[root@usmipaa51 ~]# tail -100 /var/log/logstash/logstash.log
{:timestamp=>"2022-01-17T22:37:30.682000-0500", :message=>"filter received", :event=>{"message"=>"Received disconnect from 10.34.1.42 port 40178:11: disconnected by user\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>86, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"sshd", "pid"=>"16570", "severity"=>6, "facility"=>10, "facility_label"=>"security/authorization", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"83", :method=>"filter_func"}
{:timestamp=>"2022-01-17T22:37:30.683000-0500", :message=>"filter received", :event=>{"message"=>"Disconnected from 10.34.1.42 port 40178\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>86, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"sshd", "pid"=>"16570", "severity"=>6, "facility"=>10, "facility_label"=>"security/authorization", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"83", .:method=>"filter_func"}
{:timestamp=>"2022-01-17T22:37:30.683000-0500", :message=>"filter received", :event=>{"message"=>"pam_unix(sshd:session): session closed for user sid_nagios_wintel\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>86, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"sshd", "pid"=>"16463", "severity"=>6, "facility"=>10, "facility_label"=>"security/authorization", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"83", :method=>"filter_func"}
{:timestamp=>"2022-01-17T22:37:30.684000-0500", :message=>"filter received", :event=>{"message"=>"Removed session 14518.\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>38, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"systemd-logind", "severity"=>6, "facility"=>4, "facility_label"=>"security/authorization", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"83", :method=>"filter_func"}
{:timestamp=>"2022-01-17T22:37:30.684000-0500", :message=>"filter received", :event=>{"message"=>"Removed slice User Slice of sid_nagios_wintel.\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>30, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"systemd", "severity"=>6, "facility"=>3, "facility_label"=>"system", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"83", :method=>"filter_func"}
{:timestamp=>"2022-01-17T22:37:30.685000-0500", :message=>"filter received", :event=>{"message"=>"job 17851 (pid=110614): read() returned error 11\n", "@version"=>"1", "@timestamp"=>"2022-01-18T14:07:30.000Z", "type"=>"syslog", "host"=>"10.34.1.42", "priority"=>13, "timestamp"=>"Jan 18 09:07:30", "logsource"=>"usmipaa52", "program"=>"nagios", "severity"=>5, "facility"=>1, "facility_label"=>"user-level", "severity_label"=>"Notice"}, :level=>:debug, :file=>"(eval)", :line=>"83", :method=>"filter_func"}
{:timestamp=>"2022-01-17T22:37:30.685000-0500", :message=>"output received", :event=>{"message"=>"job 17851 (pid=110614): read() returned error 11\n", "@version"=>"1", "@timestamp"=>"2022-01-18T14:07:30.000Z", "type"=>"syslog", "host"=>"10.34.1.42", "priority"=>13, "timestamp"=>"Jan 18 09:07:30", "logsource"=>"usmipaa52", "program"=>"nagios", "severity"=>5, "facility"=>1, "facility_label"=>"user-level", "severity_label"=>"Notice"}, :level=>:debug, :file=>"(eval)", :line=>"91", :method=>"output_func"}
{:timestamp=>"2022-01-17T22:37:30.685000-0500", :message=>"output received", :event=>{"message"=>"Received disconnect from 10.34.1.42 port 40178:11: disconnected by user\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>86, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"sshd", "pid"=>"16570", "severity"=>6, "facility"=>10, "facility_label"=>"security/authorization", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"91", :method=>"output_func"}
{:timestamp=>"2022-01-17T22:37:30.686000-0500", :message=>"output received", :event=>{"message"=>"Disconnected from 10.34.1.42 port 40178\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>86, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"sshd", "pid"=>"16570", "severity"=>6, "facility"=>10, "facility_label"=>"security/authorization", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"91", :method=>"output_func"}
