logstash-input-sdee 0.6.9 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 2e5c47c9f0d817a1e1d1fbb697e896ffc7fe0ef4
4
- data.tar.gz: 6df5bb5d6942b4554216a032379a4ecf00989573
3
+ metadata.gz: a309cfe8bdd6daec2c0e3abe3b2ce8378eaaecf0
4
+ data.tar.gz: 538f3991ba62d609540830549fcc58f4e24e1659
5
5
  SHA512:
6
- metadata.gz: 5ef8b0e84db55e36509d00af50cd6134b642ee4ee051c3a07f102cdf86af3dd74fcc217d5877e5451e6251b76a8e1ccb41d14135860955bd7c7fab174540f082
7
- data.tar.gz: de12fddd14935ebd9b8e377cd64b605f544ec5b9f8dc354999d7414b1496e8c4a9f76c8116db1a00691723a6866629146d3b3b31c43a04c39e5b37665794488d
6
+ metadata.gz: f7756854ba4d3c0532c74f04f7672f6eba87f56c33fc9c85ace7c2f14f0031003e33845f85564d4e306badd4d1068eb9309819427c0546ef431cee24be5dab69
7
+ data.tar.gz: d5b12d693b98aa61ab37789d8089091978fa92820680b85e8db4da32230dc635ee1faffeef368f9b8096ebf00140cc470351ac749b2b4b594c441751ea90b7bb
data/CHANGELOG.md CHANGED
@@ -1,3 +1,6 @@
1
+ * 0.7.0
2
+ - logstash configuration examples, inputs and filter
3
+ - pattern file and dictioanries for Cisco IPS messages
1
4
  * 0.6.9
2
5
  - making it ready for RubyGems
3
6
  * 0.4.0
@@ -27,9 +27,3 @@ input {
27
27
  }
28
28
 
29
29
  }
30
-
31
- output {
32
- stdout {
33
- codec => rubydebug
34
- }
35
- }
@@ -0,0 +1,57 @@
1
+ filter {
2
+ if ([type] and ([type] == "syslog-relay") and !("_grokparsefailure" in [tags]) and !("pre-processed" in [tags])) {
3
+ grok {
4
+ match => {
5
+ "message" => "%{GREEDYDATA:cisco_message}"
6
+ }
7
+ add_tag => [ "parser_begin" ]
8
+ }
9
+ grok {
10
+ patterns_dir => [ "/etc/logstash/patterns" ]
11
+ match => {
12
+ "message" => "%{CTIMESTAMP}( %{SYSLOGHOST:host})? (?:%{INT:sequence}: %{MONTH} %{MONTHDAY} %{HOUR}:%{MINUTE}:%{SECOND}\.[0-9]+: )%{GREEDYDATA:message}"
13
+ }
14
+ overwrite => [ "message" ]
15
+ add_tag => [ "pre-processed" ]
16
+ add_field => {
17
+ "vendor" => "Cisco"
18
+ "device" => "SW or Router"
19
+ }
20
+ }
21
+ grok {
22
+ patterns_dir => [ "/etc/logstash/patterns" ]
23
+ match => {
24
+ "message" => "%{CISCO_TAG}: %{GREEDYDATA:message}"
25
+ }
26
+ overwrite => [ "message" ]
27
+ }
28
+ if [cisco_facility] {
29
+ translate {
30
+ field => "cisco_facility"
31
+ destination => "facility"
32
+ dictionary_path => [ "/etc/logstash/patterns/cisco.facility" ]
33
+ override => true
34
+ remove_field => [cisco_facility]
35
+ }
36
+ }
37
+ if [cisco_severity] {
38
+ translate {
39
+ field => "cisco_severity"
40
+ destination => "severity"
41
+ dictionary => [
42
+ "0", "Emergency",
43
+ "1", "Alert",
44
+ "2", "Critical",
45
+ "3", "Error",
46
+ "4", "Warning",
47
+ "5", "Notification",
48
+ "6", "Informational",
49
+ "7", "Debugging" ]
50
+ override => true
51
+ remove_field => [cisco_severity]
52
+ }
53
+ }
54
+
55
+ }
56
+ }
57
+
@@ -0,0 +1,5 @@
1
+ output {
2
+ stdout {
3
+ codec => rubydebug
4
+ }
5
+ }
@@ -1,79 +1,133 @@
1
1
  #== Cisco ASA ==
2
2
  HOSTNAME \b(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62})(?:\.(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62}))*(\.?|\b)
3
- CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})?%{ISO8601_TIMEZONE}?
