Open firebird-automations opened 6 years ago
Commented by: @mkubecek
From networking point of view, string pattern matching is not natural for IP addresses. IP addresses are numbers, 32- or 128-bit, and are organized in hierarchical way. I would therefore rather suggest to use a list of network ranges, e.g. "172.16.0.0/15,192.168.22/23".
Submitted by: @pavel-zotov
It will be *extremely* useful (for real practice purpuces) to have ability catch via TRACE all kinds of actions that are done on one or many hosts if weknow their IP addresses. This can be implemented just as already existing filters, i.e. by adding parameters like "include_ip_filter" and "exclude_ip_filter".
For example, if one need to log activity for all machines that are included in sub-networks with IP masks: 1) 172.16.*, 172.15.*, 2) 192.168.21.* and 3) 192.168.22.*. - we can use following pattern:
include_ip_filter = '(172.((16)|(15)).%)|(192.168.((21)|(22)).%)'
2 hvlad: PLEASE, consider to add this ability in FB 3.x. This is need that really often occurs in practice.