I have got graylog configured to get both Windows Event Log and IIS logs.
The problem I have is that it is showing two different sources, The IIS source is the machine name and the Event Logs are the FQDN of the server (machinename.domain.com).
How can I get it to use one or the other for all logs from a given server, irrelevant of source within that server?
In my case, due to deployment through docker and it’s internal network magic my UTMs got mixed up and had weird IP’s in their source field, but I was able to identify each by other data like serial number etc, so i made couple extractors, one for each UTM, which are assigning some arbitrary text to source field, like fw1, fw2 basing on existence of sn=serialnumber text in message field,
so you can make a “Replace with regular expression” type extractor for source field, selecting “Only attempt extraction if field contains string” and insert source name you want to change, “.*” in “Regular expression” field and desired source name in “Replacement” field, that’s all
sources page lists things from source field of your messages, so setting this field for all future messages to desired name means you’ll see only desired name in this page
by default it shows last hour’s messages’ sources, extractors doesn’t work with old messages (no way to change past messages), so if you fixed the problem with (working) extractortor you can get rid of old source names by deleting old messages or just wait