lnav/docs/source/commands.rst

133 lines
4.8 KiB
ReStructuredText
Raw Normal View History

.. role:: lnavcmd(code)
:language: lnav
:class: highlight
2013-08-01 15:56:00 +00:00
.. _commands:
2020-05-07 14:08:59 +00:00
Commands
========
2013-08-01 15:56:00 +00:00
Commands provide access to some of the more advanced features in **lnav**, like
:ref:`filtering<filtering>` and
:ref:`"search tables"<search_tables>`. You can activate the command
prompt by pressing the :kbd:`:` key. At the prompt, you can start typing
in the desired command and/or double-tap :kbd:`TAB` to activate
auto-completion and show the available commands. To guide you in the usage of
the commands, a help window will appear above the command prompt with an
explanation of the command and its parameters (if it has any). For example,
the screenshot below shows the help for the :code:`:open` command:
.. figure:: open-help.png
:align: center
2022-08-07 17:00:34 +00:00
:figwidth: 50%
Screenshot of the online help for the :code:`:open` command.
In addition to online help, many commands provide a preview of the effects that
the command will have. This preview will activate shortly after you have
finished typing, but before you have pressed :kbd:`Enter` to execute the
command. For example, the :code:`:open` command will show a preview of the
first few lines of the file given as its argument:
.. figure:: open-preview.png
:align: center
Screenshot of the preview shown for the :code:`:open` command.
The :lnavcmd:`:filter-out pattern` command is another instance where the preview behavior
can help you craft the correct command-line. This command takes a PCRE2 regular
expression that specifies the log messages that should be filtered out of the
view. The preview for this command will highlight the portion of the log
messages that match the expression in red. Thus, you can be certain that the
regular expression is matching the log messages you are interested in before
committing the filter. The following screenshot shows an example of this
preview behavior for the string "launchd":
.. figure:: filter-out-preview.png
:align: center
2022-08-07 17:00:34 +00:00
Screenshot showing the preview for the :code:`:filter-out` command.
Any errors detected during preview will be shown in the status bar right above
the command prompt. For example, an attempt to open an unknown file will show
an error message in the status bar, like so:
.. figure:: open-error.png
:align: center
Screenshot of the error shown when trying to open a non-existent file.
2014-03-28 13:55:24 +00:00
2020-05-07 14:08:59 +00:00
.. tip::
2014-03-28 13:55:24 +00:00
2020-05-07 14:08:59 +00:00
Note that almost all commands support TAB-completion for their arguments.
So, if you are in doubt as to what to type for an argument, you can double-
tap the :kbd:`TAB` key to get suggestions. For example, the
TAB-completion for the :code:`filter-in` command will suggest words that are
currently displayed in the view.
.. note:: The following commands can be disabled by setting the ``LNAVSECURE``
environment variable before executing the **lnav** binary:
- :code:`:open`
- :code:`:pipe-to`
- :code:`:pipe-line-to`
- :code:`:write-*-to`
2020-05-07 14:08:59 +00:00
This makes it easier to run **lnav** in restricted environments without the
risk of privilege escalation.
I/O Commands
------------
Anonymization
^^^^^^^^^^^^^
Anonymization is the process of removing identifying information from content
to make it safer for sharing with others. For example, an IP address can
often be used to uniquely identify an entity. Substituting all instances of
a particular IP with the same dummy value would remove the identifying data
without losing statistical accuracy. **lnav** has built-in support for
anonymization through the :code:`--anonymize` flag on the :code:`:write-*`
collection of commands. While the anonymization process should catch most
:IPv4 Addresses: Are replaced with addresses in the :code:`10.0.0.0/8` range.
:IPv6 Addresses: Are replaced with addresses in the :code:`2001:db8::/32` range.
:URL User Names: Are replaced with a random animal name.
:URL Passwords: Are replaced with a hash of the input password.
:URL Hosts: Are replaced with a random name under the example.com domain.
:URL Paths: Are recursively examined for substitution.
:URL Query Strings: Are recursively examined for substitution.
:URL Fragments: Are recursively examined for substitution.
:Paths: Are recursively examined for substitution.
:Credit Card Numbers: Are replaced with a 16 digit hash of the input number.
:MAC Addresses: Are replaced with addresses in the :code:`00:00:5E:00:53:00` range.
:Hex Dumps: Are replaced with a hash of the input replicated to the size of input.
:Email User Names: Are replaced with a random animal name.
:Email Host Names: Are replaced with a random name under the example.com domain.
:Words: Are replaced with a random word with a matching case style.
:Quoted Strings: Are recursively examined for substitution.
:UUID: Are replaced with a hash of the input.
:XML Attribute Values: Are recursively examined for substitution.
2020-05-07 14:08:59 +00:00
Reference
---------
.. include:: ../../src/internals/cmd-ref.rst