4
- CISCO_TAGGED %{CTIMESTAMP:ctimestamp}( %{SYSLOGHOST:sysloghost})? %{CISCO_TAG:ciscotag}:
5
- CISCO_TAG %[A-Z0-9]+-%{INT:cisco_severity}-(?:[A-Z0-9_]+)|WLC[0-9]+
3
+ CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})(?:\.[0-9]+)?%{ISO8601_TIMEZONE}
4
+ CISCO_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_TAG:ciscotag}:
5
+ CISCO_ASA_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_ASA_TAG:ciscotag}:
6
+ CISCO_CLASS [0-9]{3}
7
+ CISCO_STRUC [A-Z0-9_]+
8
+ CISCO_TAG %{CISCO_STRUC:cisco_facility}-%{INT:cisco_severity}-%{CISCO_STRUC:cisco_mnemonic}|WLC[0-9]+
9
+ CISCO_ASA_TAG %[A-Z0-9_]+-%{INT:cisco_severity}-%{CISCO_CLASS:cisco_class}[0-9]{3}
6
10
  # Common Particles
7
- CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|created|deleted|SENDING|RECEIVED|monitored|dropped
8
- CISCO_ASA_REASON Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
11
+ CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|dropping|created|deleted|SENDING|RECEIVED|monitored|dropped|terminated|Rejected
12
+ CISCO_ASA_REASON AAA failure|Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
9
13
  CISCO_ASA_DIRECTION Inbound|inbound|Outbound|outbound
10
14
  CISCO_ASA_INTERVAL first hit|%{INT}-second interval
11
15
  CISCO_ASA_XLATE_TYPE static|dynamic
12
16
  # ASA-2-106001
13
- CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{CISCO_ASA_ACTION:action} from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{GREEDYDATA:tcp_flags} on interface %{GREEDYDATA:interface}
17
+ CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{DATA:action} from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{GREEDYDATA:tcp_flags} on interface %{GREEDYDATA:interface}
14
18
  # ASA-2-106006, ASA-2-106007, ASA-2-106010
15
- CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:src_fwuser}\))? (?:to|dst) %{IP:dst_ip}/%{INT:dst_port}(\(%{DATA:dst_fwuser}\))? (?:on interface %{DATA:interface}|due to %{CISCO_ASA_REASON:reason})
19
+ CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:src_user}\))? (?:to|dst) %{IP:dst_ip}/%{INT:dst_port}(\(%{DATA:dst_user}\))? (?:on interface %{DATA:interface}|due to %{CISCO_ASA_REASON:reason})
16
20
  # ASA-3-106014
17
- CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:src_fwuser}\))? dst %{DATA:dst_interface}:%{IP:dst_ip}(\(%{DATA:dst_fwuser}\))? \(type %{INT:icmp_type}, code %{INT:icmp_code}\)
21
+ CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IP:dst_ip}(\(%{DATA:dst_user}\))? \(type %{INT:icmp_type}, code %{INT:icmp_code}\)
18
22
  # ASA-6-106015
19
23
  CISCOASA106015 %{CISCO_ASA_ACTION:action} %{WORD:protocol} \(%{DATA:policy_id}\) from %{IPORHOST:src_ip}/%{INT:src_port} to %{IPORHOST:dst_ip}/%{INT:dst_port} flags %{DATA:tcp_flags} on interface %{GREEDYDATA:interface}
20
24
  # ASA-1-106021
21
25
  CISCOASA106021 %{CISCO_ASA_ACTION:action} %{WORD:protocol} reverse path check from %{IP:src_ip} to %{IP:dst_ip} on interface %{GREEDYDATA:interface}
22
26
  # ASA-4-106023
23
- CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_fwuser}\))? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(\(%{DATA:dst_fwuser}\))?( \(type %{INT:icmp_type}, code %{INT:icmp_code}\))? by access-group %{DATA:policy_id} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
27
+ CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(\(%{DATA:dst_user}\))?( \(type %{INT:icmp_type}, code %{INT:icmp_code}\))? by access-group "%{DATA:policy_id}" \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
24
28
  # ASA-5-106100
25
- CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:src_fwuser}\))? -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\)(\(%{DATA:src_fwuser}\))? hit-cnt %{INT:hit_count} %{CISCO_ASA_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
29
+ CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:src_user}\))? -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\)(\(%{DATA:dst_user}\))? hit-cnt %{INT:hit_count} %{CISCO_ASA_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
26
30
  # ASA-6-110002
27
31
  CISCOASA110002 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
28
32
  # ASA-5-111008
29
- CISCOASA111008 User \'%{DATA:src_fwuser}\' executed the \'%{GREEDYDATA:cmd}\' command\.
