# Copyright (c) 2013 Flowerfire, Inc. All Rights Reserved. redhat_syslog_ddmmmyyyyhhmmss = { plugin_version = "1.0" # 2013-09-20 - 1.0 - GMF - Initial creation [ThreadID:1293647] info.1.manufacturer = "RedHat" info.1.device = "syslogd (dd/mm/yyyy:hh:mm:ss prefix)" info.1.version.1 = "" # The name of the log format log.format.format_label = "RedHat syslogd (dd/mm/yyyy:hh:mm:ss prefix) Syslog" log.miscellaneous.log_data_type = "syslog" log.miscellaneous.log_format_type = "syslog_server" # The log is in this format if any of the first ten lines match this regular expression # 14/Jul/2013:04:03:55 +0700 12199 192.168.0.51 TCP_MISS/200 148 CONNECT fbexternal-a.akamaihd.net:443 - - DIRECT/61.19.12.26 - 192.168.0.51 8080 log.format.autodetect_regular_expression = "^ [0-9]+/[A-Z][a-z][a-z]/[0-9][0-9][0-9][0-9]:[0-9][0-9]:[0-9][0-9]:[0-9][0-9] [^ ]+ +[0-9]+" # All log field parsing will be done using the parsing filters log.format.parse_only_with_filters = "true" # Log fields log.fields = { date = "" time = "" logging_device = "" } # log.fields # Log Parsing Filters log.parsing_filters.syslog = ` v.syslog_message = ""; if (matches_regular_expression(current_log_line(), '^ ([0-9]+/[A-Z][a-z][a-z]/[0-9][0-9][0-9][0-9]):([0-9][0-9]:[0-9][0-9]:[0-9][0-9]) [^ ]+ +[0-9]+ (.*)$')) then ( set_collected_field('', 'date', $1); set_collected_field('', 'time', $2); # set_collected_field('', 'logging_device', $3); v.syslog_message = $3; ); ` # Database fields database.fields = { date_time = "" day_of_week = "" hour_of_day = "" # logging_device = "" } # database.fields } # redhat_syslog_ddmmmyyyyhhmmss