Thanks!

Wasn't sure whether you meant to use your config instead of my default 
rsyslog-config or to insert yours at the beginning of my module statements. I 
did the former and patched a few errors to wind up with just this:

module(
        load="impstats"
        interval="10"
        resetCounters="off"
        format="legacy"
        file="/var/log/pstats"
)

# load the modules to listen to the network and configure them to send their
#  logs to the 'inbound' ruleset
module(load="imtcp")
module(load="imudp" timerequery="4" )
input(type="imtcp" port="10514" ruleset="inbound" )
input(type="imudp" port="10514" ruleset="inbound")

# define the inbound ruleset, all logs will go to elasticsearch
ruleset(
        name="inbound"
        queue.type="fixedarray"
){
        action(
              name = "send_es"
              type="omelasticsearch"
              action.resumeretrycount="-1"
        )

What I'm seeing in /var/log/pstat is lots and lots of example at the end and 
still still no sign of traffic from security onion in kibana. Ideas?

BTW: the goal is to keep SO clients and server completely intact and unmodified 
(except for the two lines I showed earlier that copy all sensor -> server 
events to a separate VM. This will grow into a spark/hadoop cluster that we'll 
evolve to do  advanced analytics that SO doesn't provide. The mixing of 
syslog-ng and rsyslog is just because SO uses Ubuntu and bcoxVM uses Xubuntu. 
According to the docs they're interchangable.

I've seen the recipe link you provided as well as a similar one that routes 
traffic via kafka. I used a different one (link provided earlier) because it 
didn't involve logstash/ruby to avoid unnecessary complexity. Once I get this 
recipe working I'll probably try via kafka.

Sat Jan 30 12:13:09 2016: imtcp(10514): origin=imtcp submitted=0 
Sat Jan 30 12:13:09 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:09 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:09 2016: resource-usage: origin=impstats utime=4000 stime=4000 
maxrss=9724 minflt=184 majflt=0 inblock=8 oublock=176 nvcsw=124 nivcsw=4 
Sat Jan 30 12:13:09 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0 
Sat Jan 30 12:13:09 2016: main Q: origin=core.queue size=7 enqueued=422 full=0 
discarded.full=0 discarded.nf=0 maxqsize=9 
Sat Jan 30 12:13:09 2016: imudp(w0): origin=imudp called.recvmmsg=0 
called.recvmsg=0 msgs.received=0 
Sat Jan 30 12:13:19 2016: omelasticsearch: origin=omelasticsearch submitted=0 
failed.http=0 failed.httprequests=0 failed.es=0 
Sat Jan 30 12:13:19 2016: send_es: origin=core.action processed=0 failed=0 
suspended=0 suspended.duration=0 resumed=0 
Sat Jan 30 12:13:19 2016: imtcp(10514): origin=imtcp submitted=0 
Sat Jan 30 12:13:19 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:19 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:19 2016: resource-usage: origin=impstats utime=4000 stime=4000 
maxrss=9724 minflt=184 majflt=0 inblock=8 oublock=192 nvcsw=126 nivcsw=4 
Sat Jan 30 12:13:19 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0 
Sat Jan 30 12:13:19 2016: main Q: origin=core.queue size=7 enqueued=431 full=0 
discarded.full=0 discarded.nf=0 maxqsize=9 
Sat Jan 30 12:13:19 2016: imudp(w0): origin=imudp called.recvmmsg=0 
called.recvmsg=0 msgs.received=0 
Sat Jan 30 12:13:29 2016: omelasticsearch: origin=omelasticsearch submitted=0 
failed.http=0 failed.httprequests=0 failed.es=0 
Sat Jan 30 12:13:29 2016: send_es: origin=core.action processed=0 failed=0 
suspended=0 suspended.duration=0 resumed=0 
Sat Jan 30 12:13:29 2016: imtcp(10514): origin=imtcp submitted=0 
Sat Jan 30 12:13:29 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:29 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:29 2016: resource-usage: origin=impstats utime=4000 stime=4000 
maxrss=9724 minflt=184 majflt=0 inblock=8 oublock=192 nvcsw=128 nivcsw=4 
Sat Jan 30 12:13:29 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0 