{:timestamp=>"2022-01-17T22:37:30.686000-0500", :message=>"output received", :event=>{"message"=>"pam_unix(sshd:session): session closed for user sid_nagios_wintel\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>86, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"sshd", "pid"=>"16463", "severity"=>6, "facility"=>10, "facility_label"=>"security/authorization", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"91", :method=>"output_func"}
{:timestamp=>"2022-01-17T22:37:30.687000-0500", :message=>"output received", :event=>{"message"=>"Removed session 14518.\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>38, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"systemd-logind", "severity"=>6, "facility"=>4, "facility_label"=>"security/authorization", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"91", :method=>"output_func"}
{:timestamp=>"2022-01-17T22:37:30.687000-0500", :message=>"output received", :event=>{"message"=>"Removed slice User Slice of sid_nagios_wintel.\n", "@version"=>"1", "@timestamp"=>"2022-01-18T09:37:30.000Z", "type"=>"syslog", "host"=>"10.34.136.240", "priority"=>30, "timestamp"=>"Jan 18 04:37:30", "logsource"=>"nlskpia09", "program"=>"systemd", "severity"=>6, "facility"=>3, "facility_label"=>"system", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"91", :method=>"output_func"}
{:timestamp=>"2022-01-17T22:37:30.687000-0500", :message=>"output received", :event=>{"message"=>"job 17851 (pid=110614): read() returned error 11\n", "@version"=>"1", "@timestamp"=>"2022-01-18T14:07:30.000Z", "type"=>"syslog", "host"=>"10.34.1.42", "priority"=>13, "timestamp"=>"Jan 18 09:07:30", "logsource"=>"usmipaa52", "program"=>"nagios", "severity"=>5, "facility"=>1, "facility_label"=>"user-level", "severity_label"=>"Notice"}, :level=>:debug, :file=>"(eval)", :line=>"91", :method=>"output_func"}
{:timestamp=>"2022-01-17T22:37:31.117000-0500", :message=>"Running grok filter", :event=>#<LogStash::Event:0x317e74 @metadata_accessors=#<LogStash::Util::Accessors:0x5ae5f477 @store={}, @lut={}>, @cancelled=false, @data={"message"=>"<14>Jan 18 09:07:31 usmipaa52 nagios: SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.116Z", "type"=>"syslog", "host"=>"10.34.1.42"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x33c1d540 @store={"message"=>"<14>Jan 18 09:07:31 usmipaa52 nagios: SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.116Z", "type"=>"syslog", "host"=>"10.34.1.42"}, @lut={"host"=>[{"message"=>"<14>Jan 18 09:07:31 usmipaa52 nagios: SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.116Z", "type"=>"syslog", "host"=>"10.34.1.42"}, "host"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"277", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.118000-0500", :message=>"Regexp match object", :names=>["POSINT:priority", "SYSLOGTIMESTAMP:timestamp", "TIMESTAMP_ISO8601:timestamp8601", "NONNEGINT:facility", "NONNEGINT:priority", "SYSLOGHOST:logsource", "PROG:program", "POSINT:pid", "GREEDYDATA:message"], :captures=>["14", "Jan 18 09:07:31", nil, nil, nil, "usmipaa52", "nagios", nil, "SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n"], :level=>:debug, :file=>"grok-pure.rb", :line=>"192", :method=>"match_and_capture"}
{:timestamp=>"2022-01-17T22:37:31.119000-0500", :message=>"Event now: ", :event=>#<LogStash::Event:0x317e74 @metadata_accessors=#<LogStash::Util::Accessors:0x5ae5f477 @store={}, @lut={}>, @cancelled=false, @data={"message"=>"SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.116Z", "type"=>"syslog", "host"=>"10.34.1.42", "priority"=>"14", "timestamp"=>"Jan 18 09:07:31", "logsource"=>"usmipaa52", "program"=>"nagios"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x33c1d540 @store={"message"=>"SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.116Z", "type"=>"syslog", "host"=>"10.34.1.42", "priority"=>"14", "timestamp"=>"Jan 18 09:07:31", "logsource"=>"usmipaa52", "program"=>"nagios"}, @lut={"message"=>[{"message"=>"SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.116Z", "type"=>"syslog", "host"=>"10.34.1.42", "priority"=>"14", "timestamp"=>"Jan 18 09:07:31", "logsource"=>"usmipaa52", "program"=>"nagios"}, "message"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"292", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.120000-0500", :message=>"Date filter: received event", :type=>"syslog", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"311", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.120000-0500", :message=>"Date filter looking for field", :type=>"syslog", :field=>"timestamp", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"314", :method=>"filter"}
