–
15
PracEcal
Grep
Command
Examples
that
explains
how
to
use
grep
command.
As
explained
in
our
previous
grep
command
arEcle,
the
following
operaEons
are
possible.
Viewing
specific
lines
idenEfied
by
paWerns,
which
is
grep’s
default
funcEonality.
Viewing
only
the
matched
characters.
Viewing
N
lines
aaer
the
match
with
-‐A
opEon.
Viewing
N
lines
before
the
match
with
-‐B
opEon.
Viewing
N
lines
around
the
match
with
-‐C
opEon.
Example
9:
Displaying
specific
bytes
from
a
file.
The
following
example
explains
how
to
display
either
the
top
40
or
the
last
30
bytes
of
a
file.
Display
first
40
bytes
from
syslog.
3
of
10 18
Apr
12
7:30
pm
4. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
$ head -c40 /var/log/syslog
Display
last
30
bytes
from
syslog.
$ tail -c30 /var/log/syslog
Example
10:
Viewing
compressed
log
files
Aaer
a
specific
Eme
all
the
system
log
files
are
rotated,
and
compressed.
You
can
uncompress
it
on
the
fly,
and
pipe
the
output
to
another
unix
command
to
view
the
file
as
explained
below.
Refer
to
our
earlier
arEcle
The
Power
of
Z
Commands
–
Zcat,
Zless,
Zgrep,
Zdiff
Examples
Display
the
first
N
lines
of
a
compressed
file.
$ zcat file.gz | head -250
Display
the
last
N
lines
of
a
compressed
file.
$ zcat file.gz | tail -250
Ignoring
the
last
N
lines
of
a
compressed
file.
$ zcat file.gz | head -n -250
Ignoring
the
first
N
lines
of
a
compressed
file.
$ zcat file.gz | tail -n +250
Viewing
the
lines
matching
the
paWern
$ zcat file.gz | grep -A2 'error'
Viewing
parEcular
range
of
lines
idenEfied
by
line
number.
$ zcat file.gz | sed -n -e 45p -e 52p
If
you
need
to
return,
bookmark
this
page
at
del.icio.us
for
handy
reference.
10 Tweet 25 Like 7
Share
Comment
If
you
enjoyed
this
arMcle,
you
might
also
like..
1. 50
Linux
Sysadmin
Tutorials
Awk
IntroducEon
–
7
Awk
Print
Examples
2. 50
Most
Frequently
Used
Linux
Commands
(With
Examples)
Advanced
Sed
SubsEtuEon
Examples
3. Top
25
Best
Linux
Performance
Monitoring
and
Debugging
8
EssenEal
Vim
Editor
NavigaEon
Fundamentals
Tools
25
Most
Frequently
Used
Linux
IPTables
Rules
4. Mommy,
I
found
it!
–
15
PracEcal
Linux
Find
Command
Examples
Examples
Turbocharge
PuTTY
with
12
Powerful
Add-‐Ons
5. Linux
101
Hacks
2nd
EdiEon
eBook
4
of
10 18
Apr
12
7:30
pm
5. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
Tags:
Linux
Log
File
ManipulaEon,
Manage
Large
Unix
Log
Files,
View
Big
Linux
Files,
View
ParEal
Unix
Log
Files
{
15
comments…
read
them
below
or
add
one
}
1
Robert
Fisher
August
12,
2009
at
1:22
am
I
have
used
example
8
many
Emes
looking
for
a
response
to
a
specific
error.
I
have
also
used
the
tail
and
head
commands
as
well,
never
really
got
into
sed
so
much,
but
that
example
was
a
good
one.
Thanks
for
posEng
this
informaEon.
2
Nico
August
12,
2009
at
2:23
am
FYI:
Later
versions
of
less(1)
also
displays
.gz
files.
3
Nico
August
12,
2009
at
2:26
am
O
–
and
before
I
forget…
You
can
combine
some
of
the
soluEons,
for
example
combine
#6
and
#8:
$
tail
-‐f
/some/file
|
grep
keyword
This
will
give
you
only
the
lines
containing
the
keyword
as
it
gets
logged.
