Hello all, i am trying to use a pipeline rule to extract some information from a log line, but the simulator is indicating the rule / grok is not working when a domain / username is present in the log. external grok debuggers all work as expected. a bit puzzling but i am probably missing something simple
the grok is
contains(to_string($message.source_os_type),“vmware”) //&& !contains(to_string($message.message),“com.vmware.vim.eam”)
then
let tmp = grok(
pattern: “vim.event.%{WORD:event_action}] \[%{WORD:event_severity}\]”,
value: to_string($message.message),
only_named_captures: true
);
set_fields(tmp);
//remove_field(“tmpsource”);
end
Does not work with simulator
message:Event [119797857] [1-1] [2024-08-23T14:29:22.695142Z] [vim.event.VmCreatedEvent] [info] [domain.domain.domain.com\user-name] [xxxxx Datacenter RKPT] [119797851] [Created virtual machine computer1 on vmwarehost, in XXXXXX Datacenter XXX]
source_os_type:vmware
removing the [domain.domain.domain.com\user-name] from the log entry works every time. i will extract the domain \ username in a later rule, but i just want to ignore everything after [info]
oy, yeah seems to be working now. though i was using the key value to mimic the field of source_os_type i have set. will have to do some additional troubleshooting but i think ill move forward with this.