X-Git-Url: http://www.privoxy.org/gitweb/?p=privoxy.git;a=blobdiff_plain;f=tools%2Fprivoxy-log-parser.pl;h=3265ac72f5e226b9edb4a55f814e2792206712e3;hp=5bc6d7923fa8dee9c85d9adcfe2974ab2a65c9b4;hb=3671a38a6e948b959befb8ca23698e35b039b065;hpb=567f181b6aeee7c03aa8873cfdb3f1671ae05052 diff --git a/tools/privoxy-log-parser.pl b/tools/privoxy-log-parser.pl index 5bc6d792..3265ac72 100755 --- a/tools/privoxy-log-parser.pl +++ b/tools/privoxy-log-parser.pl @@ -23,7 +23,7 @@ # hash key as input. # - Add --compress and --decompress options. # -# Copyright (c) 2007-2020 Fabian Keil +# Copyright (c) 2007-2022 Fabian Keil # # Permission to use, copy, modify, and distribute this software for any # purpose with or without fee is hereby granted, provided that the above @@ -43,15 +43,17 @@ use warnings; use Getopt::Long; use constant { - PRIVOXY_LOG_PARSER_VERSION => '0.9.2', + PRIVOXY_LOG_PARSER_VERSION => '0.9.4', # Feel free to mess with these ... DEFAULT_BACKGROUND => 'black', # Choose registered colour (like 'black') DEFAULT_TEXT_COLOUR => 'white', # Choose registered colour (like 'black') HEADER_DEFAULT_COLOUR => 'yellow', REGISTER_HEADERS_WITH_THE_SAME_COLOUR => 1, + CLI_OPTION_DETECT_INACTIVITY => 0, CLI_OPTION_DEFAULT_TO_HTML_OUTPUT => 0, CLI_OPTION_TITLE => 'Privoxy-Log-Parser in da house', + CLI_OPTION_INACTIVITY_THRESHOLD => 100, CLI_OPTION_KEEP_DATE => 0, CLI_OPTION_NO_EMBEDDED_CSS => 0, CLI_OPTION_NO_MSECS => 0, @@ -62,6 +64,7 @@ use constant { CLI_OPTION_STRICT_CHECKS => 0, CLI_OPTION_UNBREAK_LINES_ONLY => 0, CLI_OPTION_URL_STATISTICS_THRESHOLD => 0, + CLI_OPTION_PASSED_REQUEST_STATISTICS_THRESHOLD => 0, CLI_OPTION_HOST_STATISTICS_THRESHOLD => 0, CLI_OPTION_SHOW_COMPLETE_REQUEST_DISTRIBUTION => 0, @@ -179,6 +182,7 @@ sub prepare_our_stuff() { 'pcrs-delimiter' => 'light_red', 'ignored' => 'light_red', 'action-bits-update' => 'light_red', + 'http-downgrade' => 'light_red', 'configuration-line' => 'red', 'content-type' => 'yellow', 'HOST' => HEADER_DEFAULT_COLOUR, @@ -643,7 +647,7 @@ sub highlight_request_line($) { my ($method, $url, $http_version); #GET http://images.sourceforge.net/sfx/icon_warning.gif HTTP/1.1 - if ($rl =~ m/Invalid request/) { + if ($rl =~ m/Invalid request/ or $rl =~ m/Failed reading chunked client body/) { $rl = h('invalid-request') . $rl . h('Standard'); @@ -1077,6 +1081,17 @@ sub handle_loglevel_re_filter($) { $c .= $req{$t}{'content_size_change'} . $h{'Standard'} . ")"; $content = $c; + } elsif ($c =~ m/^filtering request body from client /) { + + # filtering request body from client 127.0.0.1 (size 958) with 'null-filter' produced 0 hits (new size 958). + + $c =~ s@(?<=from client )([^\s]+)@$h{'ip-address'}$1$h{'Standard'}@; + $c =~ s@(?<=\(size )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c =~ s@([^\s]+?)(\'? produced)@$h{'filter'}$1$h{'Standard'}$2@; + $c =~ s@(?<=\(new size )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c =~ s@(?<=produced )(\d+)(?= hits)@$h{'Number'}$1$h{'Standard'}@; + $content = $c; + } elsif ($c =~ /\.{3}$/ and $c =~ m/^(?:re_)?filtering \'?(.*?)\'? \(size (\d*)\) with (?:filter )?\'?([^\s]*?)\'? ?\.{3}$/) { @@ -1244,7 +1259,38 @@ sub handle_loglevel_tagging($) { $c =~ s@(?<=^Tagger \')([^\']*)@$h{'tagger'}$1$h{'Standard'}@; $c =~ s@(?<=added tag \')([^\']*)@$h{'tag'}$1$h{'Standard'}@; $c =~ s@(?<=Action bits )(updated)@$h{'action-bits-update'}$1$h{'Standard'}@; + + } elsif ($c =~ /^Enlisting tag/) { + + # Enlisting tag 'forward-directly' for client 127.0.0.1. + + $c =~ s@(?<=tag \')([^\']*)@$h{'tag'}$1$h{'Standard'}@; + $c = highlight_matched_host($c, '[^\s]+(?=\.$)'); + + } elsif ($c =~ /^Tag/) { + + # Tag 'change-tor-socks-port' for client 127.0.0.1 expired 1 seconds ago. Deleting it. + + $c =~ s@(?