logstash-input-syslog 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,15 @@
1
+ ---
2
+ !binary "U0hBMQ==":
3
+ metadata.gz: !binary |-
4
+ NzBiZWYwNjJjMDFmYjY4Mjc2YTdlYjZhMjE0ZGYwYjQ2NWUxMzU5NA==
5
+ data.tar.gz: !binary |-
6
+ MzJmNGU5MmI2NjQ0ZGYxYjAzYmE4OTgwZDQxMmU4M2M5MGQ0N2E5NQ==
7
+ SHA512:
8
+ metadata.gz: !binary |-
9
+ NGQ0M2RjNWEzMjI1NTQ1ZGYzNDhhNzA0OWI3MjNmOWE0MTIyODE5MGI4NzVh
10
+ MDRmMTU3NjJhNGFlZjBhY2FhOWU2ZDMzOTNlNTVmMThlZDc1NjY5NTYxZDU1
11
+ MWFlY2Y0Y2Y3YmIxZjQwYmQ1MjljZjg0YmYxYmFmNWFkNWE3YzM=
12
+ data.tar.gz: !binary |-
13
+ NTkwNzY3NTQ5YWQ0NzM1YTUwMmU2NDFiZjQxOTMyZDk3MzdmZTViYjliMDEx
14
+ ZDgzZTkyYzFkODc2ZWE0ZTJmMWI4ZGZkNWJkNDVlOTJkMGMwZTNiODkwZDFm
15
+ MDk1NjVmMGNlYjBhMDJjMTAzYjdmOWI5NTFjZTFjZDg4ZDJlYWI=
data/.gitignore ADDED
@@ -0,0 +1,4 @@
1
+ *.gem
2
+ Gemfile.lock
3
+ .bundle
4
+ vendor
data/Gemfile ADDED
@@ -0,0 +1,4 @@
1
+ source 'http://rubygems.org'
2
+ gem 'rake'
3
+ gem 'gem_publisher'
4
+ gem 'archive-tar-minitar'
data/LICENSE ADDED
@@ -0,0 +1,13 @@
1
+ Copyright (c) 2012-2014 Elasticsearch <http://www.elasticsearch.org>
2
+
3
+ Licensed under the Apache License, Version 2.0 (the "License");
4
+ you may not use this file except in compliance with the License.
5
+ You may obtain a copy of the License at
6
+
7
+ http://www.apache.org/licenses/LICENSE-2.0
8
+
9
+ Unless required by applicable law or agreed to in writing, software
10
+ distributed under the License is distributed on an "AS IS" BASIS,
11
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ See the License for the specific language governing permissions and
13
+ limitations under the License.
data/Rakefile ADDED
@@ -0,0 +1,6 @@
1
+ @files=[]
2
+
3
+ task :default do
4
+ system("rake -T")
5
+ end
6
+
@@ -0,0 +1,238 @@
1
+ # encoding: utf-8
2
+ require "date"
3
+ require "logstash/filters/grok"
4
+ require "logstash/filters/date"
5
+ require "logstash/inputs/base"
6
+ require "logstash/namespace"
7
+ require "socket"
8
+
9
+ # Read syslog messages as events over the network.
10
+ #
11
+ # This input is a good choice if you already use syslog today.
12
+ # It is also a good choice if you want to receive logs from
13
+ # appliances and network devices where you cannot run your own
14
+ # log collector.
15
+ #
16
+ # Of course, 'syslog' is a very muddy term. This input only supports RFC3164
17
+ # syslog with some small modifications. The date format is allowed to be
18
+ # RFC3164 style or ISO8601. Otherwise the rest of RFC3164 must be obeyed.
19
+ # If you do not use RFC3164, do not use this input.
20
+ #
21
+ # For more information see [the RFC3164 page](http://www.ietf.org/rfc/rfc3164.txt).
22
+ #
23
+ # Note: This input will start listeners on both TCP and UDP.
