Could anyone please confirm if there is any default ASP rule for parsing vmware vRealize Operations Manager syslog?
I am receiving these logs as 'unknown events'!
The screenshot below shows some logs I am receiving to McAfee Receiver.
Hi i think there is no standard parser for this product of vmware. But you can write your own parser or you can active all other parser for vmware for this Datasource. Maybe one of them will parse your log.
I have created multiple (one long RegEx or multiple short ones) but here are couple which are working for me. Please note these are still in development phase and will be tuned further:
"vRealize Sending 'Task Function' task to Alive"
<14>1 2017-02-10T20:51:17.019326Z vRealize - - - [liagent@6876 filepath="/usr/lib/xxxxxxxxxxx.log" vmw_vr_ops_appname="vROps" vmw_vr_ops_logtype="COLLECTOR"] 2017-02-10 15:51:16,818 INFO [pool-6-thread-1] com.integrien.alive.collector.CommunicatorThread.sendTask - -> Sending 'Task Function' task to Alive (id: 756584, cid: 1) Details: AgentMailboxRemoteProxy.retrieveAgentTokensWithCommands
"vRealize Log in successfull"
<142>Feb 9 09:50:57 vRealize - UserId : 3abe1e6d-691e-4cd7-8da7-3349814d9642, UserName : xxxxxxxxxxxxx, AuthSource : LOCAL, Session : 3abe1e6d-691e-4cd7-8da7- 3349814d9642::f9775b5b-f9bd-411f-b517-abed3de5ec77, UserAction : LOGIN, - Log in successfull