Sat Jan 30 12:13:29 2016: main Q: origin=core.queue size=7 enqueued=440 full=0 
discarded.full=0 discarded.nf=0 maxqsize=9 
Sat Jan 30 12:13:29 2016: imudp(w0): origin=imudp called.recvmmsg=0 
called.recvmsg=0 msgs.received=0 
Sat Jan 30 12:13:39 2016: omelasticsearch: origin=omelasticsearch submitted=0 
failed.http=0 failed.httprequests=0 failed.es=0 
Sat Jan 30 12:13:39 2016: send_es: origin=core.action processed=0 failed=0 
suspended=0 suspended.duration=0 resumed=0 
Sat Jan 30 12:13:39 2016: imtcp(10514): origin=imtcp submitted=0 
Sat Jan 30 12:13:39 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:39 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:39 2016: resource-usage: origin=impstats utime=4000 stime=4000 
maxrss=9724 minflt=184 majflt=0 inblock=8 oublock=192 nvcsw=130 nivcsw=4 
Sat Jan 30 12:13:39 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0 
Sat Jan 30 12:13:39 2016: main Q: origin=core.queue size=7 enqueued=449 full=0 
discarded.full=0 discarded.nf=0 maxqsize=9 
Sat Jan 30 12:13:39 2016: imudp(w0): origin=imudp called.recvmmsg=0 
called.recvmsg=0 msgs.received=0 
Sat Jan 30 12:13:49 2016: omelasticsearch: origin=omelasticsearch submitted=0 
failed.http=0 failed.httprequests=0 failed.es=0 
Sat Jan 30 12:13:49 2016: send_es: origin=core.action processed=0 failed=0 
suspended=0 suspended.duration=0 resumed=0 
Sat Jan 30 12:13:49 2016: imtcp(10514): origin=imtcp submitted=0 
Sat Jan 30 12:13:49 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:49 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:49 2016: resource-usage: origin=impstats utime=4000 stime=4000 
maxrss=9724 minflt=184 majflt=0 inblock=8 oublock=192 nvcsw=132 nivcsw=4 
Sat Jan 30 12:13:49 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0 
Sat Jan 30 12:13:49 2016: main Q: origin=core.queue size=7 enqueued=458 full=0 
discarded.full=0 discarded.nf=0 maxqsize=9 
Sat Jan 30 12:13:49 2016: imudp(w0): origin=imudp called.recvmmsg=0 
called.recvmsg=0 msgs.received=0 
Sat Jan 30 12:13:59 2016: omelasticsearch: origin=omelasticsearch submitted=0 
failed.http=0 failed.httprequests=0 failed.es=0 
Sat Jan 30 12:13:59 2016: send_es: origin=core.action processed=0 failed=0 
suspended=0 suspended.duration=0 resumed=0 
Sat Jan 30 12:13:59 2016: imtcp(10514): origin=imtcp submitted=0 
Sat Jan 30 12:13:59 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:59 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:13:59 2016: resource-usage: origin=impstats utime=4000 stime=4000 
maxrss=9724 minflt=184 majflt=0 inblock=8 oublock=208 nvcsw=134 nivcsw=4 
Sat Jan 30 12:13:59 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0 
Sat Jan 30 12:13:59 2016: main Q: origin=core.queue size=7 enqueued=467 full=0 
discarded.full=0 discarded.nf=0 maxqsize=9 
Sat Jan 30 12:13:59 2016: imudp(w0): origin=imudp called.recvmmsg=0 
called.recvmsg=0 msgs.received=0 
Sat Jan 30 12:14:08 2016: omelasticsearch: origin=omelasticsearch submitted=0 
failed.http=0 failed.httprequests=0 failed.es=0 
Sat Jan 30 12:14:08 2016: send_es: origin=core.action processed=0 failed=0 
suspended=0 suspended.duration=0 resumed=0 
Sat Jan 30 12:14:08 2016: imtcp(10514): origin=imtcp submitted=0 
Sat Jan 30 12:14:08 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:14:08 2016: imudp(*:10514): origin=imudp submitted=0 
Sat Jan 30 12:14:08 2016: resource-usage: origin=impstats utime=4000 stime=4000 
maxrss=9724 minflt=184 majflt=0 inblock=8 oublock=208 nvcsw=137 nivcsw=4 
Sat Jan 30 12:14:08 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0 
Sat Jan 30 12:14:08 2016: main Q: origin=core.queue size=7 enqueued=476 full=0 
discarded.full=0 discarded.nf=0 maxqsize=9 
Sat Jan 30 12:14:08 2016: imudp(w0): origin=imudp called.recvmmsg=0 
called.recvmsg=0 msgs.received=0

Dr. Brad J. Cox    Cell: 703-594-1883 Skype: dr.brad.cox




> On Jan 29, 2016, at 8:21 PM, David Lang <[email protected]> wrote:
> 
> Ok, that's a lot cleaner. Do you want the logs that you receive remotely to 
> go anywhere other than ES?
