logstash-input-sdee 0.6.9 → 0.7.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +3 -0
- data/examples/{sdee.conf → 10-inputs.conf} +0 -6
- data/examples/20-filter.conf +57 -0
- data/examples/30-outputs.conf +5 -0
- data/examples/patterns/cisco +72 -18
- data/examples/patterns/cisco.dictionary +131 -0
- data/examples/patterns/cisco.facility +82 -0
- data/logstash-input-sdee.gemspec +1 -1
- metadata +6 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: a309cfe8bdd6daec2c0e3abe3b2ce8378eaaecf0
|
4
|
+
data.tar.gz: 538f3991ba62d609540830549fcc58f4e24e1659
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f7756854ba4d3c0532c74f04f7672f6eba87f56c33fc9c85ace7c2f14f0031003e33845f85564d4e306badd4d1068eb9309819427c0546ef431cee24be5dab69
|
7
|
+
data.tar.gz: d5b12d693b98aa61ab37789d8089091978fa92820680b85e8db4da32230dc635ee1faffeef368f9b8096ebf00140cc470351ac749b2b4b594c441751ea90b7bb
|
data/CHANGELOG.md
CHANGED
@@ -0,0 +1,57 @@
|
|
1
|
+
filter {
|
2
|
+
if ([type] and ([type] == "syslog-relay") and !("_grokparsefailure" in [tags]) and !("pre-processed" in [tags])) {
|
3
|
+
grok {
|
4
|
+
match => {
|
5
|
+
"message" => "%{GREEDYDATA:cisco_message}"
|
6
|
+
}
|
7
|
+
add_tag => [ "parser_begin" ]
|
8
|
+
}
|
9
|
+
grok {
|
10
|
+
patterns_dir => [ "/etc/logstash/patterns" ]
|
11
|
+
match => {
|
12
|
+
"message" => "%{CTIMESTAMP}( %{SYSLOGHOST:host})? (?:%{INT:sequence}: %{MONTH} %{MONTHDAY} %{HOUR}:%{MINUTE}:%{SECOND}\.[0-9]+: )%{GREEDYDATA:message}"
|
13
|
+
}
|
14
|
+
overwrite => [ "message" ]
|
15
|
+
add_tag => [ "pre-processed" ]
|
16
|
+
add_field => {
|
17
|
+
"vendor" => "Cisco"
|
18
|
+
"device" => "SW or Router"
|
19
|
+
}
|
20
|
+
}
|
21
|
+
grok {
|
22
|
+
patterns_dir => [ "/etc/logstash/patterns" ]
|
23
|
+
match => {
|
24
|
+
"message" => "%{CISCO_TAG}: %{GREEDYDATA:message}"
|
25
|
+
}
|
26
|
+
overwrite => [ "message" ]
|
27
|
+
}
|
28
|
+
if [cisco_facility] {
|
29
|
+
translate {
|
30
|
+
field => "cisco_facility"
|
31
|
+
destination => "facility"
|
32
|
+
dictionary_path => [ "/etc/logstash/patterns/cisco.facility" ]
|
33
|
+
override => true
|
34
|
+
remove_field => [cisco_facility]
|
35
|
+
}
|
36
|
+
}
|
37
|
+
if [cisco_severity] {
|
38
|
+
translate {
|
39
|
+
field => "cisco_severity"
|
40
|
+
destination => "severity"
|
41
|
+
dictionary => [
|
42
|
+
"0", "Emergency",
|
43
|
+
"1", "Alert",
|
44
|
+
"2", "Critical",
|
45
|
+
"3", "Error",
|
46
|
+
"4", "Warning",
|
47
|
+
"5", "Notification",
|
48
|
+
"6", "Informational",
|
49
|
+
"7", "Debugging" ]
|
50
|
+
override => true
|
51
|
+
remove_field => [cisco_severity]
|
52
|
+
}
|
53
|
+
}
|
54
|
+
|
55
|
+
}
|
56
|
+
}
|
57
|
+
|
data/examples/patterns/cisco
CHANGED
@@ -1,79 +1,133 @@
|
|
1
1
|
#== Cisco ASA ==
|
2
2
|
HOSTNAME \b(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62})(?:\.(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62}))*(\.?|\b)
|
3
|
-
CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})?%{ISO8601_TIMEZONE}
|
4
|
-
CISCO_TAGGED %{CTIMESTAMP
|
5
|
-
|
3
|
+
CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})(?:\.[0-9]+)?%{ISO8601_TIMEZONE}
|
4
|
+
CISCO_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_TAG:ciscotag}:
|
5
|
+
CISCO_ASA_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_ASA_TAG:ciscotag}:
|
6
|
+
CISCO_CLASS [0-9]{3}
|
7
|
+
CISCO_STRUC [A-Z0-9_]+
|
8
|
+
CISCO_TAG %{CISCO_STRUC:cisco_facility}-%{INT:cisco_severity}-%{CISCO_STRUC:cisco_mnemonic}|WLC[0-9]+
|
9
|
+
CISCO_ASA_TAG %[A-Z0-9_]+-%{INT:cisco_severity}-%{CISCO_CLASS:cisco_class}[0-9]{3}
|
6
10
|
# Common Particles
|
7
|
-
CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|created|deleted|SENDING|RECEIVED|monitored|dropped
|
8
|
-
CISCO_ASA_REASON Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
|
11
|
+
CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|dropping|created|deleted|SENDING|RECEIVED|monitored|dropped|terminated|Rejected
|
12
|
+
CISCO_ASA_REASON AAA failure|Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