24
+ class LogStash::Inputs::Syslog < LogStash::Inputs::Base
25
+ config_name "syslog"
26
+ milestone 1
27
+
28
+ default :codec, "plain"
29
+
30
+ # The address to listen on.
31
+ config :host, :validate => :string, :default => "0.0.0.0"
32
+
33
+ # The port to listen on. Remember that ports less than 1024 (privileged
34
+ # ports) may require root to use.
35
+ config :port, :validate => :number, :default => 514
36
+
37
+ # Use label parsing for severity and facility levels.
38
+ config :use_labels, :validate => :boolean, :default => true
39
+
40
+ # Labels for facility levels. These are defined in RFC3164.
41
+ config :facility_labels, :validate => :array, :default => [ "kernel", "user-level", "mail", "system", "security/authorization", "syslogd", "line printer", "network news", "UUCP", "clock", "security/authorization", "FTP", "NTP", "log audit", "log alert", "clock", "local0", "local1", "local2", "local3", "local4", "local5", "local6", "local7" ]
42
+
43
+ # Labels for severity levels. These are defined in RFC3164.
44
+ config :severity_labels, :validate => :array, :default => [ "Emergency" , "Alert", "Critical", "Error", "Warning", "Notice", "Informational", "Debug" ]
45
+
46
+ public
47
+ def initialize(params)
48
+ super
49
+ @shutdown_requested = false
50
+ BasicSocket.do_not_reverse_lookup = true
51
+ end # def initialize
52
+
53
+ public
54
+ def register
55
+ require "thread_safe"
56
+ @grok_filter = LogStash::Filters::Grok.new(
57
+ "overwrite" => "message",
58
+ "match" => { "message" => "<%{POSINT:priority}>%{SYSLOGLINE}" },
59
+ "tag_on_failure" => ["_grokparsefailure_sysloginput"],
60
+ )
61
+
62
+ @date_filter = LogStash::Filters::Date.new(
63
+ "match" => [ "timestamp", "MMM d HH:mm:ss", "MMM dd HH:mm:ss", "ISO8601"]
64
+ )
65
+
66
+ @grok_filter.register
67
+ @date_filter.register
68
+
69
+ @tcp_clients = ThreadSafe::Array.new
70
+ end # def register
71
+
72
+ public
73
+ def run(output_queue)
74
+ # udp server
75
+ udp_thr = Thread.new do
76
+ begin
77
+ udp_listener(output_queue)
78
+ rescue => e
79
+ break if @shutdown_requested
80
+ @logger.warn("syslog udp listener died",
81
+ :address => "#{@host}:#{@port}", :exception => e,
82
+ :backtrace => e.backtrace)
83
+ sleep(5)
84
+ retry
85
+ end # begin
86
+ end # Thread.new
87
+
88
+ # tcp server
89
+ tcp_thr = Thread.new do
90
+ begin
91
+ tcp_listener(output_queue)
92
+ rescue => e
93
+ break if @shutdown_requested
94
+ @logger.warn("syslog tcp listener died",
95
+ :address => "#{@host}:#{@port}", :exception => e,
96
+ :backtrace => e.backtrace)
97
+ sleep(5)
98
+ retry
99
+ end # begin
100
+ end # Thread.new
101
+
102
+ # If we exit and we're the only input, the agent will think no inputs
103
+ # are running and initiate a shutdown.
104
+ udp_thr.join
105
+ tcp_thr.join
106
+ end # def run
107
+
108
+ private
109
+ def udp_listener(output_queue)
110
+ @logger.info("Starting syslog udp listener", :address => "#{@host}:#{@port}")
111
+
112
+ if @udp
113
+ @udp.close
114
+ end
115
+
116
+ @udp = UDPSocket.new(Socket::AF_INET)
117
+ @udp.bind(@host, @port)
118
+
119
+ loop do
120
+ payload, client = @udp.recvfrom(9000)
121
+ # Ruby uri sucks, so don't use it.
