Code: Select all
2015/08/18 16:08:13 AgentActionDB D Action HostAccessCheckAddress returned 0
2015/08/18 16:08:13 HttpProtocolHandler D Thread 3124: ProcessRequest started on socket 668605920
2015/08/18 16:08:13 AgentCore T Received network incoming connexion (id: 3464) of priority 1 from IP 10.0.103.115 port 45660: handling at once
2015/08/18 16:08:13 AgentCore T Thread 3468: Processing a network incoming connection from 10.0.103.115:45660, id 3464
2015/08/18 16:08:13 AgentCore T Thread 3468: Connection is secured
2015/08/18 16:08:13 AgentCore T Thread 3468: Precision Access Control is requested
2015/08/18 16:08:13 HttpProtocolHandler D Thread 3468: Request address is 10.0.103.115 for socket 668559840
2015/08/18 16:08:13 AgentCore T Received network incoming connexion (id: 12016) of priority 1 from IP 10.0.124.113 port 49236: handling at once
2015/08/18 16:08:13 AgentCore T Thread 3912: Processing a network incoming connection from 10.0.124.113:49236, id 12016
2015/08/18 16:08:13 AgentActionDB I Invoke local action HostAccessCheckAddress
2015/08/18 16:08:13 AgentActionDB D Action HostAccessCheckAddress returned 0I am having a hard time breaking this down properly. Basically everything is going into the Message field.
I am not sure if I need to create a pattern file (which I have never done) or use the Filters section in NLS.
Hoping you can give me a quick example of how to best achieve this so I can replicate with other logs.
This source is a Windows Server and this is just a typical single line log file. I was able to configure the NXLog agent to send this file in with the a custom field called 'progam' and name of "AssetCore" so I was thinking I could filter off that, but I am still new to logstash and have other duties that keep me from putting in the time I need.
Here is a screenshot of one of these events as seen in NLS. Any and all help would be Great!!