David is right on. The “2021-“ is missing from the “03-23T16:47:20.708-05:00”
> On Mar 23, 2021, at 21:14, David Lang <[email protected]> wrote: > > Ok, the problem here is that it's sending a completly invalid timestamp, > which is why it's showing up with the syslogtag/app-name as the beginning of > the timestamp. > > I would start off by filing a ticket with the appliance vendor complaining > that they are not following the syslog RFCs (either the old or the new) > > then what you will need to do is to have a conditional (probably based on > fromhost-ip) to identify these logs and run them through a different parser > (look at mmnormalize for a fast, flexible one, but you may be able to get > away with the field() function if you only need to do one extraction) > > and then to output the logs, you will need a new template that uses the > variables that your parser pulls out of them since you can't use the default > properties. > > David Lang > >> On Tue, 23 Mar 2021, Scott Slattery wrote: >> >> Date: Tue, 23 Mar 2021 17:51:28 -0700 >> From: Scott Slattery <[email protected]> >> To: David Lang <[email protected]> >> Cc: Scott Slattery via rsyslog <[email protected]>, >> John Chivian <[email protected]> >> Subject: Re: [rsyslog] Altering forwarded logfile names >> Hi David, fortunately I had already done this. I'm including an actual log >> entry but have anonymized the data to keep the actual user and email >> address confidential: >> >> Debug line with all properties: >> FROMHOST: 'ause1oagatst02.aws.mycompany.com' >> , fromhost-ip: '10.41.102.143' >> , HOSTNAME: 'ause1oagatst02.aws.mycompany.com' >> , PRI: 13, >> syslogtag '03-23T16:' >> , programname: '03-23T16' >> , APP-NAME: '03-23T16' >> , PROCID: '-' >> , MSGID: '-' >> , TIMNESTAMP: 'Mar 23 21:47:13' >> , STRUCTURED-DATA: '-' >> , *msg*: '47:20.708-05:00 AUSE1OAGATST02.aws.mycompany.com ACCESS_GATEWAY >> ACCESS AUTHZ SESSION INFO USER_SESSION >> [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" SUBJECT=" >> [email protected]" APP="Ignio Uat OAG" >> APP_TYPE="HEADERWEB2015_APP" APP_DOMAIN="apigniodashboard-uat.mycompany.com" >> RESULT="ALLOW" REASON="SESSION_INTEGRITY_VERIFIED" REMOTE_IP="10.44.65.38" >> USER_AGENT="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) >> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 Safari/537.36"] >> SRF Request RemoteIP: 10.44.65.38 verified session RemoteIP: >> 10.44.65.38#0122021-03-23T16:47:20.708-05:00 >> AUSE1OAGATST02.aws.mycompany.com ACCESS_GATEWAY ACCESS AUTHZ POLICY INFO >> USER_AUTHZ [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" >> SUBJECT="[email protected]" RESOURCE="/_dash-dependencies" >> METHOD="GET" POLICY="root" POLICY_TYPE="PROTECTED" DURATION="0" APP="Ignio >> Uat OAG" APP_TYPE="HEADERWEB2015_APP" APP_DOMAIN=" >> apigniodashboard-uat.mycompany.com" RESULT="ALLOW" REASON="N/A - >> SESSIONID=_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0 oag_username= >> [email protected] RelayDomain=apigniodashboard-uat.mycompany.com >> [email protected] >> SourceAuthNType=urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport >> RemoteIP=10.44.65.38 USER_AGENT=Mozilla/5.0 (Macintosh; Intel Mac OS X >> 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 >> Safari/537.36 creationTime=1616536016811 maxInactiveInterval=3600000 >> maxActiveInterval=28800000 