Hi everyone!
Has anyone ever installed or have some tips regarding a community edition package compatible with Oracle Linux 6? We've tried to use the package for REHL/CENTOS 6, installing all the dependencies, but no log is generated and sent to the syslog server.
Thanks!
klebersilva created
Is it an issue with Windows 2019 Server or an issue with the XM_SYSLOG module?
######### WORKING - Copies event log data to C:\Program Files\nxlog\data\nxlog-output.log ########
define ROOT C:\Program Files\nxlog
define CERTDIR %ROOT%\cert
Moduledir %ROOT%\modules
CacheDir %ROOT%\data
Pidfile %ROOT%\data\nxlog.pid
SpoolDir %ROOT%\data
LogFile %ROOT%\data\nxlog.log
<Extension syslog>
Module xm_syslog
</Extension>
# Monitor Windows event logs
<Input eventlog>
Module im_msvistalog
</Input>
<Output file>
Module om_file
File 'C:\Program Files\nxlog\data\nxlog-output.log'
Exec to_syslog_snare();
</Output>
<Output syslogout>
Module om_ssl
Host logsx.papertrailapp.com
Port 12345
Exec $Hostname = hostname(); to_syslog_ietf();
OutputType Syslog_TLS
CAFile %CERTDIR%/papertrail-bundle.pem
AllowUntrusted FALSE
</Output>
<Route out>
Path eventlog => file
</Route>
######### NOT WORKING - NXLOG Service will start for a moment and then stop immediately ###########
<Route out>
Path eventlog => syslogout
</Route>
nxlog.log
2022-03-16 18:10:47 WARNING not starting unused module file
2022-03-16 18:10:47 INFO nxlog-ce-3.0.2272 started
2022-03-16 18:10:47 INFO connecting to logs3.papertrailapp.com:49305
2022-03-16 18:10:47 INFO successfully connected to logx.papertrailapp.com:12345
Windows Logs, Application Events:
Source: Application Error
Event ID: 1000
Faulting application name: nxlog.exe, version: 0.0.0.0, time stamp: 0x00000000
Faulting module name: ntdll.dll, version: 10.0.17763.2628, time stamp: 0x91ea188a
Exception code: 0xc0000374
Fault offset: 0x00000000000faad9
Faulting process id: 0xa7c
Faulting application start time: 0x01d8399bfa79f8d0
Faulting application path: C:\Program Files\nxlog\nxlog.exe
Faulting module path: C:\Windows\SYSTEM32\ntdll.dll
Report Id: 7870365a-2a26-49dd-9670-7c8d889f9dda
Faulting package full name:
Faulting package-relative application ID:
Windows Logs, Application Events:
Source: Windows Error Reporting
Event ID: 1001
Fault bucket 1367701673690831831, type 4
Event Name: APPCRASH
Response: Not available
Cab Id: 0
Problem signature:
P1: nxlog.exe
P2: 0.0.0.0
P3: 00000000
P4: StackHash_2e07
P5: 10.0.17763.2628
P6: 91ea188a
P7: c0000374
P8: PCH_43_FROM_ntdll+0x00000000000A0544
P9:
P10:
Attached files:
\\?\C:\ProgramData\Microsoft\Windows\WER\Temp\WER86A8.tmp.dmp
\\?\C:\ProgramData\Microsoft\Windows\WER\Temp\WER87D2.tmp.WERInternalMetadata.xml
\\?\C:\ProgramData\Microsoft\Windows\WER\Temp\WER8802.tmp.xml
\\?\C:\ProgramData\Microsoft\Windows\WER\Temp\WER8804.tmp.csv
\\?\C:\ProgramData\Microsoft\Windows\WER\Temp\WER8843.tmp.txt
These files may be available here:
\\?\C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_nxlog.exe_7198d2d4b17dc7d6aaa419f8df82eecf4ad86a_e5992931_12418b0d
Analysis symbol:
Rechecking for solution: 0
Report Id: 7870365a-2a26-49dd-9670-7c8d889f9dda
Report Status: 268435456
Hashed bucket: 8cc762824f1e456172fb0d6d030c9bd7
Cab Guid: 0
TXTOM created
Hi team, from the guide below we know that the Nxlog is able to deduplicate the log by some specific fields ("CheckFields"). https://nxlog.co/documentation/nxlog-user-guide/pm_norepeat.html
May I know if it is possible to set the interval for it? Let's take below configuration as example. Is it possible to set the interval = 10s, so that the log with the same fields (Hostname, SourceName, Message) will be suppressed for only every 10 seconds. This is doable from Logstash (throttle -> period), but we wanna confirm if it is capable in Nxlog as well. Thank you.