> 
> not that I want to discourage you from using rsyslog ;-)
> 
> But are you aware that syslog-ng can deliver logs directly to ES? If rsyslog 
> isn't providing any other value (and especially if you are already very 
> comforatable with syslog-ng), you may be better off going directly instead of 
> adding a hop. I don't know syslog-ng and what it can and can't do. I've hit 
> unpleasent surprises with both nxlog and logstash when I assumed that they 
> would do some of the things that I find trivial to do with rsyslog :-)
> 
> a quick google search found: 
> https://www.balabit.com/sites/default/files/documents/syslog-ng-ose-latest-guides/en/syslog-ng-ose-guide-admin/html/configuring-destinations-elasticsearch.html
> 
> In reading the linux-help page, it looks like it's having you send logs to 
> logstash, so you would end up running syslog-ng, rsyslog, and logstash. I 
> would sure not want to do that if I could avoid it.
> 
> Assuming that you don't need the remote logs to go anywhere else, and you 
> don't need anything local to go to ES, then remove the UDP/TCP stuff at the 
> top of your current config and add the following
> 
> # load the pstats module and output data every 10 sec. change this after 
> testing
> #   remove file (so the pstats data is processed like other log messages)
> #   change 10 to a value that is reasonable for your environment
> #  note that counters are not reset so most values are cumulative since 
> startup
> 
> module(load="impstats" interval="10" resetCounters="off" format="legacy" 
> file="/var/log/pstats")
> 
> # load the modules to listen to the network and configure them to send their
> #  logs to the 'inbound' ruleset
> module(load="imtcp")
> module(load="imudp" timerequery="4" )
> input(type="imtcp" port="514" ruleset="inbound" )
> input(type="imudp" port="514" ruleset="inbound")
> 
> # define the inbound ruleset, all logs will go to elasticsearch
> 
> ruleset(name="inbound" queue.type="fixedarray"){
>       action(name = "send_es" type="omelasticsearch" 
> action.resumeretrycount="-1")
> }
> 
> then do
> 
> rsyslogd -N2
> 
> to check the syntax of things.
> 
> If there are no errors, restart rsyslog and look at the /var/log/pstats logs, 
> specifically you are going to be looking for the imtcp, inblund, and send_es 
> lines in each 10 second batch.
> 
> now, how this differs from what you had before:
> 
>>>>  *.* action(type="omelasticsearch"
> 
> you don't need *.* (match everything)
> 
>>>>             server="localhost"
>>>>             serverport="9200"
> 
> these are the default. validate that you do have ES running on the same box 
> as rsyslog, and it is listening on port 9200
> 
>>>>             template="logstash"
>>>>             searchIndex="logstash-index"
>>>>             dynSearchIndex="on"
>>>>             searchType="syslog"
>>>>             bulkmode="on"
> 
> These are more advanced features and interact with how you have elasticsearch 
> setup, so let's hold off on these for the moment.
> 
> The first one we will need to add is searchIndex. How do you have ES setup 
> currently? What index (or indexes) do you want the logs to go into?
> 
>>>>             queue.type="linkedlist"
>>>>             queue.size="5000"
>>>>             queue.dequeuebatchsize="300"
> 
> I moved the queue from the elasticsearch action to the ruleset. We may add 
> one back later if there are enough other actions in the rulset
> 
>>>>             action.resumeretrycount="-1")
> 
> without this, a failure won't be retried and you will have trouble figuring 
> out what's happening.