4
Nicholas
Sterling
August
12,
2009
at
2:40
am
How
about
sed
-‐n
300,350p
foo.log
Edit:
oops
—
how
embarrassing.
You
covered
it
and
I
missed
it
somehow.
5
Ashish
August
12,
2009
at
5:12
am
Great
post,
very
useful
arEcle.
6
Ronald
August
12,
2009
at
8:45
am
The
“sed
-‐n
101,110p
/var/log/cron”
approach
is
really
useful.
Although
I
have
to
say
that
I
wouldn’t
have
come
up
with
that
command
when
looking
at
the
sed-‐manual….
Sed:
-‐n,
–quiet,
–silent
suppress
automaEc
prinEng
of
paWern
space
p
Print
the
current
paWern
space.
7
Koen
De
Jaeger
August
13,
2009
at
9:27
am
5
of
10 18
Apr
12
7:30
pm
6. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
Very
nice!
8
Ramesh
Natarajan
August
14,
2009
at
8:56
am
@Robert,
Sed
can
do
lot
of
amazing
things.
But
it
is
hard
to
remember
those
on
top
of
your
head.
I
have
close
to
100
sed
command
that
solves
some
common
problem
in
a
notebook,
which
I
copy/paste
whenever
nedded.
Example
1
of
this
arEcle
is
in
that
list.
@Nico,
Thanks
for
poinEng
that
out.
Most
of
us
forget
that
grep
can
be
combined
with
“tail
-‐f ”.
This
indeed
can
be
very
handy.
@Nicholas,
Don’t
worry.
I’ve
done
similar
mistakes
several
Emes.
So,
I
can
related
to
it.
@Ashish,
@Koen
I’m
very
glad
that
you
found
this
arEcle
helpful.
@Ronald,
Yeah.
That
is
the
beauty
of
Unix.
We
can
do
amazing
things
with
linux
commands
that
were
not
even
clearly
menEoned
in
the
manual.
This
is
also
the
reason
Windows
admins
don’t
like
Linux,
as
they
hate
reading
manuals.
Even
when
they
read
the
manuals,
it
is
not
really
explained
very
well.
9
ShekarKCB
August
24,
2009
at
5:13
am
Nice
ArEcle,
uses
of
head,
tail,
and
sed
were
nicely
covered.
Thanks
for
the
same.
10
Ted
September
13,
2009
at
12:06
am
The
sed
Ep
I
will
use
for
sure
and
I
also
like
the
tail
-‐f
|grep.
Thank
you
Ramesh.
Any
chance
you
will
be
posEng
your
most
useful
sed
commands
from
your
note
book
at
some
Eme?
11
Bipin
May
6,
2010
at
5:49
am
Great
stuffs.
Thanks
for
sharing.
12
Brad
July
14,
2010
at
8:49
am
You
showed
zcat,
but
there
is
also
bzcat
and
lzcat,
and
probably
a
few
others.
so
if
you
have
a
file
that
is
bzip2ʹ′d
or
lzma’d,
then
you
can
use
bzcat
and
lzcat
respecEvely
to
display
them.
Also,
it
can
be
piped
to
the
less
command
so
it
can
be
scrolled
across
the
terminal.
13
anton
August
6,
2010
at
3:24
am
Is
the
following
any
beWer
(i.e.
more
efficient)
than
zcat
logfile.gz
|
tail
???
#
emulate
ztail
???
zless
+F
logfile.gz
14
logan
February
21,
2011
at
12:11
am
or
you
can
always
use
6
of
10 18
Apr
12
7:30
pm
7. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
cat
logfile
|
less
which
lets
you
scroll
through
it
OR
cat
logfile
|
less
|
grep
“PATTERN”
which
lets
you
scroll
through
matching
entries
I
search
for
sshd
for
my
auth.log
file
and
can
see
all
and
only
the
ssh
server
entries
15
ks
March
2,
2011
at
5:45
pm
A
nice
and
handy
tutorial.
A
few
comments
about
the
above
comment
by
@logan:
$
cat
logfile
|
less
has
the
same
effect
as
$
less
logfile
and
hence
the
use
of
the
pipe
is
redundant
(‘$’
stands
for
the
command
prompt).