33
+ CISCOASA111008 User '%{DATA:user}' executed the '%{GREEDYDATA:cmd}' command\.
30
34
  # ASA-7-111009
31
- CISCOASA111009 User \'%{DATA:src_fwuser}\' executed cmd: %{GREEDYDATA:cmd}
35
+ CISCOASA111009 User '%{DATA:user}' executed cmd: %{GREEDYDATA:cmd}
32
36
  # ASA-5-111010
33
- CISCOASA111010 User \'%{DATA:src_fwuser}\', running \'CLI\' from IP %{IPORHOST:src_ip}, executed \'%{GREEDYDATA:cmd}\'
37
+ CISCOASA111010 User '%{DATA:user}', running '%{WORD:service}' from IP %{IPORHOST:src_ip}, executed '%{GREEDYDATA:cmd}'
38
+ # ASA-6-113004
39
+ CISCOASA113004 AAA user authentication Successful : server = \s*%{IPORHOST:server} : user = %{DATA:user}
40
+ # ASA-6-113005
41
+ CISCOASA113005 AAA user authentication %{CISCO_ASA_ACTION:action} : reason = %{CISCO_ASA_REASON} : server = %{IPORHOST:server} : user = %{DATA:user} : user IP = %{IP:src_ip}
42
+ # ASA-6-113008
43
+ CISCOASA113008 AAA transaction status ACCEPT : user = %{DATA:user}
44
+ # ASA-6-113009
45
+ CISCOASA113009 AAA retrieved default group policy \(%{DATA:policy}\) for user = %{DATA:user}
46
+ # ASA-6-302004
47
+ CISCOASA302004 Pre-allocate %{DATA:protocol} backconnection for faddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})? to laddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})?
34
48
  # ASA-6-302010
35
49
  CISCOASA302010 %{INT:connection_count} in use, %{INT:connection_count_max} most used
36
50
  # ASA-6-302013, ASA-6-302014, ASA-6-302015, ASA-6-302016
37
- CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:src_fwuser}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port}( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?(\(%{DATA:dst_fwuser}\))?( duration %{TIME:duration} bytes %{INT:bytes})?(?: %{CISCO_ASA_REASON:reason})?( \(%{DATA:user}\))?
51
+ CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:src_user}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port}( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?(\(%{DATA:dst_user}\))?( duration %{TIME:duration} bytes %{INT:bytes})?(?: %{CISCO_ASA_REASON:reason})?( \(%{DATA:user}\))?
38
52
  # ASA-6-302020, ASA-6-302021
39
- CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:fwuser}\))? gaddr %{IPORHOST:src_xlated_ip}/%{INT:icmp_code_xlated} laddr %{IPORHOST:src_ip}/%{INT:icmp_code}( \(%{DATA:user}\))?
53
+ CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:user}\))? gaddr %{IPORHOST:src_xlated_ip}/%{INT:icmp_code_xlated} laddr %{IPORHOST:src_ip}/%{INT:icmp_code}( \(%{DATA:user}\))?