> 
> David Lang
> 
> On Fri, 29 Jan 2016, Brad Cox wrote:
> 
>> Date: Fri, 29 Jan 2016 19:48:59 -0500
>> From: Brad Cox <[email protected]>
>> Reply-To: rsyslog-users <[email protected]>
>> To: rsyslog-users <[email protected]>
>> Subject: Re: [rsyslog] Logs from remote server not making it to Elastic      
>> Search
>> I only care about remote logs. I only need these to go to elastic search. I 
>> don't care about the local ones except it would be nice to have them go to 
>> files somewhere.
>> 
>> I started with the plain rsyslog.conf that came with the Xubuntu iso. I 
>> pasted it at the end of this message.
>> 
>> I modified the security onion syslog-ng.conf file to copy everything it 
>> collects to tcp port 10514. These are the key lines I added at the end of 
>> its original conf.
>> 
>> destination d_net { tcp("192.168.48.145" port(10514)); };
>> log { source(s_syslog); destination(d_net); }
>> 
>> SO events come from various SO sensors that I don't yet fully understand 
>> (snort, bro, elsa, others) with many more sensor types expected over time. 
>> Right now I'm just trying to collect them all in ES. I expect to untangle 
>> the mess once I know what I need.
>> 
>> Here's my backup of rsyslog.conf
>> 
>> #  /etc/rsyslog.conf Configuration file for rsyslog.
>> #
>> #                    For more information see
>> #                    /usr/share/doc/rsyslog-doc/html/rsyslog_conf.html
>> #
>> #  Default logging rules can be found in /etc/rsyslog.d/50-default.conf
>> 
>> 
>> #################
>> #### MODULES ####
>> #################
>> 
>> $ModLoad imuxsock # provides support for local system logging
>> $ModLoad imklog   # provides kernel logging support
>> #$ModLoad immark  # provides --MARK-- message capability
>> 
>> # provides UDP syslog reception
>> #$ModLoad imudp
>> #$UDPServerRun 514
>> 
>> # provides TCP syslog reception
>> $ModLoad imtcp
>> $InputTCPServerRun 10514
>> 
>> # Enable non-kernel facility klog messages
>> $KLogPermitNonKernelFacility on
>> 
>> ###########################
>> #### GLOBAL DIRECTIVES ####
>> ###########################
>> 
>> #
>> # Use traditional timestamp format.
>> # To enable high precision timestamps, comment out the following line.
>> #
>> $ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat
>> 
>> # Filter duplicated messages
>> $RepeatedMsgReduction on
>> 
>> #
>> # Set the default permissions for all log files.
>> #
>> $FileOwner syslog
>> $FileGroup adm
>> $FileCreateMode 0640
>> $DirCreateMode 0755
>> $Umask 0022
>> $PrivDropToUser syslog
>> $PrivDropToGroup syslog
>> 
>> #
>> # Where to place spool and state files
>> #
>> $WorkDirectory /var/spool/rsyslog
>> 
>> #
>> # Include all config files in /etc/rsyslog.d/
>> #
>> $IncludeConfig /etc/rsyslog.d/*.conf
>> 
>> 
>> Dr. Brad J. Cox    Cell: 703-594-1883 Skype: dr.brad.cox
>> 
>> 
>> 
>> 
>>> On Jan 29, 2016, at 7:33 PM, David Lang <[email protected]> wrote:
>>> 
>>> Ok, changing the default ruleset to remote is probably not what you want to 
>>> do, because then your local messages won't go to all the files defined in 
>>> the local ruleset.
>>> 
>>> Let's back up a bit here. Before you started with Elasticsearch, what did 
>>> your config look like? Let's go back to that first.
>>> 
>>> Then let's talk about what do you want to have go to elasticsearch. Do you 
>>> want everything there?, only some things there?, all in one index?, some 
>>> logs in one, some in another?, etc.
>>> 
>>> Then we can add an action to deliver the logs to elasticsearch to the right 
>>> place in your config file.
>>> 
>>> We will probably also want to add impstats so that you can see how many 
>>> logs are being processed and what are being queued. We may need to turn on 
>>> debugging if we see everything being queued to elasticsearch, but that's 
>>> further down the line.
>>> 
>>> For now, let's just get back to a state that you understand and is handling 
>>> your logs the way you want them handled (except for ES)
>>> 
>>> David Lang
>>> 
>>> On Fri, 29 Jan 2016, Brad Cox wrote:
>>> 
>>>> Strange. I copied that directly from  
>>>> https://linux-help.org/wiki/logging/rsyslog/advanced-rsyslog.