{:timestamp=>"2022-01-18T14:07:31.000Z", :message=>"Date parsing done", :value=>"Jan 18 09:07:31", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"348", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.248000-0500", :message=>"Pushing flush onto pipeline", :level=>:debug, :file=>"logstash/pipeline.rb", :line=>"458", :method=>"flush"}
{:timestamp=>"2022-01-17T22:37:31.249000-0500", :message=>"filter received", :event=>{"message"=>"SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n", "@version"=>"1", "@timestamp"=>"2022-01-18T14:07:31.000Z", "type"=>"syslog", "host"=>"10.34.1.42", "priority"=>14, "timestamp"=>"Jan 18 09:07:31", "logsource"=>"usmipaa52", "program"=>"nagios", "severity"=>6, "facility"=>1, "facility_label"=>"user-level", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"83", :method=>"filter_func"}
{:timestamp=>"2022-01-17T22:37:31.250000-0500", :message=>"output received", :event=>{"message"=>"SERVICE ALERT: usinkok-ap81.delphidrive.com;CPU Usage;OK;SOFT;2;OK (Sample Period 432 sec) - Average CPU Utilisation 7.94%\n", "@version"=>"1", "@timestamp"=>"2022-01-18T14:07:31.000Z", "type"=>"syslog", "host"=>"10.34.1.42", "priority"=>14, "timestamp"=>"Jan 18 09:07:31", "logsource"=>"usmipaa52", "program"=>"nagios", "severity"=>6, "facility"=>1, "facility_label"=>"user-level", "severity_label"=>"Informational"}, :level=>:debug, :file=>"(eval)", :line=>"91", :method=>"output_func"}
{:timestamp=>"2022-01-17T22:37:31.429000-0500", :message=>"Flushing buffer at interval", :instance=>"#<LogStash::Outputs::ElasticSearch::Buffer:0x429a96a5 @operations_mutex=#<Mutex:0x46a50a2e>, @max_size=500, @operations_lock=#<Java::JavaUtilConcurrentLocks::ReentrantLock:0x3a79c9e>, @submit_proc=#<Proc:0x326edfb4@/usr/local/nagioslogserver/logstash/vendor/bundle/jruby/1.9/gems/logstash-output-elasticsearch-2.7.1-java/lib/logstash/outputs/elasticsearch/common.rb:57>, @logger=#<Cabin::Channel:0x6ed65cbb @metrics=#<Cabin::Metrics:0x7d53b5ea @metrics_lock=#<Mutex:0x3fec589a>, @metrics={}, @channel=#<Cabin::Channel:0x6ed65cbb ...>>, @subscriber_lock=#<Mutex:0x5aa49aa2>, @level=:debug, @subscribers={497630=>#<Cabin::Subscriber:0x66573f1f @output=#<Cabin::Outputs::IO:0x3ba283c7 @io=#<File:/var/log/logstash/logstash.log>, @lock=#<Mutex:0x452d7f9b>>, @options={}>, 497632=>#<Cabin::Subscriber:0x1a8f6489 @output=#<Cabin::Outputs::IO:0x457f0f00 @io=#<IO:fd 1>, @lock=#<Mutex:0x6aec00d3>>, @options={:level=>:fatal}>}, @data={}>, @last_flush=2022-01-17 22:37:30 -0500, @flush_interval=1, @stopping=#<Concurrent::AtomicBoolean:0x5c7457ad>, @buffer=[], @flush_thread=#<Thread:0x638863d1 run>>", :interval=>1, :level=>:debug, :file=>"logstash/outputs/elasticsearch/buffer.rb", :line=>"90", :method=>"interval_flush"}
{:timestamp=>"2022-01-17T22:37:31.430000-0500", :message=>"Flushing buffer at interval", :instance=>"#<LogStash::Outputs::ElasticSearch::Buffer:0x1e049551 @operations_mutex=#<Mutex:0x10c378e1>, @max_size=500, @operations_lock=#<Java::JavaUtilConcurrentLocks::ReentrantLock:0x14fcfe21>, @submit_proc=#<Proc:0x6beacba9@/usr/local/nagioslogserver/logstash/vendor/bundle/jruby/1.9/gems/logstash-output-elasticsearch-2.7.1-java/lib/logstash/outputs/elasticsearch/common.rb:57>, @logger=#<Cabin::Channel:0x6ed65cbb @metrics=#<Cabin::Metrics:0x7d53b5ea @metrics_lock=#<Mutex:0x3fec589a>, @metrics={}, @channel=#<Cabin::Channel:0x6ed65cbb ...>>, @subscriber_lock=#<Mutex:0x5aa49aa2>, @level=:debug, @subscribers={497630=>#<Cabin::Subscriber:0x66573f1f @output=#<Cabin::Outputs::IO:0x3ba283c7 @io=#<File:/var/log/logstash/logstash.log>, @lock=#<Mutex:0x452d7f9b>>, @options={}>, 497632=>#<Cabin::Subscriber:0x1a8f6489 @output=#<Cabin::Outputs::IO:0x457f0f00 @io=#<IO:fd 1>, @lock=#<Mutex:0x6aec00d3>>, @options={:level=>:fatal}>}, @data={}>, @last_flush=2022-01-17 22:37:30 -0500, @flush_interval=1, @stopping=#<Concurrent::AtomicBoolean:0x60e5a245>, @buffer=[], @flush_thread=#<Thread:0x131b458e run>>", :interval=>1, :level=>:debug, :file=>"logstash/outputs/elasticsearch/buffer.rb", :line=>"90", :method=>"interval_flush"}
