newrelic-insights-log-reader
kandi X-RAY | newrelic-insights-log-reader Summary
kandi X-RAY | newrelic-insights-log-reader Summary
newrelic-insights-log-reader is a JavaScript library. newrelic-insights-log-reader has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. You can download it from GitHub.
newrelic-insights-log-reader
newrelic-insights-log-reader
Support
Quality
Security
License
Reuse
Support
newrelic-insights-log-reader has a low active ecosystem.
It has 1 star(s) with 0 fork(s). There are 1 watchers for this library.
It had no major release in the last 6 months.
newrelic-insights-log-reader has no issues reported. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of newrelic-insights-log-reader is current.
Quality
newrelic-insights-log-reader has 0 bugs and 0 code smells.
Security
newrelic-insights-log-reader has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
newrelic-insights-log-reader code analysis shows 0 unresolved vulnerabilities.
There are 0 security hotspots that need review.
License
newrelic-insights-log-reader is licensed under the MIT License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
newrelic-insights-log-reader releases are not available. You will need to build from source code and install.
Installation instructions are available. Examples and code snippets are not available.
Top functions reviewed by kandi - BETA
kandi has reviewed newrelic-insights-log-reader and discovered the below as its top functions. This is intended to give you an instant insight into newrelic-insights-log-reader implemented functionality, and help decide if they suit your requirements.
- Process a line .
Get all kandi verified functions for this library.
newrelic-insights-log-reader Key Features
No Key Features are available at this moment for newrelic-insights-log-reader.
newrelic-insights-log-reader Examples and Code Snippets
No Code Snippets are available at this moment for newrelic-insights-log-reader.
Community Discussions
No Community Discussions are available at this moment for newrelic-insights-log-reader.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install newrelic-insights-log-reader
Download the latest version of the agent: https://github.com/sschwartzman/Insights-Log-Reader/archive/master.zip
Unzip on the server server that you want to monitor
Configure config/config.json
Start by copying config.json.template OR your pre-built config.json to config/config.json.
Click here for config.json configuration details
Start agent using either the node command-line, or a wrapper package like forever
nohup node /path/to/app.js > /path/to/InsightsLogReader.log 2>&1 &
Directions for usage with forever coming soon...
Login to New Relic Insights UI and check the Data Explorer for events flowing in.
In Insights, click the "Explore" Icon from the top of the left-hand menu.
In the Data Explorer, look for "LogEvent" as an event type, and there to be a non-zero count of events for that type.
Click on "LogEvent" to see some of the most recent events that match your search criteria.
Make dashboards! Here are helpful links to New Relic's docs:
Building Dashboards
Editing Dashboards
Using Widgets
accountid - Your account ID, which can be found in any New Relic RPM or Insights URL in the format: http://insights.newrelic.com/{account_id}/...
apikey - Your API Insert Key, which is created and saved here: https://insights.newrelic.com/accounts/{account_id}/manage/api_keys
logfile - Path and name of the log file you wish to tail.
parsers - An array of parsers, each of which will be run against the log file.
name - (Optional) Name of the matching parse will appear in debug logs.
comment - (Optional) Anything you want can go here. Currently, I'm using it to store an example log line for this parser.
match - Regular Expression used to search your log file. Read below in Regex-ing Your Log for details.
headers - Column names for matched fields in a line of your log file. You MUST have as many header fields as you do match fields. For now.
eventtype (Optional) The type of event you want to put into Insights - can be anything. Defaults to 'LogEvent'
timestamp is a special header in Insights that can be populated from your data.
If you use timestamp, it must be parsing a standard date & time format. For example: 2014/07/01 21:23:09.841 GMT
If the timestamp that is read is more than 24 hours old, it is ignored (Insights limitation).
The original contents of the timestamp field are saved as timestamp_orig in each Insights record.
newmsgs - If set to true, Insights Log Reader will only look for new log events. If false, Insights Log Reader will read the whole log every time it is started.
send_interval - how often (seconds) it will send events. Default is 10.
send_max_events - max # of events it will send in an interval. Default is 50.
send_min_events - min # of events necessary in an interval to send. Default is 10.
Standard regex with groupings is used.
Each grouping (...) will produce a field in the log event.
\ must be escaped with another \, like in the example below.
Here is an example regex used to find most any log event in an Mac OSX system.log (/var/log/system.log): (\\w{3}[0-9\\s -]+)(\\S+)\\s([^\\[]+)\\[(\\d+)\\] -(.*),
More regex examples to follow!
I recommend using a regex tool like regexr or reggy to build your regex statement. Copy-and-paste in a sample line or lines from the log file in question to build the regex.
Unzip on the server server that you want to monitor
Configure config/config.json
Start by copying config.json.template OR your pre-built config.json to config/config.json.
Click here for config.json configuration details
Start agent using either the node command-line, or a wrapper package like forever
nohup node /path/to/app.js > /path/to/InsightsLogReader.log 2>&1 &
Directions for usage with forever coming soon...
Login to New Relic Insights UI and check the Data Explorer for events flowing in.
In Insights, click the "Explore" Icon from the top of the left-hand menu.
In the Data Explorer, look for "LogEvent" as an event type, and there to be a non-zero count of events for that type.
Click on "LogEvent" to see some of the most recent events that match your search criteria.
Make dashboards! Here are helpful links to New Relic's docs:
Building Dashboards
Editing Dashboards
Using Widgets
accountid - Your account ID, which can be found in any New Relic RPM or Insights URL in the format: http://insights.newrelic.com/{account_id}/...
apikey - Your API Insert Key, which is created and saved here: https://insights.newrelic.com/accounts/{account_id}/manage/api_keys
logfile - Path and name of the log file you wish to tail.
parsers - An array of parsers, each of which will be run against the log file.
name - (Optional) Name of the matching parse will appear in debug logs.
comment - (Optional) Anything you want can go here. Currently, I'm using it to store an example log line for this parser.
match - Regular Expression used to search your log file. Read below in Regex-ing Your Log for details.
headers - Column names for matched fields in a line of your log file. You MUST have as many header fields as you do match fields. For now.
eventtype (Optional) The type of event you want to put into Insights - can be anything. Defaults to 'LogEvent'
timestamp is a special header in Insights that can be populated from your data.
If you use timestamp, it must be parsing a standard date & time format. For example: 2014/07/01 21:23:09.841 GMT
If the timestamp that is read is more than 24 hours old, it is ignored (Insights limitation).
The original contents of the timestamp field are saved as timestamp_orig in each Insights record.
newmsgs - If set to true, Insights Log Reader will only look for new log events. If false, Insights Log Reader will read the whole log every time it is started.
send_interval - how often (seconds) it will send events. Default is 10.
send_max_events - max # of events it will send in an interval. Default is 50.
send_min_events - min # of events necessary in an interval to send. Default is 10.
Standard regex with groupings is used.
Each grouping (...) will produce a field in the log event.
\ must be escaped with another \, like in the example below.
Here is an example regex used to find most any log event in an Mac OSX system.log (/var/log/system.log): (\\w{3}[0-9\\s -]+)(\\S+)\\s([^\\[]+)\\[(\\d+)\\] -(.*),
More regex examples to follow!
I recommend using a regex tool like regexr or reggy to build your regex statement. Copy-and-paste in a sample line or lines from the log file in question to build the regex.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page