Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

In Log Search, users can create queries and visualizations to better understand how Armor bills against log usage. Users will want to review usage for both Agent and non-Agent log types. 


Query for Armor Agent Log Types


To query Armor Agent log types:

  1. In AMP, go to the Log Search screen.
  2. Click on Discover.
  3. Use the Change Index Pattern dropdown to view all customer accounts under your Partner account.
    1. Click the View drop down, and change the Index Pattern to (Account ID)_partner.
    2. Below the Search bar, click the link for +Add Filter
      1. Field = tenant.id
      2. Operator = is
      3. Value = (Partner Customer Account ID)
  4. Below the Search bar, click the link for +Add Filter
    1. Filter #1
      1. Field = tags
      2. Operator = is one of
      3. Values = armor agent, oslogs
        1. Type *armor_agent* and hit enter
        2. Type *oslogs* and hit enter
      4. Hit Save
    2. Filter #2
      1. Field = tags
      2. Operator = is one of
      3. Values = windows, linux
        1. Type *windows* and hit enter
        2. Type *linux* and hit enter
      4. Hit Save
    3. Hit the Refresh button


Visualization for Armor Log Types


To create a visualization for Armor Agent log types:

  1. Click on Visualize
  2. In the New Visualization pop up, select the Data Table visualization option.
  3. Choose a source.
  4. Below the Search bar, click the link for +Add Filter
    1. Filter #1
      1. Field = tags
      2. Operator = is one of
      3. Values = armor agent, oslogs
        1. Type *armor_agent* and hit enter
        2. Type *oslogs* and hit enter
      4. Hit Save
    2. Filter #2
      1. Field = tags
      2. Operator = is one of
      3. Values = windows, linux
        1. Type *windows* and hit enter
        2. Type *linux* and hit enter
      4. Hit Save
    3. Hit the Refresh button
  5. In the Data tab, expand the Metric configuration
    1. In the Aggregation dropdown, select Sum      
    2. In the Field dropdown, enter message_size
  6. Under Buckets, click Add
    1. Select Split rows
    2. In the Aggregation dropdown, select Terms
    3. In the Field dropdown, select external_id
  7. Add another Bucket by clicking Add
    1. Select Split rows
      1. In the Sub aggregation, select Terms
      2. In the Field dropdown, select winevent.log.source
  8. Hit Update
  • No labels