Provided Grok expressions do not match field value: [2024-11-15 16:25:59 WINYAMS1337 192.168.5.25 GET / helloWorldEatMe 80 yambot500 192.168.5.99 200 0 0 703 7 1]
Event Original
No response
What did you do?
Just tried to use the integration out of the box and none of the IIS logs were parsed for a few servers.
The solution: Created a new GROK expression to catch and IIS servers that use the same limited field configurations to get a match:
I expect that the OOB IIS integration can handle a variety of different configurations for how IIS can be configured. Without this it will be a pain to manage this integration over time since I cannot use this custom GROK with the traditional @custom pipeline.
Anything else?
Nope, pretty straight forward. Just add this new GROK and I will be happy.
Integration Name
IIS [iis]
Dataset Name
iis.access
Integration Version
1.20.0
Agent Version
8.15.4
Agent Output Type
elasticsearch
Elasticsearch Version
8.15.4
OS Version and Architecture
Windows Server 2019
Software/API Version
Unknown
Error Message
Event Original
No response
What did you do?
Just tried to use the integration out of the box and none of the IIS logs were parsed for a few servers.
The solution: Created a new GROK expression to catch and IIS servers that use the same limited field configurations to get a match:
What did you see?
I saw that this is properly getting parsed in the system ingest pipeline:
What did you expect to see?
I expect that the OOB IIS integration can handle a variety of different configurations for how IIS can be configured. Without this it will be a pain to manage this integration over time since I cannot use this custom GROK with the traditional @custom pipeline.
Anything else?
Nope, pretty straight forward. Just add this new GROK and I will be happy.