<=Tag \')([^\']*)@$h{'tag'}$1$h{'Standard'}@; + $c =~ s@(?<=expired )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c = highlight_matched_host($c, '(?<=client )[^\s]+'); + + } elsif ($c =~ /^Evaluating/) { + + # Evaluating tag 'change-tor-socks-port' for client 127.0.0.1. End of life 1613162302. + + $c =~ s@(?<=tag \')([^\']*)@$h{'tag'}$1$h{'Standard'}@; + $c = highlight_matched_host($c, '(?<=client )[^\s]+(?=\.)'); + $c =~ s@(?<=life )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ /^Client tag/) { + + # Client tag 'forward-directly' matches + + $c =~ s@(?<=tag \')([^\']*)@$h{'tag'}$1$h{'Standard'}@; + } + return $c; } @@ -1305,6 +1351,17 @@ sub handle_loglevel_redirect($) { # Percent-encoding redirect URL: http://www.example.org/\x02 $c = highlight_matched_url($c, '(?<=redirect URL: ).*'); + } elsif ($c =~ m/^Rewrite detected:/) { + + # Rewrite detected: GET http://10.0.0.2:88/blah.txt HTTP/1.1 + # Rewrite detected: GET https://www.electrobsd.org/CommonJS/ajax/libs/jquery/3.4.1/jquery.min.js HTTP/1.1 + $c = highlight_matched_request_line($c, '(?<=^Rewrite detected: ).*'); + + } elsif ($c =~ m/^Rewritten request line results in downgrade to http/) { + + # Rewritten request line results in downgrade to http + $c =~ s@(downgrade)@$h{'http-downgrade'}$1$h{'Standard'}@; + } else { found_unknown_content($c); @@ -1410,6 +1467,11 @@ sub handle_loglevel_crunch($) { # [...]&filter... [too long, truncated] $content = highlight_matched_pattern($content, 'request_', '^.*(?=\.\.\. \[too long, truncated\]$)'); + } elsif ($content =~ m/Certificate error:/) { + + # Certificate error: ASN date error, current date after: https://expired.badssl.com/ + $content = highlight_matched_pattern($content, 'request_', 'https://.*'); + } else { # Blocked: http://ads.example.org/ @@ -1563,9 +1625,10 @@ sub handle_loglevel_connect($) { $c = highlight_matched_host($c, '(?<=for )[^\s]+'); $c =~ s@(?<=in slot )(\d+)@$h{'Number'}$1$h{'Standard'}@; - } elsif ($c =~ m/^Socket/) { + } elsif ($c =~ m/^Socket \d+ (already|closed)/) { # Socket 16 already forgotten or never remembered. + # Socket 9 closed while waiting for client headers $c =~ s@(?<=Socket )(\d+)@$h{'Number'}$1$h{'Standard'}@; } elsif ($c =~ m/^The connection to/) { @@ -1582,7 +1645,7 @@ sub handle_loglevel_connect($) { $c =~ s@(?<=Assumed latency: )(\d+)@$h{'Number'}$1$h{'Standard'}@; } elsif ($c =~ m/^Stopped waiting for the request line/ or - $c =~ m/^No request line on socket \d received in time/ or + $c =~ m/^No request line on socket \d+ received in time/ or $c =~ m/^The client side of the connection on socket \d/) { # Stopped waiting for the request line. Timeout: 121. @@ -1804,7 +1867,11 @@ sub handle_loglevel_connect($) { } elsif ($c =~ m/^Dropping the client connection on socket/) { # Dropping the client connection on socket 71. The server connection has not been established yet. + # Dropping the client connection on socket 23 with server socket 24 connected to \ + # www.reddit.com. The forwarder has changed. $c =~ s@(?<=on socket )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c =~ s@(?<=server socket )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c = highlight_matched_host($c, '(?<=connected to )[^ ]+(?=\.)'); } elsif ($c =~ m/^The client socket \d+ has become unusable while the server/) { @@ -1812,6 +1879,64 @@ sub handle_loglevel_connect($) { $c =~ s@(?<=client socket )(\d+)@$h{'Number'}$1$h{'Standard'}@; $c =~ s@(?<=server socket )(\d+)@$h{'Number'}$1$h{'Standard'}@; + } elsif ($c =~ m/^The last \d+ bytes of the request body have been read/) { + + # The last 12078 bytes of the request body have been read + $c =~ s@(?