logstash-input-sdee 0.7.6 → 0.7.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 321e59b01dd51b2f566e9bcb308702381565348c
4
- data.tar.gz: 4047d3f10d2ae6cbf15b9072e5d3c601cb5c2270
3
+ metadata.gz: c60cdea95b9dfa2fbda788c2b4d77bb86fb0a566
4
+ data.tar.gz: 0b8e30d80123b765e3373686518708fe2a3c29cc
5
5
  SHA512:
6
- metadata.gz: 117fa7c3cda33593d981e7b7ef7d2cab20b3f3de6bb670f11e634660f1d34dd57625f126ae01aae2edcef857fcd8a3011f45222f294cb34c8bb384d37656d83c
7
- data.tar.gz: 464eb70ff8460ef30ae9dcdc4be411c33f6c0164c01bebb4efc6ee7d7850553425bb523332f0de217c5d5ff05e067c4f562511b2b95dcba0c9f8f9feef55f51f
6
+ metadata.gz: 0ca5fba5f3d0f9621913e5fcb36b5696e60677127027156f79a730058806780a1d7679cff8e4c52100416d5d2781ccd0303e108c4b214737b0645d0bfe6a41da
7
+ data.tar.gz: 8e7df7b885a0155bde73c74ab952506cc22b743d6b535123704f279671a9c4f347a4fccdb6b01d5f8fe2b46df77dbba44655ac5188f39b758126e3a58da4e34d
@@ -1,3 +1,5 @@
1
+ * 0.7.7
2
+ - logstash 5.x plugin API
1
3
  * 0.7.1
2
4
  - something seriously broken in rubysl-rexml 2.0.4 gem
3
5
  it's trying to install without success even if already installed
@@ -0,0 +1,2 @@
1
+ # logstash-input-logstash-input-sdee-5.3
2
+ Example input plugin. This should help bootstrap your effort to write your own input plugin!
data/Gemfile CHANGED
@@ -1,2 +1,3 @@
1
1
  source 'https://rubygems.org'
2
- gemspec
2
+ gemspec
3
+
@@ -234,7 +234,7 @@ class LogStash::Inputs::SDEE < LogStash::Inputs::Base
234
234
 
235
235
  # This is also in the metadata, but we send it anyone because we want this
236
236
  # persisted by default, whereas metadata isn't. People don't like mysterious errors
237
- event["sdee_failure"] = {
237
+ event.set("[sdee_failure]") = {
238
238
  "request" => structure_request(request),
239
239
  "error" => exception.to_s,
240
240
  "backtrace" => exception.backtrace,
@@ -254,7 +254,7 @@ class LogStash::Inputs::SDEE < LogStash::Inputs::Base
254
254
  private
255
255
  def apply_metadata(event, request, response=nil, execution_time=nil)
256
256
  #return unless @metadata_target
257
- event[@metadata_target] = event_metadata(request, response, execution_time)
257
+ event.set("[@metadata_target]") = event_metadata(request, response, execution_time)
258
258
  end
259
259
 
260
260
  private
@@ -1,21 +1,26 @@
1
1
  Gem::Specification.new do |s|
2
- s.name = 'logstash-input-sdee'
3
- s.version = '0.7.6'
4
- s.date = '2016-09-06'
5
- s.summary = "Logstah SDEE input from Cisco ASA"
6
- s.description = "This Logstash input plugin allows you to call a Cisco SDEE/CIDEE HTTP API, decode the output of it into event(s), and send them on their merry way."
7
- s.authors = ["rootik"]
8
- s.email = 'roootik@gmail.com'
2
+ s.name = 'logstash-input-sdee'
3
+ s.version = '0.7.7'
4
+ s.licenses = ['Apache License (2.0)']
5
+ s.summary = 'Logstah SDEE input from Cisco ASA'
6
+ s.description = 'This Logstash input plugin allows you to call a Cisco SDEE/CIDEE HTTP API, decode the output of it into event(s), and send them on their merry way.'
