2014-06-11 09:13 AM
Hi,
I have some logs from a Red-Hat server which are interpreted as Big-IP logs.
How can I configure my Log Decoder to use only one specific parser for a specific device IP?
(I must keep the Big-IP Parser...)
Thanks!
2015-08-08 06:28 PM
2014-06-11 09:28 AM
I would also love to know this. I have resorted to reparsing with in rhlinux just to get around it.
2014-06-11 11:26 AM
you can drill down like this: device.ip='xxx' && device.type='rhlinux'
i don't think there is configuration for the parser, unless modify the parser.
2014-06-11 12:55 PM
Is it really impossible to do something like this on Log Decoder (pseudo code) :
if device.ip == (10.0.0.1|10.0.0.2|10.0.0.3) {
parser = redhat
} else if device.ip in 10.0.1.0/34 {
parser = cisco
} else {
try all parsers...
}
2014-06-12 03:33 AM
i don't see this function. maybe can check with support and raise a feature request.
2014-06-24 05:34 AM
Hi,
I have the same issue.
As a workaround I would recommend only to turn on parsers that you actually need on decoder as lots of syslogs look the same and SA can misinterpret it.
In Envision we had a possibility to change device type if it was misinterpreted and force use of specific parser. Here we have tons of "multi-device" (lot's of different event sources on one ip) because lots of log look the same. For example I have one device with types: bigip, rhlinux, junosrouter and in fact it's a rhlinux. If rhlinux parser cannot parse this log I would prefer it to be unknown (unparsed) not to mislead reports and investigations.
The feature you're talking about, or interpretation of envision possibilities would be really great.
2014-06-27 02:49 PM
That appears to be the only option currently. I also have been adding new headers/parsers to linux to take care of the outliers (mostly bigip) then giving them distinct messageids that I can track.
2015-08-08 06:28 PM
2021-11-17 01:38 AM
2021-11-17 01:46 AM
Hello Kamarul,
The document you're referring to is no longer available, please refer to the steps below:
Follow these directions to configure a specific device parser when collecting logs from a given event source. These steps are conducted in the Security Analytics UI as an administrator.
Go to Explore view of the Log Decoder service.
For 11.x, Admin -> Services -> <Log Decoder > -> View -> Explore
Navigate to Decoder -> Parsers.
Right-click Parsers and select Properties.
From the drop-down, select ipdevice.
In the parameters field, enter the following: op=edit entries=+<ip_address>=<parser_name>
Thanks