logstreamlineparsersyslog23.class.php 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126
  1. <?php
  2. /*
  3. *********************************************************************
  4. * LogAnalyzer - http://loganalyzer.adiscon.com
  5. * ----------------------------------------------------------------- *
  6. * LogStream Parser is used to split syslog messages into fields *
  7. * *
  8. * All directives are explained within this file *
  9. *
  10. * Copyright (C) 2008-2011 Adiscon GmbH.
  11. *
  12. * This file is part of LogAnalyzer.
  13. *
  14. * LogAnalyzer is free software: you can redistribute it and/or modify
  15. * it under the terms of the GNU General Public License as published by
  16. * the Free Software Foundation, either version 3 of the License, or
  17. * (at your option) any later version.
  18. *
  19. * LogAnalyzer is distributed in the hope that it will be useful,
  20. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  21. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  22. * GNU General Public License for more details.
  23. *
  24. * You should have received a copy of the GNU General Public License
  25. * along with LogAnalyzer. If not, see <http://www.gnu.org/licenses/>.
  26. *
  27. * A copy of the GPL can be found in the file "COPYING" in this
  28. * distribution.
  29. *
  30. * Adiscon LogAnalyzer is also available under a commercial license.
  31. * For details, contact info@adiscon.com or visit
  32. * http://loganalyzer.adiscon.com/commercial
  33. *********************************************************************
  34. */
  35. // --- Avoid directly accessing this file!
  36. if ( !defined('IN_PHPLOGCON') )
  37. {
  38. die('Hacking attempt');
  39. exit;
  40. }
  41. // ---
  42. // --- Basic Includes
  43. require_once($gl_root_path . 'classes/enums.class.php');
  44. require_once($gl_root_path . 'include/constants_errors.php');
  45. require_once($gl_root_path . 'include/constants_logstream.php');
  46. // ---
  47. class LogStreamLineParsersyslog23 extends LogStreamLineParser {
  48. // protected $_arrProperties = null;
  49. // Constructor
  50. public function LogStreamLineParsersyslog23() {
  51. return; // Nothing
  52. }
  53. /**
  54. * ParseLine
  55. *
  56. * @param arrArguments array in&out: properties of interest. There can be no guarantee the logstream can actually deliver them.
  57. * @return integer Error stat
  58. */
  59. public function ParseLine($szLine, &$arrArguments)
  60. {
  61. // Set IUT Property first!
  62. $arrArguments[SYSLOG_MESSAGETYPE] = IUT_Syslog;
  63. // Sample: <22>1 2011-03-03T15:27:06+01:00 debian507x64 postfix 2454 - - daemon started -- version 2.5.5, configuration /etc/postfix
  64. // Sample: <46>1 2011-03-03T15:27:05+01:00 debian507x64 rsyslogd - - - [origin software="rsyslogd" swVersion="4.6.4" x-pid="2344" x-info="http://www.rsyslog.com"] (re)start
  65. // Sample (RSyslog): 2008-03-28T11:07:40+01:00 localhost rger: test 1
  66. if ( preg_match("/^(\w+) ?(\d{1,2})\s+([\d:]+)\s+([\d\.]+) [\d\.]+ (\w{3})?\s*:\s*%(\w+-((\d*[a-zA-Z]+\d*)?))-?(\d)-([^:]+): (.*?)$/", $szLine, $out ) )
  67. {
  68. $arrArguments[SYSLOG_FACILITY] = $out[6];
  69. $arrArguments[SYSLOG_SEVERITY] = $out[9];
  70. $arrArguments[SYSLOG_DATE] = GetEventTime($out[1] . " " . $out[3] . " " . $out[3] . " " . $out[5]);
  71. $arrArguments[SYSLOG_HOST] = $out[4];
  72. $arrArguments[SYSLOG_SYSLOGTAG] = $out[10];
  73. $arrArguments[SYSLOG_MESSAGE] = $out[11];
  74. }
  75. else if ( preg_match("/<([0-9]{1,3})>([0-9]) ([0-9]{4,4}-[0-9]{1,2}-[0-9]{1,2}T[0-9]{1,2}:[0-9]{1,2}:[0-9]{1,2}.[0-9]{1,2}:[0-9]{1,2}) (.*?) (.*?) (.*?) (.*?) (.*?) (.*?)$/", $szLine, $out ) )
  76. {
  77. // Copy parsed properties!
  78. $arrArguments[SYSLOG_FACILITY] = $out[1] >> 3;
  79. $arrArguments[SYSLOG_SEVERITY] = $out[1] & 0x0007;
  80. $arrArguments[SYSLOG_DATE] = GetEventTime($out[3]);
  81. $arrArguments[SYSLOG_HOST] = $out[4];
  82. $arrArguments[SYSLOG_SYSLOGTAG] = $out[5];
  83. $arrArguments[SYSLOG_PROCESSID] = $out[6];
  84. $arrArguments[SYSLOG_MESSAGE] = $out[9];
  85. }
  86. // Sample: <22>1 2011-03-03T15:27:06.501740+01:00 debian507x64 postfix 2454 - - daemon started -- version 2.5.5, configuration /etc/postfix
  87. // Sample: <46>1 2011-03-03T15:27:05.366981+01:00 debian507x64 rsyslogd - - - [origin software="rsyslogd" swVersion="4.6.4" x-pid="2344" x-info="http://www.rsyslog.com"] (re)start
  88. else if ( preg_match("/<([0-9]{1,3})>([0-9]) ([0-9]{4,4}-[0-9]{1,2}-[0-9]{1,2}T[0-9]{1,2}:[0-9]{1,2}:[0-9]{1,2}\.[0-9]{1,6}.[0-9]{1,2}:[0-9]{1,2}) (.*?) (.*?) (.*?) (.*?) (.*?) (.*?)$/", $szLine, $out ) )
  89. {
  90. // Copy parsed properties!
  91. $arrArguments[SYSLOG_FACILITY] = $out[1] >> 3;
  92. $arrArguments[SYSLOG_SEVERITY] = $out[1] & 0x0007;
  93. $arrArguments[SYSLOG_DATE] = GetEventTime($out[3]);
  94. $arrArguments[SYSLOG_HOST] = $out[4];
  95. $arrArguments[SYSLOG_SYSLOGTAG] = $out[5];
  96. $arrArguments[SYSLOG_PROCESSID] = $out[6];
  97. $arrArguments[SYSLOG_MESSAGE] = $out[9];
  98. }
  99. else
  100. {
  101. if ( isset($arrArguments[SYSLOG_MESSAGE]) && strlen($arrArguments[SYSLOG_MESSAGE]) > 0 )
  102. OutputDebugMessage("Unparseable syslog msg - '" . $arrArguments[SYSLOG_MESSAGE] . "'", DEBUG_ERROR);
  103. }
  104. // If SyslogTag is set, we check for MessageType!
  105. if ( isset($arrArguments[SYSLOG_SYSLOGTAG]) )
  106. {
  107. if ( strpos($arrArguments[SYSLOG_SYSLOGTAG], "EvntSLog" ) !== false )
  108. $arrArguments[SYSLOG_MESSAGETYPE] = IUT_NT_EventReport;
  109. }
  110. // Return success!
  111. return SUCCESS;
  112. }
  113. }
  114. ?>