- Related Products
- ADManager Plus
- ADAudit Plus
- ADSelfService Plus
- Exchange Reporter Plus
- AD360
- Log360
EventLog Analyzer helps you collect and analyze logs from different sources such as servers, network devices, and applications. The solution provides actionable intelligence that helps security teams stay on top of security threats in the organization.
This solution provides you the capability to import log files. The supported log formats include Windows and syslog device formats, application log formats and archived files log formats.
Note: To import .evt logs (Windows XP and Windows 2003), you will need to convert the .evt to .evtx using the command wevtutil export-log application.evt application.evtx /lf in your EventLog Analyzer installation.
Navigate to the Import Configuration page using any one of the following menu options:
EventLog Analyzer allows you to import:
With this option, you can import log files from any device that has access to EventLog Analyzer.
Note: Log import cannot be scheduled to run at regular time intervals.
Note: You can view a preview of the selected log file and extract the desired fields, by clicking on the View symbol of the attached log file and enabling the pop-up window option in your browser.
The log file import via Universal Naming Convention (UNC) path allows you to access shared network folders on a local area network (LAN).
Note: You can view a preview of the selected log file and extract the desired fields, by clicking on the View symbol of the attached log file and enabling the pop-up window option in your browser.
Importing log files from a remote path in EventLog Analyzer needs authentication. This authentication can be achieved in two ways:
Authentication type: Password
Authentication type: SFTP-based SSH private key file sharing
To import logs from AWS S3 buckets, you first need to create an IAM user with access to the S3 bucket(s). You can also grant users access to only specific S3 buckets by following the steps given in this link.
To configure AWS S3 buckets for importing logs,
EventLog Analyzer supports only error logs and general logs from MySQL. MySQL logon failures are taken into account from MySQL general query logs.
To enable logging in MySQL,
Log format of PostgreSQL logs is determined by log_line_prefix parameter, set in postgresql.conf file.
The default format of PostgreSQL logs is '%m [%p] ' which logs a time stamp and the process ID.
log_line_prefix = '%m [%p] '
This format is supported by default in EventLog Analyzer.
If the user wants to add additional fields, log_line_prefix parameter in the postgresql.conf file must be changed.
The log_line_prefix parameter must follow the format(key- value pair) given below in the postgresql.conf file.
log_line_prefix = 'time_stamp=%m or %t process_id=%p application_name=%a database_name=%d connection_from_with_port=%r connection_from=%h session_id=%c transaction_id=%x user_name=%u command_tag=%i sql_state_code=%e session_start_time=%s '
log_line_prefix Parameter | Key | Value |
Time stamp with milliseconds or time stamp without milliseconds | time_stamp | %m or %t |
Process ID | process_id | %p |
Application name | application_name | %a |
Database name | database_name | %d |
Remote host name or IP address, and remote port | connection_from_with_port | %r |
Remote host name or IP address | connection_from | %h |
Session ID | session_id | %c |
Transaction ID | transaction_id | %x |
User name | user_name | %u |
Command tag: type of session's current command | command_tag | %i |
SQLSTATE error code | sql_state_code | %e |
Process start time stamp | session_start_time | %s |
To add the SAP ERP application for monitoring, the audit logs have to be enabled.
To enable the SAP ERP audit logs:
To the DEFAULT.PFL file in the location <SAP_installed path>\sys\profile, add
Note: The user should have permission to read this audit file while importing.
Db2 database systems allow auditing at both the instance and database levels. The db2audit tool is used to configure the auditing process. The tool can also be used to archive and extract audit logs, from both instance and database levels. The audit facility can be configured by following these six steps.
EventLog Analyzer also supports diagnostic logs. Click here to learn how to generate the diagnostic logs report.
