Creating a filtering rule
You can filter the logs to include relevant log data and exclude data that you do not require. Filtering rules enable you to configure the grep configurations that define the data that you want to collect. For example, you set up the following grep configurations:
Sample logs
The value of the message field contains cool.
The value of the hostname field matches web<INTEGER>.example.com.
The value of the message field does NOT contain uncool.
The following logs are collected:
{"message":"It's cool outside today", "hostname":"web001.example.com"}
{"message":"That's not cool", "hostname":"web1337.example.com"}
The following logs are excluded:
{"message":"I am cool but you are uncool", "hostname":"db001.example.com"}
{"hostname":"web001.example.com"}
{"message":"It's cold outside today"}
The value of the hostname field matches web<INTEGER>.example.com.
The value of the message field does NOT contain uncool.
The following logs are collected:
{"message":"It's cool outside today", "hostname":"web001.example.com"}
{"message":"That's not cool", "hostname":"web1337.example.com"}
The following logs are excluded:
{"message":"I am cool but you are uncool", "hostname":"db001.example.com"}
{"hostname":"web001.example.com"}
{"message":"It's cold outside today"}
You can also create a filtering rule while you create collection policies.
To create a filtering rule
- Click the Collection menu and select Filtering Rules.
- On the Filtering Rules page, click Create.
- In the Rule Information section, perform the following actions:
- Enter a unique name and description for the rule.
- In the Collection Type field, select the log collection type.
- In the Rule Configuration section, perform the following actions:
- If you selected Kubernetes as the collection type, in the Type field, select Agent or Aggregator.
The filtering rule will apply to the logs collected by the Agent or aggregated by the Aggregator. - From the Log Filter list, select Grep.
- From the Directive list, select Regex (to include logs) or Exclude.
- (Only for the Agent configuration type) From the Condition list, select AND or OR.
- In the Key field, enter the key from the log expression.
- Get the keys from the log expression. For example, in the Apache expression, host, user, time, method, path, code, size, refer, and agent are keys.
For a CSV type of parser, keys are the column names (or field names) of the columns in the CSV file.
- In the Pattern field, enter the value to be included or excluded.
For Apache, Apache Error, Nginx, and Regexp, enclose the values within forward slashes (//). Click + to add another grep expression.
- If you selected Kubernetes as the collection type, in the Type field, select Agent or Aggregator.
- Click Save.
You can see the filtering rule on the Filtering Rules page.
Where to go from here
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*