7
+ s.homepage = 'http://rubygems.org/gems/logstash-input-sdee'
8
+ s.authors = ['rootik']
9
+ s.email = 'roootik@gmail.com'
9
10
  s.require_paths = ['lib']
10
11
 
11
- s.files = Dir['lib/**/*', 'examples/**/*', '*.gemspec', 'LICENSE', 'Gemfile', 'README.md', 'CHANGELOG.md', 'CONTRIBUTORS']
12
- s.homepage =
13
- 'http://rubygems.org/gems/logstash-input-sdee'
14
- s.metadata = { "logstash_plugin" => "true", "logstash_group" => "input" }
15
- s.license = 'Apache-2.0'
12
+ # Files
13
+ s.files = Dir['lib/**/*','spec/**/*','vendor/**/*','*.gemspec','*.md','CONTRIBUTORS','Gemfile','LICENSE','NOTICE.TXT']
14
+ # Tests
15
+ s.test_files = s.files.grep(%r{^(test|spec|features)/})
16
+
17
+ # Special flag to let us know this is actually a logstash plugin
16
18
  s.metadata = { "logstash_plugin" => "true", "logstash_group" => "input" }
17
- s.add_runtime_dependency 'logstash-core', '>= 1.4.0', '<= 2.99'
18
- s.add_runtime_dependency 'logstash-core-plugin-api', '>= 0.60', '<= 2.99'
19
+
20
+ # Gem dependencies
21
+ s.add_runtime_dependency "logstash-core-plugin-api", "~> 2.0"
22
+ s.add_runtime_dependency 'logstash-codec-plain'
23
+ s.add_runtime_dependency 'stud', '>= 0.0.22'
24
+ s.add_development_dependency 'logstash-devutils', '>= 0.0.16'
19
25
  s.add_runtime_dependency 'logstash-mixin-http_client', '>= 1.0.0', '<= 6.0.0'
20
- # s.add_runtime_dependency 'rubysl-rexml', '>= 2.0.0', '<= 3.0.0'
21
26
  end
@@ -0,0 +1,11 @@
1
+ # encoding: utf-8
2
+ require "logstash/devutils/rspec/spec_helper"
3
+ require "logstash/inputs/logstash-input-sdee"
4
+
5
+ describe LogStash::Inputs::SDEE do
6
+
7
+ it_behaves_like "an interruptible input plugin" do
8
+ let(:config) { { "interval" => 100 } }
9
+ end
10
+
11
+ end
metadata CHANGED
@@ -1,55 +1,71 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-input-sdee
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.7.6
4
+ version: 0.7.7
5
5
  platform: ruby
6
6
  authors:
7
7
  - rootik
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2016-09-06 00:00:00.000000000 Z
11
+ date: 2017-03-29 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
- name: logstash-core
14
+ name: logstash-core-plugin-api
15
15
  requirement: !ruby/object:Gem::Requirement
16
16
  requirements:
17
- - - ">="
18
- - !ruby/object:Gem::Version
19
- version: 1.4.0
20
- - - "<="
17
+ - - "~>"
21
18
  - !ruby/object:Gem::Version
22
- version: '2.99'
19
+ version: '2.0'
23
20
  type: :runtime
24
21
  prerelease: false
25
22
  version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '2.0'
27
+ - !ruby/object:Gem::Dependency
28
+ name: logstash-codec-plain
29
+ requirement: !ruby/object:Gem::Requirement
26
30
  requirements:
27
31
  - - ">="
28
32
  - !ruby/object:Gem::Version
29
- version: 1.4.0
30
- - - "<="
33
+ version: '0'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - ">="
31
39
  - !ruby/object:Gem::Version
32
- version: '2.99'
40
+ version: '0'
33
41
  - !ruby/object:Gem::Dependency
34
- name: logstash-core-plugin-api
42
+ name: stud
35
43
  requirement: !ruby/object:Gem::Requirement
36
44
  requirements:
37
45
  - - ">="
38
46
  - !ruby/object:Gem::Version
39
- version: '0.60'
40
- - - "<="
41
- - !ruby/object:Gem::Version
