Seaching the protocol

<< Click to Display Table of Contents >>

Navigation:  Introduction > Protocol Analyser >

Seaching the protocol

The log analysis can also be used to get an overview of the processes in !MC5, however, it should be used much more frequently to search for a specific data transmission or data processing. For this purpose there are several tools to quickly find specific operations in the logs.

 

loganalyzer_007

Search for file names in all loaded logs.

 

If the exact, or at least rough time of the searched process is known, then the easiest way to its protocol probably leads over the left tree view in which all processes of the loaded protocols are listed sorted by time. The protocol evaluation always loads the protocol currently used by !MC5 at startup. Further protocol backups can be loaded at any time, so that a larger period can be viewed at the same time.

 

loganalyzer_008

Loading of additional log backups is possible at any time.

 

The number of displayed processes can be further limited:

 

The display can be limited to processes that concern a specific partner. In the selection list, only those partners are displayed for which there are also processes in one of the loaded logs.

It is possible to search for processes that contain a specific file name. To do this, the second search field in the toolbar must be set to File search. You can then enter a file name in the input field.

It is possible to search specifically for operations with a certain ID. Each operation, such as individual connections or the processing of individual files, is assigned an internal ID in !MC5. These IDs are also shown in the detail display. The ID search can be used, for example, to search for other operations that involve a very specific file, rather than all files with the same name. To do this, the second search field in the toolbar must be set to ID search.

 

loganalyzer_009

Targeted search in the log for the internal ID of a specific file.