# Copyright (c) 2010 Flowerfire, Inc. All Rights Reserved. net_acct = { plugin_version = "1.0.2" info.1.manfacturer = "Ulrich Callmeier" info.1.device = "Network log daemon" info.1.version.1 = "0.71 libc5" info.1.version.2 = "http://exorsus.net/projects/net-acct/" # 2007-09-05 - 1.0.1 - gas - Added support for a variant, updated plug-in ro modern format (dropped lots of defaults) # 2010-10-06 - 1.0.2 - MSG - Edited info lines. # The name of the log format log.format.format_label = "Net-Acct" log.miscellaneous.log_data_type = "firewall" log.miscellaneous.log_format_type = "network_device" # The log is in this format if any of the first ten lines match this regular expression log.format.autodetect_expression = ` matches_regular_expression(volatile.log_data_line, '^[0-9]* [0-9]* [0-9.]* [0-9]* [0-9.]* [0-9]* [0-9]* [0-9]* eth[0-9]* [a-z]*$') or matches_regular_expression(volatile.log_data_line, '^[0-9]* [0-9]* [0-9.]* [0-9]* [0-9.]* [0-9]* [0-9]* eth[0-9]*$') ` # The format of dates and times in this log log.format.date_format = "seconds_since_jan1_1970" log.format.time_format = "seconds_since_jan1_1970" log.format.parse_only_with_filters = true # Log fields log.fields = { date_time = "" protocol = "" source_ip = "" source_port = "" destination_ip = "" destination_port = "" packets = "" bytes_transferred = "" interface = "" } # log.fields # Database fields database.fields = { date_time = "" day_of_week = "" hour_of_day = "" protocol = "" source_ip = "" source_port = "" destination_ip = "" destination_port = "" interface = "" } # database.fields # Log Filters log.filters = { mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'hits = 1;' } # mark_entry } # log.filters log.parsing_filters.parse = ` if (matches_regular_expression(current_log_line(), '^([0-9]*) ([0-9]*) ([0-9.]*) ([0-9]*) ([0-9.]*) ([0-9]*) ([0-9]*) ([0-9]*) (eth[0-9]*) ([a-z]*)$')) then ( set_collected_field('', 'date_time', $1); set_collected_field('', 'protocol', $2); set_collected_field('', 'source_ip', $3); set_collected_field('', 'source_port', $4); set_collected_field('', 'destination_ip', $5); set_collected_field('', 'destination_port', $6); set_collected_field('', 'packets', $7); set_collected_field('', 'bytes_transferred', $8); set_collected_field('', 'interface', $9); accept_collected_entry('', false); ); else if (matches_regular_expression(current_log_line(), '^([0-9]*) ([0-9]*) ([0-9.]*) ([0-9]*) ([0-9.]*) ([0-9]*) ([0-9]*) (eth[0-9]*)$')) then ( set_collected_field('', 'date_time', $1); set_collected_field('', 'protocol', $2); set_collected_field('', 'source_ip', $3); set_collected_field('', 'source_port', $4); set_collected_field('', 'destination_ip', $5); set_collected_field('', 'destination_port', $6); set_collected_field('', 'bytes_transferred', $7); set_collected_field('', 'interface', $8); accept_collected_entry('', false); ); ` database.numerical_fields = { hits = { label = "$lang_stats.field_labels.hits" default = true requires_log_field = false type = "int" display_format_type = "integer" entries_field = true } # hits bytes_transferred = { label = "$lang_stats.field_labels.bytes_transferred" default = false requires_log_field = true log_field = "bytes_transferred" type = "float" display_format_type = "bandwidth" } # bytes_transferred } # database.numerical_fields create_profile_wizard_options = { date_time_tracking = true # How the reports should be grouped in the report menu report_groups = { date_time_group = "" protocol = true source_ip = true source_port = true destination_ip = true destination_port = true interface = true } # report_groups } # create_profile_wizard_options } # net_acct