42
- version: '2.99'
47
+ version: 0.0.22
43
48
  type: :runtime
44
49
  prerelease: false
45
50
  version_requirements: !ruby/object:Gem::Requirement
46
51
  requirements:
47
52
  - - ">="
48
53
  - !ruby/object:Gem::Version
49
- version: '0.60'
50
- - - "<="
54
+ version: 0.0.22
55
+ - !ruby/object:Gem::Dependency
56
+ name: logstash-devutils
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - ">="
60
+ - !ruby/object:Gem::Version
61
+ version: 0.0.16
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - ">="
51
67
  - !ruby/object:Gem::Version
52
- version: '2.99'
68
+ version: 0.0.16
53
69
  - !ruby/object:Gem::Dependency
54
70
  name: logstash-mixin-http_client
55
71
  requirement: !ruby/object:Gem::Requirement
@@ -79,19 +95,16 @@ extra_rdoc_files: []
79
95
  files:
80
96
  - CHANGELOG.md
81
97
  - CONTRIBUTORS
98
+ - DEVELOPER.md
82
99
  - Gemfile
83
100
  - LICENSE
84
101
  - README.md
85
- - examples/10-inputs.conf
86
- - examples/20-filter.conf
87
- - examples/30-outputs.conf
88
- - examples/dict/cisco.facility.yaml
89
- - examples/patterns/cisco
90
102
  - lib/logstash/inputs/sdee.rb
91
103
  - logstash-input-sdee.gemspec
104
+ - spec/inputs/sdee_spec.rb
92
105
  homepage: http://rubygems.org/gems/logstash-input-sdee
93
106
  licenses:
94
- - Apache-2.0
107
+ - Apache License (2.0)
95
108
  metadata:
96
109
  logstash_plugin: 'true'
97
110
  logstash_group: input
@@ -115,4 +128,5 @@ rubygems_version: 2.6.6
115
128
  signing_key:
116
129
  specification_version: 4
117
130
  summary: Logstah SDEE input from Cisco ASA
118
- test_files: []
131
+ test_files:
132
+ - spec/inputs/sdee_spec.rb
@@ -1,29 +0,0 @@
1
- input {
2
-
3
- sdee {
4
- type => "sdee"
5
- interval => 60
6
- http => {
7
- url => "http://ciscoips1"
8
- auth => {
9
- user => "cisco"
10
- password => "p@ssw0rd"
11
- }
12
- }
13
- }
14
-
15
- sdee {
16
- type => "sdee"
17
- interval => 60
18
- http => {
19
- url => "https://ciscoips2"
20
- # do not forget, you must add your device or CA certificate to Java trustStore. See README.md
21
- truststore_password => "changeit"
22
- auth => {
23
- user => "cisco"
24
- password => "p@ssw0rd"
25
- }
26
- }
27
- }
28
-
29
- }
@@ -1,56 +0,0 @@
1
- filter {
2
- if ([type] and ([type] == "syslog-relay") and !("_grokparsefailure" in [tags]) and !("pre-processed" in [tags])) {
3
- grok {
4
- match => {
5
- "message" => "%{GREEDYDATA:cisco_message}"
6
- }
7
- add_tag => [ "parser_begin" ]
8
- }
9
- grok {
10
- patterns_dir => [ "/etc/logstash/patterns" ]
11
- match => {
12
- "message" => "%{CTIMESTAMP}( %{SYSLOGHOST:host})? (?:%{INT:sequence}: %{MONTH} %{MONTHDAY} %{HOUR}:%{MINUTE}:%{SECOND}\.[0-9]+: )%{GREEDYDATA:message}"
13
- }
14
- overwrite => [ "message" ]
15
- add_tag => [ "pre-processed" ]
16
- add_field => {
17
- "vendor" => "Cisco"
18
- "device" => "SW or Router"
19
- }
20
- }
21
- grok {
22
- patterns_dir => [ "/etc/logstash/patterns" ]
23
- match => {
24
- "message" => "%{CISCO_TAG}: %{GREEDYDATA:message}"
25
- }
26
- overwrite => [ "message" ]
27
- }
28
- if [cisco_facility] {
29
- translate {
30
- field => "cisco_facility"
31
- destination => "facility"
32
- dictionary_path => [ "/etc/logstash/dict/cisco.facility.yaml" ]
33