54
+ # ASA-6-303002
55
+ CISCOASA303002 FTP connection from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?, user %{DATA:user} %{WORD:action} file %{DATA:filename}
40
56
  # ASA-3-305006
41
57
  CISCOASA305006 regular translation creation failed for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(?: \(type %{INT:icmp_type}, code %{INT:icmp_code}\))?
42
58
  # ASA-6-305011
43
- CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_fwuser}\))? to %{DATA:src_xlated_interface}:%{IPORHOST:src_xlated_ip}/%{DATA:src_xlated_port}
59
+ CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? to %{DATA:src_xlated_interface}:%{IPORHOST:src_xlated_ip}/%{DATA:src_xlated_port}
44
60
  # ASA-5-305013
45
61
  CISCOASA305013 Asymmetric NAT rules matched for forward and reverse flows; Connection for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? %{CISCO_ASA_ACTION:action} due to NAT reverse path failure
46
62
  # ASA-3-313001, ASA-3-313004, ASA-3-313008
47
63
  CISCOASA313001_313004_313008 %{CISCO_ASA_ACTION:action} %{WORD:protocol} type=%{INT:icmp_type}, code=%{INT:icmp_code} from %{IP:src_ip} on interface %{DATA:interface}( to %{IP:dst_ip})?
48
64
  # ASA-4-313005
49
- CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:err_src_fwuser}\))? dst %{DATA:err_dst_interface}:%{IPORHOST:err_dst_ip}(\(%{DATA:err_dst_fwuser}\))? \(type %{INT:err_icmp_type}, code %{INT:err_icmp_code}\) on %{DATA:interface} interface\. Original IP payload: %{WORD:protocol} src %{IPORHOST:orig_src_ip}/%{INT:orig_src_port}(\(%{DATA:orig_src_fwuser}\))? dst %{IPORHOST:orig_dst_ip}/%{INT:orig_dst_port}(\(%{DATA:orig_dst_fwuser}\))?
65
+ CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:err_src_user}\))? dst %{DATA:err_dst_interface}:%{IPORHOST:err_dst_ip}(\(%{DATA:err_dst_user}\))? \(type %{INT:err_icmp_type}, code %{INT:err_icmp_code}\) on %{DATA:interface} interface\. Original IP payload: %{WORD:protocol} src %{IPORHOST:orig_src_ip}/%{INT:orig_src_port}(\(%{DATA:orig_src_user}\))? dst %{IPORHOST:orig_dst_ip}/%{INT:orig_dst_port}(\(%{DATA:orig_dst_user}\))?
66
+ # ASA-4-313004
67
+ #CISCOASA338004 Denied ICMP type=%{INT:icmp_type}, from laddr %{IPORHOST:src_ip} on interface %{DATA:src_interface} to %{IPORHOST:dst_ip}: no matching session
50
68
  # ASA-4-338004, ASA-4-338008
51
69
  CISCOASA338004_338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: %{IPORHOST:blacklisted_ip}/%{IPORHOST:blacklisted_netmask}, threat-level: %{DATA:threat_level}, category: %{DATA:category}
52
70
  # ASA-4-338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: 221.204.186.0/255.255.255.0, threat-level: very-high, category: admin-added
71
+ # ASA-6-338304
72
+ CISCOASA338304 Successfully downloaded dynamic filter data file from updater server %{DATA:url}
73
+ # ASA-4-400013
74
+ CISCOASA400013 IDS:2003 ICMP redirect from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
75
+ # ASA-4-400028
76
+ CISCOASA400028 IDS:3042 TCP FIN only flags from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
77
+ # ASA-4-400037
78
+ CISCOASA400037 IDS:6053 DNS all records request from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
53
79
  # ASA-4-402117
54
80
  CISCOASA402117 %{WORD:protocol}: Received a non-IPSec packet \(protocol= %{WORD:orig_protocol}\) from %{IP:src_ip} to %{IP:dst_ip}
55
81
  # ASA-4-402119
56
82
  CISCOASA402119 %{WORD:protocol}: Received an %{WORD:orig_protocol} packet \(SPI= %{DATA:spi}, sequence number= %{DATA:seq_num}\) from %{IP:src_ip} \(user= %{DATA:user}\) to %{IP:dst_ip} that failed anti-replay checking
83
+ # ASA-4-405104
84
+ CISCOASA405104 %{WORD:protocol} message %{DATA:voip_message} received from %{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_ip}(/%{INT:dst_port})? before SETUP
57
85
  # ASA-4-419001
58
86
  CISCOASA419001 %{CISCO_ASA_ACTION:action} %{WORD:protocol} packet from %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port}, reason: %{GREEDYDATA:reason}
59
87
  # ASA-4-419002
60
88
  CISCOASA419002 %{CISCO_ASA_REASON:reason} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} with different initial sequence number
61
89
  # ASA-4-500004
62
90
  CISCOASA500004 %{CISCO_ASA_REASON:reason} for protocol=%{WORD:protocol}, from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
91
+ # ASA-5-502103
92
+ CISCOASA502103 User priv level changed: Uname: %{DATA:user} From: %{INT:from_level} To: %{INT:to_level}
93
+ # ASA-4-507003
94
+ CISCOASA507003 %{WORD:protocol} flow from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} %{CISCO_ASA_ACTION:action} by inspection engine, reason - %{DATA:reason}?\.
63
95
  # ASA-6-602303, ASA-6-602304
64
96
  CISCOASA602303_602304 %{WORD:protocol}: An %{CISCO_ASA_DIRECTION:direction} %{GREEDYDATA:tunnel_type} SA \(SPI= %{DATA:spi}\) between %{IP:src_ip} and %{IP:dst_ip} \(user= %{DATA:user}\) has been %{CISCO_ASA_ACTION:action}
97
+ # ASA-6-605005
98
+ CISCOASA605005 Login permitted from %{IPORHOST:src_ip}/%{INT:src_port} %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{WORD:dst_port} for user "%{DATA:user}"
99
+ # ASA-6-607001
100
+ CISCOASA607001 Pre-allocate %{GREEDYDATA:protocol} secondary channel for %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? from %{DATA:voip_message} message
65
101
  # ASA-7-609001, ASA-7-609002
66
102
  CISCOASA609001_609002 %{CISCO_ASA_ACTION:action} local-host %{DATA:src_interface}:%{IPORHOST:src_ip}(?: duration %{TIME:duration})?
103
+ # ASA-6-611101
104
+ CISCOASA611101 User authentication succeeded: Uname: %{DATA:user}
67
105
  # ASA-7-710001, ASA-7-710002, ASA-7-710003, ASA-7-710005, ASA-7-710006
68
106
  CISCOASA710001_710002_710003_710005_710006_710007 %{WORD:protocol} (?:request|access|keepalive) %{CISCO_ASA_ACTION:action} from %{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{DATA:dst_port}
69
107
  # ASA-6-713172
70
108
  CISCOASA713172 Group = %{GREEDYDATA:group}, IP = %{IP:src_ip}, Automatic NAT Detection Status:\s+Remote end\s*%{DATA:is_remote_natted}\s*behind a NAT device\s+This\s+end\s*%{DATA:is_local_natted}\s*behind a NAT device
71
109
  # ASA-7-713236
72
110
  CISCOASA713236 IP = %{IPORHOST:src_ip}, IKE_DECODE %{CISCO_ASA_ACTION} Message \(msgid=%{DATA:msgid}\) with payloads : %{GREEDYDATA:payload} total length : %{INT:length}
111
+ # ASA-5-713257
112
