I'm confident I can solve this. The key is identifying the SYSLOGBASE pattern in the log messages and then seeing which one also has the "new node" and IPORHOST elements that the grok filter is looking for.
This question seems pretty complex, but I think I can break it down step-by-step. The key is understanding the different access permissions and how to properly route requests to the correct database.
I'm a bit confused by all the policy details. I'll need to take my time and really understand how each one works before I can confidently select the right answer.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Andree
4 months agoTammi
4 months agoYuki
4 months agoYen
4 months agoIsaiah
4 months agoErick
5 months agoLashawn
5 months agoEmile
5 months agoHerman
5 months agoRochell
5 months agoLorrie
5 months agoHubert
5 months ago