<=The last )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Flushed \d+ bytes of request body/) { + + # Flushed 3153 bytes of request body + $c =~ s@(?<=Flushed )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Complete client request followed by/) { + + # Complete client request followed by 59 bytes of pipelined data received. + $c =~ s@(?<=followed by )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^The peer notified us that the connection on socket/) { + + # The peer notified us that the connection on socket 11 is going to be closed + $c =~ s@(?<=socket )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Client socket \d is no longer usable/) { + + # Client socket 7 is no longer usable. The server socket has been closed. + $c =~ s@(?<=socket )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Socket timeout \d+ reached/) { + + # Socket timeout 3 reached: http://127.0.0.1:20000/no-filter/chunked-content/36 + $c =~ s@(?<=timeout )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c = highlight_matched_url($c, "(?<=reached: ).*") + + } elsif ($c =~ m/^Prepared to read up to /) { + + # Prepared to read up to 157 bytes of encrypted request body from the client. + $c =~ s@(?<=up to )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Forwarding \d+ bytes /) { + + # Forwarding 157 bytes of encrypted request body. + $c =~ s@(?<=Forwarding )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Buffering encrypted client body/) { + + # Buffering encrypted client body. Prepared to read up to 2236 bytes. + $c =~ s@(?<=up to )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^The last \d+ bytes of the encrypted request body have been read/) { + + # The last 6945 bytes of the encrypted request body have been read. + $c =~ s@(?<=The last )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Reducing the chunk offset from/) { + + # Reducing the chunk offset from 1096654 to 32704 after discarding 1063950 bytes to make room in the buffer. + $c =~ s@(?<=\d to )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c =~ s@(?<=offset from )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c =~ s@(?<=after discarding )(\d+)@$h{'Number'}$1$h{'Standard'}@; + } elsif ($c =~ m/^Looks like we / or $c =~ m/^Unsetting keep-alive flag/ or $c =~ m/^No connections to wait/ or @@ -2045,6 +2170,23 @@ sub handle_loglevel_error($) { # Didn't receive data in time: a.fsdn.com:443 $c =~ s@(?<=in time: )(.*)@$h{'destination'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Sending data on socket \d+ over TLS/) { + + # Sending data on socket 33 over TLS/SSL failed: no TLS/SSL errors detected + $c =~ s@(?<=on socket )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^Chunk size \d+ exceeds buffered data left/) { + + # Chunk size 291 exceeds buffered data left. Already digested 69894 of 69957 buffered bytes. + $c =~ s@(?<=size )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c =~ s@(?<=digested )(\d+)@$h{'Number'}$1$h{'Standard'}@; + $c =~ s@(?<=of )(\d+)@$h{'Number'}$1$h{'Standard'}@; + + } elsif ($c =~ m/^The socks connection timed out after/) { + + # The socks connection timed out after 60 seconds. + $c =~ s@(?<=after )(\d+)@$h{'Number'}$1$h{'Standard'}@; } # XXX: There are probably more messages that deserve highlighting. @@ -2078,7 +2220,14 @@ sub gather_loglevel_clf_stats($) { unless (defined $method) { # +0200] "Invalid request" 400 0 return if ($content =~ m/^[+-]\d{4}\] "Invalid request"/); - print("Failed to parse: $content\n"); + # +0100] "Failed reading chunked client body" 400 0 + return if ($content =~ m/^[+-]\d{4}\] "Failed reading chunked client body"/); + # +0100] "GET https://securepubads.g.doubleclick.net/gampad/ads?gd[...]