122
+ @codec.decode(payload) do |event|
123
+ decorate(event)
124
+ event["host"] = client[3]
125
+ syslog_relay(event)
126
+ output_queue << event
127
+ end
128
+ end
129
+ ensure
130
+ close_udp
131
+ end # def udp_listener
132
+
133
+ private
134
+ def tcp_listener(output_queue)
135
+ @logger.info("Starting syslog tcp listener", :address => "#{@host}:#{@port}")
136
+ @tcp = TCPServer.new(@host, @port)
137
+ @tcp_clients = []
138
+
139
+ loop do
140
+ client = @tcp.accept
141
+ @tcp_clients << client
142
+ Thread.new(client) do |client|
143
+ ip, port = client.peeraddr[3], client.peeraddr[1]
144
+ @logger.info("new connection", :client => "#{ip}:#{port}")
145
+ LogStash::Util::set_thread_name("input|syslog|tcp|#{ip}:#{port}}")
146
+ begin
147
+ client.each do |line|
148
+ @codec.decode(line) do |event|
149
+ decorate(event)
150
+ event["host"] = ip
151
+ syslog_relay(event)
152
+ output_queue << event
153
+ end
154
+ end
155
+ rescue Errno::ECONNRESET
156
+ ensure
157
+ @tcp_clients.delete(client)
158
+ end
159
+ end # Thread.new
160
+ end # loop do
161
+ ensure
162
+ close_tcp
163
+ end # def tcp_listener
164
+
165
+ public
166
+ def teardown
167
+ @shutdown_requested = true
168
+ close_udp
169
+ close_tcp
170
+ finished
171
+ end
172
+
173
+ private
174
+ def close_udp
175
+ if @udp
176
+ @udp.close_read rescue nil
177
+ @udp.close_write rescue nil
178
+ end
179
+ @udp = nil
180
+ end
181
+
182
+ private
183
+ def close_tcp
184
+ # If we somehow have this left open, close it.
185
+ @tcp_clients.each do |client|
186
+ client.close rescue nil
187
+ end
188
+ @tcp.close if @tcp rescue nil
189
+ @tcp = nil
190
+ end
191
+
192
+ # Following RFC3164 where sane, we'll try to parse a received message
193
+ # as if you were relaying a syslog message to it.
194
+ # If the message cannot be recognized (see @grok_filter), we'll
195
+ # treat it like the whole event["message"] is correct and try to fill
196
+ # the missing pieces (host, priority, etc)
197
+ public
198
+ def syslog_relay(event)
199
+ @grok_filter.filter(event)
200
+
201
+ if event["tags"].nil? || !event["tags"].include?(@grok_filter.tag_on_failure)
202
+ # Per RFC3164, priority = (facility * 8) + severity
203
+ # = (facility << 3) & (severity)
204
+ priority = event["priority"].to_i rescue 13
205
+ severity = priority & 7 # 7 is 111 (3 bits)
206
+ facility = priority >> 3
207
+ event["priority"] = priority
208
+ event["severity"] = severity
209
+ event["facility"] = facility
210
+
211
+ event["timestamp"] = event["timestamp8601"] if event.include?("timestamp8601")
212
+ @date_filter.filter(event)
213
+ else
214
+ @logger.info? && @logger.info("NOT SYSLOG", :message => event["message"])
215
+
216
+ # RFC3164 says unknown messages get pri=13
217
+ priority = 13
218
+ event["priority"] = 13
219
+ event["severity"] = 5 # 13 & 7 == 5
220
+ event["facility"] = 1 # 13 >> 3 == 1
221
+ end
222
+
223
+ # Apply severity and facility metadata if
224
+ # use_labels => true
225
+ if @use_labels
226
+ facility_number = event["facility"]
227
+ severity_number = event["severity"]
228
+
229
+ if @facility_labels[facility_number]
230
+ event["facility_label"] = @facility_labels[facility_number]
231
+ end
232
+
233
+ if @severity_labels[severity_number]
234
+ event["severity_label"] = @severity_labels[severity_number]
235
+ end
236
+ end
237
+ end # def syslog_relay
238
+ end # class LogStash::Inputs::Syslog
@@ -0,0 +1,30 @@
1
+ Gem::Specification.new do |s|
2
+
3
+ s.name = 'logstash-input-syslog'
4
+ s.version = '0.1.0'
5
+ s.licenses = ['Apache License (2.0)']
6
+ s.summary = "Read syslog messages as events over the network."
