Skip to content

Example: RTPProxy Logs

Lorenzo Mangani edited this page Sep 12, 2017 · 8 revisions

RTPProxy to RTPAgent Correlation

PaStash app_rtpproxy can extract RTP to SIP correlation and details from debug logs:

Sample Logs
Aug 18 06:01:41 rtpa rtpproxy[8027]: DBUG:handle_command: received command "17402_275704 Uc18,0,8,101 b372ce50185fadc713c466c071f15fbd25bb650dbc8cab4a0c0-0082-7266 10.0.10.1 55078 -45026-66c071f-4496f1ad-66c071f;1"
Aug 18 06:01:41 rtpa rtpproxy[8027]: INFO:handle_command: new session b372ce50185fadc713c466c071f15fbd25bb650dbc8cab4a0c0-0082-7266, tag -45026-66c071f-4496f1ad-66c071f;1 requested, type strong
Aug 18 06:01:41 rtpa rtpproxy[8027]: INFO:handle_command: new session on a port 56726 created, tag -45026-66c071f-4496f1ad-66c071f;1
Aug 18 06:01:41 rtpa rtpproxy[8027]: INFO:handle_command: pre-filling caller's address with 10.0.10.1:55078
Aug 18 06:01:41 rtpa rtpproxy[8027]: DBUG:doreply: sending reply "17402_275704 56726 10.20.0.2#012"

Recipe

input {
  file {
    path => "/var/log/sonus-webui.log"
    #    start_index => 0
  }
}

filter {
  app_rtpproxy {}
}

output {
  http_post {
    host => ['10.0.0.1']
    port => 18090
    path => '/api/transaction/#{method}'
  }
}
Output
[STDOUT] {
  "message": {
    "media": [
      {
        "codec": "PCMA",
        "port": "56726",
        "ip": "10.20.0.2"
      }
    ],
    "direction": 0,
    "method": "create",
    "correlation_id": "b372ce50185fadc713c466c071f15fbd25bb650dbc8cab4a0c0-0082-7266"
  },
  "path": "/tmp/rtpproxy.log",
  "host": "localhost",
  "@timestamp": "2017-09-12T14:41:22.668Z",
  "@version": "1"
}
Clone this wiki locally