{:timestamp=>"2022-01-17T22:37:31.429000-0500", :message=>"Flushing buffer at interval", :instance=>"#<LogStash::Outputs::ElasticSearch::Buffer:0x65dcecdf @operations_mutex=#<Mutex:0x6b1b1e14>, @max_size=500, @operations_lock=#<Java::JavaUtilConcurrentLocks::ReentrantLock:0x6f2487af>, @submit_proc=#<Proc:0x281eafa0@/usr/local/nagioslogserver/logstash/vendor/bundle/jruby/1.9/gems/logstash-output-elasticsearch-2.7.1-java/lib/logstash/outputs/elasticsearch/common.rb:57>, @logger=#<Cabin::Channel:0x6ed65cbb @metrics=#<Cabin::Metrics:0x7d53b5ea @metrics_lock=#<Mutex:0x3fec589a>, @metrics={}, @channel=#<Cabin::Channel:0x6ed65cbb ...>>, @subscriber_lock=#<Mutex:0x5aa49aa2>, @level=:debug, @subscribers={497630=>#<Cabin::Subscriber:0x66573f1f @output=#<Cabin::Outputs::IO:0x3ba283c7 @io=#<File:/var/log/logstash/logstash.log>, @lock=#<Mutex:0x452d7f9b>>, @options={}>, 497632=>#<Cabin::Subscriber:0x1a8f6489 @output=#<Cabin::Outputs::IO:0x457f0f00 @io=#<IO:fd 1>, @lock=#<Mutex:0x6aec00d3>>, @options={:level=>:fatal}>}, @data={}>, @last_flush=2022-01-17 22:37:30 -0500, @flush_interval=1, @stopping=#<Concurrent::AtomicBoolean:0x1bc6ff09>, @buffer=[], @flush_thread=#<Thread:0x50141a21 run>>", :interval=>1, :level=>:debug, :file=>"logstash/outputs/elasticsearch/buffer.rb", :line=>"90", :method=>"interval_flush"}
{:timestamp=>"2022-01-17T22:37:31.431000-0500", :message=>"Flushing buffer at interval", :instance=>"#<LogStash::Outputs::ElasticSearch::Buffer:0x10394199 @operations_mutex=#<Mutex:0x1efeadee>, @max_size=500, @operations_lock=#<Java::JavaUtilConcurrentLocks::ReentrantLock:0x1ac12ae9>, @submit_proc=#<Proc:0x5ac103d@/usr/local/nagioslogserver/logstash/vendor/bundle/jruby/1.9/gems/logstash-output-elasticsearch-2.7.1-java/lib/logstash/outputs/elasticsearch/common.rb:57>, @logger=#<Cabin::Channel:0x6ed65cbb @metrics=#<Cabin::Metrics:0x7d53b5ea @metrics_lock=#<Mutex:0x3fec589a>, @metrics={}, @channel=#<Cabin::Channel:0x6ed65cbb ...>>, @subscriber_lock=#<Mutex:0x5aa49aa2>, @level=:debug, @subscribers={497630=>#<Cabin::Subscriber:0x66573f1f @output=#<Cabin::Outputs::IO:0x3ba283c7 @io=#<File:/var/log/logstash/logstash.log>, @lock=#<Mutex:0x452d7f9b>>, @options={}>, 497632=>#<Cabin::Subscriber:0x1a8f6489 @output=#<Cabin::Outputs::IO:0x457f0f00 @io=#<IO:fd 1>, @lock=#<Mutex:0x6aec00d3>>, @options={:level=>:fatal}>}, @data={}>, @last_flush=2022-01-17 22:37:30 -0500, @flush_interval=1, @stopping=#<Concurrent::AtomicBoolean:0x2559e485>, @buffer=[], @flush_thread=#<Thread:0x18e3f821 run>>", :interval=>1, :level=>:debug, :file=>"logstash/outputs/elasticsearch/buffer.rb", :line=>"90", :method=>"interval_flush"}
{:timestamp=>"2022-01-17T22:37:31.443000-0500", :message=>"Running grok filter", :event=>#<LogStash::Event:0x2b6b981e @metadata_accessors=#<LogStash::Util::Accessors:0x14d2e907 @store={}, @lut={}>, @cancelled=false, @data={"message"=>"<85>Jan 17 22:37:31 usmipaa51 sudo: nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/elasticsearch status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.443Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x2ae58c9b @store={"message"=>"<85>Jan 17 22:37:31 usmipaa51 sudo: nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/elasticsearch status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.443Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @lut={"host"=>[{"message"=>"<85>Jan 17 22:37:31 usmipaa51 sudo: nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/elasticsearch status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.443Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, "host"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"277", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.444000-0500", :message=>"Regexp match object", :names=>["POSINT:priority", "SYSLOGTIMESTAMP:timestamp", "TIMESTAMP_ISO8601:timestamp8601", "NONNEGINT:facility", "NONNEGINT:priority", "SYSLOGHOST:logsource", "PROG:program", "POSINT:pid", "GREEDYDATA:message"], :captures=>["85", "Jan 17 22:37:31", nil, nil, nil, "usmipaa51", "sudo", nil, " nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/elasticsearch status\n"], :level=>:debug, :file=>"grok-pure.rb", :line=>"192", :method=>"match_and_capture"}
