I am trying to parse this log:
Code: Select all
<14>Aug 17 11:05:21 KC-FI-MGR.konecranes.com 1,2020/08/17 11:05:21,001701001987,SYSTEM,globalprotect,0,2020/08/17 11:05:01,,globalprotectgateway-config-release,GP gateway-N,0,0,general,informational,"GlobalProtect gateway client configuration released. User name: XXXX, Private IP: 10.XX.XX.X, Client version: 5.1.5-20, Device name: CNU406CM1R, Client OS version: Microsoft Windows 10 Enterprise , 64-bit, VPN type: Device Level VPN.",383324,0x8000000000000000,0,0,0,0,,KC-FI-FW2
Code: Select all
if [type] == "PALOALTOlog" {
grok {
match => { "message" => "%{DATE:date} %{TIME:time} - %{DATA:mtype} - \[%{IP:ip}\] %{WORD:username}%{GREEDYDATA:authstring} - %{GREEDYDATA:message}"}
overwrite => [ "message" ]
}
}