Closed
Bug 997319
Opened 10 years ago
Closed 10 years ago
Data request: modules loaded into Firefox which match the pattern .*\.[0-9a-f]{12}\.dll
Categories
(Socorro :: Data request, task)
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: benjamin, Unassigned)
References
Details
Attachments
(2 files)
Socorro data request: To determine the risk of bug 973138, we'd like to get a list of modules loaded into Firefox/plugin crash reports which match this pattern: .*\.[0-9a-f]{12}\.dll (case-insensitive) This should catch the following modules from that bug: MovieMode.48CA2AEFA22D.dll SafeMonitor.5D8B1F66A294.dll WbShld.384B48E6DC83.dll But I'm interested in what other DLLs it catches. I tried to do this using a new custom ES search, but the searches timed out. I think it would be sufficient to do this over 4 days of recent crashes. Can I have these results by Friday?
Flags: needinfo?(chris.lonnen)
Comment 1•10 years ago
|
||
If you have an elasticsearch JSON query, I can run it against production data and give you the results. I filed bug 997816 about the timeout problem.
Comment 2•10 years ago
|
||
I used this stage super search page: https://crash-stats.allizom.org/search/custom/?date=%3E%3D2014-04-15&dump=~.*\.[0-9a-f]{12}\.dll&_facets=signature&_columns=signature&_columns=date to construct a raw ES query that I ran directly on the production ES servers. I got no results, not even the expected ones. Looking it over again.
Flags: needinfo?(chris.lonnen)
Comment 3•10 years ago
|
||
@adrian -- so "wildcard" queries don't appear to match a regex; they recognize * and ?. I tried changing the query to use a "regex" query type and got "No query registered for [regexp]". After chatting with Erik in irc I rewrote the query to matchall and use a regex filter. That had a similar error "No filter registered for [regexp]". Could you handle this bug and show me what eventually worked? I bet it would take you much less time than it has already taken me.
Updated•10 years ago
|
Whiteboard: [qa+][needsAutomation?]
Comment 4•10 years ago
|
||
@mbrandt -- this is probably outside the scope of general website functionality. We're running raw queries against the ES servers directly.
Comment 5•10 years ago
|
||
@lonnen - thank you for the clarification. Agreed
Whiteboard: [qa+][needsAutomation?]
Comment 7•10 years ago
|
||
Here are the results I found from production data: MovieMode.48CA2AEFA22D.dll SearchDonkey.E3E38E2B3C8C.dll LightsOff.CD920490367F.dll WbShld.384B48E6DC83.dll Websteroids.B324755F3F87.dll ZombieAlert.A222801BB6B4.dll Radsteroids.33AABCF1AD13.dll I'm going to attach the elasticsearch query and the script I used to extract that data as well so you can perform the same operation again if need be.
Flags: needinfo?(adrian)
Comment 8•10 years ago
|
||
elasticsearch query I used to get all the dumps containing the dlls we are looking for.
Comment 9•10 years ago
|
||
Python script I used to extract DLL names from the dumps I received from elasticsearch.
Reporter | ||
Comment 10•10 years ago
|
||
Thanks.
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•