{:timestamp=>"2022-01-17T22:37:31.444000-0500", :message=>"Event now: ", :event=>#<LogStash::Event:0x2b6b981e @metadata_accessors=#<LogStash::Util::Accessors:0x14d2e907 @store={}, @lut={}>, @cancelled=false, @data={"message"=>" nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/elasticsearch status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.443Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"85", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x2ae58c9b @store={"message"=>" nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/elasticsearch status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.443Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"85", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @lut={"message"=>[{"message"=>" nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/elasticsearch status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.443Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"85", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, "message"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"292", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.445000-0500", :message=>"Date filter: received event", :type=>"syslog", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"311", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.445000-0500", :message=>"Date filter looking for field", :type=>"syslog", :field=>"timestamp", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"314", :method=>"filter"}
{:timestamp=>"2022-01-18T03:37:31.000Z", :message=>"Date parsing done", :value=>"Jan 17 22:37:31", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"348", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.445000-0500", :message=>"Running grok filter", :event=>#<LogStash::Event:0x33e3d1d3 @metadata_accessors=#<LogStash::Util::Accessors:0x27bfc6a @store={}, @lut={}>, @cancelled=false, @data={"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.445Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x36e6774a @store={"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.445Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @lut={"host"=>[{"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.445Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, "host"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"277", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.446000-0500", :message=>"Regexp match object", :names=>["POSINT:priority", "SYSLOGTIMESTAMP:timestamp", "TIMESTAMP_ISO8601:timestamp8601", "NONNEGINT:facility", "NONNEGINT:priority", "SYSLOGHOST:logsource", "PROG:program", "POSINT:pid", "GREEDYDATA:message"], :captures=>["86", "Jan 17 22:37:31", nil, nil, nil, "usmipaa51", "sudo", nil, "pam_unix(sudo:session): session opened for user root by (uid=0)\n"], :level=>:debug, :file=>"grok-pure.rb", :line=>"192", :method=>"match_and_capture"}
{:timestamp=>"2022-01-17T22:37:31.446000-0500", :message=>"Event now: ", :event=>#<LogStash::Event:0x33e3d1d3 @metadata_accessors=#<LogStash::Util::Accessors:0x27bfc6a @store={}, @lut={}>, @cancelled=false, @data={"message"=>"pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.445Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x36e6774a @store={"message"=>"pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.445Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @lut={"message"=>[{"message"=>"pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.445Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, "message"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"292", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.447000-0500", :message=>"Date filter: received event", :type=>"syslog", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"311", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.447000-0500", :message=>"Date filter looking for field", :type=>"syslog", :field=>"timestamp", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"314", :method=>"filter"}