The configure parameter modifies the db2audit.cfg configuration file in the instance's security subdirectory. All updates to this file will occur even when the instance is stopped. Updates occurring when the instance is active will dynamically affect the auditing being done by the Db2 instance. To know more on all possible actions on the configuration file, refer source
db2audit configure datapath"C:\IBM\DB2\DataPath"archivepath"C:\IBM\DB2\ArchivePath"
Note: Replace the given paths with the paths of your choice for data path and archive path respectively.
db2audit configure scope all status both error type normal
db2audit start
db2 connect toyour_database
Note: Replace your_database with the database name of your choice.
db2 create audit policypolicy_namecategoriesallstatusbotherror typeaudit
Note: Replace policy_name with the policy name of your choice. Replace the given parameters with the command parameters of your choice. To know more on the allowed command parameters, refer source.
db2 commit
Now the audit policy has been created.
db2 audit database using policypolicy_name
Note: Replace policy_name with the name of the audit policy that you created.
db2 commit
Now the created audit policy is assigned to the database.
You can archive the active logs from both instance and database. The logs will be archived to the archive path that you configured in the first step.
db2audit archive databaseyour_database
Note: Replace your_database with the name of the database.
db2audit archive
Both files have to be extracted into a human-readable format to be imported into EventLog Analyzer.
db2audit extract fileC:/IBM/DB2/instancelog.txt from files db2audit.instance.log.0.20060418235612
Note: Replace the instancelog with the filename of your choice. Replace db2audit.instance.log.0.20060418235612 with the filename of the archived instance logs.
db2audit extract fileC:/IBM/DB2/databaselog.txt from files db2audit.db.your_database.log.0.20060418235612
Note: Replace databaselog with the filename of your choice. Replace db2audit.db.your_database.log.0.20060418235612 with the filename of the archived database logs.
Both files will be extracted to the given archive path and can be imported into EventLog Analyzer.
Now you will have to import the extracted database and instance log files into EventLog Analyzer. Here is a comprehensive guide on how to import log files in EventLog Analyzer.
EventLog Analyzer also provides a report for diagnostic logs. To generate the diagnostic logs report, follow the given steps.
db2 get dbm cfg | findstr DIAGPATH
db2 get dbm cfg | grep DIAGPATH
db2 get dbm cfg
Note: The path corresponding to Current member resolved DIAGPATH is the path to the diagnostic log file.
If you are unable to import a log file, ensure the following:
a. Now custom fields are also displayed in the left pane.
b. Click on the Save button.
You can view a list of all imported log files in your EventLog Analyzer installation. This is the default page that appears when the import log option is selected. This page provides details of the imported log file including, filename, device, monitoring interval, time taken to import the log file, log format, and size of the log file.
The Combined Log Format is one of the log formats commonly used with Apache logs.
The Combined Log format is:
%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-agent}i\"
While importing the log files in the Combined log format, the log files will not include the values for the fields response time and bytes received.
The following widgets in the Apache Overview dashboard can display their values accurately only if the response time and bytes received fields are parsed.
In order to parse these additional fields, the log format has to be modified. The values for the additional fields can be obtained once the logs are configured with the parameters "%{ms}T" and "%I".
Eventlog Analyzer can parse the modified log format by default.
The modified log format containing the parameters for response time and bytes received is:
%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-agent}i\" %{ms}T %I
%{ms}T - time taken to serve the request (in milliseconds)
%I - bytes received, including headers
Note: Requires modlog_io to be enabled https://httpd.apache.org/docs/2.4/mod/mod_logio.html
The modified log has 2 directives in addition to the commonly used Combined Log Format. These directives are present at the end of the format, therefore, the combined log format will continue to be parsed as it was parsed in the previous versions.
Note: The configuration files by default are located at /etc/apache2/ in Debian/Ubuntu/Linux Mint or, /etc/httpd/conf on Red Hat/Fedora/CentOS
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-agent}i\" %{ms}T %I" modified
CustomLog logs/access.log modified
After the log files have been imported, the updated Apache Overview dashboard has been displayed below: