Hello All, 

Due to limited functionality with statistical capabilities with graylog2 we 
are looking to forward our modified logs to Splunk that has a limited 
license. 

Now, sending the raw data as an output from graylog is fairly easy with an 
existing plugin on the marketplace. 
However, we are trying to minimize the amount of data and would like to 
send only 4 fields (out of 25) from the original message. 

One of the things we thought of using was a pipeline rule that creates a 
new message but based on graylog2 doc it does not allow you to set specific 
fields. 

Any idea on how to accomplish this would be great! 

In case you know of a way on how to perform a comparison of the past 30 day 
hourly average with the last hour event rate that would be even better! 

Thanks, 

Jonathan V.

 

-- 
You received this message because you are subscribed to the Google Groups 
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to graylog2+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/graylog2/f97d20ba-7dbb-4c18-8538-f58f02586559%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to