+ CISCOASA713257 Phase %{DATA} failure: Mismatched attribute types for class %{DATA:vpn_class}: Rcv'd: %{DATA:vpn_rcvd} Cfg'd: %{DATA:vpn_cfgd}
113
+ # ASA-5-713904
114
+ CISCOASA713904 IP = %{IPORHOST:src_ip}, Received encrypted packet with no matching SA, %{CISCO_ASA_ACTION:action}
73
115
  # ASA-7-713906
74
116
  CISCOASA713906 IKE Receiver: Packet received on %{IPORHOST:dst_ip}:%{INT:dst_port} from %{IPORHOST:src_ip}:%{INT:src_port}
75
117
  # ASA-7-715046
76
- CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:src_fwuser},)? IP = %{IP:src_ip},%{GREEDYDATA:vpn_action}
118
+ CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:user},)? IP = %{IP:src_ip},%{GREEDYDATA:vpn_action}
77
119
  # ASA-4-733100
78
120
  CISCOASA733100 \[\s*%{DATA:drop_type}\s*\] drop %{DATA:drop_rate_id} exceeded. Current burst rate is %{INT:drop_rate_current_burst} per second, max configured rate is %{INT:drop_rate_max_burst}; Current average rate is %{INT:drop_rate_current_avg} per second, max configured rate is %{INT:drop_rate_max_avg}; Cumulative total count is %{INT:drop_total_count}
121
+ # ASA-6-734001
122
+ CISCOASA734001 DAP: User %{DATA:user}, Addr %{IP:src_ip}, Connection %{DATA:protocol}: The following DAP records were selected for this connection: %{GREEDYDATA:policy_id}
123
+ # ASA-6-737006
124
+ CISCOASA737006 IPAA: Local pool request succeeded for tunnel-group '%{DATA:vpn_group}'
125
+ # ASA-6-737016
126
+ CISCOASA737016 IPAA: Freeing local pool address %{IP:src_ip}
127
+ # ASA-6-737026
128
+ CISCOASA737026 IPAA: Client assigned %{IP:src_ip} from local pool
129
+ # ASA-6-737029
130
+ CISCOASA737029 IPAA: Added %{IP:src_ip} to standby
131
+ # ASA-6-737031
132
+ CISCOASA737031 IPAA: Removed %{IP:src_ip} from standby
79
133
  #== End Cisco ASA ==
@@ -0,0 +1,131 @@
1
+ "101": High Availability (Failover)
2
+ "102": High Availability (Failover)
3
+ "103": High Availability (Failover)
4
+ "104": High Availability (Failover)
5
+ "105": High Availability (Failover)
6
+ "106": Access Lists
7
+ "107": RIP Routing
8
+ "108": User Session
9
+ "109": User Authentication
10
+ "110": Transparent Firewall
11
+ "111": Command Interface
12
+ "112": Command Interface
13
+ "113": User Authentication
14
+ "120": Smart Call Home
15
+ "199": System
16
+ "201": User Session
17
+ "202": User Session
18
+ "204": User Session
19
+ "208": Command Interface
20
+ "209": IP Stack
21
+ "210": High Availability (Failover)
22
+ "211": System
23
+ "212": SNMP
24
+ "213": PPTP and L2TP Sessions
25
+ "214": System
26
+ "215": IP Stack
27
+ "216": System
28
+ "220": Transparent Firewall
29
+ "302": User Session
30
+ "303": User Session
31
+ "304": User Session
32
+ "305": NAT and PAT
33
+ "306": System
34
+ "307": System
35
+ "308": Command Interface
36
+ "311": High Availability (Failover)
37
+ "312": RIP Routing
38
+ "313": IP Stack
39
+ "314": User Session
40
+ "315": System
41
+ "316": IKE and IPSec
42
+ "317": IP Stack
43
+ "318": OSPF Routing
44
+ "319": Network Processor
45
+ "320": IKE and IPSec
46
+ "321": Resource Manager
47
+ "325": IPv6
48
+ "321": Resource Manager
49
+ "323": Card Management
50
+ "333": EAP or EAPoUDP for NAC
51
