nortel_contivity = { # The name of the log format log.format.format_label = "Nortel Contivity Log Format" log.miscellaneous.log_data_type = "syslog_required" log.miscellaneous.log_format_type = "network_device" # The log is in this format if any of the first ten lines match this regular expression log.format.autodetect_regular_expression = "[0-9]+ : Security \\[[0-9]+\\] Session: " # All log field parsing will be done using the parsing filters log.format.parse_only_with_filters = "true" # Log fields log.fields = { event_type = { label = "$lang_stats.field_labels.event_type" type = "flat" index = 0 subindex = 0 } # event_type protocol = { label = "$lang_stats.field_labels.protocol" type = "flat" index = 0 subindex = 0 } # protocol client = { label = "$lang_stats.field_labels.client" type = "host" index = 0 subindex = 0 hierarchy_dividers = "." left_to_right = false leading_divider = "false" } # client local_address = { label = "$lang_stats.field_labels.local_address" type = "flat" index = 0 subindex = 0 } # local_address remote_address = { label = "$lang_stats.field_labels.remote_address" type = "flat" index = 0 subindex = 0 } # remote_address } # log.fields # Log Parsing Filters log.parsing_filters = { # Parse log out lines log_out = { label = "log out" comment = "" value = "collect_fields_using_regexp('()(Security \\\\[[0-9]+\\\\]) Session: (IPSEC)\\\\[([^]]+)\\\\]:[0-9]+ logged out', '*KEY*,event_type,protocol,client')" } # log_out # Parse IPSEC lines ipsec = { label = "ipsec" comment = "" value = "collect_fields_using_regexp('()(Security \\\\[[0-9]+\\\\]) Session: (IPSEC)\\\\[([^]]+)\\\\]:[0-9]+ physical addresses: remote ([^ ]+) local ([^ ]+)', '*KEY*,event_type,protocol,client,remote_address,local_address')" } # ipsec # Accept entries accept = { label = "accept" comment = "" value = "accept_collected_entry_using_regexp('()Security \\\\[[0-9]+\\\\] Session: IPSEC\\\\[[^]]+\\\\]:[0-9]+ logged out', false)" } # accept } # log.parsing_filters # Database fields database.fields = { event_type = { label = "$lang_stats.field_labels.event_type" log_field = "event_type" type = "string" suppress_top = 0 suppress_bottom = 2 } # event_type protocol = { label = "$lang_stats.field_labels.protocol" log_field = "protocol" type = "string" suppress_top = 0 suppress_bottom = 2 } # protocol client = { label = "$lang_stats.field_labels.client" log_field = "client" type = "string" suppress_top = 0 suppress_bottom = 2 } # client remote_address = { label = "$lang_stats.field_labels.remote_address" log_field = "remote_address" type = "string" suppress_top = 0 suppress_bottom = 2 } # remote_address local_address = { label = "$lang_stats.field_labels.local_address" log_field = "local_address" type = "string" suppress_top = 0 suppress_bottom = 2 } # local_address } # database.fields database.numerical_fields = { sessions = { label = "$lang_stats.field_labels.sessions" default = true requires_log_field = false type = "int" display_format_type = "integer" entries_field = true } # sessions } # database.numerical_fields log.filters = { mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'sessions = 1;' } # mark_entry } # log.filters create_profile_wizard_options = { date_time_tracking = true # How the reports should be grouped in the report menu report_groups = { date_time_group = "" event_type = true protocol = true client = true remote_address = true local_address = true } # report_groups } # create_profile_wizard_options not_supported = { individualhosts = true sessions = true visitors = true pageviews = true } # not_supported } # nortel_contivity