<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter the logs from WSA CLI in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/filter-the-logs-from-wsa-cli/m-p/4103346#M9079</link>
    <description>&lt;P&gt;Hi Jack,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try to filter the logs with the source IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Quick command to filter the access logs:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;wsa&amp;gt; grep "IP_Address" accesslogs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2. Another way is:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;wsa.lab&amp;gt; grep&lt;/P&gt;
&lt;P&gt;Currently configured logs:&lt;BR /&gt;1. "accesslogs" Type: "Access Logs" Retrieval: FTP Poll&lt;BR /&gt;2. "amp_logs" Type: "AMP Engine Logs" Retrieval: FTP Poll&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;49. "webcat_logs" Type: "Web Categorization Logs" Retrieval: FTP Poll&lt;BR /&gt;50. "webrootlogs" Type: "Webroot Logs" Retrieval: FTP Poll&lt;BR /&gt;51. "webtapd_logs" Type: "Webtapd Logs" Retrieval: FTP Poll&lt;BR /&gt;52. "welcomeack_logs" Type: "Welcome Page Acknowledgement Logs" Retrieval: FTP Poll&lt;BR /&gt;Enter the number of the log you wish to grep.&lt;BR /&gt;[]&amp;gt; 1&lt;/P&gt;
&lt;P&gt;Enter the regular expression to grep.&lt;BR /&gt;[]&amp;gt; &lt;STRONG&gt;IP_address&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Do you want this search to be case insensitive? [Y]&amp;gt;&lt;/P&gt;
&lt;P&gt;Do you want to search for non-matching lines? [N]&amp;gt;&lt;/P&gt;
&lt;P&gt;Do you want to tail the logs? [N]&amp;gt; &lt;STRONG&gt;Y (if you want to see real-time logs)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Do you want to paginate the output? [N]&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="st"&gt;Note that WSA uses Unix epoch (or Unix time) format,&amp;nbsp;sometimes it makes difficult to filter the logs. You can use any online epoch time converter tools to convert the time to filter the logs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The easiest way to filter the transaction is using Web Tracking option, there are lots of predefined filter available which you can use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you would like to see the time stamp for each transaction in human-readable form in access logs then you can also consider adding %G in the custom field option under accesslogs settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Mohit&lt;/P&gt;</description>
    <pubDate>Mon, 15 Jun 2020 13:55:21 GMT</pubDate>
    <dc:creator>Mohit Soni</dc:creator>
    <dc:date>2020-06-15T13:55:21Z</dc:date>
    <item>
      <title>Filter the logs from WSA CLI</title>
      <link>https://community.cisco.com/t5/web-security/filter-the-logs-from-wsa-cli/m-p/4096765#M9065</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have access to WSA CLI and I am searcing any possible deny of traffic based on a specific source IP address:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. "access_logs" Type: "Access Logs" Retrieval: FTP Poll&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you want this search to be case insensitive? [Y]&amp;gt;&lt;/P&gt;&lt;P&gt;Do you want to search for non-matching lines? [N]&amp;gt;&lt;/P&gt;&lt;P&gt;Do you want to tail the logs? [N]&amp;gt; &amp;lt;&amp;lt; If i leave as it is I will have a huge ammount of logs, butif I select `Y` I do not have any logs&lt;/P&gt;&lt;P&gt;Do you want to paginate the output? [N]&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know if I can filter the huge logs I get for instance for the last month&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Jack&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jun 2020 10:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/filter-the-logs-from-wsa-cli/m-p/4096765#M9065</guid>
      <dc:creator>giacomo12</dc:creator>
      <dc:date>2020-06-03T10:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Filter the logs from WSA CLI</title>
      <link>https://community.cisco.com/t5/web-security/filter-the-logs-from-wsa-cli/m-p/4103346#M9079</link>
      <description>&lt;P&gt;Hi Jack,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try to filter the logs with the source IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Quick command to filter the access logs:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;wsa&amp;gt; grep "IP_Address" accesslogs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2. Another way is:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;wsa.lab&amp;gt; grep&lt;/P&gt;
&lt;P&gt;Currently configured logs:&lt;BR /&gt;1. "accesslogs" Type: "Access Logs" Retrieval: FTP Poll&lt;BR /&gt;2. "amp_logs" Type: "AMP Engine Logs" Retrieval: FTP Poll&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;49. "webcat_logs" Type: "Web Categorization Logs" Retrieval: FTP Poll&lt;BR /&gt;50. "webrootlogs" Type: "Webroot Logs" Retrieval: FTP Poll&lt;BR /&gt;51. "webtapd_logs" Type: "Webtapd Logs" Retrieval: FTP Poll&lt;BR /&gt;52. "welcomeack_logs" Type: "Welcome Page Acknowledgement Logs" Retrieval: FTP Poll&lt;BR /&gt;Enter the number of the log you wish to grep.&lt;BR /&gt;[]&amp;gt; 1&lt;/P&gt;
&lt;P&gt;Enter the regular expression to grep.&lt;BR /&gt;[]&amp;gt; &lt;STRONG&gt;IP_address&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Do you want this search to be case insensitive? [Y]&amp;gt;&lt;/P&gt;
&lt;P&gt;Do you want to search for non-matching lines? [N]&amp;gt;&lt;/P&gt;
&lt;P&gt;Do you want to tail the logs? [N]&amp;gt; &lt;STRONG&gt;Y (if you want to see real-time logs)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Do you want to paginate the output? [N]&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="st"&gt;Note that WSA uses Unix epoch (or Unix time) format,&amp;nbsp;sometimes it makes difficult to filter the logs. You can use any online epoch time converter tools to convert the time to filter the logs.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The easiest way to filter the transaction is using Web Tracking option, there are lots of predefined filter available which you can use.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you would like to see the time stamp for each transaction in human-readable form in access logs then you can also consider adding %G in the custom field option under accesslogs settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Mohit&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 13:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/filter-the-logs-from-wsa-cli/m-p/4103346#M9079</guid>
      <dc:creator>Mohit Soni</dc:creator>
      <dc:date>2020-06-15T13:55:21Z</dc:date>
    </item>
  </channel>
</rss>