+ "334": EAP or EAPoUDP for NAC
52
+ "336": EIGRP Routing
53
+ "337": Phone Proxy
54
+ "338": Blacklists, Whitelists, and Graylists
55
+ "339": UC-IME
56
+ "400": Intrusion Protection System
57
+ "401": Intrusion Protection System
58
+ "402": IKE and IPSec
59
+ "403": PPTP and L2TP Sessions
60
+ "404": IKE and IPSec
61
+ "405": User Session
62
+ "406": User Session
63
+ "407": User Session
64
+ "408": IP Stack
65
+ "409": OSPF Routing
66
+ "414": System
67
+ "415": Application Firewall
68
+ "419": Intrusion Protection System
69
+ "420": Intrusion Protection System
70
+ "444": Licensing
71
+ "500": User Session
72
+ "501": IKE and IPSec
73
+ "502": User Session
74
+ "503": OSPF Routing
75
+ "505": System
76
+ "602": IKE and IPSec
77
+ "603": PPTP and L2TP Sessions
78
+ "604": System
79
+ "605": System
80
+ "606": System
81
+ "607": User Session
82
+ "608": User Session
83
+ "609": User Session
84
+ "610": System
85
+ "611": VPN Client
86
+ "612": System
87
+ "613": OSPF Routing
88
+ "614": System
89
+ "615": System
90
+ "616": User Session
91
+ "620": User Session
92
+ "701": System
93
+ "702": IKE and IPSec
94
+ "703": User Session
95
+ "709": High Availability (Failover)
96
+ "710": User Session
97
+ "711": System
98
+ "713": Network Access Point
99
+ "714": IKE and IPSec
100
+ "715": IKE and IPSec
101
+ "716": WebVPN Client
102
+ "717": PKI Certification Authority
103
+ "718": VPN Load Balancing
104
+ "719": E-mail Proxy
105
+ "720": VPN Failover
106
+ "721": WebVPN Failover
107
+ "722": SSL VPN Client
108
+ "723": Citrix Client
109
+ "724": Secure Desktop
110
+ "725": SSL Stack
111
+ "727": High Availability (Failover)
112
+ "728": Load Balancing
113
+ "730": VLAN Mapping
114
+ "731": NAC Policy
115
+ "732": NAC Settings to apply NAC Policy
116
+ "733": Threat Detection
117
+ "734": Dynamic Access Policies
118
+ "735": IP Address Assignment
119
+ "737": IP Address Assignment
120
+ "741": System
121
+ "742": Password Encryption
122
+ "746": Identity-based Firewall
123
+ "747": Clustering
124
+ "750": IKEv2 Toolkit
125
+ "751": IKEv2 Toolkit
126
+ "752": IKEv2 Toolkit
127
+ "775": ScanSafe
128
+ "776": Cisco TrustSec
129
+ "778": VXLAN
130
+ "779": Service Tag Switching
131
+ "802": MDM Proxy
@@ -0,0 +1,82 @@
1
+ AUTHMGR: Authentication manager
2
+ ACLMGR: ACL manager
3
+ BACKUP_INTERFACE: Flex Links
4
+ BADTRANSCEIVER: Defective transceiver
5
+ BSPATCH: Boot loader patch
6
+ CFGMGR: Configuration manager
7
+ CLS_ACC: Consoleless access
8
+ CMP: Cluster Membership Protocol
9
+ DHCP_SNOOPING: DHCP snooping
10
+ DOT1X: 802.1x
11
+ DOT1X_SWITCH: 802.1x for switches
12
+ DTP: Dynamic Trunking Protocol
13
+ DWL: Down-when-looped
14
+ EC: EtherChannel
15
+ ENVIRONMENT: Environment Messages
16
+ EPM: Enforcement Policy Module
17
+ ETHCNTR: Ethernet controller
18
+ EXPRESS_SETUP: Express Setup
19
+ FRNTEND_CTRLR: Front-end controller
20
+ GBIC_SECURITY: GBIC and SFP module security
21
+ GBIC_SECURITY_CRYPT: GBIC and SFP module security
22
+ GBIC_SECURITY_UNIQUE: GBIC and SFP module security
23
+ HARDWARE: Hardware
24
+ LFM: Local forwarding manager
25
+ HPSECURE: Port security
26
+ HULC_LICENSE: Licensing
27