<Input uds> Module im_uds UDS /dev/log </Input>
<Processor norepeat> Module pm_norepeat CheckFields Hostname, SourceName, Message </Processor>
<Output file> Module om_file File "/var/log/messages" </Output>
<Route uds_to_file> Path uds => norepeat => file </Route>
steven.su created
Hi all.
I'm having some windows server that are subscribed to a nxlog server, who in turn sends the windows logs to a linux/syslog server.
The syslog receives all these logs as NOTICE.USER which is not too practical.
I would want the nxlog to keep the criticity of the message when forwarding them. I would want nxlog to prefix the logs with the original log sender hostname so that they appear as $PROGRAM in syslog.
Also, is there a way to use some criterions to send logs from nxlog to syslog using different facilities (USER, MAIL, LOCALn,...) according to some criterions (real PROGRAM value for instance)
pothesis created
Hello -
Currently using this for Event logs:
Exec $SyslogFacilityValue = 22;to_syslog_snare();
However the timestamp in the logs is local machine time and it needs to be in UTC. From searching around it looks like this is possible in EE:
DateFormat YYYY-MM-DDThh:mm:ss.sUTC
However I cannot find that this is feasible for CE.
Is there a way with Community Edition to either manually set the timestamp to UTC (without having to know the local machine time) or, worst case scenario, is it possible to forward the log from nxlog without a timestamp at all so the received log will only have a timestamp of ingest time?
crobert created
Config works without <QueryXML> lines. When i add thoose lines it stops sends any data. I tested with user modification or login fail etc.
Thanks for your help
<Extension syslog> Module xm_syslog </Extension>
<Extension xml> Module xm_xml </Extension>
<Input eventlog> Module im_msvistalog <QueryXML> <QueryList> <Query Id="0"> <Select Path="Security">*[System[(Level=1 or Level=2 or Level=3 or Level=4 or Level=0) and (EventID=1102 or EventID=4719 or EventID=4704 or EventID=4717 or EventID=4738 or EventID=4798 or EventID=4705 or EventID=4674 or EventID=4697 or EventID=4648 or EventID=4723 or EventID=4946 or EventID=4950 or EventID=6416 or EventID=6424 or EventID=4732)]]</Select> </Query> </QueryList> </QueryXML> Exec $Message = to_xml(); to_syslog_bsd(); </Input>
<Output tcp> Module om_tcp Host 127.0.0.1 Port 514 </Output>
<Route eventlog_to_tcp> Path eventlog => tcp </Route>
sillvana662 created
Hello,
I am trying to shorten a part of my raw_field which is way too long : Host_Application="..." to only keep like 50 characters. And I noticed that NXlog is using PCRE syntax for finding a string in a field, but not for the substitution where it uses classic regex.
I tried different things:
- Substitute with a regex the part I want but I can't, since it replaces everything I write in the regex.
- Find the exact string I want to replace with my PCRE rexgex, and then try to substitute it but I can't use the $1 field as the source string to modify.
I would like to know if there is any way of doing what I want.
Malauran
Malauran created
Hi, Having this error below ..any ideas how to resolved ? Thanks
INFO nxlog-ce-2.11.2190 started
ERROR failed to subscribe to msvistalog events using bookmark: Access is denied.
ERROR failed to subscribe to msvistalog events,access denied [error code: 5]; Access is denied.
WARNING stopping nxlog service
WARNING nxlog-ce received a termination request signal, exiting...
WARNING not starting unused module dns
INFO nxlog-ce-2.11.2190 started
ERROR failed to subscribe to msvistalog events using bookmark: Access is denied.
ERROR failed to subscribe to msvistalog events,access denied [error code: 5]; Access is denied.
Mcoll created
Hi All,
We have configured Nxlog to send application logs to RSA Virtual log collector.
We are able to send one logfile using the below configurations in nxlog.conf
<Input AppLogs> Module im_file File 'C:\Important_Application\Logs\log1.log' SavePos FALSE Recursive TRUE ReadFromLast FALSE Exec $Message = $raw_event; </Input>
<Output out2> Module om_tcp Host "0.0.0.0" Port 514 </Output>
<Route 2> Path AppLogs => out2 </Route>
However, we are unable to send all the log files within the Logs directory.
We tried the below methods:
<Input AppLogs> Module im_file File 'C:\Important_Application\Logs*.log' or 'C:\Important_Application\Logs*.log' or 'C:\Important_Application\Logs' or 'C:\Important_Application\Logs*' SavePos FALSE Recursive TRUE ReadFromLast FALSE Exec $Message = $raw_event; </Input>
But none of the above methods are workings. We need to send all the log files within the "Logs" folder.