- override => true
34
- remove_field => [cisco_facility]
35
- }
36
- }
37
- if [cisco_severity] {
38
- translate {
39
- field => "cisco_severity"
40
- destination => "severity"
41
- dictionary => [
42
- "0", "Emergency",
43
- "1", "Alert",
44
- "2", "Critical",
45
- "3", "Error",
46
- "4", "Warning",
47
- "5", "Notification",
48
- "6", "Informational",
49
- "7", "Debugging" ]
50
- override => true
51
- remove_field => [cisco_severity]
52
- }
53
- }
54
-
55
- }
56
- }
@@ -1,5 +0,0 @@
1
- output {
2
- stdout {
3
- codec => rubydebug
4
- }
5
- }
@@ -1,82 +0,0 @@
1
- AUTHMGR: Authentication manager
2
- ACLMGR: ACL manager
3
- BACKUP_INTERFACE: Flex Links
4
- BADTRANSCEIVER: Defective transceiver
5
- BSPATCH: Boot loader patch
6
- CFGMGR: Configuration manager
7
- CLS_ACC: Consoleless access
8
- CMP: Cluster Membership Protocol
9
- DHCP_SNOOPING: DHCP snooping
10
- DOT1X: 802.1x
11
- DOT1X_SWITCH: 802.1x for switches
12
- DTP: Dynamic Trunking Protocol
13
- DWL: Down-when-looped
14
- EC: EtherChannel
15
- ENVIRONMENT: Environment Messages
16
- EPM: Enforcement Policy Module
17
- ETHCNTR: Ethernet controller
18
- EXPRESS_SETUP: Express Setup
19
- FRNTEND_CTRLR: Front-end controller
20
- GBIC_SECURITY: GBIC and SFP module security
21
- GBIC_SECURITY_CRYPT: GBIC and SFP module security
22
- GBIC_SECURITY_UNIQUE: GBIC and SFP module security
23
- HARDWARE: Hardware
24
- LFM: Local forwarding manager
25
- HPSECURE: Port security
26
- HULC_LICENSE: Licensing
27
- IFMGR: Interface manager
28
- IGMP_QUERIER: IGMP querier
29
- ILET: Cisco IOS License Enforcement Test
30
- ILPOWER: PoE
31
- IMAGEMGR: Image manager
32
- IP: Internet Protocol
33
- IP_DEVICE_TRACKING: IP device tracking
34
- KEYMAN: Keyman Messages
35
- MAC_MOVE: Host activity
36
- PAGP: Port Aggregation Protocol
37
- PHY: PHY
38
- PIMSN: PIM snooping
39
- PLATFORM: Low-level platform-specific
40
- PLATFORM_SM10G: Platform FRULink 10G Service Module
41
- PLATFORM_ENV: Platform environment
42
- PLATFORM_FBM: Platform fallback bridging manager
43
- PLATFORM_HCEF: Cisco Express Forwarding
44
- PLATFORM_HPLM: Platform pseudo-label manager
45
- PLATFORM_IPC: Platform Interprocess Communication Protocol
46
- PLATFORM_IPv6_UCAST: IP Version 6 Unicast
47
- PLATFORM_PBR: Platform policy-based routing
48
- PLATFORM_PM: Platform port manager
49
- PLATFORM_RPC: Platform remote procedure call
50
- PLATFORM_SPAN: Platform switched port analyzer
51
- PLATFORM_STACKPOWER: Platform stack power
52
- PLATFORM_UCAST: Platform unicast routing
53
- PLATFORM_VLAN: Platform VLAN
54
- PLATFORM_WCCP: Platform WCCP
55
- PM: Port manager
56
- PORT_SECURITY: Port security
57
- POWERNET_ISSU: EnergyWise domain
58
- PT: Protocol tunneling
59
- QOSMGR: QoS manager
60
- RMON: Remote Network Monitoring (RMON)
61
- SCHED: Schedule
62
- SDM: Switch Database Manager
63
- SESA: SESA
64
- SPAN: Switched port analyzer
65
- SPANTREE: Spanning tree
66
- SPANTREE_FAST: Spanning-tree fast convergence
67
- SPANTREE_VLAN_SW: Spanning-tree VLAN switch
68
- STACKMGR: Stack manager
69
- STORM_CONTROL: Storm control
70
- SUPERVISOR: Supervisor ASIC
71
- SUPQ: Supervisor queue
72
- SW_DAI: Dynamic ARP inspection
73
- SW_MACAUTH: MAC address authentication