>>>> 
>>>> I've moved that action block into the remote section as shown below and 
>>>> restarted rsyslogd. Also changed the DefaultRuleSet to remote.
>>>> 
>>>> ruleset(name="remote") {
>>>>  $IncludeConfig /etc/rsyslog.d/*.remote
>>>>  action(type="omfile" DynaFile="RemoteHost")
>>>>  *.* action(type="omelasticsearch"
>>>>             server="localhost"
>>>>             serverport="9200"
>>>>             template="logstash"
>>>>             searchIndex="logstash-index"
>>>>             dynSearchIndex="on"
>>>>             searchType="syslog"
>>>>             bulkmode="on"
>>>>             queue.type="linkedlist"
>>>>             queue.size="5000"
>>>>             queue.dequeuebatchsize="300"
>>>>             action.resumeretrycount="-1")
>>>> }
>>>> $DefaultRuleset remote
>>>> 
>>>> But still no sign of security onion messages in elastic search. I'm doing 
>>>> all this with very little understanding at this point. Any insight into 
>>>> how to diagnose such problems would be most helpful.
>>>> 
>>>> Dr. Brad J. Cox    Cell: 703-594-1883 Skype: dr.brad.cox
>>>> 
>>>> 
>>>> 
>>>> 
>>>>> On Jan 29, 2016, at 6:53 PM, David Lang <[email protected]> wrote:
>>>>> 
>>>>> from a quick glance, the elasticsearch call is part of the local ruleset 
>>>>> while anything that arrives remotely only has the remote ruleset applied 
>>>>> to it.
>>>>> 
>>>>> Am I missing something?
>>>>> 
>>>>> David Lang
>>>>> 
>>>>> 
>>>>> On Fri, 29 Jan 2016, Brad Cox wrote:
>>>>> 
>>>>>> Date: Fri, 29 Jan 2016 13:55:56 -0500
>>>>>> From: Brad Cox <[email protected]>
>>>>>> Reply-To: rsyslog-users <[email protected]>
>>>>>> To: rsyslog-users <[email protected]>
>>>>>> Subject: Re: [rsyslog] Logs from remote server not making it to Elastic  
>>>>>> Search
>>>>>> OK. Do you need the rsyslog.d/* files too?
>>>>>> 
>>>>>> # https://linux-help.org/wiki/logging/rsyslog/advanced-rsyslog
>>>>>> # rsyslog v7 configuration file
>>>>>> 
>>>>>> # For more information see /usr/share/doc/rsyslog-*/rsyslog_conf.html
>>>>>> # If you experience problems, see 
>>>>>> http://www.rsyslog.com/doc/troubleshoot.html
>>>>>> # $DebugFile /var/log/rsyslog.debug.log
>>>>>> # $DebugLevel 1
>>>>>> 
>>>>>> #### MODULES ####
>>>>>> 
>>>>>> module(load="imuxsock") # local system logging (e.g. via logger command)
>>>>>> module(load="imklog")   # provides kernel logging (previously done by 
>>>>>> rklogd)
>>>>>> #module(load"immark")  # --MARK-- message capability
>>>>>> module(load="mmnormalize")
>>>>>> module(load="omelasticsearch")
>>>>>> 
>>>>>> # Provides UDP syslog reception
>>>>>> # for parameters see http://www.rsyslog.com/doc/imudp.html
>>>>>> #module(load="imudp") # needs to be done just once
>>>>>> #input(type="imudp" port="514")
>>>>>> module(load="imudp")
>>>>>> 
>>>>>> # Provides TCP syslog reception
>>>>>> # for parameters see http://www.rsyslog.com/doc/imtcp.html
>>>>>> # module(load="imtcp") # needs to be done just once
>>>>>> # input(type="imtcp" port="10514")
>>>>>> # module(load="imtcp" MaxSessions="500")
>>>>>> # module(load="imrelp" RuleSet="remote")
>>>>>> module(load="imtcp" MaxSessions="500")
>>>>>> #input(type="imtcp" port="10514")
>>>>>> input(type="imudp" port="10514" ruleset="remote")
>>>>>> input(type="imtcp" port="10514" ruleset="remote")
>>>>>> 
>>>>>> $AllowedSender TCP, 127.0.0.1, 192.168.48.137
>>>>>> 
>>>>>> #### GLOBAL DIRECTIVES ####
>>>>>> # Templates
>>>>>> template(name="RemoteHost" type="string" 
>>>>>> string="/srv/log/%HOSTNAME%/%$YEAR%/%$MONTH%/syslog-%$DAY%.log")
>>>>>> $IncludeConfig /etc/rsyslog.d/*.template
>>>>>> 
>>>>>> # Use default timestamp format
>>>>>> $ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat
>>>>>> 
>>>>>> # Include all config files in /etc/rsyslog.d/
>>>>>> $IncludeConfig /etc/rsyslog.d/*.conf
>>>>>> 
>>>>>> 
>>>>>> #### RULES ####
>>>>>> ruleset(name="local") {
>>>>>> # Log all kernel messages to the console.