lastAccessedTime=1616536029221 " >> REMOTE_IP="10.44.65.38" USER_AGENT="Mozilla/5.0 (Macintosh; Intel Mac OS X >> 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 >> Safari/537.36"] allow access to resource#0122021-03-23T16:47:20.711-05:00 >> AUSE1OAGATST02.aws.mycompany.com ACCESS_GATEWAY ACCESS AUTHZ SESSION INFO >> USER_SESSION [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" >> SUBJECT="Joe.User@mycompan' >> *escaped msg*: '47:20.708-05:00 AUSE1OAGATST02.aws.mycompany.com >> ACCESS_GATEWAY ACCESS AUTHZ SESSION INFO USER_SESSION >> [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" SUBJECT=" >> [email protected]" APP="Ignio Uat OAG" >> APP_TYPE="HEADERWEB2015_APP" APP_DOMAIN="apigniodashboard-uat.mycompany.com" >> RESULT="ALLOW" REASON="SESSION_INTEGRITY_VERIFIED" REMOTE_IP="10.44.65.38" >> USER_AGENT="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) >> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 Safari/537.36"] >> SRF Request RemoteIP: 10.44.65.38 verified session RemoteIP: >> 10.44.65.38#0122021-03-23T16:47:20.708-05:00 >> AUSE1OAGATST02.aws.mycompany.com ACCESS_GATEWAY ACCESS AUTHZ POLICY INFO >> USER_AUTHZ [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" >> SUBJECT="[email protected]" RESOURCE="/_dash-dependencies" >> METHOD="GET" POLICY="root" POLICY_TYPE="PROTECTED" DURATION="0" APP="Ignio >> Uat OAG" APP_TYPE="HEADERWEB2015_APP" APP_DOMAIN=" >> apigniodashboard-uat.mycompany.com" RESULT="ALLOW" REASON="N/A - >> SESSIONID=_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0 oag_username= >> [email protected] RelayDomain=apigniodashboard-uat.mycompany.com >> [email protected] >> SourceAuthNType=urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport >> RemoteIP=10.44.65.38 USER_AGENT=Mozilla/5.0 (Macintosh; Intel Mac OS X >> 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 >> Safari/537.36 creationTime=1616536016811 maxInactiveInterval=3600000 >> maxActiveInterval=28800000 lastAccessedTime=1616536029221 " >> REMOTE_IP="10.44.65.38" USER_AGENT="Mozilla/5.0 (Macintosh; Intel Mac OS X >> 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 >> Safari/537.36"] allow access to resource#0122021-03-23T16:47:20.711-05:00 >> AUSE1OAGATST02.aws.mycompany.com ACCESS_GATEWAY ACCESS AUTHZ SESSION INFO >> USER_SESSION [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" >> SUBJECT="Joe.User@mycompan' >> *rawmsg*: '03-23T16:47:20.708-05:00 AUSE1OAGATST02.aws.mycompany.com >> ACCESS_GATEWAY *ACCESS* AUTHZ SESSION INFO USER_SESSION >> [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" SUBJECT=" >> [email protected]" APP="Ignio Uat OAG" >> APP_TYPE="HEADERWEB2015_APP" APP_DOMAIN="apigniodashboard-uat.mycompany.com" >> RESULT="ALLOW" REASON="SESSION_INTEGRITY_VERIFIED" REMOTE_IP="10.44.65.38" >> USER_AGENT="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) >> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 Safari/537.36"] >> SRF Request RemoteIP: 10.44.65.38 verified session RemoteIP: >> 10.44.65.38#0122021-03-23T16:47:20.708-05:00 >> AUSE1OAGATST02.aws.mycompany.com ACCESS_GATEWAY ACCESS AUTHZ POLICY INFO >> USER_AUTHZ [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" >> SUBJECT="[email protected]" RESOURCE="/_dash-dependencies" >> METHOD="GET" POLICY="root" POLICY_TYPE="PROTECTED" DURATION="0" APP="Ignio >> Uat OAG" APP_TYPE="HEADERWEB2015_APP" APP_DOMAIN=" >> apigniodashboard-uat.mycompany.com" RESULT="ALLOW" REASON="N/A - >> SESSIONID=_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0 oag_username= >> [email protected] RelayDomain=apigniodashboard-uat.mycompany.com >> [email protected] >> SourceAuthNType=urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport >> RemoteIP=10.44.65.38 USER_AGENT=Mozilla/5.0 (Macintosh; Intel Mac OS X >> 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 >> Safari/537.36 creationTime=1616536016811 maxInactiveInterval=3600000 >> maxActiveInterval=28800000 lastAccessedTime=1616536029221 " >> REMOTE_IP="10.44.65.38" USER_AGENT="Mozilla/5.0 (Macintosh; Intel Mac OS X >> 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.192 >> Safari/537.36"] allow access to resource#0122021-03-23T16:47:20.711-05:00 >> AUSE1OAGATST02.aws.mycompany.com ACCESS_GATEWAY ACCESS AUTHZ SESSION INFO >> USER_SESSION [SESSION_ID="_eddf580f5a5b9436ea27e5e6fa4515a2175ca69ac0" >> SUBJECT="Joe.User@mycompan' >> >> >> By inspecting the rawmsg, I can see that field four (space-delimited) >> indicates this is the ACCESS log. So if I were able to extract the log >> identifier from the msg, I could then write all access logs to the same >> daily file. There are other formats as well from the same device but the >> idea is the same. >> >> *Scott Slattery* >> >> *Sr. Systems & Cloud Architect* >> >> *Cloud, Compute, Information & Architecture Team* >> >> motorolasolutions.com >> >> *O: 602.529.8226* >> >> *E*: [email protected] >> >> >> >> >>> On Tue, Mar 23, 2021 at 5:29 PM David Lang <[email protected]> wrote: >>> >>> the source logfile name is not included in the payload by the syslog spec. >>> It >>> may be in the case of your appliance, but we would need to see a sample >>> log to >>> understand ho to parse it. >>> >>> based on your template, you are using app-name, which may be listed >>> separtely if >>> it's a RFC5424 format log, or may be part of the syslog tag if it's a >>> RFC3164 >>> format log over the wire (neither format has a way to specify a source log >>> file >>> by default) >>> >>> you can look at >>> https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_Chojins_LinuxCNC-2DPolargraph&d=DwIDaQ&c=q3cDpHe1hF8lXU5EFjNM_A&r=9VZN8jOeh6Wq3zsBr6Mr_GSxmEpodGbXQ2UxP3oRpciBnWp1cJKyh3iyX6xKS_Zd&m=N7tTREp8_2WP8ZJPT8UpZsuFedG7Q4cil9vsQoiSiGM&s=XRQ9OP8K-KeJO3-s6-unMBIRqEZONzs6npmrQYaXnds&e= >>> and see the *-cc >>> options that you could apply to the app-name to eliminate control >>> characters. >>> >>> Again, we really need to see the original log message to understand what's >>> what. >>> Please log it with the templateRSYSLOG_DebugFormat so we can see exactly >>> what is >>> sent over the wire and how rsyslog has parsed it. >>> >>> David Lang >>> >>> On Tue, 23 Mar 2021, Scott Slattery via rsyslog >>> wrote: >>> >>>> Date: Tue, 23 Mar 2021 16:05:45 -0700 >>>> From: Scott Slattery via rsyslog <[email protected]> >>>> To: John Chivian <[email protected]> >>>> Cc: Scott Slattery <[email protected]>, >>>> rsyslog-users <[email protected]> >>>> Subject: Re: [rsyslog] Altering forwarded logfile names >>>> >>>> Thanks, John, let me try to clarify what I mean. >>>> >>>> Normally when I forward from a remote server to the central log server, I >>>> can include