74
- SW_MATM: MAC address table manager
75
- SW_VLAN: VLAN manager
76
- SW_QOS_TB: QoS trusted boundary
77
- TCAMMGR: Ternary content addressable memory manager
78
- UDLD: UniDirectional Link Detection
79
- UFAST_MCAST_SW: UplinkFast packet transmission
80
- VLMAPLOG: VLAN Access Map Logs
81
- VQPCLIENT: VLAN Query Protocol client
82
- WCCP: WCCP
@@ -1,133 +0,0 @@
1
- #== Cisco ASA ==
2
- HOSTNAME \b(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62})(?:\.(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62}))*(\.?|\b)
3
- CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})(?:\.[0-9]+)?%{ISO8601_TIMEZONE}
4
- CISCO_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_TAG:ciscotag}:
5
- CISCO_ASA_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_ASA_TAG:ciscotag}:
6
- CISCO_CLASS [0-9]{3}
7
- CISCO_STRUC [A-Z0-9_]+
8
- CISCO_TAG %{CISCO_STRUC:cisco_facility}-%{INT:cisco_severity}-%{CISCO_STRUC:cisco_mnemonic}|WLC[0-9]+
9
- CISCO_ASA_TAG %[A-Z0-9_]+-%{INT:cisco_severity}-%{CISCO_CLASS:cisco_class}[0-9]{3}
10
- # Common Particles
11
- CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|dropping|created|deleted|SENDING|RECEIVED|monitored|dropped|terminated|Rejected
12
- CISCO_ASA_REASON AAA failure|Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
13
- CISCO_ASA_DIRECTION Inbound|inbound|Outbound|outbound
14
- CISCO_ASA_INTERVAL first hit|%{INT}-second interval
15
- CISCO_ASA_XLATE_TYPE static|dynamic
16
- # ASA-2-106001
17
- CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{DATA:action} from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{GREEDYDATA:tcp_flags} on interface %{GREEDYDATA:interface}
18
- # ASA-2-106006, ASA-2-106007, ASA-2-106010
19
- CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:src_user}\))? (?:to|dst) %{IP:dst_ip}/%{INT:dst_port}(\(%{DATA:dst_user}\))? (?:on interface %{DATA:interface}|due to %{CISCO_ASA_REASON:reason})
20
- # ASA-3-106014
21
- CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IP:dst_ip}(\(%{DATA:dst_user}\))? \(type %{INT:icmp_type}, code %{INT:icmp_code}\)
22
- # ASA-6-106015
23
- CISCOASA106015 %{CISCO_ASA_ACTION:action} %{WORD:protocol} \(%{DATA:policy_id}\) from %{IPORHOST:src_ip}/%{INT:src_port} to %{IPORHOST:dst_ip}/%{INT:dst_port} flags %{DATA:tcp_flags} on interface %{GREEDYDATA:interface}
24
- # ASA-1-106021
25
- CISCOASA106021 %{CISCO_ASA_ACTION:action} %{WORD:protocol} reverse path check from %{IP:src_ip} to %{IP:dst_ip} on interface %{GREEDYDATA:interface}
26
- # ASA-4-106023
27
- CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(\(%{DATA:dst_user}\))?( \(type %{INT:icmp_type}, code %{INT:icmp_code}\))? by access-group "%{DATA:policy_id}" \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
28
- # ASA-5-106100
29
- CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:src_user}\))? -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\)(\(%{DATA:dst_user}\))? hit-cnt %{INT:hit_count} %{CISCO_ASA_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
30
- # ASA-6-110002
31
- CISCOASA110002 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
32
- # ASA-5-111008
33
- CISCOASA111008 User '%{DATA:user}' executed the '%{GREEDYDATA:cmd}' command\.