7
+ s.description = "Read syslog messages as events over the network."
8
+ s.authors = ["Elasticsearch"]
9
+ s.email = 'richard.pijnenburg@elasticsearch.com'
10
+ s.homepage = "http://logstash.net/"
11
+ s.require_paths = ["lib"]
12
+
13
+ # Files
14
+ s.files = `git ls-files`.split($\)+::Dir.glob('vendor/*')
15
+
16
+ # Tests
17
+ s.test_files = s.files.grep(%r{^(test|spec|features)/})
18
+
19
+ # Special flag to let us know this is actually a logstash plugin
20
+ s.metadata = { "logstash_plugin" => "true", "group" => "input" }
21
+
22
+ # Gem dependencies
23
+ s.add_runtime_dependency 'logstash', '>= 1.4.0', '< 2.0.0'
24
+
25
+ s.add_runtime_dependency 'logstash-codec-plain'
26
+ s.add_runtime_dependency 'logstash-filter-grok'
27
+ s.add_runtime_dependency 'logstash-filter-date'
28
+
29
+ end
30
+
@@ -0,0 +1,9 @@
1
+ require "gem_publisher"
2
+
3
+ desc "Publish gem to RubyGems.org"
4
+ task :publish_gem do |t|
5
+ gem_file = Dir.glob(File.expand_path('../*.gemspec',File.dirname(__FILE__))).first
6
+ gem = GemPublisher.publish_if_updated(gem_file, :rubygems)
7
+ puts "Published #{gem}" if gem
8
+ end
9
+
@@ -0,0 +1,169 @@
1
+ require "net/http"
2
+ require "uri"
3
+ require "digest/sha1"
4
+
5
+ def vendor(*args)
6
+ return File.join("vendor", *args)
7
+ end
8
+
9
+ directory "vendor/" => ["vendor"] do |task, args|
10
+ mkdir task.name
11
+ end
12
+
13
+ def fetch(url, sha1, output)
14
+
15
+ puts "Downloading #{url}"
16
+ actual_sha1 = download(url, output)
17
+
18
+ if actual_sha1 != sha1
19
+ fail "SHA1 does not match (expected '#{sha1}' but got '#{actual_sha1}')"
20
+ end
21
+ end # def fetch
22
+
23
+ def file_fetch(url, sha1)
24
+ filename = File.basename( URI(url).path )
25
+ output = "vendor/#{filename}"
26
+ task output => [ "vendor/" ] do
27
+ begin
28
+ actual_sha1 = file_sha1(output)
29
+ if actual_sha1 != sha1
30
+ fetch(url, sha1, output)
31
+ end
32
+ rescue Errno::ENOENT
33
+ fetch(url, sha1, output)
34
+ end
35
+ end.invoke
36
+
37
+ return output
38
+ end
39
+
40
+ def file_sha1(path)
41
+ digest = Digest::SHA1.new
42
+ fd = File.new(path, "r")
43
+ while true
44
+ begin
45
+ digest << fd.sysread(16384)
46
+ rescue EOFError
47
+ break
48
+ end
49
+ end
50
+ return digest.hexdigest
51
+ ensure
52
+ fd.close if fd
53
+ end
54
+
55
+ def download(url, output)
56
+ uri = URI(url)
57
+ digest = Digest::SHA1.new
58
+ tmp = "#{output}.tmp"
59
+ Net::HTTP.start(uri.host, uri.port, :use_ssl => (uri.scheme == "https")) do |http|
60
+ request = Net::HTTP::Get.new(uri.path)
61
+ http.request(request) do |response|
62
+ fail "HTTP fetch failed for #{url}. #{response}" if [200, 301].include?(response.code)
63
+ size = (response["content-length"].to_i || -1).to_f
64
+ count = 0
65
+ File.open(tmp, "w") do |fd|
66
+ response.read_body do |chunk|
67
+ fd.write(chunk)
68
+ digest << chunk
69
+ if size > 0 && $stdout.tty?
