首页
学习
活动
专区
圈层
工具
发布
社区首页 >问答首页 >Regular_expression巨蟒

Regular_expression巨蟒
EN

Stack Overflow用户
提问于 2016-04-21 16:43:53
回答 1查看 28关注 0票数 0

我有一个file.txt,我想检测在第一次出现Report之后出现的第一个udp:data

我使用了另一种方法,但我喜欢在Python中使用正则表达式。

代码语言:javascript
复制
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.236896000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.238663000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.240578000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.242551000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.244473000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.246256000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.248466000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.250880000 eth:ip:udp:adp  
192.168.1.13    232.0.4.3   Apr 20, 2016 17:17:04.252270000 eth:ip:igmp Membership Report group 232.0.4.3
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.252680000 eth:ip:udp:data Source port: 49152  Destination port: aesop
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.254618000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.256553000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.258349000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.260234000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.262228000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.264001000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.265925000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.268151000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.270116000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.271854000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.273810000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.275996000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.278013000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.279936000 eth:ip:udp:data Source port: 49152  Destination port: aesop
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.281734000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.283952000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.285879000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.287654000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.289663000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.291609000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.293337000 eth:ip:udp:adp  
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.295284000 eth:ip:udp:adp  
EN

回答 1

Stack Overflow用户

发布于 2016-04-21 16:52:32

这可以使用标准的外壳工具sedgrephead轻松完成。

代码语言:javascript
复制
$ sed -n '/Report/,$p' so.txt | grep udp:data | head -1
193.253.155.253 232.0.4.2   Apr 20, 2016 17:17:04.252680000 eth:ip:udp:data Source port: 49152  Destination port: aesop
票数 0
EN
页面原文内容由Stack Overflow提供。腾讯云小微IT领域专用引擎提供翻译支持
原文链接:

https://stackoverflow.com/questions/36764292

复制
相关文章

相似问题

领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档