Home > Elasticsearch > Elasticsearch – Parse WildFly Application server Logs

Elasticsearch – Parse WildFly Application server Logs


To parse WildFly Application server logs in Elastic search, do the following:

  • Create new pipleline and GROK Processor, here is a a GROK rule to parse it:

%{DATESTAMP:transactionDate},%{INT:LEVEL} %{WORD:Type} %{GREEDYDATA:CodePath}

  • Create a new file stream log integration in Elastic agent, point to the new processor and enjoy.

Have fun.

Categories: Elasticsearch
  1. No comments yet.
  1. No trackbacks yet.

Leave a comment