>>>>>> # Logging much else clutters up the screen.
>>>>>> kern.*                                                  /var/log/kern.log
>>>>>> 
>>>>>> # Log anything (except mail) of level info or higher.
>>>>>> # Don't log private authentication messages!
>>>>>> *.info;mail.none;authpriv.none;cron.none                /var/log/messages
>>>>>> 
>>>>>> # The authpriv file has restricted access.
>>>>>> authpriv.*                                              /var/log/secure
>>>>>> 
>>>>>> # Log all the mail messages in one place.
>>>>>> mail.*                                                  -/var/log/maillog
>>>>>> 
>>>>>> 
>>>>>> # Log cron stuff
>>>>>> cron.*                                                  /var/log/cron
>>>>>> 
>>>>>> # Everybody gets emergency messages
>>>>>> *.emerg                                                 :omusrmsg:*
>>>>>> 
>>>>>> # Save news errors of level crit and higher in a special file.
>>>>>> uucp,news.crit                                          /var/log/spooler
>>>>>> 
>>>>>> # Save boot messages also to boot.log
>>>>>> local7.*                                                /var/log/boot.log
>>>>>> 
>>>>>> *.* action(type="omelasticsearch"
>>>>>>            server="localhost"
>>>>>>            serverport="9200"
>>>>>>            template="logstash"
>>>>>>            searchIndex="logstash-index"
>>>>>>            dynSearchIndex="on"
>>>>>>            searchType="syslog"
>>>>>>            bulkmode="on"
>>>>>>            queue.type="linkedlist"
>>>>>>            queue.size="5000"
>>>>>>            queue.dequeuebatchsize="300"
>>>>>>            action.resumeretrycount="-1")
>>>>>> }
>>>>>> $DefaultRuleset local
>>>>>> 
>>>>>> ruleset(name="remote") {
>>>>>> $IncludeConfig /etc/rsyslog.d/*.remote
>>>>>> action(type="omfile" DynaFile="RemoteHost")
>>>>>> }
>>>>>> #input(type="imudp" port="10514" ruleset="remote")
>>>>>> #input(type="imtcp" port="10514" ruleset="remote")
>>>>>> 
>>>>>> # $InputRELPServerBindRuleset remote
>>>>>> # input(type="imrelp" port="20514")
>>>>>> 
>>>>>> Dr. Brad J. Cox    Cell: 703-594-1883 Skype: dr.brad.cox
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>>> On Jan 29, 2016, at 1:20 PM, David Lang <[email protected]> wrote:
>>>>>>> 
>>>>>>> please post your config (rsyslog.conf)
>>>>>>> 
>>>>>>> David Lang
>>>>>>> 
>>>>>>> On Fri, 29 Jan 2016, Brad Cox wrote:
>>>>>>> 
>>>>>>>> Date: Fri, 29 Jan 2016 12:58:34 -0500
>>>>>>>> From: Brad Cox <[email protected]>
>>>>>>>> Reply-To: rsyslog-users <[email protected]>
>>>>>>>> To: [email protected]
>>>>>>>> Subject: [rsyslog] Logs from remote server not making it to Elastic 
>>>>>>>> Search
>>>>>>>> I'm trying to centralize logs that originate from syslog-ng on a 
>>>>>>>> Security
>>>>>>>> Onion server (Ubuntu 14.04.3-11) at an central server running rsyslog
>>>>>>>> latest. I've configured SO to copy all logs to the central server on 
>>>>>>>> TCP
>>>>>>>> port 10514 and confirmed that Tcpdump shows log traffic (on TCP port 
>>>>>>>> 10514)
>>>>>>>> is leaving SO and arriving at the central server.