70
+ count += chunk.bytesize
71
+ $stdout.write(sprintf("\r%0.2f%%", count/size * 100))
72
+ end
73
+ end
74
+ end
75
+ $stdout.write("\r \r") if $stdout.tty?
76
+ end
77
+ end
78
+
79
+ File.rename(tmp, output)
80
+
81
+ return digest.hexdigest
82
+ rescue SocketError => e
83
+ puts "Failure while downloading #{url}: #{e}"
84
+ raise
85
+ ensure
86
+ File.unlink(tmp) if File.exist?(tmp)
87
+ end # def download
88
+
89
+ def untar(tarball, &block)
90
+ require "archive/tar/minitar"
91
+ tgz = Zlib::GzipReader.new(File.open(tarball))
92
+ # Pull out typesdb
93
+ tar = Archive::Tar::Minitar::Input.open(tgz)
94
+ tar.each do |entry|
95
+ path = block.call(entry)
96
+ next if path.nil?
97
+ parent = File.dirname(path)
98
+
99
+ mkdir_p parent unless File.directory?(parent)
100
+
101
+ # Skip this file if the output file is the same size
102
+ if entry.directory?
103
+ mkdir path unless File.directory?(path)
104
+ else
105
+ entry_mode = entry.instance_eval { @mode } & 0777
106
+ if File.exists?(path)
107
+ stat = File.stat(path)
108
+ # TODO(sissel): Submit a patch to archive-tar-minitar upstream to
109
+ # expose headers in the entry.
110
+ entry_size = entry.instance_eval { @size }
111
+ # If file sizes are same, skip writing.
112
+ next if stat.size == entry_size && (stat.mode & 0777) == entry_mode
113
+ end
114
+ puts "Extracting #{entry.full_name} from #{tarball} #{entry_mode.to_s(8)}"
115
+ File.open(path, "w") do |fd|
116
+ # eof? check lets us skip empty files. Necessary because the API provided by
117
+ # Archive::Tar::Minitar::Reader::EntryStream only mostly acts like an
118
+ # IO object. Something about empty files in this EntryStream causes
119
+ # IO.copy_stream to throw "can't convert nil into String" on JRuby
120
+ # TODO(sissel): File a bug about this.
121
+ while !entry.eof?
122
+ chunk = entry.read(16384)
123
+ fd.write(chunk)
124
+ end
125
+ #IO.copy_stream(entry, fd)
126
+ end
127
+ File.chmod(entry_mode, path)
128
+ end
129
+ end
130
+ tar.close
131
+ File.unlink(tarball) if File.file?(tarball)
132
+ end # def untar
133
+
134
+ def ungz(file)
135
+
136
+ outpath = file.gsub('.gz', '')
137
+ tgz = Zlib::GzipReader.new(File.open(file))
138
+ begin
139
+ File.open(outpath, "w") do |out|
140
+ IO::copy_stream(tgz, out)
141
+ end
142
+ File.unlink(file)
143
+ rescue
144
+ File.unlink(outpath) if File.file?(outpath)
145
+ raise
146
+ end
147
+ tgz.close
148
+ end
149
+
150
+ desc "Process any vendor files required for this plugin"
151
+ task "vendor" do |task, args|
152
+
153
+ @files.each do |file|
154
+ download = file_fetch(file['url'], file['sha1'])
155
+ if download =~ /.tar.gz/
156
+ prefix = download.gsub('.tar.gz', '').gsub('vendor/', '')
157
+ untar(download) do |entry|
158
+ if !file['files'].nil?
