I have a syslog message that contains a null terminated string: "syslog_message":"A10\u0000" -- these messages represent is-alive checks from a load balancer to the logstash servers. I would prefer not to have thousands of "the A10 checked & said logstash is still there" filling up Elasticsearch.
I've been able to filter out any messages that start with A10. Since our "real" messages , I shouldn't be dropping any good data, but I wonder if there is there any way to do an exact match for the full string including the null termination character. I've commented out the ones I've tried that haven't worked.
#if [message] == "A10\u0000"{
#if [message] == "A10\\u0000"{
#if [message] == 'A10\u0000'{
if [message] =~ /^A10/{
drop { }
}