>>>>>>>> 
>>>>>>>> My goal is to ingest the remote logs into Elastic Search so I've been
>>>>>>>> following the instructions at
>>>>>>>> https://linux-help.org/wiki/logging/rsyslog/advanced-rsyslog. I had to
>>>>>>>> tweak some settings to get past parsing errors from rsyslog but that 
>>>>>>>> seems
>>>>>>>> OK now (according to rsyslogd -f rsyslog.conf -N1 with and without
>>>>>>>> $DebugLevel=1). At least rsyslogd now launches and runs correctly.
>>>>>>>> 
>>>>>>>> Problem is, only local logs are appearing in the Elastic Search index
>>>>>>>> (according to kibana). There's no sign of remote logs from Security 
>>>>>>>> Onion
>>>>>>>> in the ES indices. The only trace of remote logs is in
>>>>>>>> /srv/log/SecurityOnionVM/...) which seems to contain the right 
>>>>>>>> contents,
>>>>>>>> although I can find no signs of how they wound up there in the debug 
>>>>>>>> logs.
>>>>>>>> 
>>>>>>>> I'm new at rsyslog and have ridden the documentation about as far as it
>>>>>>>> will take me. Can someone help me get this bus on its wheels?
>>>>>>>> 
>>>>>>>> Dr. Brad J. Cox    Cell: 703-594-1883 Blog: 
>>>>>>>> http://bradjcox.blogspot.com
>>>>>>>> _______________________________________________
>>>>>>>> rsyslog mailing list
>>>>>>>> http://lists.adiscon.net/mailman/listinfo/rsyslog
>>>>>>>> http://www.rsyslog.com/professional-services/
>>>>>>>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>>>>>>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a 
>>>>>>>> myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST 
>>>>>>>> if you DON'T LIKE THAT.
>>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> rsyslog mailing list
>>>>>>> http://lists.adiscon.net/mailman/listinfo/rsyslog
>>>>>>> http://www.rsyslog.com/professional-services/
>>>>>>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>>>>>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a 
>>>>>>> myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST 
>>>>>>> if you DON'T LIKE THAT.
>>>>>> 
>>>>>> _______________________________________________
>>>>>> rsyslog mailing list
>>>>>> http://lists.adiscon.net/mailman/listinfo/rsyslog
>>>>>> http://www.rsyslog.com/professional-services/
>>>>>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>>>>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad 
>>>>>> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you 
>>>>>> DON'T LIKE THAT.
>>>>>> 
>>>>> _______________________________________________
>>>>> rsyslog mailing list
>>>>> http://lists.adiscon.net/mailman/listinfo/rsyslog
>>>>> http://www.rsyslog.com/professional-services/
>>>>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>>>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad 
>>>>> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you 
>>>>> DON'T LIKE THAT.
>>>> 
>>>> _______________________________________________
>>>> rsyslog mailing list
>>>> http://lists.adiscon.net/mailman/listinfo/rsyslog
>>>> http://www.rsyslog.com/professional-services/
>>>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad 
>>>> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you 
>>>> DON'T LIKE THAT.
>>>> 
>>> _______________________________________________
>>> rsyslog mailing list
>>> http://lists.adiscon.net/mailman/listinfo/rsyslog
>>> http://www.rsyslog.com/professional-services/
>>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
>>> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T 
>>> LIKE THAT.
>> 
>> _______________________________________________
>> rsyslog mailing list
>> http://lists.adiscon.net/mailman/listinfo/rsyslog
>> http://www.rsyslog.com/professional-services/
>> What's up with rsyslog? Follow https://twitter.com/rgerhards
>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
>> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T 
>> LIKE THAT.
>> 
> _______________________________________________
> rsyslog mailing list
> http://lists.adiscon.net/mailman/listinfo/rsyslog
> http://www.rsyslog.com/professional-services/
> What's up with rsyslog? Follow https://twitter.com/rgerhards
> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T 
> LIKE THAT.

_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to