ServersLog Analysis Basics Page 3

Log Analysis Basics Page 3

ServerWatch content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Converting Logs Into Useful Information

Log Types
Log Contents
Converting Logs Into Useful Information
Tracking Rather than Analysis

A host of log analysis tools translate a range of information based on the content of various logs into useful statistics, but it is actually relatively easy and straightforward to build your own. Although you can achieve this in any language, a scripting solution like Perl or Python is the most practical way to go because of its flexible data handling and built-in data types, like the Perl hash and Python dictionary.

Once you know the log format, pulling out the information is relatively easy. For example, here’s a very simple parser, in Perl, for a standard Apache access log:

while ()

    ($host,$ident,$user,$time,$url,$success,$bytes) = m/^(S+)s+(S+)s+(S+)s+
 [(.*)]s+"(.*)"s+(S+)s+(S+)[ ]*$/;
    ($day,$mon,$year,$hour,$min,$sec) = ($time =~ m%(..)/(...)/(....):(..):(..):(..)%);

Here’s a similar solution, in Python:

while 1:
    line = file.readline()
    if line:
        splitline = string.split(line)
        if len(splitline) 

Now that we have the basic fields, we can build counters and cross-referencing
systems to track and report on different elements. For example, to get a
list of the unique URLs accessed we can use a hash or dictionary to count them up. In
Perl this looks like:

$urlaccesses{$url} += 1;

while in Python we have to embed it into an try statement to set the initial value:

   urlaccess[loc] = urlaccess[loc] + 1
   urlaccess[loc] = 1

You can repeat the same basic process with any of the other values in the log that we’ve picked out through the field information. Once you’ve processed the log, simply output the summary information generated as the log was

If you just want to extract specific fields of information from a log to report on the contents and ignore the unnecessary parts, you can ignore the statistical gathering and use the parser as a reformatting tool. The syslog
extraction tool mentioned earlier, which extracts the mail source and destination, is written in Perl and looks like this:

my (%from, %to, $time, @id);
    if (m/
        if (m/(S+s+d+s+[d:]+).*?]s+(S+):.*?from=/)
            push @id, $2;
            $from{$2} = $3;
            $time{$2} = $1;
        if (m/]s+(S+):.*?to=(.*?),/)
            $to{$1} = $2;

We use a regular expression to pick out the necessary information, and in the process create a number of hashes that map the unique ID for each e-mail with its sender, destination, and date/time. To report on the information, we process through one of the
hashes and print out the corresponding data:

foreach my $id (@id)
    if (exists($to{$id}))
        $to{$id} =~ s/[]//g;
        my ($pre,$post) = split /@/,$to{$id};
        next if ($pre =~ /ESMTP/);
        next if ($from{$id} =~ /;
        my ($frombat,$fromaat) = split /@/,$from{$id};
        $frombat = substr($frombat,0,8);
        printf("%s %-40s => %sn",$time{$id},"$frombat@$fromaat",$pre);

This example also demonstrates how to filter the information or parts of the log we don’t like. In the above example, e-mail destined for the main administration account of the domain is ignored because we are interested only in user-related e-mails.

Finally, again as shown in the previous example, there is nothing to stop you from adjusting or reformatting source data to suit your requirements. In this case, we’ve removed the domain information in the destination address. In Weblogs, you might want to
filter the report to work only on a particular part of the site or perhaps ignore URLs other than those relating to HTML or CGI content (e.g., images and movies).

Tracking Rather Than Analysis

Summarizing logs and generating statistics is relatively easy — we’re talking about counting information based on a specific field’s content, such as the URL or host. This information is fine if all you want is basic counts and statistics, but it may not provide for all of your information needs, as occasionally you may want to trace the progress of a user, issue, or element through the history of the log.

If you are tracking an individual user through the system, for example, you would want to identify which pages he or she viewed. This type of analysis goes beyond the basic statistical systems highlighted here.
The basic processing and parsing of the log into an internal data structure remains
the same, but how you later analyse that information differs.

If you want to know more about tracking and more complex log analysis techniques, let
me know, and I’ll cover the topic in an upcoming article. Please include any specific
examples that you might want covered and provide details on the type of information you
want to track and report.

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends & analysis

Latest Posts

Related Stories