How to view the unix logs in windows ??


 
Thread Tools Search this Thread
Top Forums UNIX for Advanced & Expert Users How to view the unix logs in windows ??
# 1  
Old 05-15-2009
How to view the unix logs in windows ??

Hi !

I have a FTP site, where I softlinked my server log file.

Now I want to view the logs in IE [ ie, windows ] as I do in unix [tail -f ]

Some kind of free tool should be there, Can somebody provide me a pointer.

Thanks.
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Help with Shell Script to View Logs

Hi I'm very new to unix shell scripting. Im also new here in this forum. I'm a SQL Server DBA but I'm slowly learning Oracle and Sybase DB. Our Oracle and Sybase are on Unix platforms. Im slowly learning Linux Admin and Shell Scripting to automate tasks. I'm writing a script to view DB error... (4 Replies)
Discussion started by: Ricky777
4 Replies

2. Solaris

How to view audit logs in Solaris?

Does anyone know if there is software written to view the audit logs generated by Solaris? I am referring the the logs created by auditd. It produces an unreadable log. I am familiar with auditreduce and praudit, but I am looking for something that produces a report, much like logwatch looks at the... (4 Replies)
Discussion started by: brownwrap
4 Replies

3. UNIX for Dummies Questions & Answers

how to view dynamically updated managed server logs from the same putty window

Hi, I want to know how we can view two or three logs which are dynamically getting updated from a single/same putty window with tail commnad. Thanks. (7 Replies)
Discussion started by: reachsudha
7 Replies

4. Shell Programming and Scripting

Logs access in windows fetching the data from a unix server

How I can get the logs that are getting stored in specific location in unix server through an Apache web server installed in unix server? Requirement is to access the logs through the URL in windows browser without any access. (1 Reply)
Discussion started by: alvida
1 Replies

5. Shell Programming and Scripting

Shell script to view logs of a server

Please share a shell script to collect logs of a server (like cpu utilization, memory etc) for a perticular time interval by giving date, time and server name as input. (1 Reply)
Discussion started by: abhishek27
1 Replies

6. UNIX for Dummies Questions & Answers

View Files In Linux/Windows

I have a bunch of text files that currently reside on a red hat linux machine. I'd like to zip them up and copy them to a windows machine. I'm not sure about how to do this though since I believe zipping files up creates a totally different format that will be unreadable on windows. Is there any... (3 Replies)
Discussion started by: doublek321
3 Replies

7. UNIX for Dummies Questions & Answers

view access logs telenet

Hello one of my sites i host is doing somewhat well in the search engines, and i would like to watch the raw log files while looged in with telenet is there a way to do this. thanx Mike (2 Replies)
Discussion started by: whothought1
2 Replies

8. UNIX for Dummies Questions & Answers

How can I view a Windows 2003 folder in Unix?

Is it possible to do something like this? Have a folder shared on a Windows machine and then be able to view it under a Unix server? Sort of like a reverse Samaba share? (5 Replies)
Discussion started by: LordJezo
5 Replies
Login or Register to Ask a Question
grokevt(7)																grokevt(7)

