logstash-input-sdee 0.7.2 → 0.7.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 460035a2184f46b87a7fb80c50cbcc34f17448e2
4
- data.tar.gz: bea63d705eda5f26ff80c217b1b82f8f98853a4b
3
+ metadata.gz: 1f5a805de332064bc3fb54d0038a7e8adac2b38b
4
+ data.tar.gz: 507a27ffa21c3e7c4e38e3217207cc7b22652074
5
5
  SHA512:
6
- metadata.gz: b7d8c9dc088e97fad2de9c83918d9cf7036560b521c2cf41ccf4c8bd940d90b4a069d816a2591736b09d6400432d4e6bbf46af2d3f1de641353abf0f3d83f0d2
7
- data.tar.gz: c28ec76ff7ca0ad2d25f7f94b3ba8c762bae97f6704f71327be7535387c1ec4116fd3e780b9853cb47204c166ec6eeb2bda0ba9e63a22f6fe42c4c96e7d1c9ca
6
+ metadata.gz: 132da9980c667224234e27dca3f06e23202fe72e0d9a73ec3bdd37f809d66c2c82c9d0f5dae6fecc7e9ab48f05902c4afe050aeaad9991326b02494d747b9cb2
7
+ data.tar.gz: 67e9490b0ac75ae8f85eac525bf85c1d4f3bce65e8efcab05a34cecc9cd5ddda31336c42b5c5c7f494fe9c1a899028fec52e624b6023f6345a4173f21edea6da
@@ -176,10 +176,15 @@ class LogStash::Inputs::SDEE < LogStash::Inputs::Base
176
176
  run_once(queue)
177
177
  end while (@remaining > 0)
178
178
  end
179
- rescue EOFError, LogStash::ShutdownSignal
179
+ rescue LogStash::ShutdownSignal
180
+ teardown
181
+ break
182
+ rescue IOError, EOFError
183
+ teardown
180
184
  break
181
185
  end
182
186
  end
187
+ finished
183
188
  end
184
189
 
185
190
  public
@@ -1,7 +1,7 @@
1
1
  Gem::Specification.new do |s|
2
2
  s.name = 'logstash-input-sdee'
3
- s.version = '0.7.2'
4
- s.date = '2016-08-14'
3
+ s.version = '0.7.3'
4
+ s.date = '2016-08-17'
5
5
  s.summary = "Logstah SDEE input from Cisco ASA"
6
6
  s.description = "This Logstash input plugin allows you to call a Cisco SDEE/CIDEE HTTP API, decode the output of it into event(s), and send them on their merry way."
7
7
  s.authors = ["rootik"]
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-input-sdee
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.7.2
4
+ version: 0.7.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - rootik
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2016-08-14 00:00:00.000000000 Z
11
+ date: 2016-08-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: logstash-core
@@ -85,7 +85,6 @@ files:
85
85
  - examples/10-inputs.conf
86
86
  - examples/20-filter.conf
87
87
  - examples/30-outputs.conf
88
- - examples/dict/cisco.dictionary.yaml
89
88
  - examples/dict/cisco.facility.yaml
90
89
  - examples/patterns/cisco
91
90
  - lib/logstash/inputs/sdee.rb
@@ -1,131 +0,0 @@
1
- "101": High Availability (Failover)
2
- "102": High Availability (Failover)
3
- "103": High Availability (Failover)
4
- "104": High Availability (Failover)
5
- "105": High Availability (Failover)
6
- "106": Access Lists
7
- "107": RIP Routing
8
- "108": User Session
9
- "109": User Authentication
10
- "110": Transparent Firewall
11
- "111": Command Interface
12
- "112": Command Interface
13
- "113": User Authentication
14
- "120": Smart Call Home
15
- "199": System
16
- "201": User Session
17
- "202": User Session
18
- "204": User Session
19
- "208": Command Interface
20
- "209": IP Stack
21
- "210": High Availability (Failover)
22
- "211": System
23
- "212": SNMP
24
- "213": PPTP and L2TP Sessions
25
- "214": System
26
- "215": IP Stack
27
- "216": System
28
- "220": Transparent Firewall
29
- "302": User Session
30
- "303": User Session
31
- "304": User Session
32
- "305": NAT and PAT
33
- "306": System
34
- "307": System
35
- "308": Command Interface
36
- "311": High Availability (Failover)
37
- "312": RIP Routing
38
- "313": IP Stack
39
- "314": User Session
40
- "315": System
41
- "316": IKE and IPSec
42
- "317": IP Stack
43
- "318": OSPF Routing
44
- "319": Network Processor
45
- "320": IKE and IPSec
46
- "321": Resource Manager
47
- "325": IPv6
48
- "321": Resource Manager
49
- "323": Card Management
50
- "333": EAP or EAPoUDP for NAC
51
- "334": EAP or EAPoUDP for NAC
52
- "336": EIGRP Routing
53
- "337": Phone Proxy
54
- "338": Blacklists, Whitelists, and Graylists
55
- "339": UC-IME
56
- "400": Intrusion Protection System
57
- "401": Intrusion Protection System
58
- "402": IKE and IPSec
59
- "403": PPTP and L2TP Sessions
60
- "404": IKE and IPSec
61
- "405": User Session
62
- "406": User Session
63
- "407": User Session
64
- "408": IP Stack
65
- "409": OSPF Routing
66
- "414": System
67
- "415": Application Firewall
68
- "419": Intrusion Protection System
69
- "420": Intrusion Protection System
70
- "444": Licensing
71
- "500": User Session
72
- "501": IKE and IPSec
73
- "502": User Session
74
- "503": OSPF Routing
75
- "505": System
76
- "602": IKE and IPSec
77
- "603": PPTP and L2TP Sessions
78
- "604": System
79
- "605": System
80
- "606": System
81
- "607": User Session
82
- "608": User Session
83
- "609": User Session
84
- "610": System
85
- "611": VPN Client
86
- "612": System
87
- "613": OSPF Routing
88
- "614": System
89
- "615": System
90
- "616": User Session
91
- "620": User Session
92
- "701": System
93
- "702": IKE and IPSec
94
- "703": User Session
95
- "709": High Availability (Failover)
96
- "710": User Session
97
- "711": System
98
- "713": Network Access Point
99
- "714": IKE and IPSec
100
- "715": IKE and IPSec
101
- "716": WebVPN Client
102
- "717": PKI Certification Authority
103
- "718": VPN Load Balancing
104
- "719": E-mail Proxy
105
- "720": VPN Failover
106
- "721": WebVPN Failover
107
- "722": SSL VPN Client
108
- "723": Citrix Client
109
- "724": Secure Desktop
110
- "725": SSL Stack
111
- "727": High Availability (Failover)
112
- "728": Load Balancing
113
- "730": VLAN Mapping
114
- "731": NAC Policy
115
- "732": NAC Settings to apply NAC Policy
116
- "733": Threat Detection
117
- "734": Dynamic Access Policies
118
- "735": IP Address Assignment
119
- "737": IP Address Assignment
120
- "741": System
121
- "742": Password Encryption
122
- "746": Identity-based Firewall
123
- "747": Clustering
124
- "750": IKEv2 Toolkit
125
- "751": IKEv2 Toolkit
126
- "752": IKEv2 Toolkit
127
- "775": ScanSafe
128
- "776": Cisco TrustSec
129
- "778": VXLAN
130
- "779": Service Tag Switching
131
- "802": MDM Proxy