... [too long, truncated] + if ($content =~ m/\[too long, truncated\]$/) { + print("Skipped LOG_LEVEL_CLF message that got truncated by Privoxy. Statistics will be inprecise.\n"); + } else { + print("Failed to parse: $content\n"); + } return; } $stats{'method'}{$method}++; @@ -2096,17 +2245,25 @@ sub gather_loglevel_clf_stats($) { } sub gather_loglevel_request_stats($$) { - my $c = shift; + my $request_url = shift; my $thread = shift; our %stats; + our %cli_options; $stats{requests}++; + if ($cli_options{'passed-request-statistics-threshold'} != 0) { + # If the request get blocked we'll decrement + # in gather_loglevel_crunch_stats() + chomp $request_url; + $stats{'passed-request-url'}{$request_url}++; + } } sub gather_loglevel_crunch_stats($$) { my $c = shift; my $thread = shift; our %stats; + our %cli_options; $stats{crunches}++; @@ -2126,6 +2283,15 @@ sub gather_loglevel_crunch_stats($$) { # Connection failure: http://127.0.0.1:8080/ $stats{'connection-failure'}++; } + if ($cli_options{'passed-request-statistics-threshold'} != 0) { + $c =~ m/^[^:]+: (.*)/; + if ($stats{'passed-request-url'}{$1}) { + $stats{'passed-request-url'}{$1}-- ; + if ($stats{'passed-request-url'}{$1} == 0) { + delete($stats{'passed-request-url'}{$1}); + } + } + } } @@ -2291,7 +2457,7 @@ sub print_stats() { get_percentage($requests_total, $stats{'server-keep-alive'}) . ")\n"; print "New outgoing connections: " . $new_connections . " (" . get_percentage($requests_total, $new_connections) . ")\n"; - print "Reused connections: " . $stats{'reused-connections'} . " (" . + print "Reused server connections: " . $stats{'reused-connections'} . " (" . get_percentage($requests_total, $stats{'reused-connections'}) . "; server offers accepted: " . get_percentage($stats{'server-keep-alive'}, $stats{'reused-connections'}) . ")\n"; @@ -2307,7 +2473,7 @@ sub print_stats() { ")\n"; print "Client connections: " . $stats{'closed-client-connections'} . "\n"; if ($stats{'content-size-total'}) { - print "Bytes of content transfered to the client: " . $stats{'content-size-total'} . "\n"; + print "Bytes of content transferred to the client: " . $stats{'content-size-total'} . "\n"; } my $lines_printed = 0; print "Client requests per connection distribution:\n"; @@ -2346,7 +2512,7 @@ sub print_stats() { print "HTTP version distribution unknown. No CLF message parsed yet. Is 'debug 512' enabled?\n"; } if (exists $stats{'status-code'}) { - print "HTTP status codes:\n"; + print "HTTP status codes according to 'debug 512' (status codes sent by the server may differ):\n"; foreach my $status_code (sort {$stats{'status-code'}{$b} <=> $stats{'status-code'}{$a}} keys %{$stats{'status-code'}}) { printf "%8d : %-8d\n", $stats{'status-code'}{$status_code}, $status_code; } @@ -2367,6 +2533,19 @@ sub print_stats() { } } + if ($cli_options{'passed-request-statistics-threshold'} == 0) { + print "Passed request statistics are disabled. Increase --passed-request-statistics-threshold to enable them.\n"; + } else { + print "Requested requests that were passed:\n"; + foreach my $passed_url (sort {$stats{'passed-request-url'}{$b} <=> $stats{'passed-request-url'}{$a}} + keys %{$stats{'passed-request-url'}}) { + if ($stats{'passed-request-url'}{$passed_url} < $cli_options{'passed-request-statistics-threshold'}) { + print "Skipped statistics for passed URLs below the treshold.\n"; + last; + } + printf "%d : %s\n", $stats{'passed-request-url'}{$passed_url}, $passed_url; + } + } if ($cli_options{'host-statistics-threshold'} == 0) { print "Host statistics are disabled. Increase --host-statistics-threshold to enable them.