a tag that can then be used to determine the file name I want >>>> on the central server. Since I have no real way to include this tag from >>>> the appliance, this is not an option. >>>> >>>> I'm looking for a way of inspecting the incoming packets to determining >>> the >>>> source logfile name (which is included in the payload) and use that >>>> filename on the target central server. Since there are multiple logs >>> being >>>> sent (access, audit, monitor, etc.), I'd like to segregate these into >>> their >>>> own files. I'm already using a template with the host information to >>>> dynamically create the file names. I just don't know how I can go beyond >>>> this to also include the source logname. >>>> >>>> Here's the template I'm using. It works for all other hosts where I can >>>> configure the tag but I get garbage names from the appliance. I had hoped >>>> that the appliance included some standard syslog tags but it doesn't seem >>>> so. >>>> >>>> template(name="DynRemoteLogFile" type="string" >>>> >>> string="/remote/%FROMHOST%-%FROMHOST-IP%/%$year%-%$month%-%$day%-%app-name%.log") >>>> >>>> *Scott Slattery* >>>> >>>> *Sr. Systems & Cloud Architect* >>>> >>>> *Cloud, Compute, Information & Architecture Team* >>>> >>>> motorolasolutions.com >>>> >>>> *O: 602.529.8226* >>>> >>>> *E*: [email protected] >>>> >>>> >>>> >>>> >>>> On Tue, Mar 23, 2021 at 3:30 PM John Chivian <[email protected]> >>> wrote: >>>> >>>>> Your use of the term “file name” is confusing. When senders deliver to >>>>> rsyslog over the network there is no exchange of files or filenames, >>> only >>>>> packets of information. Those packets are expected to be in a format >>> that >>>>> syslog understands such that useful information (header elements and >>>>> message body) may be parsed from them. If you as the rsyslog admin >>> choose >>>>> to use some of that header information to compose filenames for output >>>>> files, then yes you are sort of at the mercy of the senders content >>>>> (especially if the sender doesn’t follow the syslog rules). However, >>> there >>>>> are functions in the advanced syntax that can be used to perform the >>> type >>>>> of character replacements you’re talking about. >>>>> >>>>> It is common practice to use the syslog header/rsyslog property element >>>>> called “hostname” for just such purposes. Is this what you’re talking >>>>> about? You’d have to provide your configuration for real analysis, at >>>>> least the part you perceive to be responsible for the problem. >>>>> >>>>> Regards, >>>>> >>>>> >>>>> >>>>>> On Mar 23, 2021, at 12:35, Scott Slattery via rsyslog < >>>>> [email protected]> wrote: >>>>>> >>>>>> I have a configured central log collector using rsyslog. A few of the >>>>>> devices forwarding their logs are appliances that have no >>> configuration >>>>>> options other than the IP forwarding address and protocol. I cannot >>>>> control >>>>>> what file names are being sent. >>>>>> >>>>>> Unfortunately, they are sending unintelligible file names with >>> characters >>>>>> that normally would be escaped. Is there any way I can control or >>> alter >>>>> the >>>>>> incoming file name to normalize it to avoid these odd characters? >>>>>> >>>>>> For example, could I establish a character map that maps the unallowed >>>>>> character to something