Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
maxLevel2
typeflat

...

Valid tags and data tables

The full tag must have 4 levels. The first two are fixed asauth.ping. The third level identifies the type of events sent, and the fourth level indicates the event subtype. 

These are the valid tags and corresponding data tables that will receive the parsers' data:

Product / Service

Tag

Data table

PingFederate

auth.ping.federate.audit

auth.ping.federate.audit

auth.ping.federate.security_audit

auth.ping.federate.security_audit

auth.ping.federate.server

auth.ping.federate.server

PingID

auth.ping.id.mfa

auth.ping.id.mfa

For more information, read more About Devo tags.

How is the data sent to Devo?

Logs may be sent with the Devo relay. Example relay rules:

Code Block
         Source message: 
            Source data: ^\d{4}-\d{2}-\d{2}\s\d{2}:\d{2}:\d{2},\d{3}\strackingid=
             Source tag: 
             Target tag: auth.ping.federate.audit
Sent without syslog tag: true
Code Block
         Source message: 
            Source data: ^\d{4}-\d{2}-\d{2}T\d{2}:\d{2}:\d{2},\d{3}\|
             Source tag: 
             Target tag: auth.ping.federate.security_audit
Sent without syslog tag: true
Code Block
         Source message: 
            Source data: 
             Source tag: 
             Target tag: auth.ping.id.mfa
Sent without syslog tag: true

Table structure

These are the fields displayed in these tables:

...