+ IFMGR: Interface manager
28
+ IGMP_QUERIER: IGMP querier
29
+ ILET: Cisco IOS License Enforcement Test
30
+ ILPOWER: PoE
31
+ IMAGEMGR: Image manager
32
+ IP: Internet Protocol
33
+ IP_DEVICE_TRACKING: IP device tracking
34
+ KEYMAN: Keyman Messages
35
+ MAC_MOVE: Host activity
36
+ PAGP: Port Aggregation Protocol
37
+ PHY: PHY
38
+ PIMSN: PIM snooping
39
+ PLATFORM: Low-level platform-specific
40
+ PLATFORM_SM10G: Platform FRULink 10G Service Module
41
+ PLATFORM_ENV: Platform environment
42
+ PLATFORM_FBM: Platform fallback bridging manager
43
+ PLATFORM_HCEF: Cisco Express Forwarding
44
+ PLATFORM_HPLM: Platform pseudo-label manager
45
+ PLATFORM_IPC: Platform Interprocess Communication Protocol
46
+ PLATFORM_IPv6_UCAST: IP Version 6 Unicast
47
+ PLATFORM_PBR: Platform policy-based routing
48
+ PLATFORM_PM: Platform port manager
49
+ PLATFORM_RPC: Platform remote procedure call
50
+ PLATFORM_SPAN: Platform switched port analyzer
51
+ PLATFORM_STACKPOWER: Platform stack power
52
+ PLATFORM_UCAST: Platform unicast routing
53
+ PLATFORM_VLAN: Platform VLAN
54
+ PLATFORM_WCCP: Platform WCCP
55
+ PM: Port manager
56
+ PORT_SECURITY: Port security
57
+ POWERNET_ISSU: EnergyWise domain
58
+ PT: Protocol tunneling
59
+ QOSMGR: QoS manager
60
+ RMON: Remote Network Monitoring (RMON)
61
+ SCHED: Schedule
62
+ SDM: Switch Database Manager
63
+ SESA: SESA
64
+ SPAN: Switched port analyzer
65
+ SPANTREE: Spanning tree
66
+ SPANTREE_FAST: Spanning-tree fast convergence
67
+ SPANTREE_VLAN_SW: Spanning-tree VLAN switch
68
+ STACKMGR: Stack manager
69
+ STORM_CONTROL: Storm control
70
+ SUPERVISOR: Supervisor ASIC
71
+ SUPQ: Supervisor queue
72
+ SW_DAI: Dynamic ARP inspection
73
+ SW_MACAUTH: MAC address authentication
74
+ SW_MATM: MAC address table manager
75
+ SW_VLAN: VLAN manager
76
+ SW_QOS_TB: QoS trusted boundary
77
+ TCAMMGR: Ternary content addressable memory manager
78
+ UDLD: UniDirectional Link Detection
79
+ UFAST_MCAST_SW: UplinkFast packet transmission
80
+ VLMAPLOG: VLAN Access Map Logs
81
+ VQPCLIENT: VLAN Query Protocol client
82
+ WCCP: WCCP
@@ -1,6 +1,6 @@
1
1
  Gem::Specification.new do |s|
2
2
  s.name = 'logstash-input-sdee'
3
- s.version = '0.6.9'
3
+ s.version = '0.7.0'
4
4
  s.date = '2016-08-14'
5
5
  s.summary = "Logstah SDEE input from Cisco ASA"
6
6
  s.description = "This Logstash input plugin allows you to call a Cisco SDEE/CIDEE HTTP API, decode the output of it into event(s), and send them on their merry way."
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-input-sdee
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.6.9
4
+ version: 0.7.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - rootik
@@ -102,8 +102,12 @@ files:
102
102
  - Gemfile
103
103
  - LICENSE
104
104
  - README.md
105
+ - examples/10-inputs.conf
106
+ - examples/20-filter.conf
107
+ - examples/30-outputs.conf
105
108
  - examples/patterns/cisco
106
- - examples/sdee.conf
109
+ - examples/patterns/cisco.dictionary
110
+ - examples/patterns/cisco.facility
107
111
  - lib/logstash/inputs/sdee.rb
108
112
  - logstash-input-sdee.gemspec
109
113
  homepage: http://rubygems.org/gems/logstash-input-sdee