Please have a look on raw message. Sep 11 11:52:15 172.20.16.54 AgentDevice=WindowsLog#011AgentLogFile=Application#011PluginVersion=7.2.2.959003#011Source=MSSQL$MICROSOFT##WID#011Computer=rdsadc.ciit.local#011OriginatingComputer=#011User=NETWORK SERVICE#011Domain=NT AUTHORITY#011EventID=3221243928#011EventIDCode=18456#011EventType=16#011EventCategory=4#011RecordNumber=282236#011TimeGenerated=1441997534#011TimeWritten=1441997534#011Level=0#011Keywords=0#011Task=0#011Opcode=0#011Message=Login failed for user 'NT AUTHORITY\NETWORK SERVICE'. Reason: Could not find a login matching the name provided. [CLIENT: <named pipe>]
On Thu, Sep 10, 2015 at 3:47 PM, David Lang <[email protected]> wrote: > On Thu, 10 Sep 2015, Muhammad Asif wrote: > > We are using IBM wincollect. Is nxlog opensource. >> > > there is a community versin (opensource) and a paid version, I use the > open one > > Here is a raw message I >> write in a file using rsyslog. >> > > unfortunantly this is after it's gone through the rsyslog > parsing/heuristics, can you write a message using rawmsg? so we can see > exactly what is on the wire. > > David Lang > > > Sep 10 11:26:41 192.168.6.197 AgentDevice=WindowsLog# >> 011AgentLogFile=Security#011PluginVersion=7.2.2.959003# >> 011Source=Microsoft-Windows-Security-Auditing#011Computer=WIN-C9JDK1MDI5G# >> 011OriginatingComputer=#011User=#011Domain=#011EventID=5156# >> 011EventIDCode=5156#011EventType=8#011EventCategory=12810# >> 011RecordNumber=622562#011TimeGenerated=1441866149# >> >> 011TimeWritten=1441866149#011Level=0#011Keywords=0#011Task=0#011Opcode=0#011Message=The >> Windows Filtering Platform has permitted a connection. Application >> Information: Process ID: 912 Application Name: >> \device\harddiskvolume2\windows\system32\svchost.exe >> Network Information: Direction: Inbound Source Address: 224.0.0.252 >> Source Port: 5355 Destination Address: 192.168.6.109 Destination Port: >> 50215 Protocol: 17 Filter Information: Filter Run-Time ID: 66094 >> Layer Name: Receive/Accept Layer Run-Time ID: 44 >> >> >> >> >> >> On Thu, Sep 10, 2015 at 3:17 PM, David Lang <[email protected]> wrote: >> >> On Thu, 10 Sep 2015, Muhammad Asif wrote: >>> >>> Hi David, >>> >>>> >>>> Thanks for being so prompt helper and guider. We can not enforce windows >>>> server 2012 to send logs in specific format. >>>> But we solve the issue by using the following template. >>>> >>>> $template msgonly,"%rawmsg%\n" >>>> >>>> >>>> What else solution can be? >>>> >>>> >>> well, I don't know what your rawmsg looks like, so I can't say what's >>> wrong with it, but you probably should do something more than just send >>> the >>> rawmsg on. >>> >>> what software are you using on the windows 2012 servers to send the logs? >>> Microsoft doesn't include any software to do so that I am aware of. >>> >>> David Lang >>> >>> >>> >>> Thanks >>>> >>>> On Thu, Sep 10, 2015 at 12:08 PM, David Lang <[email protected]> wrote: >>>> >>>> On Thu, 10 Sep 2015, Muhammad Asif wrote: >>>> >>>>> >>>>> Hi Geeks, >>>>> >>>>> >>>>>> We are using tcp protocol for sending logs from rsyslog to fluentd on >>>>>> same >>>>>> system. We also test tcp to send logs to other system on tcp. >>>>>> But problem is that rsyslog dont' send log complete. >>>>>> >>>>>> On Sending server >>>>>> >>>>>> *.* action(type="omfwd" target="192.168.6.193" port="514" >>>>>> protocol="tcp" >>>>>> queue.filename="forwarding" queue.size="1000000 >>>>>> queue.maxdiskspace="5g" >>>>>> queue.highwatermark="900000" queue.lowwatermark= "200000" >>>>>> queue.type="LinkedList" ) >>>>>> >>>>>> >>>>>> On receiving server >>>>>> >>>>>> if ($fromhost-ip == '192.168.6.192') then /var/log/dccc.log >>>>>> & ~ >>>>>> >>>>>> But incomplete message is received. >>>>>> >>>>>> Sent Message >>>>>> >>>>>> Sep 10 11:26:41 192.168.6.197 >>>>>> >>>>>> >>>>>> >>>>>> AgentDevice=WindowsLog#011AgentLogFile=Security#011PluginVersion=7.2.2.959003#011Source=Microsoft-Windows-Security-Auditing#011Computer=WIN-C9JDK1MDI5G#011OriginatingComputer=#011User=#011Domain=#011EventID=5156#011EventIDCode=5156#011EventType=8#011EventCategory=12810#011RecordNumber=622562#011TimeGenerated=1441866149#011TimeWritten=1441866149#011Level=0#011Keywords=0#011Task=0#011Opcode=0#011Message=The >>>>>> Windows Filtering Platform has permitted a connection. Application >>>>>> Information: Process ID: 912 Application Name: >>>>>> \device\harddiskvolume2\windows\system32\svchost.exe Network >>>>>> Information: >>>>>> Direction: Inbound Source Address: 224.0.0.252 Source Port: 5355 >>>>>> Destination Address: 192.168.6.109 Destination Port: 50215 >>>>>> Protocol: >>>>>> 17 Filter Information: Filter Run-Time ID: 66094 Layer Name: >>>>>> Receive/Accept Layer Run-Time ID: 44 >>>>>> >>>>>> >>>>>> >>>>>> Received Message >>>>>> >>>>>> Sep 10 11:26:41 192.168.6.197 AgentDevice=WindowsLog#011AgentL Windows >>>>>> Filtering Platform has permitted a connection. Application >>>>>> Information: >>>>>> Process ID: 912 Application Name: >>>>>> \device\harddiskvolume2\windows\system32\svchost.exe Network >>>>>> Information: >>>>>> Direction: Inbound Source Address: 224.0.0.252 Source Port: 5355 >>>>>> Destination Address: 192.168.6.109 Destination Port: 50215 >>>>>> Protocol: >>>>>> 17 Filter Information: Filter Run-Time ID: 66094 Layer Name: >>>>>> Receive/Accept Layer Run-Time ID: 44 >>>>>> >>>>>> >>>>>> The problem is that your sent mesasge is malformed. After the >>>>> hostname/IP >>>>> address, you are supposed to have the programname[with optional pid]: >>>>> that >>>>> is limtied by teh spec to 32 characters. >>>>> >>>>> instead you have >>>>> >>>>> >>>>> >>>>> >>>>> AgentDevice=WindowsLog#011AgentLogFile=Security#011PluginVersion=7.2.2.959003#011Source=Microsoft-Windows-Security-Auditing#011Computer=WIN-C9JDK1MDI5G#011OriginatingComputer=#011User=#011Domain=#011EventID=5156#011EventIDCode=5156#011EventType=8#011EventCategory=12810#011RecordNumber=622562#011TimeGenerated=1441866149#011TimeWritten=1441866149#011Level=0#011Keywords=0#011Task=0#011Opcode=0#011Message=The >>>>> >>>>> which is a LOT longer than 32 characters. >>>>> >>>>> whatever it is that you have slurping up the logs from windows and >>>>> sending >>>>> them to rsyslog in the first place needs to be fixed. >>>>> >>>>> David Lang >>>>> _______________________________________________ >>>>> rsyslog mailing list >>>>> http://lists.adiscon.net/mailman/listinfo/rsyslog >>>>> http://www.rsyslog.com/professional-services/ >>>>> What's up with rsyslog? Follow https://twitter.com/rgerhards >>>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a >>>>> myriad >>>>> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you >>>>> DON'T LIKE THAT. >>>>> >>>>> _______________________________________________ >>>>> >>>> rsyslog mailing list >>>> http://lists.adiscon.net/mailman/listinfo/rsyslog >>>> http://www.rsyslog.com/professional-services/ >>>> What's up with rsyslog? Follow https://twitter.com/rgerhards >>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad >>>> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you >>>> DON'T LIKE THAT. >>>> >>>> _______________________________________________ >>>> >>> rsyslog mailing list >>> http://lists.adiscon.net/mailman/listinfo/rsyslog >>> http://www.rsyslog.com/professional-services/ >>> What's up with rsyslog? Follow https://twitter.com/rgerhards >>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad >>> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you >>> DON'T LIKE THAT. >>> >>> _______________________________________________ >> rsyslog mailing list >> http://lists.adiscon.net/mailman/listinfo/rsyslog >> http://www.rsyslog.com/professional-services/ >> What's up with rsyslog? Follow https://twitter.com/rgerhards >> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad >> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you >> DON'T LIKE THAT. >> >> _______________________________________________ > rsyslog mailing list > http://lists.adiscon.net/mailman/listinfo/rsyslog > http://www.rsyslog.com/professional-services/ > What's up with rsyslog? Follow https://twitter.com/rgerhards > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > DON'T LIKE THAT. > _______________________________________________ rsyslog mailing list http://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.