159
+ next unless file['files'].include?(entry.full_name.gsub(prefix, ''))
160
+ out = entry.full_name.split("/").last
161
+ end
162
+ File.join('vendor', out)
163
+ end
164
+ elsif download =~ /.gz/
165
+ ungz(download)
166
+ end
167
+ end
168
+
169
+ end
@@ -0,0 +1,92 @@
1
+ # coding: utf-8
2
+ require "spec_helper"
3
+ require "socket"
4
+ require "logstash/inputs/syslog"
5
+ require "logstash/event"
6
+
7
+ describe "inputs/syslog" do
8
+
9
+
10
+ it "should properly handle priority, severity and facilities", :socket => true do
11
+ port = 5511
12
+ event_count = 10
13
+
14
+ config <<-CONFIG
15
+ input {
16
+ syslog {
17
+ type => "blah"
18
+ port => #{port}
19
+ }
20
+ }
21
+ CONFIG
22
+
23
+ input do |pipeline, queue|
24
+ Thread.new { pipeline.run }
25
+ sleep 0.1 while !pipeline.ready?
26
+
27
+ socket = Stud.try(5.times) { TCPSocket.new("127.0.0.1", port) }
28
+ event_count.times do |i|
29
+ socket.puts("<164>Oct 26 15:19:25 1.2.3.4 %ASA-4-106023: Deny udp src DRAC:10.1.2.3/43434 dst outside:192.168.0.1/53 by access-group \"acl_drac\" [0x0, 0x0]")
30
+ end
31
+ socket.close
32
+
33
+ events = event_count.times.collect { queue.pop }
34
+
35
+ insist { events.length } == event_count
36
+ event_count.times do |i|
37
+ insist { events[i]["priority"] } == 164
38
+ insist { events[i]["severity"] } == 4
39
+ insist { events[i]["facility"] } == 20
40
+ end
41
+ end
42
+ end
43
+
44
+ it "should add unique tag when grok parsing fails with live syslog input", :socket => true do
45
+ port = 5511
46
+ event_count = 10
47
+
48
+ config <<-CONFIG
49
+ input {
50
+ syslog {
51
+ type => "blah"
52
+ port => #{port}
53
+ }
54
+ }
55
+ CONFIG
56
+
57
+ input do |pipeline, queue|
58
+ Thread.new { pipeline.run }
59
+ sleep 0.1 while !pipeline.ready?
60
+
61
+ socket = Stud.try(5.times) { TCPSocket.new("127.0.0.1", port) }
62
+ event_count.times do |i|
63
+ socket.puts("message which causes the a grok parse failure")
64
+ end
65
+ socket.close
66
+
67
+ events = event_count.times.collect { queue.pop }
68
+
69
+ insist { events.length } == event_count
70
+ event_count.times do |i|
71
+ insist { events[i]["tags"] } == ["_grokparsefailure_sysloginputplugin"]
72
+ end
73
+ end
74
+ end
75
+
76
+ it "should add unique tag when grok parsing fails" do
77
+ input = LogStash::Inputs::Syslog.new({})
78
+ input.register
79
+
80
+ # event which is not syslog should have a new tag
81
+ event = LogStash::Event.new({ "message" => "hello world, this is not syslog RFC3164" })
82
+ input.syslog_relay(event)
83
+ insist { event["tags"] } == ["_grokparsefailure_sysloginput"]
84
+
85
+ syslog_event = LogStash::Event.new({ "message" => "<164>Oct 26 15:19:25 1.2.3.4 %ASA-4-106023: Deny udp src DRAC:10.1.2.3/43434" })
86
+ input.syslog_relay(syslog_event)
87
+ insist { syslog_event["priority"] } == 164
88
+ insist { syslog_event["severity"] } == 4
89
+ insist { syslog_event["tags"] } == nil
90
+ end
91
+
92
+ end
metadata ADDED
@@ -0,0 +1,117 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: logstash-input-syslog