\n"; } else { @@ -2552,7 +2731,7 @@ sub parse_loop() { sub stats_loop() { - my ($day, $time_stamp, $msecs, $thread, $log_level, $content); + my ($day, $time_stamp, $thread, $log_level, $content); my $strict_checks = cli_option_is_set('strict-checks'); my %log_level_handlers = ( 'Connect:' => \&gather_loglevel_connect_stats, @@ -2600,6 +2779,75 @@ sub stats_loop() { } +# Convert a timestamp like 18:07:28.733 into milliseconds +sub time_stamp_to_msecs($) { + my $time_stamp = shift; + + if ($time_stamp =~ /(\d\d):(\d\d):(\d\d)\.(\d{3})/) { + my ($hours, $minutes, $seconds, $msecs) = ($1, $2, $3, $4); + + $msecs += $seconds * 1000; + $msecs += $minutes * 1000 * 60; + $msecs += $hours * 1000 * 60 * 60; + + return $msecs; + } + return undef; +} + +sub inactivity_detection_loop() { + + our %cli_options; + my ($date, $time_stamp, $thread, $log_level, $content); + my ($msecs, $previous_msecs, $inactivity); + my $inactivity_threshold = $cli_options{'inactivity-threshold'}; + my $previous_date; + my $log_messages_out_of_order = 0; + + while (<>) { + ($date, $time_stamp, $thread, $log_level, $content) = split(/ /, $_, 5); + + next if (not defined($log_level)); + next if ($time_stamp eq "-"); + $msecs = time_stamp_to_msecs($time_stamp); + unless (defined $msecs) { + print "Failed to convert $time_stamp into milliseconds\n"; + print "$_"; + next; + } + unless (defined $previous_msecs) { + $previous_msecs = $msecs; + $previous_date = $date; + print "$_"; + next; + } + $inactivity = $msecs - $previous_msecs; + if ($inactivity < 0) { + # This can happen if there's a high load in which case + # a Privoxy thread may be moved off schedule between + # getting the timestamp for the log message and actually + # writing it. + $log_messages_out_of_order++; + } + if ($inactivity > $inactivity_threshold) { + if ($previous_date eq $date) { + print "Detected inactivity: $inactivity msecs\n"; + } else { + # While we could include the date in the timestamp + # we currently don't. + print "Detected date change. Timestamp difference ignored.\n"; + } + } + print "$_"; + $previous_msecs = $msecs; + $previous_date = $date; + } + if ($log_messages_out_of_order) { + print "At least $log_messages_out_of_order messages were written out of the chronological order.\n"; + print "This can result in false positives. Consider sorting the log first.\n"; + } +} + sub unbreak_lines_only_loop() { my $log_messages_reached = 0; while (<>) { @@ -2636,6 +2884,8 @@ sub VersionMessage { sub get_cli_options() { our %cli_options = ( + 'detect-inactivity' => CLI_OPTION_DETECT_INACTIVITY, + 'inactivity-threshold' => CLI_OPTION_INACTIVITY_THRESHOLD, 'html-output' => CLI_OPTION_DEFAULT_TO_HTML_OUTPUT, 'title' => CLI_OPTION_TITLE, 'keep-date' => CLI_OPTION_KEEP_DATE, @@ -2649,10 +2899,13 @@ sub get_cli_options() { 'url-statistics-threshold' => CLI_OPTION_URL_STATISTICS_THRESHOLD, 'unbreak-lines-only' => CLI_OPTION_UNBREAK_LINES_ONLY, 'host-statistics-threshold'=> CLI_OPTION_HOST_STATISTICS_THRESHOLD, + 'passed-request-statistics-threshold' => CLI_OPTION_PASSED_REQUEST_STATISTICS_THRESHOLD, 'show-complete-request-distribution' => CLI_OPTION_SHOW_COMPLETE_REQUEST_DISTRIBUTION, ); GetOptions ( + 'detect-inactivity' => \$cli_options{'detect-inactivity'}, + 'inactivity-threshold=i' => \$cli_options{'inactivity-threshold'}, 'html-output' => \$cli_options{'html-output'}, 'title' => \$cli_options{'title'}, 'keep-date' => \$cli_options{'keep-date'}, @@ -2666,6 +2919,7 @@ sub get_cli_options() { 'unbreak-lines-only' => \$cli_options{'unbreak-lines-only'}, 'url-statistics-threshold=i'=> \$cli_options{'url-statistics-threshold'}, 'host-statistics-threshold=i'=> \$cli_options{'host-statistics-threshold'}, + 'passed-request-statistics-threshold=i' => \$cli_options{'passed-request-statistics-threshold'}, 