logo elektroda
logo elektroda
X
logo elektroda

Inspecting OBK logs with ncat - shortcut without the Web application

max4elektroda  Cool? (+4)
📢 Listen (AI):
Sometimes I like a short look in the logs of an OpenBeken device without starting the web app and open the "logs" menu.

Or I like to save or filter the logs over a longer period.

This can be easily achieved by the connecting to port 9000 of the device.

I learned about this feature from a comment from @miegapele on git and would like to share it here.


On linux you would probably use nc/netcat. So, e.g. when working on the Driver for DS1820, I used:

max@max-PC:~$ nc 192.168.0.37 9000 | grep DS1820
Info:CFG:DS1820 - asked for conversion - Pin 2
Info:CFG:DS1820 - Pin=2 temp=+19.37 
Info:CFG:DS1820 - High=1 Low=54 Val=310 Tc=1937  -- Read CRC=79 - calculated:79 
Info:CFG:DS1820 - asked for conversion - Pin 2
Info:CFG:DS1820 - Pin=2 temp=+19.37 
Info:CFG:DS1820 - High=1 Low=54 Val=310 Tc=1937  -- Read CRC=79 - calculated:79 
Info:CFG:DS1820 - asked for conversion - Pin 2
Info:CFG:DS1820 - Pin=2 temp=+19.37 
Info:CFG:DS1820 - High=1 Low=54 Val=310 Tc=1937  -- Read CRC=79 - calculated:79 
Info:CFG:DS1820 - asked for conversion - Pin 2
Info:CFG:DS1820 - Pin=2 temp=+19.37 
Info:CFG:DS1820 - High=1 Low=54 Val=310 Tc=1937  -- Read CRC=79 - calculated:79 
Info:CFG:DS1820 - asked for conversion - Pin 2
Info:CFG:DS1820 - Pin=2 temp=+19.37 
Info:CFG:DS1820 - High=1 Low=54 Val=310 Tc=1937  -- Read CRC=79 - calculated:79 
Info:CFG:DS1820 - asked for conversion - Pin 2
Info:CFG:DS1820 - Pin=2 temp=+19.37 
Info:CFG:DS1820 - High=1 Low=54 Val=310 Tc=1937  -- Read CRC=79 - calculated:79 
Info:CFG:DS1820 - asked for conversion - Pin 2
Info:CFG:DS1820 - Pin=2 temp=+19.37 




On Windows (if you didn't install WSL) my preferred "swiss army knife" for tasks like this is a windows port of "busybox" (I get the binary from here).

So you can just start a "shell" there with "busybox sh" and simply use the same command as above :-).

Screenshot of a Windows console showing the use of busybox to analyze device logs.

And if there are times, when you miss md5sum, awk or sed - it's also there in this useful little binary.

The access to the network log is not a full replacement for the log on the hardware UART. But I really like it, especially when "waiting" for entries in the log.

About Author
max4elektroda wrote 506 posts with rating 115 , helped 21 times. Been with us since 2024 year.

Comments

p.kaczmarek2 01 Oct 2024 21:58

Very nice method, even I was not aware about that! Still, it could be also good to have logs stored in LittleFS, maybe? At least for debugging purposes and with some filtering, so we don't wear out flash... [Read more]

divadiow 01 Oct 2024 22:53

Cool! You could also do it with PowerShell # Prompt the user to enter the IP address $ip = Read-Host -Prompt "Enter the IP address to get logs from" $port = 9000 $client = New-Object System.Net.Sockets.TcpClient($ip,... [Read more]

jkwim 14 Oct 2024 18:55

I have CYGWIN in my Windows machine. Added nc and now it becomes very handy to filter log entries in real time. $ nc 192.168.1.250 9000 | awk '/SENSOR NOT/ {print}' Error:CMD:cmd... [Read more]

morgan_flint 17 Nov 2024 18:36

I've just tried this with PuTTy and works like a charm: https://obrazki.elektroda.pl/6384735500_1731864901_thumb.jpg https://obrazki.elektroda.pl/2622612300_1731864923_thumb.jpg [Read more]

%}