I've setup Snort integration with Graylog via 
https://www.graylog.org/blog/64-visualize-and-correlate-ids-alerts-with-open-source-tools.
 
It's working quite well. now that I have a place to store remote logs I 
thought I'd try and add those to Graylog too.  I have syslog-ng listening 
on my Graylog server and messages are rolling in from my remote servers. 
I've created a stream, pipeline and stage to extract fields based on a 
regex for a portion of the logs which deal with an IDS appliance.  When I 
click on the "Streams" menu item at the top of the Graylog UI, I can select 
my IDS log stream and view the messages it's extracted. It seems to be 
working correctly, except I don't see any of the fields I've set in my 
Pipeline rule. It appears to be using the fields from the Snort integration 
example (scr_addr, src_port, snort_alert, etc). What have I missed? Thanks.

-- 
You received this message because you are subscribed to the Google Groups 
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to graylog2+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/graylog2/32f520b9-3f62-4314-b11b-afcb2ee6a670%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to