34
- # ASA-7-111009
35
- CISCOASA111009 User '%{DATA:user}' executed cmd: %{GREEDYDATA:cmd}
36
- # ASA-5-111010
37
- CISCOASA111010 User '%{DATA:user}', running '%{WORD:service}' from IP %{IPORHOST:src_ip}, executed '%{GREEDYDATA:cmd}'
38
- # ASA-6-113004
39
- CISCOASA113004 AAA user authentication Successful : server = \s*%{IPORHOST:server} : user = %{DATA:user}
40
- # ASA-6-113005
41
- CISCOASA113005 AAA user authentication %{CISCO_ASA_ACTION:action} : reason = %{CISCO_ASA_REASON} : server = %{IPORHOST:server} : user = %{DATA:user} : user IP = %{IP:src_ip}
42
- # ASA-6-113008
43
- CISCOASA113008 AAA transaction status ACCEPT : user = %{DATA:user}
44
- # ASA-6-113009
45
- CISCOASA113009 AAA retrieved default group policy \(%{DATA:policy}\) for user = %{DATA:user}
46
- # ASA-6-302004
47
- CISCOASA302004 Pre-allocate %{DATA:protocol} backconnection for faddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})? to laddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})?
48
- # ASA-6-302010
49
- CISCOASA302010 %{INT:connection_count} in use, %{INT:connection_count_max} most used
50
- # ASA-6-302013, ASA-6-302014, ASA-6-302015, ASA-6-302016
51
- CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:src_user}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port}( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?(\(%{DATA:dst_user}\))?( duration %{TIME:duration} bytes %{INT:bytes})?(?: %{CISCO_ASA_REASON:reason})?( \(%{DATA:user}\))?
52
- # ASA-6-302020, ASA-6-302021
53
- CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:user}\))? gaddr %{IPORHOST:src_xlated_ip}/%{INT:icmp_code_xlated} laddr %{IPORHOST:src_ip}/%{INT:icmp_code}( \(%{DATA:user}\))?
54
- # ASA-6-303002
55
- CISCOASA303002 FTP connection from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?, user %{DATA:user} %{WORD:action} file %{DATA:filename}
56
- # ASA-3-305006
57
- CISCOASA305006 regular translation creation failed for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(?: \(type %{INT:icmp_type}, code %{INT:icmp_code}\))?
58
- # ASA-6-305011
59
- CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? to %{DATA:src_xlated_interface}:%{IPORHOST:src_xlated_ip}/%{DATA:src_xlated_port}
60
- # ASA-5-305013
61
- CISCOASA305013 Asymmetric NAT rules matched for forward and reverse flows; Connection for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? %{CISCO_ASA_ACTION:action} due to NAT reverse path failure
62
- # ASA-3-313001, ASA-3-313004, ASA-3-313008
63
- CISCOASA313001_313004_313008 %{CISCO_ASA_ACTION:action} %{WORD:protocol} type=%{INT:icmp_type}, code=%{INT:icmp_code} from %{IP:src_ip} on interface %{DATA:interface}( to %{IP:dst_ip})?