acceptable? >>>>>> >>>>>> thanks, >>>>>> >>>>>> *Scott Slattery* >>>>>> >>>>>> *Sr. Systems & Cloud Architect* >>>>>> >>>>>> *Cloud, Compute, Information & Architecture Team* >>>>>> >>>>>> motorolasolutions.com >>>>>> >>>>>> *O: 602.529.822* >>>>>> >>>>>> *E*: [email protected] >>>>>> >>>>>> -- >>>>>> >>>>>> >>>>>> *For more information on how and why we collect your personal >>>>>> information, please visit our Privacy Policy >>>>>> < >>>>> >>> https://www.motorolasolutions.com/en_us/about/privacy-policy.html?elqTrackId=8980d888905940e39a2613a7a3dcb0a7&elqaid=2786&elqat=2#privacystatement >>>>>> .* >>>>>> _______________________________________________ >>>>>> rsyslog mailing list >>>>>> >>>>> >>> https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.adiscon.net_mailman_listinfo_rsyslog&d=DwIFaQ&c=q3cDpHe1hF8lXU5EFjNM_A&r=9VZN8jOeh6Wq3zsBr6Mr_GSxmEpodGbXQ2UxP3oRpciBnWp1cJKyh3iyX6xKS_Zd&m=F25vuEW_UOr4xhEXRHv4FYzBC10xi8a7L7cY9KDJz-E&s=O-radZKC6RhALSGrunmgfnDcUe0FBEzQXlwVMv4rwrk&e= >>>>>> >>>>> >>> https://urldefense.proofpoint.com/v2/url?u=http-3A__www.rsyslog.com_professional-2Dservices_&d=DwIFaQ&c=q3cDpHe1hF8lXU5EFjNM_A&r=9VZN8jOeh6Wq3zsBr6Mr_GSxmEpodGbXQ2UxP3oRpciBnWp1cJKyh3iyX6xKS_Zd&m=F25vuEW_UOr4xhEXRHv4FYzBC10xi8a7L7cY9KDJz-E&s=Ujl6rNYsQwlkacdBkNSQI3_ugt9iTahsA2ALpSb1zWA&e= >>>>>> What's up with rsyslog? Follow >>>>> >>> https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_rgerhards&d=DwIFaQ&c=q3cDpHe1hF8lXU5EFjNM_A&r=9VZN8jOeh6Wq3zsBr6Mr_GSxmEpodGbXQ2UxP3oRpciBnWp1cJKyh3iyX6xKS_Zd&m=F25vuEW_UOr4xhEXRHv4FYzBC10xi8a7L7cY9KDJz-E&s=5gFALcKlKXLfCND69qR14lRU4iA42kMWjsC9PDoIb3Q&e= >>>>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a >>> myriad >>>>> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you >>>>> DON'T LIKE THAT. >>>>> >>>>> >>>> >>>> -- >>>> >>>> >>>> *For more information on how and why we collect your personal >>>> information, please visit our Privacy Policy >>>> < >>> https://www.motorolasolutions.com/en_us/about/privacy-policy.html?elqTrackId=8980d888905940e39a2613a7a3dcb0a7&elqaid=2786&elqat=2#privacystatement >>>> .* >>>> _______________________________________________ >>>> rsyslog mailing list >>>> >>> https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.adiscon.net_mailman_listinfo_rsyslog&d=DwIDaQ&c=q3cDpHe1hF8lXU5EFjNM_A&r=9VZN8jOeh6Wq3zsBr6Mr_GSxmEpodGbXQ2UxP3oRpciBnWp1cJKyh3iyX6xKS_Zd&m=N7tTREp8_2WP8ZJPT8UpZsuFedG7Q4cil9vsQoiSiGM&s=4ENTgbqNRL4m9EpaPD487wHPCEOI1UMUrZ6zizJ25HE&e= >>>> >>> https://urldefense.proofpoint.com/v2/url?u=http-3A__www.rsyslog.com_professional-2Dservices_&d=DwIDaQ&c=q3cDpHe1hF8lXU5EFjNM_A&r=9VZN8jOeh6Wq3zsBr6Mr_GSxmEpodGbXQ2UxP3oRpciBnWp1cJKyh3iyX6xKS_Zd&m=N7tTREp8_2WP8ZJPT8UpZsuFedG7Q4cil9vsQoiSiGM&s=YboIrpBbwiXlhlR3JZnvNDi2QWxYQqNifb7d8JV6Xn0&e= >>>> What's up with rsyslog? Follow >>> https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_rgerhards&d=DwIDaQ&c=q3cDpHe1hF8lXU5EFjNM_A&r=9VZN8jOeh6Wq3zsBr6Mr_GSxmEpodGbXQ2UxP3oRpciBnWp1cJKyh3iyX6xKS_Zd&m=N7tTREp8_2WP8ZJPT8UpZsuFedG7Q4cil9vsQoiSiGM&s=gVD-Vwy9VAK7xAHPrmGhwhORXImwEoBcYZZVVG-KbZQ&e= >>>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad >>> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you >>> DON'T LIKE THAT. >> _______________________________________________ rsyslog mailing list https://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.

