Re: [squid-users] "deep" analysis of some request

From: Amos Jeffries <squid3_at_treenet.co.nz>
Date: Fri, 09 Sep 2011 12:59:50 +1200

On 09/09/11 07:02, alexus wrote:
> Is there a way to analyze somehow deeper what's going on with this?
>
> tss# grep -c 'http://ecs.amazonaws.com/onca/xml?' access.log
> 3065
> tss# grep 'http://ecs.amazonaws.com/onca/xml?' access.log | tail -1
> 66.55.138.70 - - [08/Sep/2011:18:59:26 +0000] "GET
> http://ecs.amazonaws.com/onca/xml? HTTP/1.1" 200 135861 "-"
> "Mozilla/4.1" TCP_MISS:DIRECT
> tss#
>
> I'd like to capture it somehow so I can look what kind of request is that.
>

Data retrieval from an amazon online API. You have stripped the query
parameters from the logged information so there is no way to tell how
many different requests are being bunched together in that 3065 count.

The above line count has about the same meaning as:
   grep -c 'http://ecs.amazonaws.com/' access.log

(and probably a similar count.)

Amos

-- 
Please be using
   Current Stable Squid 2.7.STABLE9 or 3.1.15
   Beta testers wanted for 3.2.0.11
Received on Fri Sep 09 2011 - 00:59:55 MDT

This archive was generated by hypermail 2.2.0 : Fri Sep 09 2011 - 12:00:02 MDT