64
- # ASA-4-313005
65
- CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:err_src_user}\))? dst %{DATA:err_dst_interface}:%{IPORHOST:err_dst_ip}(\(%{DATA:err_dst_user}\))? \(type %{INT:err_icmp_type}, code %{INT:err_icmp_code}\) on %{DATA:interface} interface\. Original IP payload: %{WORD:protocol} src %{IPORHOST:orig_src_ip}/%{INT:orig_src_port}(\(%{DATA:orig_src_user}\))? dst %{IPORHOST:orig_dst_ip}/%{INT:orig_dst_port}(\(%{DATA:orig_dst_user}\))?
66
- # ASA-4-313004
67
- #CISCOASA338004 Denied ICMP type=%{INT:icmp_type}, from laddr %{IPORHOST:src_ip} on interface %{DATA:src_interface} to %{IPORHOST:dst_ip}: no matching session
68
- # ASA-4-338004, ASA-4-338008
69
- CISCOASA338004_338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: %{IPORHOST:blacklisted_ip}/%{IPORHOST:blacklisted_netmask}, threat-level: %{DATA:threat_level}, category: %{DATA:category}
70
- # ASA-4-338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: 221.204.186.0/255.255.255.0, threat-level: very-high, category: admin-added
71
- # ASA-6-338304
72
- CISCOASA338304 Successfully downloaded dynamic filter data file from updater server %{DATA:url}
73
- # ASA-4-400013
74
- CISCOASA400013 IDS:2003 ICMP redirect from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
75
- # ASA-4-400028
76
- CISCOASA400028 IDS:3042 TCP FIN only flags from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
77
- # ASA-4-400037
78
- CISCOASA400037 IDS:6053 DNS all records request from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
79
- # ASA-4-402117
80
- CISCOASA402117 %{WORD:protocol}: Received a non-IPSec packet \(protocol= %{WORD:orig_protocol}\) from %{IP:src_ip} to %{IP:dst_ip}
81
- # ASA-4-402119
82
- CISCOASA402119 %{WORD:protocol}: Received an %{WORD:orig_protocol} packet \(SPI= %{DATA:spi}, sequence number= %{DATA:seq_num}\) from %{IP:src_ip} \(user= %{DATA:user}\) to %{IP:dst_ip} that failed anti-replay checking
83
- # ASA-4-405104
84
- CISCOASA405104 %{WORD:protocol} message %{DATA:voip_message} received from %{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_ip}(/%{INT:dst_port})? before SETUP
85
- # ASA-4-419001
86
- CISCOASA419001 %{CISCO_ASA_ACTION:action} %{WORD:protocol} packet from %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port}, reason: %{GREEDYDATA:reason}
87
- # ASA-4-419002
88
- CISCOASA419002 %{CISCO_ASA_REASON:reason} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} with different initial sequence number
89
- # ASA-4-500004
90
- CISCOASA500004 %{CISCO_ASA_REASON:reason} for protocol=%{WORD:protocol}, from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
91
- # ASA-5-502103
92
- CISCOASA502103 User priv level changed: Uname: %{DATA:user} From: %{INT:from_level} To: %{INT:to_level}
93
- # ASA-4-507003
94
- CISCOASA507003 %{WORD:protocol} flow from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} %{CISCO_ASA_ACTION:action} by inspection engine, reason - %{DATA:reason}?\.
