On Sat, 30 Jan 2016, Brad Cox wrote:

Thanks!

Wasn't sure whether you meant to use your config instead of my default 
rsyslog-config or to insert yours at the beginning of my module statements. I 
did the former and patched a few errors to wind up with just this:

module(
        load="impstats"
        interval="10"
        resetCounters="off"
        format="legacy"
        file="/var/log/pstats"
)

# load the modules to listen to the network and configure them to send their
#  logs to the 'inbound' ruleset
module(load="imtcp")
module(load="imudp" timerequery="4" )
input(type="imtcp" port="10514" ruleset="inbound" )
input(type="imudp" port="10514" ruleset="inbound")

# define the inbound ruleset, all logs will go to elasticsearch
ruleset(
        name="inbound"
        queue.type="fixedarray"
){
        action(
              name = "send_es"
              type="omelasticsearch"
              action.resumeretrycount="-1"
        )

What I'm seeing in /var/log/pstat is lots and lots of example at the end and 
still still no sign of traffic from security onion in kibana. Ideas?

BTW: the goal is to keep SO clients and server completely intact and unmodified 
(except for the two lines I showed earlier that copy all sensor -> server 
events to a separate VM. This will grow into a spark/hadoop cluster that we'll 
evolve to do  advanced analytics that SO doesn't provide. The mixing of syslog-ng 
and rsyslog is just because SO uses Ubuntu and bcoxVM uses Xubuntu. According to 
the docs they're interchangable.

I've seen the recipe link you provided as well as a similar one that routes 
traffic via kafka. I used a different one (link provided earlier) because it 
didn't involve logstash/ruby to avoid unnecessary complexity. Once I get this 
recipe working I'll probably try via kafka.

Sat Jan 30 12:13:09 2016: imtcp(10514): origin=imtcp submitted=0
Sat Jan 30 12:13:09 2016: imudp(*:10514): origin=imudp submitted=0
Sat Jan 30 12:13:09 2016: imudp(*:10514): origin=imudp submitted=0

these tell you how many messages have been submitted via these inputs.

Sat Jan 30 12:13:09 2016: resource-usage: origin=impstats utime=4000 stime=4000 
maxrss=9724 minflt=184 majflt=0 inblock=8 oublock=176 nvcsw=124 nivcsw=4

ignore this for now, it is how many resources rsyslog has consumed in the last 10 sec

Sat Jan 30 12:13:09 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0

how many messages have gone to the inbound ruleset (enqueued=0 means none)

Sat Jan 30 12:13:09 2016: main Q: origin=core.queue size=7 enqueued=422 full=0 
discarded.full=0 discarded.nf=0 maxqsize=9

ignore this for now, it shows how many messages went to the main queue.

Sat Jan 30 12:13:09 2016: imudp(w0): origin=imudp called.recvmmsg=0 
called.recvmsg=0 msgs.received=0

more stats on inbound udp, but you whould be getting things via tcp, so ignore it

Sat Jan 30 12:13:19 2016: omelasticsearch: origin=omelasticsearch submitted=0 
failed.http=0 failed.httprequests=0 failed.es=0

stats from the elasticsearch module

Sat Jan 30 12:13:19 2016: send_es: origin=core.action processed=0 failed=0 
suspended=0 suspended.duration=0 resumed=0

stats from the action delivering logs to ES

Sat Jan 30 12:14:08 2016: inbound: origin=core.queue size=0 enqueued=0 full=0 
discarded.full=0 discarded.nf=0 maxqsize=0

so this shows that no logs have been deliverd to rsylog yet. you may need to kick syslog-ng on the senders to get it to try again.

do a grep -e imtcp -e inbount -e omelasticsearch -e send_es on the pstats file, we need the end of it when it shows some data arriving.

David Lang
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to