Open oxr463 opened 3 years ago
For the Log Collector output, extract the archive it generates and then check all of file extensions.
tree | awk '{ split($0,a,"."); print a[2] }'
that awk code prints out in the terminal blanks with a few lines of "pem, conflist, txt, log, 1-7" so I used grep to find lab2, ubuntu and 137.184.84.136:2379.
that awk code prints out in the terminal blanks with a few lines of "pem, conflist, txt, log, 1-7"
Yeah, the few lines it spit out are file extentions, e.g., PEM keys
so I used grep to find lab2, ubuntu and 137.184.84.136:2379.
We have a hostname, an IPv4 address, and a port. What was that ubuntu
reference from? It's fine to have that.
21.1-19-gbad84ad4-0ubuntu1~20.04.2 /usr/lib/ubuntu-advantage/apt-esm-hook process-templates
most of it was 'ubuntu-s-4vcpu-8gb-amd-sfo3-01' (I think that was the main name of the droplet)
21.1-19-gbad84ad4-0ubuntu1~20.04.2 /usr/lib/ubuntu-advantage/apt-esm-hook process-templates
most of it was 'ubuntu-s-4vcpu-8gb-amd-sfo3-01' (I think that was the main name of the droplet)
Ah okay. Yeah, that's not PII.
Programs:
Scripts:
.log
.crt