{:timestamp=>"2022-01-18T03:37:31.000Z", :message=>"Date parsing done", :value=>"Jan 17 22:37:31", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"348", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.469000-0500", :message=>"Running grok filter", :event=>#<LogStash::Event:0x6f2bd06 @metadata_accessors=#<LogStash::Util::Accessors:0x604ba9f7 @store={}, @lut={}>, @cancelled=false, @data={"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.469Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x6b8296a3 @store={"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.469Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @lut={"host"=>[{"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.469Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, "host"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"277", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.470000-0500", :message=>"Regexp match object", :names=>["POSINT:priority", "SYSLOGTIMESTAMP:timestamp", "TIMESTAMP_ISO8601:timestamp8601", "NONNEGINT:facility", "NONNEGINT:priority", "SYSLOGHOST:logsource", "PROG:program", "POSINT:pid", "GREEDYDATA:message"], :captures=>["86", "Jan 17 22:37:31", nil, nil, nil, "usmipaa51", "sudo", nil, "pam_unix(sudo:session): session closed for user root\n"], :level=>:debug, :file=>"grok-pure.rb", :line=>"192", :method=>"match_and_capture"}
{:timestamp=>"2022-01-17T22:37:31.470000-0500", :message=>"Event now: ", :event=>#<LogStash::Event:0x6f2bd06 @metadata_accessors=#<LogStash::Util::Accessors:0x604ba9f7 @store={}, @lut={}>, @cancelled=false, @data={"message"=>"pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.469Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x6b8296a3 @store={"message"=>"pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.469Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @lut={"message"=>[{"message"=>"pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.469Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, "message"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"292", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.470000-0500", :message=>"Date filter: received event", :type=>"syslog", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"311", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.471000-0500", :message=>"Date filter looking for field", :type=>"syslog", :field=>"timestamp", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"314", :method=>"filter"}
{:timestamp=>"2022-01-18T03:37:31.000Z", :message=>"Date parsing done", :value=>"Jan 17 22:37:31", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"348", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.482000-0500", :message=>"Running grok filter", :event=>#<LogStash::Event:0x3916397b @metadata_accessors=#<LogStash::Util::Accessors:0x2952f686 @store={}, @lut={}>, @cancelled=false, @data={"message"=>"<85>Jan 17 22:37:31 usmipaa51 sudo: nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/logstash status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.481Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x775fd75e @store={"message"=>"<85>Jan 17 22:37:31 usmipaa51 sudo: nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/logstash status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.481Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @lut={"host"=>[{"message"=>"<85>Jan 17 22:37:31 usmipaa51 sudo: nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/logstash status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.481Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, "host"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"277", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.482000-0500", :message=>"Regexp match object", :names=>["POSINT:priority", "SYSLOGTIMESTAMP:timestamp", "TIMESTAMP_ISO8601:timestamp8601", "NONNEGINT:facility", "NONNEGINT:priority", "SYSLOGHOST:logsource", "PROG:program", "POSINT:pid", "GREEDYDATA:message"], :captures=>["85", "Jan 17 22:37:31", nil, nil, nil, "usmipaa51", "sudo", nil, " nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/logstash status\n"], :level=>:debug, :file=>"grok-pure.rb", :line=>"192", :method=>"match_and_capture"}
