|
我用来分析maillog的,一般的,现在有个工具pflogsumm.pl但那个工具出来的结果不是我想要的,所以想自己写,我的目的是要看是否有邮件被一些大的邮件服务器比如163 、sina 、sohu等屏蔽掉,以下是自己写的非常简陋的脚本,如果大家有好的想法,或者工具,请不惜吝啬的教教俺吧 :)
- #!/bin/bash
- #
- mail163="CoremailSys:Your message was blocked by NetEase AntiSpam+"
- shonline="remote ip is forbidden"
- sohu="未收集"
- sina="未收集"
- mail21cn="Mail data refused by AISP"
- MAILLOG="/var/log/maillog"
- #grep "bounce" /var/log/maillog |grep ""
- echo -e "有 `grep -c "$mail163" $MAILLOG` 封邮件被 163 屏蔽了,日志如下:\n" >/tmp/bounce.log
- grep -m 1 "$mail163" $MAILLOG >>/tmp/bounce.log
- echo -e "有 `grep -c "$shonline" $MAILLOG` 封邮件被 citiz.net 屏蔽了,日志如下:\n" >>/tmp/bounce.log
- grep -m 1 "$shonline" $MAILLOG >>/tmp/bounce.log
- echo -e "有 `grep -c "$sohu" $MAILLOG` 封邮件被 sohu 屏蔽了,日志如下:\n" >>/tmp/bounce.log
- grep -m 1 "$sohu" $MAILLOG >>/tmp/bounce.log
- echo -e "有 `grep -c "$sina" $MAILLOG` 封邮件被 sina 屏蔽了,日志如下:\n" >>/tmp/bounce.log
- grep -m 1 "$sina" $MAILLOG >>/tmp/bounce.log
- echo -e "有 `grep -c "$mail21cn" $MAILLOG` 封邮件被 21cn 屏蔽了,日志如下:\n" >>/tmp/bounce.log
- grep -m 1 "$mail21cn" $MAILLOG >>/tmp/bounce.log
- cat /tmp/bounce.log |mail -s "mx4 report" [email]battosai@163.com[/email]
- rm -f /tmp/bounce.log
复制代码
上面的变量是一些邮件服务器的屏蔽所特有的字符串,还有那个未收集,是因为在下还不知道他的屏蔽信息是什么,大家知道的话也可以在帖子里告诉俺
下面是maillog一些信息
Sep 21 04:12:04 mx72 postfix/smtp[23204]: 43B25D400A: to=<cwkzxj@21cn.com>, relay=mta2.21cn.com[61.140.60.70], delay=0, status=bounced (host mta2.21cn.com[61.140.60.70] said: 553 Mail data refused by AISP, rule [2848737]. (in reply to end of DATA command))
Sep 21 09:16:22 mx72 postfix/smtp[24779]: F1142D403C: to=<eva-shen@citiz.net>, relay=mx.citiz.net[218.1.66.91], delay=1143, status=bounced (host mx.citiz.net[218.1.66.91] said: 559 remote ip is forbidden(#4.4.2) (in reply to RCPT TO command)) |
|