Both
lets
you
scroll
through
the
logfile
and
search
for
paWern
using
‘/’
and
‘?’
(similar
to
vim).
However,
the
second
$
cat
logfile
|
less
|
grep
“PATTERN”
does
not
let
you
scroll,
but
the
following
$
grep
“PATTERN”
logfile
|
less
will
—
through
only
the
the
lines
that
has
the
matching
paWern
“PATTERN”.
Leave
a
Comment
Name
E-‐mail
Website
NoEfy
me
of
followup
comments
via
e-‐mail
Submit
Previous
post:
Google
Next-‐GeneraEon
Search
Engine
is
Already
Here
For
You
Next
post:
Ubuntu
Tips:
How
To
Setup
Dual
Monitor
7
of
10 18
Apr
12
7:30
pm
8. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
Sign
up
for
our
free
email
newsleWer
you@address.com
Sign Up
RSS
TwiWer
Facebook
Search
EBOOKS
8
of
10 18
Apr
12
7:30
pm
9. 10
Awesome
Examples
for
Viewing
Huge
Log
Files
in
Unix hWp://www.thegeekstuff.com/2009/08/10-‐awesome-‐examples...
POPULAR
POSTS
12
Amazing
and
EssenEal
Linux
Books
To
Enrich
Your
Brain
and
Library
50
UNIX
/
Linux
Sysadmin
Tutorials
50
Most
Frequently
Used
UNIX
/
Linux
Commands
(With
Examples)
How
To
Be
ProducEve
and
Get
Things
Done
Using
GTD
30
Things
To
Do
When
you
are
Bored
and
have
a
Computer
Linux
Directory
Structure
(File
System
Structure)
Explained
with
Examples
Linux
Crontab:
15
Awesome
Cron
Job
Examples
Get
a
Grip
on
the
Grep!
–
15
PracEcal
Grep
Command
Examples
Unix
LS
Command:
15
PracEcal
Examples
15
Examples
To
Master
Linux
Command
Line
History
Top
10
Open
Source
Bug
Tracking
System
Vi
and
Vim
Macro
Tutorial:
How
To
Record
and
Play
Mommy,
I
found
it!
-‐-‐
15
PracEcal
Linux
Find
Command
Examples
15
Awesome
Gmail
Tips
and
Tricks
15
Awesome
Google
Search
Tips
and
Tricks
RAID
0,
RAID
1,
RAID
5,
RAID
10
Explained
with
Diagrams
Can
You
Top
This?
15
PracEcal
Linux
Top
Command
Examples
Top
5
Best
System
Monitoring
Tools
Top
5
Best
Linux
OS
DistribuEons
How
To
Monitor
Remote
Linux
Host
using
Nagios
3.0
Awk
IntroducEon
Tutorial
–
7
Awk
Print
Examples
How
to
Backup
Linux?
15
rsync
Command
Examples
The
UlEmate
Wget
Download
Guide
With
15
Awesome
Examples
Top
5
Best
Linux
Text
Editors
Packet
Analyzer:
15
TCPDUMP
Command
Examples
The
UlEmate
Bash
Array
Tutorial
with
15
Examples
3
Steps
to
Perform
SSH
Login
Without
Password
Using
ssh-‐keygen
&
ssh-‐copy-‐id
Unix
Sed
Tutorial:
Advanced
Sed
SubsEtuEon
Examples
UNIX
/
Linux:
10
Netstat
Command
Examples
The
UlEmate
Guide
for
CreaEng
Strong
Passwords
6
Steps
to
Secure
Your
Home
Wireless
Network
Turbocharge
PuTTY
with
12
Powerful
Add-‐Ons
About
The
Geek
Stuff
My
name
is
Ramesh
Natarajan.
I
will
be
posEng
instrucEon
guides,
how-‐to,
troubleshooEng
Eps
and
tricks
on
Linux,
database,
hardware,
security
and
web.
My
focus
is
to
write
arEcles
that
will
either
teach
you
or
help
you
resolve
a
9
of
10 18
Apr
12
7:30
pm