Please help.
anusha_rampure created
I get an error in this module but the xm_python.dll is available and 35kb
ERROR Failed to load module from C:\nxlog\modules\extension\xm_python.dll
thanks
rizakara created
tevfikceydeliler created
Hello Techies,
Can someone please help me below query?
How to execute windows MSI installer to silently install nxlog agent(nxlog-ce-3.0.2272.msi) using a PowerShell script. Any code snippet or reference url will be very helpful to refer from.
Thanks in advance Anil Kr
anilbqkumar created
Heres the copy of my configuration. For my first input i have a bunch of firewall logs coming in to /syslog/firewalls.log. I now want to ingest syslog data from my isilon to a different log file. It only seems to work if I have host 0.0.0.0 setup. I'm getting the data but everything is being written to firewalls.log and not my isilon.log
Any help would be greatly appreciated.
<Extension _syslog>
Module xm_syslog
</Extension>
<Extension _json>
Module xm_json
</Extension>
<Input udp1>
Module im_udp
Host 0.0.0.0
Port 514
Exec parse_syslog();
</Input>
<Output fwlog>
Module om_file
File "/syslog/firewalls.log"
Exec to_json();
</Output>
<Input udp2>
Module im_udp
Host 0.0.0.0
Port 514
InputType Syslog_TLS
Exec parse_syslog();
</Input>
<Output isilog>
Module om_file
File "/syslog/isilon.log"
Exec to_json();
</Output>
########################################
# Routes #
########################################
<Route udp_to_file1>
Path udp1 => fwlog
</Route>
<Route udp_to_file2>
Path udp2 => isilog
</Route>
aleblanc75 created
https://docs.nxlog.co/ce/current/index.html#om_python
The document has usage information. is not it right ?
or is it only for linux ? https://gitlab.com/nxlog-public/nxlog-ce/-/blob/master/ChangeLog.txt 2021-12-13 3.0.2272 [2268] added python language integration modules
[2639] added Raijin output module - om_raijin
Thanks
rizakara created
Have you ever tested om_elasticsearch module with the 8th ElasticSearch version? I have no error log in nxlog.log, but no index or data are available in ES instance. I used the trial version 5.4 with ElasticSearch 8.0.
cm created
Hi. Tell me where I can download the 32-bit version of CE for Windows?
travsontor created
Hi Folks,
We are from a reputed service based company, We have recently tested NXLog. We are planning to deploy it more than 500 production server. We want to automate deployment process. We have below queries.
- Is the windows setup (nxlog-ce-3.0.2272.msi) supports silent installation?
- Can it be installed using a PowerShell script without manual intervention?
Note- If NxLog serves our purpose with better performance then we will go for enterprise edition.
Thanks Anil
anilbqkumar created
Hi everyone
I'm very new to this and have searched around but couldn't find anything obvious.
I have a few Pc's with NXLog Community Edition sending data to a Loggly instance, event log data
They are picking up Security and System and Application ogs out of the box it seems, but i'm wondering if i need to do anything to add other event log sources to have them sent to Loggly?
Is it a matter of adding something to the Conf file?
For example, I have Kaspersky AV on an endpoint and i want to pick up the specific Event Log where Kaspersky sits.
Am i explaining it right? I basically want to add other event Log types into the process of log sending
Mark
markdavidboyd created
Hello,
I am in the process of setting up NXLOG to capture syslog messages via TLS, but I have issues with the TLS connection, specifically:
ERROR SSL certificate verification failed: unsupported certificate purpose (err: 26)
Certificate for NXLOG was issued with the following:
OID=1.3.6.1.5.5.7.3.2; Client authentication OID=1.3.6.1.5.5.7.3.1; Server authentication
Is there any documentation on how to request certificates for NXLOG? I do not have NXLOG manager. Cheers
istoikov created
Hello,
I am evaluating the om_ssl (GELF) module of nxlog EE agent for a large number of devices with TLS authentication of the devices enabled at Graylog. We already have the certificates in the Windows certificate manager on the devices which we would use for the nxlog agent as well. The certificates are rotated frequently, and thus nxlog.conf needs to be kept up to date (with the thumbprints) and due to the large number of devices we cannot create and update the configuration files by hand.
What is the best practice to populate nxlog.conf with the required certificate thumbprints from the certificate store on each device and keep the configuration up to date?
Thank you!
atisu created