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Elasticsearch
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2014-11-05 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: logstash
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - ! '>='
18
+ - !ruby/object:Gem::Version
19
+ version: 1.4.0
20
+ - - <
21
+ - !ruby/object:Gem::Version
22
+ version: 2.0.0
23
+ type: :runtime
24
+ prerelease: false
25
+ version_requirements: !ruby/object:Gem::Requirement
26
+ requirements:
27
+ - - ! '>='
28
+ - !ruby/object:Gem::Version
29
+ version: 1.4.0
30
+ - - <
31
+ - !ruby/object:Gem::Version
32
+ version: 2.0.0
33
+ - !ruby/object:Gem::Dependency
34
+ name: logstash-codec-plain
35
+ requirement: !ruby/object:Gem::Requirement
36
+ requirements:
37
+ - - ! '>='
38
+ - !ruby/object:Gem::Version
39
+ version: '0'
40
+ type: :runtime
41
+ prerelease: false
42
+ version_requirements: !ruby/object:Gem::Requirement
43
+ requirements:
44
+ - - ! '>='
45
+ - !ruby/object:Gem::Version
46
+ version: '0'
47
+ - !ruby/object:Gem::Dependency
48
+ name: logstash-filter-grok
49
+ requirement: !ruby/object:Gem::Requirement
50
+ requirements:
51
+ - - ! '>='
52
+ - !ruby/object:Gem::Version
53
+ version: '0'
54
+ type: :runtime
55
+ prerelease: false
56
+ version_requirements: !ruby/object:Gem::Requirement
57
+ requirements:
58
+ - - ! '>='
59
+ - !ruby/object:Gem::Version
60
+ version: '0'
61
+ - !ruby/object:Gem::Dependency
62
+ name: logstash-filter-date
63
+ requirement: !ruby/object:Gem::Requirement
64
+ requirements:
65
+ - - ! '>='
66
+ - !ruby/object:Gem::Version
67
+ version: '0'
68
+ type: :runtime
69
+ prerelease: false
70
+ version_requirements: !ruby/object:Gem::Requirement
71
+ requirements:
72
+ - - ! '>='
73
+ - !ruby/object:Gem::Version
74
+ version: '0'
75
+ description: Read syslog messages as events over the network.
76
+ email: richard.pijnenburg@elasticsearch.com
77
+ executables: []
78
+ extensions: []
79
+ extra_rdoc_files: []
80
+ files:
81
+ - .gitignore
82
+ - Gemfile
83
+ - LICENSE
84
+ - Rakefile
85
+ - lib/logstash/inputs/syslog.rb
86
+ - logstash-input-syslog.gemspec
87
+ - rakelib/publish.rake
88
+ - rakelib/vendor.rake
89
+ - spec/inputs/syslog_spec.rb
90
+ homepage: http://logstash.net/
91
+ licenses:
92
+ - Apache License (2.0)
93
+ metadata:
94
+ logstash_plugin: 'true'
95
+ group: input
96
+ post_install_message:
97
+ rdoc_options: []
98
+ require_paths:
99
+ - lib
100
+ required_ruby_version: !ruby/object:Gem::Requirement
101
+ requirements:
102
+ - - ! '>='
103
+ - !ruby/object:Gem::Version
104
+ version: '0'
105
+ required_rubygems_version: !ruby/object:Gem::Requirement
106
+ requirements:
107
+ - - ! '>='
108
+ - !ruby/object:Gem::Version
109
+ version: '0'
110
+ requirements: []
111
+ rubyforge_project:
112
+ rubygems_version: 2.4.1
113
+ signing_key:
114
+ specification_version: 4
115
+ summary: Read syslog messages as events over the network.
116
+ test_files:
117
+ - spec/inputs/syslog_spec.rb