Hi, can somebody help me to solve this problem
2018-05-15 16:33:33 ERROR failed to open /var/log/freeradius/linelog-accounting;Permission denied 2018-05-15 16:33:35 ERROR apr_stat failed on file /var/log/freeradius/linelog-accounting;Permission denied
nazir.haron created
Hi, I just want to fileter the windows logs. I mean I dont want to collect the info type, because I need just the warning and the critical types. Where and how can I set this settings up?
Thanks!
klambi created
I am trying to use multiline to ship a log file. Here is my config:
<Extension log>
Module xm_multiline
HeaderLine /^\---Begin event transaction---/
EndLine /^\---Event Reporting Complete---/
</Extension>
<Extension json>
Module xm_json
</Extension>
<Input in>
Module im_file
File "C:\\Users\\Administrator\\Desktop\\log.txt"
SavePos FALSE
ReadFromLast FALSE
Exec to_json();
</Input>
<Output out>
Module om_tcp
Host (server)
Port 5010
</Output>
<Route>
Path in => out
</Route>
I have blank entries in my database; 1 blank entry for each line that should be a part of the multiline (37 in one case).
Any help would be appreciated.
Thanks,
Deleted user created
Constrife created
Hello I try to use nxlog-ce to collect the log of an aruba controller The log file is well created, but it remains empty Could you help me ?
for information : the aruba controller is correctly configured since I get the logs well with the software "visual syslog server"
here is the nxlog.conf file used
define ROOT C:\Program Files (x86)\nxlog
Moduledir %ROOT%\modules CacheDir %ROOT%\data Pidfile C:\Program Files (x86)\nxlog\nxlog.pid SpoolDir C:\Program Files (x86)\nxlog\data LogFile C:\Program Files (x86)\nxlog\nxlog.log
<Extension fileop> Module xm_fileop </Extension>
<Extension syslog> Module xm_syslog </Extension>
<Input in> Module im_udp Host IP Adress of my Windows serveur Port 514 </Input>
<Output out> Module om_file File 'D:\arubasyslogs\aruba.log' </Output>
<Route 1> Path in_Aruba => out_file </Route>
seb created
Hi there
Maybe a dumb/newbie question: I'm not a Windows guy, but I know EventLogs have some weird normalization trick where GUIDs/etc have to be cross-referenced against some locale data to show you what you really want to see. I'm trying to run nxlog on a domain controller, but instead of forwarding (to syslog) "english text", we're seeing "Object: Object Server: DS Object Type: %{bf967a9c-0de6-11d0-a285-00aa003049e2} Object Name: %{d7cb26ca-1f06-4d..." kind of stuff
It looks fine in the the EventLog viewer on the DC, and running "nxlog -f" from the command line doesn't show any error, so any ideas what's missing?
According to this: https://nxlog.co/question/794/64-bit-windows-event-log-support-community-vs-enterprise I would think standard "this user was added to this group" kind of Security messages would be covered, but I suspect this isn't the case with the community edition?
So do you need the enterprise version to get all Eventlog "translations" that are really standard on systems like domain controllers?
This is with nxlog-ce-2.9.1716.msi.
Thanks, Jason
jhaar created
Hi,
I'm trying to read from a .evtx file directly using the File directive in im_msvistalog. I keep getting an error: Assertion failed at line 1945 in im_msvistalog.c/im_msvistalog_start(): "((nx_im_msvistalog_subscr_t **)(imconf->q_subs->nelts-1->query = imconf->_query""
I'm running Windows 10 with nxlog-4.0.3550. I've tested with different files with the same error.
yajitux created
Hello, is there an solution to install nxlog on Debian 9? When does the Debian 9 package released?
rumo created
Can NXLog run as-is on Windows Embedded? Specifically Windows Embedded Standard 6.1?
ck_loggy created
Hi,
I am trying to forward Windows 2016 event logs to a RHEL 7 syslog collector, on the community edition. I am not receiving any logs at the collector. I know that this is not a network issue as syslog generator tools (such as kiwi) are working. Current config is below:
#define ROOT C:\Program Files\nxlog define ROOT C:\Program Files (x86)\nxlog
Moduledir %ROOT%\modules CacheDir %ROOT%\data Pidfile %ROOT%\data\nxlog.pid SpoolDir %ROOT%\data LogFile %ROOT%\data\nxlog.log
<Extension _syslog> Module xm_syslog </Extension>
<Input in>
Module im_msvistalog
Query <QueryList>
<Query Id="0">
<Select Path="Security">*[System[(EventID=4624 or EventID=4634 or EventID=4656 or EventID=4659 or EventID=4662 or EventID=4663 or EventID=4672 or EventID=4676 or EventID=6272 or EventID=6278)]]</Select>
</Query>
</QueryList>
</Input>
<Output out> Module om_udp Host <myhostip> Port 514 Exec to_syslog_snare(); </Output>
<Route 1> Path in => out </Route>
Any pointers as to where I'm going wrong? Ideally I would like to send all Windows Event logs, not just the IDs listed above.
syslog_guru_192 created
Hi all.
