<div dir="ltr"><div><div>Sorry All, It appears the linux server and windows and upper/lower case link bit me.<br><br>
<a href="http://www.projecttesn.org/ckrparse4rtmt.exe" target="_blank">http://www.projecttesn.org/<wbr>CKRParse4rtmt.exe</a><br><br></div>I seem to be running into the same problem as the person with the AXL app was doing and antivirus. Is there a way to let the program run without being signed?<br><br></div>Thanks<br> <br></div><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Mar 30, 2018 at 9:26 PM, Kent Roberts <span dir="ltr"><<a href="mailto:kent@fredf.org" target="_blank">kent@fredf.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word;line-break:after-white-space"><div>Hi all. </div><div><br></div><div>So I am one of the few people that have worked with CUCM since Cisco started with CallManager, back in 2000’s. As such, there is one thing that I have always hated, and that was reading the logs cause there is just soooooo much stuff there.</div><div><br></div><div>I wrote a set of scrips a couple years ago, that is designed to parse the RTMT logs from CUCM and return only data based on the call.</div><div><br></div><div>After a few people begging for a copy of it, I decided to make it a real program.</div><div><br></div><div>If you find it useful, please contribute to my tax deductible non-profit. (Facebook has an easy donation program. <a href="Https://www.facebook.com/projecttesn" target="_blank">Https://www.facebook.com/<wbr>projecttesn</a>)</div><div><br></div><div><br></div><div>If you have Ideas for other stuff you would like to see let me know, I will see what I can do.</div><div><br></div><div><br></div><div>So the program works or should work like the following. (It is beta right now, as I am trying to make it self contained instead of scrips)</div><div><br></div><div>Put in the ANI or DNIS. (Right now I know the extension on cucm works, not sure about the other side yet). Or the SIP ID. (This might be hit or miss at the moment)</div><div><br></div><div>Push the button to start. Select the location of the RTMT files. (Gz’s are ok, it will unpack them) </div><div><br></div><div>It will create a -output on the end of the path you provide with the data.</div><div><br></div><div>It will collect the calllog files, and put the revenant data into a file. Once it finds matches it will start to assemble the data into a file, and copy the SDL files that are tied to it.</div><div><br></div><div>The goal is to get only the data related to the call provided, so tracking down what went on is much easier.</div><div><br></div><div>Once complete, you can or should be able to load the file with translatorx and have a smaller file to work with.</div><div><br></div><div>Find it here. Please note, I have restricted the running time, as it will need some updates. Please feel free to help me make it better. If its negative feedback, please don’t bother.</div><br><div><a href="http://www.projecttesn.org/ckrparse4rtmt.exe" target="_blank">http://www.projecttesn.org/<wbr>ckrparse4rtmt.exe</a></div><div><br></div><div>FYI. This is running with a test CERT, and right now not signed, so windows defender may pop up and Symantec will have a cow…. Put should not be any worries.</div></div></blockquote></div><br></div>