# Copyright (c) 2010 Flowerfire, Inc. All Rights Reserved. citrix_firewall_manager_syslog = { plugin_version = "1.0" # 2007-10-22 - 1.0 - Initial creation - pseudo syslog for Citrix Netscaler. # 2010-10-26 - 1.0.1 - MSG - Edited info lines. info.1.manufacturer = "Citrix" info.1.device = "Firewall Manager Syslog" info.1.version.1 = "" # The name of the log format log.format.format_label = "Citrix Firewall Manager Syslog" log.miscellaneous.log_data_type = "syslog" log.miscellaneous.log_format_type = "syslog_server" # The log is in this format if any of the first ten lines match this regular expression #Oct 10 22:39:13 55.55.255.55 log.format.autodetect_regular_expression = "^[A-Za-z][A-Za-z][A-Za-z] [0-9 ]?[0-9] [0-9][0-9]:[0-9][0-9]:[0-9][0-9] <[^>]+> [^ ]+ " # All log field parsing will be done using the parsing filters log.format.parse_only_with_filters = "true" # The format of dates and times in this log log.format.date_format = "auto" log.format.time_format = "auto" # Log fields log.fields = { date = "" time = "" logging_device = "" log_level = "" syslog_message = "" } # log.fields # Log Parsing Filters log.parsing_filters.syslog_parse = ` v.syslog_message = ''; if (matches_regular_expression(current_log_line(), "^([A-Za-z][A-Za-z][A-Za-z] [0-9 ]?[0-9]) ([0-9][0-9]:[0-9][0-9]:[0-9][0-9]) <([^>]+)> ([^ ]+) (.*)")) then ( set_collected_field('', 'date', normalize_date($1, 'mmm/dd')); set_collected_field('', 'time', $2); set_collected_field('', 'log_level', $3); set_collected_field('', 'logging_device', $4); v.syslog_message = $5; ); ` # Database fields database.fields = { date_time = "" day_of_week = "" hour_of_day = "" logging_device = "" log_level = "" } # database.fields create_profile_wizard_options = { # How the reports should be grouped in the report menu report_groups = { date_time_group = "" } # report_groups } # create_profile_wizard_options } # citrix_firewall_manager_syslog