These are my two inputs and the extractor behind them
Raw/Plaintext TCP JSON Extractor ONLY (Raw/Plaintext TCP) running
On node 3b7c3971 / graylog
Show received messages Manage extractors Stop input More actions
recv_buffer_size: 1048576
port: 5556
tls_key_file:
tls_key_password: *******
tls_client_auth_cert_file:
max_message_size: 2097152
tls_client_auth: disabled
override_source:
bind_address: 0.0.0.0
tls_cert_file:
JSON(Flatten Structures=disabled) (JSON)
Details Edit Remove
Trying to extract data from message into message, leaving the original
intact.
Configuration:
flatten: false
key_separator: .
list_separator: ,
kv_separator: =
---------------------------------------------------------------------------------------
JSON Extractor (flatten structures=enabled) (Raw/Plaintext TCP) running
On node 3b7c3971 / graylog
Show received messages Manage extractors Stop input More actions
recv_buffer_size: 1048576
port: 5557
tls_key_file: admin
tls_key_password: *******
tcp_keepalive: true
tls_client_auth_cert_file:
max_message_size: 2097152
tls_client_auth: disabled
override_source:
bind_address: 0.0.0.0
tls_cert_file:
flatten json (JSON)
Details Edit Remove
Trying to extract data from message into message, leaving the original
intact.
Configuration:
flatten: true
key_separator: .
list_separator: ,
kv_separator: =
---------------------------------
Please let me know if you need any further information to help me. The
example I provided below shows that value of key abc is [[{t=value1,
v=154.99}, {t=value2, v=0.0}]]. I cannot query individual t, and v in it.
Whereas splunk, allows it. Now I am working on testing if ELK can do this..
Any ideas ?
Thanks
Tushar
On Saturday, February 13, 2016 at 12:16:41 PM UTC-8, Tushar Goel wrote:
>
> Hi Jochen,
>
> Sorry, did not see this. I did not get any notification that someone
> replied to this. I am new to google groups.
> I used netcat to send data on tcp raw data input finally. Since,my primary
> objective is to test its ability to parse our logs(which are nested
> structures)
> while read x; do echo "$x"|nc IP 5556;done <error_case.log
>
> That is where most of the open source splunk alternatives fail with our
> use case. This functionality is very critical to us.
>
> I also replied to you on another thread, pasting here as well
>
>
> We are looking for something that parses our nested json logs. I tested
> graylog but it fails at parsing nested arrays. Not even flattening
> structures helps. Any suggestions?
> For example:
> abc[[{t=value1, v=154.99}, {t=value2, v=0.0}]]
> flatten structures=enable or disabled in json extractor, it remains the
> same.
> Thanks
> Tushar
>
> However
>
> On Tuesday, December 29, 2015 at 4:36:57 AM UTC-8, Jochen Schalanda wrote:
>>
>> Hi,
>>
>> did you start a GELF TCP input on the Graylog server you're trying to
>> send the messages to and is it accessible from the machine the Graylog
>> Collector is running on?
>>
>> Additionally, the type setting for the GELF output in the Graylog
>> Collector configuration is wrong. It should be "gelf" instead of "file"
>> (see http://docs.graylog.org/en/latest/pages/collector.html#gelf-output).
>>
>>
>> Cheers,
>> Jochen
>>
>> On Monday, 28 December 2015 13:49:05 UTC+1, Tushar Goel wrote:
>>>
>>> Hi,
>>>
>>> Testig to send json logs to GRAYLog.
>>> Getting below error in graylogcollector-stdout.2015-12-28
>>>
>>> 2015-12-28T04:46:13.626-0800 ERROR [gelfTcpTransport-1-1]
>>> gelfclient.transport.GelfTcpTransport - Connection failed: Connection
>>> refused: no further information: /XX.XXX.XXX.XX:12201
>>>
>>> Please advice.
>>> Here is my collector.conf
>>>
>>> server-url = "http://XX.XXX.XXX.XX:12900/"
>>>
>>> inputs {
>>> xbec_transactions {
>>> type = "file"
>>> path = "C:\\Users\\tugoel\\Documents\\GSP\\Temp\\xbec_transactions.log"
>>> charset = "utf-8"
>>> content-splitter = "newline"
>>> }
>>> //win-eventlog-system {
>>> // type = "windows-eventlog"
>>> // source-name = "System"
>>> // poll-interval = "1s"
>>> //}
>>> // win-eventlog-security {
>>> // type = "windows-eventlog"
>>> // source-name = "Security"
>>> // poll-interval = "1s"
>>> // }
>>> }
>>>
>>> outputs {
>>> gelf-tcp {
>>> type = "file"
>>> host = "XX.XXX.XXX.XX"
>>> port = 12201
>>> }
>>> }
>>>
>>>
--
You received this message because you are subscribed to the Google Groups
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/graylog2/bfc3c7d3-81c4-4c2c-adbd-a1c1595262eb%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.