Home
> Elasticsearch > Elasticsearch – Parse WildFly Application server Logs
Elasticsearch – Parse WildFly Application server Logs
To parse WildFly Application server logs in Elastic search, do the following:
- Create new pipleline and GROK Processor, here is a a GROK rule to parse it:
%{DATESTAMP:transactionDate},%{INT:LEVEL} %{WORD:Type} %{GREEDYDATA:CodePath}
- Create a new file stream log integration in Elastic agent, point to the new processor and enjoy.
Have fun.
Categories: Elasticsearch
Comments (0)
Trackbacks (0)
Leave a comment
Trackback