Hi Jack,
Try to filter the logs with the source IP address.
1. Quick command to filter the access logs:
wsa> grep "IP_Address" accesslogs
2. Another way is:
wsa.lab> grep
Currently configured logs:
1. "accesslogs" Type: "Access Logs" Retrieval: FTP Poll
2. "amp_logs" Type: "AMP Engine Logs" Retrieval: FTP Poll
.
.
.
.
49. "webcat_logs" Type: "Web Categorization Logs" Retrieval: FTP Poll
50. "webrootlogs" Type: "Webroot Logs" Retrieval: FTP Poll
51. "webtapd_logs" Type: "Webtapd Logs" Retrieval: FTP Poll
52. "welcomeack_logs" Type: "Welcome Page Acknowledgement Logs" Retrieval: FTP Poll
Enter the number of the log you wish to grep.
[]> 1
Enter the regular expression to grep.
[]> IP_address
Do you want this search to be case insensitive? [Y]>
Do you want to search for non-matching lines? [N]>
Do you want to tail the logs? [N]> Y (if you want to see real-time logs)
Do you want to paginate the output? [N]>
Note that WSA uses Unix epoch (or Unix time) format, sometimes it makes difficult to filter the logs. You can use any online epoch time converter tools to convert the time to filter the logs.
The easiest way to filter the transaction is using Web Tracking option, there are lots of predefined filter available which you can use.
If you would like to see the time stamp for each transaction in human-readable form in access logs then you can also consider adding %G in the custom field option under accesslogs settings.
Thanks,
Mohit