NAME
GrokEVT - a collection of scripts built for reading windows event log files. DESCRIPTION
This document serves as an overview to using the GrokEVT suite of tools. Please see the man pages for each tool for specific command-line options. USING
Using GrokEVT on a set of windows partitions is a three stage process. One must first mount the partitions and configure the system's pro- file. Next, grokevt-builddb(1) must be run to extract the necessary information from these partitions. Finally, grokevt-parselog(1) may be run to use this information to convert the logs to something useful. Mounting and configuration: This is the most labor-intensive step of the process. There are several technical reasons why this cannot be simpler, and it is unlikely many will be resolved anytime soon. (Sorry, blame the vendor who produced these logs that you wish to convert.) First mount the partitions used by your windows system. Specifically, mount any partition that has software installed on it. (You can probably get away with not mounting ones with no software, or no software that produces events in the event log.) This includes windows shares, if you have any with software installed on them. The key point when mounting partitions or shares, is that you must mount them with case-insensitive filenames. To do this in Linux, you should be able to use the NTFS option 'posix=0', or with type vfat this appears to be the default. On FreeBSD, one can use the -i option with NTFS and mount_ntfs, but this hasn't been tested. (More research is necessary in this area. Please let me know if case-insensitivity is available on other *NIXes and what the options are.) All of this, of course, depends on your version of mount and related software. See mount(8) for more information. Once you have all necessary filesystems mounted for your windows image, you need to configure GrokEVT so it knows where everything is. If you look in the main configuration directory, (by default at '/usr/local/etc/grokevt') you'll find a sub-directory called 'systems'. In there is a set of system configuration profiles. Each directory under 'systems' represents the configuration for a single windows host. You may create directories here of any name. It is suggested you use the host name of the system you wish to extract logs from. By default, there will be one system configuration there already, named 'example'. I suggest you make a full copy of this, and edit it from there to create your own configuration: # cd /usr/local/etc/grokevt/systems # cp -r example mysystem Now that you have your own configuration, take a look at the files under this directory: path-vars/%SystemRoot% system-registry drives/c: drives/d: Each file represents a single configuration setting. The first line of every file is the setting, all others are ignored. You should start by configuring your drive letters. These drive letters need to map to the *NIX path of the drives. So, if you mounted your C: partition under '/mnt/win/c', then you should do the following: echo /mnt/win/c > drives/c: This will of course, overwrite that file with your actual mount point for the C: drive. Do this for all drives mounted on your windows sys- tem. Next, you need to configure your %SystemRoot% path variable. Since the registry often references files in relation to this variable, we need to know where it is on your system. Typically, on W2K this should be 'C:WINNT'. On other windows systems it is often 'C:Windows'. This path may be referenced as a full windows path (with drive letters) or as a *NIX path. Finally, you need to set the path of the system registry. This path must be a *NIX path, and not a windows path. It should be located under your %SystemRoot%. For instance, if you mount a W2K machine's C: on '/mnt/win/c', this path will probably be: /mnt/win/c/WINNT/sys- tem32/config/system This will vary from system to system, but if you have ever done any forensics, you should be able to find the correct path pretty quickly. Using grokevt-builddb(1): Once you get past the mounting and configuration step, you're in good shape. To extract the necessary information from the system you just mounted, you just need to decide where you want to store the output database. Based on the example paths above, one could run grokevt- builddb(1) like so: grokevt-builddb mysystem /var/db/grokevt/mysystem Or something similar. This step will take some time, as a lot of files need to be parsed. You will likely get some warnings about missing DLLs and possibly service removals. This is normal if software on the windows system failed to clean up the registry correctly when it was un-installed. You might want to record this information though, if later you find you are missing a lot of message templates in your log output. Now that you have finished this step, you have fully extracted all information needed to interpret the event logs. Using grokevt-parselog(1): To run grokevt-parselog(1), you must specify the database directory that you generated with grokevt-builddb(1). Initially, you will want to find out what event logs were extracted by running: grokevt-parselog -l /var/db/grokevt/mysystem This will print out all available event log types, based on information found previously in the system's registry. Then you may view one of those logs simply by dropping the -l option, and adding it's name as the second parameter. For instance, to view the 'System' log: grokevt-parselog /var/db/grokevt/mysystem System See the grokevt-parselog(1) man page for further options. Finding and Parsing Log Fragments: One may find it useful to parse deleted log files or fragments of log files found in a system's RAM dump. A special-purpose tool, grokevt- findlogs(1) is included in this distribution which makes finding log fragments easy. It can find even a single log record by itself with a relatively low rate of false positives. Suppose one has a file, dump.img, which contains an image of a system's RAM, or perhaps the unallocated blocks of a filesystem (as might be produced by The SleuthKit's dls(1)). One could search this dump by running: grokevt-findlogs dump.img This will produce a listing of all hits in the file, which may include header records, cursor records, or log records, offsets and contigu- ity information to help one eliminate any false positives. Supposing we found a log fragment in this dump that we're interested in, we could simply use dd(1) or some other tool to carve out the rel- evant data in to a file named fragment.evt. We'd then need to find a way to associate this log with a set of message templates. This is what grokevt-addlog(1) is for. Let's take a guess that the fragment.evt was originally a part of System log. We would add the log into our previously built message database by running: grokevt-addlog /var/db/grokevt/mysystem fragment.evt System-fragment System Finally, we can parse the log by simply specifying the newly imported name with grokevt-parselog(1): grokevt-parselog /var/db/grokevt/mysystem System-fragment If we found that most of the log entries didn't have associated message templates (which would result in lots of warnings to stderr), we would be pretty that fragment.evt really wasn't based on a System log. Simply re-importing it as another log type (and a different name) would let us parse it again as if it were of another type. Please see the grokevt-findlogs(1) and grokevt-addlog(1) man pages for more information. CREDITS
This man page written by Timothy D. Morgan LICENSE
Please see the file "LICENSE" included with this software distribution. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MER- CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License version 2 for more details. SEE ALSO
grokevt-addlog(1) grokevt-builddb(1) grokevt-findlogs(1) grokevt-parselog(1) grokevt-ripdll(1) reglookup(1) File Conversion Utilities 20 March 2008 grokevt(7)