{:timestamp=>"2022-01-17T22:37:31.482000-0500", :message=>"Event now: ", :event=>#<LogStash::Event:0x3916397b @metadata_accessors=#<LogStash::Util::Accessors:0x2952f686 @store={}, @lut={}>, @cancelled=false, @data={"message"=>" nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/logstash status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.481Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"85", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x775fd75e @store={"message"=>" nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/logstash status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.481Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"85", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @lut={"message"=>[{"message"=>" nagios : TTY=unknown ; PWD=/var/www/html/nagioslogserver/www ; USER=root ; COMMAND=/etc/init.d/logstash status\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.481Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"85", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, "message"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"292", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.483000-0500", :message=>"Date filter: received event", :type=>"syslog", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"311", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.483000-0500", :message=>"Date filter looking for field", :type=>"syslog", :field=>"timestamp", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"314", :method=>"filter"}
{:timestamp=>"2022-01-18T03:37:31.000Z", :message=>"Date parsing done", :value=>"Jan 17 22:37:31", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"348", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.484000-0500", :message=>"Running grok filter", :event=>#<LogStash::Event:0x6e4478dc @metadata_accessors=#<LogStash::Util::Accessors:0x393ad1da @store={}, @lut={}>, @cancelled=false, @data={"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.484Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x35362b7a @store={"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.484Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @lut={"host"=>[{"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.484Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, "host"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"277", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.484000-0500", :message=>"Regexp match object", :names=>["POSINT:priority", "SYSLOGTIMESTAMP:timestamp", "TIMESTAMP_ISO8601:timestamp8601", "NONNEGINT:facility", "NONNEGINT:priority", "SYSLOGHOST:logsource", "PROG:program", "POSINT:pid", "GREEDYDATA:message"], :captures=>["86", "Jan 17 22:37:31", nil, nil, nil, "usmipaa51", "sudo", nil, "pam_unix(sudo:session): session opened for user root by (uid=0)\n"], :level=>:debug, :file=>"grok-pure.rb", :line=>"192", :method=>"match_and_capture"}
{:timestamp=>"2022-01-17T22:37:31.485000-0500", :message=>"Event now: ", :event=>#<LogStash::Event:0x6e4478dc @metadata_accessors=#<LogStash::Util::Accessors:0x393ad1da @store={}, @lut={}>, @cancelled=false, @data={"message"=>"pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.484Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x35362b7a @store={"message"=>"pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.484Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @lut={"message"=>[{"message"=>"pam_unix(sudo:session): session opened for user root by (uid=0)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.484Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, "message"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"292", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.485000-0500", :message=>"Date filter: received event", :type=>"syslog", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"311", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.485000-0500", :message=>"Date filter looking for field", :type=>"syslog", :field=>"timestamp", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"314", :method=>"filter"}
{:timestamp=>"2022-01-18T03:37:31.000Z", :message=>"Date parsing done", :value=>"Jan 17 22:37:31", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"348", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.502000-0500", :message=>"Running grok filter", :event=>#<LogStash::Event:0x678af935 @metadata_accessors=#<LogStash::Util::Accessors:0x1cea80f2 @store={}, @lut={}>, @cancelled=false, @data={"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.502Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x3a9dff60 @store={"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.502Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @lut={"host"=>[{"message"=>"<86>Jan 17 22:37:31 usmipaa51 