We've got nxlog installed on multiple servers, and at least once a day we get an incident where the CPU usage massively spikes - 90%+ being used by nxlog. Then the service stops (presumably killed because of the high CPU).
Has anyone experienced this before?
EmilyH created
Hey!
I can think of several ways to solve this, but I'm looking to see if anyone has a better idea. I'm getting some logs that are uploaded as a gzipped file. I need to uncompress the file and then send the log content to several destinations, but for this purpose, let's assume that I'm using om_tcp as the destination. I'm considering a couple of options, but has anyone already done something like this or have a brilliant idea for handling it?
Thanks!
davidatpinger created
Hi, I'm new in NXLOG and Graylog. I'm using nxlog to send Windows server log to Graylog, My final goal is to transfer and log in ssl, but proceed by step. All my machines are on my company lan The configuration of NXLOG with OM_UDP
#define ROOT C:\Program Files\nxlog define ROOT C:\Program Files (x86)\nxlog
Moduledir %ROOT%\modules CacheDir %ROOT%\data Pidfile %ROOT%\data\nxlog.pid SpoolDir %ROOT%\data LogFile %ROOT%\data\nxlog.log
<Extension _syslog> Module xm_gelf </Extension>
<Input in>
Module im_msvistalog
Query <QueryList>
<Query Id="0">
<Select Path="Security">*[System[(EventID=4624 or EventID=4634 or EventID=4656 or EventID=4659 or EventID=4662 or EventID=4663 or EventID=4672 or EventID=4676 or EventID=6272 or EventID=6278)]]</Select>
</Query>
</QueryList>
</Input>
<Output out> Module om_udp Host 10.0.0.22 Port 12201 #Exec to_syslog_snare(); Exec if ($ProcessName =~ /TbService.exe/ or $ProcessName =~ /w3wp.exe/) drop(); OutputType GELF </Output>
<Route 1> Path in => out </Route>
works correctly, while the one, identical, that I did with OM_TCP
<Output out> Module om_tcp Host 10.0.0.22 Port 12201 #Exec to_syslog_snare(); Exec if ($ProcessName =~ /TbService.exe/ or $ProcessName =~ /w3wp.exe/) drop(); OutputType GELF </Output>
create this log
018-04-11 19:48:06 ERROR om_tcp send failed; An existing connection was forcibly closed by the remote host.
2018-04-11 19:48:06 INFO reconnecting in 2 seconds
2018-04-11 19:48:07 INFO connecting to 10.0.0.22:12201
2018-04-11 19:48:07 INFO reconnecting in 1 seconds
2018-04-11 19:48:07 ERROR om_tcp send failed; An established connection was aborted by the software in your host machine.
2018-04-11 19:48:08 INFO connecting to 10.0.0.22:12201
2018-04-11 19:52:59 ERROR couldn't connect to tcp socket on 10.0.0.22:12201; No connection could be made because the target machine actively refused it.
2018-04-11 19:53:01 INFO connecting to 10.0.0.22:12201
2018-04-11 19:53:02 INFO reconnecting in 4 seconds
2018-04-12 10:02:09 ERROR om_tcp send failed; An existing connection was forcibly closed by the remote host.
2018-04-12 10:02:10 INFO connecting to 10.0.0.22:12201
2018-04-12 10:02:10 INFO reconnecting in 1 seconds
2018-04-12 10:02:10 ERROR om_tcp send failed; An existing connection was forcibly closed by the remote host.
2018-04-12 10:02:11 INFO connecting to 10.0.0.22:12201
2018-04-12 10:02:11 INFO reconnecting in 1 seconds
2018-04-12 10:02:11 ERROR om_tcp send failed; An existing connection was forcibly closed by the remote host.
2018-04-12 10:02:11 INFO reconnecting in 2 seconds
2018-04-12 10:02:12 INFO connecting to 10.0.0.22:12201
2018-04-12 10:02:12 INFO reconnecting in 1 seconds
2018-04-12 10:02:12 ERROR om_tcp send failed; An existing connection was forcibly closed by the remote host.
2018-04-12 10:02:13 INFO connecting to 10.0.0.22:12201
2018-04-12 10:02:13 INFO reconnecting in 1 seconds
2018-04-12 10:02:13 ERROR om_tcp send failed; An existing connection was forcibly closed by the remote host.