95
- # ASA-6-602303, ASA-6-602304
96
- CISCOASA602303_602304 %{WORD:protocol}: An %{CISCO_ASA_DIRECTION:direction} %{GREEDYDATA:tunnel_type} SA \(SPI= %{DATA:spi}\) between %{IP:src_ip} and %{IP:dst_ip} \(user= %{DATA:user}\) has been %{CISCO_ASA_ACTION:action}
97
- # ASA-6-605005
98
- CISCOASA605005 Login permitted from %{IPORHOST:src_ip}/%{INT:src_port} %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{WORD:dst_port} for user "%{DATA:user}"
99
- # ASA-6-607001
100
- CISCOASA607001 Pre-allocate %{GREEDYDATA:protocol} secondary channel for %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? from %{DATA:voip_message} message
101
- # ASA-7-609001, ASA-7-609002
102
- CISCOASA609001_609002 %{CISCO_ASA_ACTION:action} local-host %{DATA:src_interface}:%{IPORHOST:src_ip}(?: duration %{TIME:duration})?
103
- # ASA-6-611101
104
- CISCOASA611101 User authentication succeeded: Uname: %{DATA:user}
105
- # ASA-7-710001, ASA-7-710002, ASA-7-710003, ASA-7-710005, ASA-7-710006
106
- CISCOASA710001_710002_710003_710005_710006_710007 %{WORD:protocol} (?:request|access|keepalive) %{CISCO_ASA_ACTION:action} from %{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{DATA:dst_port}
107
- # ASA-6-713172
108
- CISCOASA713172 Group = %{GREEDYDATA:group}, IP = %{IP:src_ip}, Automatic NAT Detection Status:\s+Remote end\s*%{DATA:is_remote_natted}\s*behind a NAT device\s+This\s+end\s*%{DATA:is_local_natted}\s*behind a NAT device
109
- # ASA-7-713236
110
- CISCOASA713236 IP = %{IPORHOST:src_ip}, IKE_DECODE %{CISCO_ASA_ACTION} Message \(msgid=%{DATA:msgid}\) with payloads : %{GREEDYDATA:payload} total length : %{INT:length}
111
- # ASA-5-713257
112
- CISCOASA713257 Phase %{DATA} failure: Mismatched attribute types for class %{DATA:vpn_class}: Rcv'd: %{DATA:vpn_rcvd} Cfg'd: %{DATA:vpn_cfgd}
113
- # ASA-5-713904
114
- CISCOASA713904 IP = %{IPORHOST:src_ip}, Received encrypted packet with no matching SA, %{CISCO_ASA_ACTION:action}
115
- # ASA-7-713906
116
- CISCOASA713906 IKE Receiver: Packet received on %{IPORHOST:dst_ip}:%{INT:dst_port} from %{IPORHOST:src_ip}:%{INT:src_port}
117
- # ASA-7-715046
118
- CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:user},)? IP = %{IP:src_ip},%{GREEDYDATA:vpn_action}
119
- # ASA-4-733100
120
- CISCOASA733100 \[\s*%{DATA:drop_type}\s*\] drop %{DATA:drop_rate_id} exceeded. Current burst rate is %{INT:drop_rate_current_burst} per second, max configured rate is %{INT:drop_rate_max_burst}; Current average rate is %{INT:drop_rate_current_avg} per second, max configured rate is %{INT:drop_rate_max_avg}; Cumulative total count is %{INT:drop_total_count}
121
- # ASA-6-734001
122
- CISCOASA734001 DAP: User %{DATA:user}, Addr %{IP:src_ip}, Connection %{DATA:protocol}: The following DAP records were selected for this connection: %{GREEDYDATA:policy_id}
123
- # ASA-6-737006
124
- CISCOASA737006 IPAA: Local pool request succeeded for tunnel-group '%{DATA:vpn_group}'
125
- # ASA-6-737016
126
- CISCOASA737016 IPAA: Freeing local pool address %{IP:src_ip}
127
- # ASA-6-737026
128
- CISCOASA737026 IPAA: Client assigned %{IP:src_ip} from local pool
129
- # ASA-6-737029
130
- CISCOASA737029 IPAA: Added %{IP:src_ip} to standby
131
- # ASA-6-737031
132
- CISCOASA737031 IPAA: Removed %{IP:src_ip} from standby
133
- #== End Cisco ASA ==