sudo: pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.502Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, "host"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"277", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.502000-0500", :message=>"Regexp match object", :names=>["POSINT:priority", "SYSLOGTIMESTAMP:timestamp", "TIMESTAMP_ISO8601:timestamp8601", "NONNEGINT:facility", "NONNEGINT:priority", "SYSLOGHOST:logsource", "PROG:program", "POSINT:pid", "GREEDYDATA:message"], :captures=>["86", "Jan 17 22:37:31", nil, nil, nil, "usmipaa51", "sudo", nil, "pam_unix(sudo:session): session closed for user root\n"], :level=>:debug, :file=>"grok-pure.rb", :line=>"192", :method=>"match_and_capture"}
{:timestamp=>"2022-01-17T22:37:31.503000-0500", :message=>"Event now: ", :event=>#<LogStash::Event:0x678af935 @metadata_accessors=#<LogStash::Util::Accessors:0x1cea80f2 @store={}, @lut={}>, @cancelled=false, @data={"message"=>"pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.502Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0x3a9dff60 @store={"message"=>"pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.502Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, @lut={"message"=>[{"message"=>"pam_unix(sudo:session): session closed for user root\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:31.502Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1", "priority"=>"86", "timestamp"=>"Jan 17 22:37:31", "logsource"=>"usmipaa51", "program"=>"sudo"}, "message"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"292", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.504000-0500", :message=>"Date filter: received event", :type=>"syslog", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"311", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:31.504000-0500", :message=>"Date filter looking for field", :type=>"syslog", :field=>"timestamp", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"314", :method=>"filter"}
{:timestamp=>"2022-01-18T03:37:31.000Z", :message=>"Date parsing done", :value=>"Jan 17 22:37:31", :level=>:debug, :file=>"logstash/filters/date.rb", :line=>"348", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:32.033000-0500", :message=>"Running grok filter", :event=>#<LogStash::Event:0x26be9d33 @metadata_accessors=#<LogStash::Util::Accessors:0xb6ae34e @store={}, @lut={}>, @cancelled=false, @data={"message"=>"<85>Jan 17 22:37:32 usmipaa51 polkitd[723]: Registered Authentication Agent for unix-process

177598541 (system bus name :1.447863 [/usr/bin/pkttyagent --notify-fd 5 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:32.033Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @metadata={}, @accessors=#<LogStash::Util::Accessors:0xf2da43f @store={"message"=>"<85>Jan 17 22:37:32 usmipaa51 polkitd[723]: Registered Authentication Agent for unix-process

177598541 (system bus name :1.447863 [/usr/bin/pkttyagent --notify-fd 5 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:32.033Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, @lut={"host"=>[{"message"=>"<85>Jan 17 22:37:32 usmipaa51 polkitd[723]: Registered Authentication Agent for unix-process

177598541 (system bus name :1.447863 [/usr/bin/pkttyagent --notify-fd 5 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8)\n", "@version"=>"1", "@timestamp"=>"2022-01-18T03:37:32.033Z", "type"=>"syslog", "host"=>"0:0:0:0:0:0:0:1"}, "host"]}>>, :level=>:debug, :file=>"logstash/filters/grok.rb", :line=>"277", :method=>"filter"}
{:timestamp=>"2022-01-17T22:37:32.035000-0500", :message=>"Regexp match object", :names=>["POSINT:priority", "SYSLOGTIMESTAMP:timestamp", "TIMESTAMP_ISO8601:timestamp8601", "NONNEGINT:facility", "NONNEGINT:priority", "SYSLOGHOST:logsource", "PROG:program", "POSINT:pid", "GREEDYDATA:message"], :captures=>["85", "Jan 17 22:37:32", nil, nil, nil, "usmipaa51", "polkitd", "723", "Registered Authentication Agent for unix-process

177598541 (system bus name :1.447863 [/usr/bin/pkttyagent --notify-fd 5 --fallback], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8)\n"], :level=>:debug, :file=>"grok-pure.rb", :line=>"192", :method=>"match_and_capture"}
{:timestamp=>"2022-01-17T22:37:32.035000-0500", :message=>"Event now: ", :event=>#<LogStash::Event:0x26be9d33 @metadata_accessors=#