'show-complete-request-distribution' => \$cli_options{'show-complete-request-distribution'}, 'version' => sub { VersionMessage && exit(0) }, 'help' => \&help, @@ -2687,6 +2941,8 @@ sub help() { print << " EOF" Options and their default values if they have any: + [--detect-innactivity] + [--inactivity-threshold $cli_options{'inactivity-threshold'}] [--host-statistics-threshold $cli_options{'host-statistics-threshold'}] [--html-output] [--no-embedded-css] @@ -2698,6 +2954,7 @@ Options and their default values if they have any: [--statistics] [--unbreak-lines-only] [--url-statistics-threshold $cli_options{'url-statistics-threshold'}] + [--passed-request-statistics-threshold $cli_options{'passed-request-statistics-threshold'}] [--title $cli_options{'title'}] [--version] see "perldoc $0" for more information @@ -2715,18 +2972,18 @@ sub main() { set_background(DEFAULT_BACKGROUND); prepare_our_stuff(); - print_intro(); - # XXX: should explicitly reject incompatible argument combinations if (cli_option_is_set('unbreak-lines-only')) { unbreak_lines_only_loop(); } elsif (cli_option_is_set('statistics')) { stats_loop(); + } elsif (cli_option_is_set('detect-inactivity')) { + inactivity_detection_loop(); } else { + print_intro(); parse_loop(); + print_outro(); } - - print_outro(); } main(); @@ -2737,7 +2994,8 @@ B - A parser and syntax-highlighter for Privoxy log messages =head1 SYNOPSIS -B [B<--html-output>] +B [B<--detect-inactivity>] [B<--inactivity-threshold msecs>] +[B<--html-output>] [B<--no-msecs>] [B<--no-syntax-higlighting>] [B<--statistics>] [B<--shorten-thread-ids>] [B<--show-ineffective-filters>] [B<--url-statistics-threshold>] [B<--version>] @@ -2764,25 +3022,37 @@ will hide the "filter foo caused 0 hits" message. =head1 OPTIONS +[B<--detect-inactivity>] Instead of syntax highlighting, detect periods +of log inactivity of more than the amount of milliseconds specified with +the B<--inactivity-threshold> option. Mainly useful for debugging. + [B<--host-statistics-threshold>] Only show the request count for a host if it's above or equal to the given threshold. If the threshold is 0, host statistics are disabled. -[B<--html-output>] Use HTML and CSS for the syntax highlighting. If this option is +[B<--html-output>] Use HTML and CSS when syntax highlighting. If this option is omitted, ANSI escape sequences are used unless B<--no-syntax-highlighting> is active. This option is only intended to make embedding log excerpts in web pages easier. It does not escape any input! +[B<--inactivity-threshold msecs>] Specifies the number of milliseconds between +log messages to consider inactivity when running in [B<--detect-inactivity>] +mode. + [B<--keep-date>] Don't remove the date when printing highlighted log messages. Useful when parsing multiple log files at once. -[B<--no-msecs>] Don't expect milisecond resolution +[B<--no-msecs>] Don't expect millisecond resolution [B<--no-syntax-highlighting>] Disable syntax-highlighting. Useful when the filtered output is piped into less in which case the ANSI control codes don't work, or if the terminal itself doesn't support the control codes. +[B<--passed-request-statistics-threshold>] Only show the request count for +a passed requests if it's above or equal to the given threshold. If the +threshold is 0, passed request statistics are disabled. + [B<--shorten-thread-ids>] Shorten the thread ids to a three-digit decimal number. Note that the mapping from thread ids to shortened ids is created at run-time and thus varies with the input. @@ -2865,7 +3135,7 @@ Many settings can't be controlled through command line options yet. =head1 SEE ALSO -privoxy(1) +privoxy(8) =head1 AUTHOR