2018-04-12 10:02:13 INFO connecting to 10.0.0.22:12201
does not work correctly In graylog i recive 1 message / minute Instead of 15/20 which I receive with the udp onfiguration,even if the Graylog input message counter reports about 20 / minute. It seems that most messages are discarded as incorrect On Graylog server firewall port 12201 tcp/udp is open, and on windows server 12201 port is open too. I have no idea what's going on. thank you
sbergami created
Hello,
I would like to use nxlog-xchg utility as described in the documentation.
Where can I find this utility ? I use the community edition.
Thanks.
james811 created
Hi everyone,
The user guide section for the om_http module explains:
Each event is transferred in a single POST request.
https://nxlog.co/documentation/nxlog-user-guide#om_http
When https is used, is the TLS handshake also performed for each event? This seems like it would be quite inefficient.
Are there any plans to support bulk / batch exporting of many events in a single http post, specifically for exporting data to the Splunk HEC?
rsyslog and syslog-ng support batch exporting events to Splunk using the external python script omsplunkhec.py, as explained here:
https://www.splunk.com/blog/2017/03/30/syslog-ng-and-hec-scalable-aggregated-data-collection-in-splunk.html
NXLog supports batch exporting events to Elasticsearch using their bulk API:
https://nxlog.co/documentation/nxlog-user-guide#om_elasticsearch
woodsb02 created
With reference to the following guide for sending NXLog output to Splunk using HEC:
https://nxlog.co/documentation/nxlog-user-guide#splunk-hec-collection
The NXLog community edition om_http is missing the add_http_header() procedure:
https://nxlog.co/docs/nxlog-ce/nxlog-reference-manual.html#om_http
This means it is not possible to output nxlog-ce data to http where a header needs to be added to the http post, such as the Splunk HEC:
https://docs.splunk.com/Documentation/Splunk/7.0.3/Data/HECWalkthrough
Is this functionality deliberately missing from the community edition, or can it please be added?
woodsb02 created
This is a two part problem relating to source IP addresses used by nxlog:
-
We have several systems that use 192.168.x.x addresses as their source - not sure what this is about, but I'm thinking it may be related to the nxlog service starting before the Windows network services are completely up?
-
We have several systems that have multiple IP addresses (interfaces) and we would like to force nxlog to report from one IP address. Is there a way to do this?
Thanks for your help.
rbeeler created
nxlog use high cpu on AIX system,bug low cpu use percent on Linux system. So why?
wenxiaoming created
On first load nxlog seems to run just fine. After a new reload I get this error in the logs.
"nxlog failed to start: Failed to load module from C:/msys/1.0\extension\xm_gelf.dll, The specified module could not be found.
The specified module could not be found."
Any idea how to fix this? Never ran into this before and used nxlog in many other windows machines without a problem. Reinstalling hasn't fixed it.
aries135 created
Hello
I've defined this as an input file in nxlog.conf
<Input cerberus_log> Module im_file File "C:\ProgramData\Cerberus LLC\Cerberus FTP Server\log\server.1.log" InputType LineBased PollInterval 5 <Exec> log_info("Msg <" + $raw_event + ">"); $date = substr($raw_event,1,10); $time = substr($raw_event,12,8); $cmd = substr($raw_event,23,7); $pid = substr($raw_event,32,6); $action = substr($raw_event,42); $Hostname = hostname_fqdn(); $SourceName = "Cerberus FTP Server"; $ProcessID = $pid; $EventTime = parsedate($date + " " + $time); $Message = $cmd + ": " + $action; $SyslogSeverityValue = 6; $SyslogFacilityValue = 11; </Exec> </Input>
When this input is read from the log file
[2018-03-28 09:21:48]: REPLY [ 5445] - 234 Authentication method accepted
[2018-03-28 09:21:48]:CONNECT [ 5445] - SSL connection using TLSv1.2 (ECDHE-RSA-AES256-GCM-SHA384), 256 bit encryption [2018-03-28 09:21:48]:CONNECT [ 5445] - SSL connection established [2018-03-28 09:21:48]:COMMAND [ 5445] - USER PandoraManuellt [2018-03-28 09:21:48]: REPLY [ 5445] - 331 User PandoraManuellt, password please
[2018-03-28 09:21:48]:COMMAND [ 5445] - PASS ***********
the following is logged in nxlog.log
2018-03-28 09:21:51 INFO Msg <[> 2018-03-28 09:21:51 INFO Msg <> 2018-03-28 09:21:51 INFO Msg <[> 2018-03-28 09:21:51 INFO last message repeated 3 times 2018-03-28 09:21:51 INFO Msg <> 2018-03-28 09:21:51 INFO Msg <[>
Empty lines are empty, but when a line that starts with a '[' then $raw_event only contains that character and nothing else. Why?
Mats-Ove
matsovef created