|
9
13
|
CISCO_ASA_DIRECTION Inbound|inbound|Outbound|outbound
|
10
14
|
CISCO_ASA_INTERVAL first hit|%{INT}-second interval
|
11
15
|
CISCO_ASA_XLATE_TYPE static|dynamic
|
12
16
|
# ASA-2-106001
|
13
|
-
CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{
|
17
|
+
CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{DATA:action} from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{GREEDYDATA:tcp_flags} on interface %{GREEDYDATA:interface}
|
14
18
|
# ASA-2-106006, ASA-2-106007, ASA-2-106010
|
15
|
-
CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:
|
19
|
+
CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:src_user}\))? (?:to|dst) %{IP:dst_ip}/%{INT:dst_port}(\(%{DATA:dst_user}\))? (?:on interface %{DATA:interface}|due to %{CISCO_ASA_REASON:reason})
|
16
20
|
# ASA-3-106014
|
17
|
-
CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:
|
21
|
+
CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IP:dst_ip}(\(%{DATA:dst_user}\))? \(type %{INT:icmp_type}, code %{INT:icmp_code}\)
|
18
22
|
# ASA-6-106015
|
19
23
|
CISCOASA106015 %{CISCO_ASA_ACTION:action} %{WORD:protocol} \(%{DATA:policy_id}\) from %{IPORHOST:src_ip}/%{INT:src_port} to %{IPORHOST:dst_ip}/%{INT:dst_port} flags %{DATA:tcp_flags} on interface %{GREEDYDATA:interface}
|
20
24
|
# ASA-1-106021
|
21
25
|
CISCOASA106021 %{CISCO_ASA_ACTION:action} %{WORD:protocol} reverse path check from %{IP:src_ip} to %{IP:dst_ip} on interface %{GREEDYDATA:interface}
|
22
26
|
# ASA-4-106023
|
23
|
-
CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:
|
27
|
+
CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(\(%{DATA:dst_user}\))?( \(type %{INT:icmp_type}, code %{INT:icmp_code}\))? by access-group "%{DATA:policy_id}" \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
|
24
28
|
# ASA-5-106100
|
25
|
-
CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:
|
29
|
+
CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:src_user}\))? -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\)(\(%{DATA:dst_user}\))? hit-cnt %{INT:hit_count} %{CISCO_ASA_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
|
26
30
|
# ASA-6-110002
|
27
31
|
CISCOASA110002 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
|
28
32
|
# ASA-5-111008
|
29
|
-
CISCOASA111008 User
|
33
|
+
CISCOASA111008 User '%{DATA:user}' executed the '%{GREEDYDATA:cmd}' command\.
|
30
34
|
# ASA-7-111009
|
31
|
-
CISCOASA111009 User
|
35
|
+
CISCOASA111009 User '%{DATA:user}' executed cmd: %{GREEDYDATA:cmd}
|
32
36
|
# ASA-5-111010
|
33
|
-
CISCOASA111010 User
|
37
|
+
CISCOASA111010 User '%{DATA:user}', running '%{WORD:service}' from IP %{IPORHOST:src_ip}, executed '%{GREEDYDATA:cmd}'
|
38
|
+
# ASA-6-113004
|
39
|
+
CISCOASA113004 AAA user authentication Successful : server = \s*%{IPORHOST:server} : user = %{DATA:user}
|
40
|
+
# ASA-6-113005
|
41
|
+
CISCOASA113005 AAA user authentication %{CISCO_ASA_ACTION:action} : reason = %{CISCO_ASA_REASON} : server = %{IPORHOST:server} : user = %{DATA:user} : user IP = %{IP:src_ip}
|
42
|
+
# ASA-6-113008
|
43
|
+
CISCOASA113008 AAA transaction status ACCEPT : user = %{DATA:user}
|
44
|
+
# ASA-6-113009
|
45
|
+
CISCOASA113009 AAA retrieved default group policy \(%{DATA:policy}\) for user = %{DATA:user}
|
46
|
+
# ASA-6-302004
|
47
|
+
CISCOASA302004 Pre-allocate %{DATA:protocol} backconnection for faddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})? to laddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})?
|
34
48
|
# ASA-6-302010
|
35
49
|
CISCOASA302010 %{INT:connection_count} in use, %{INT:connection_count_max} most used
|
36
50
|
# ASA-6-302013, ASA-6-302014, ASA-6-302015, ASA-6-302016
|
37
|
-
CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:
|
51
|
+
CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:src_user}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port}( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?(\(%{DATA:dst_user}\))?( duration %{TIME:duration} bytes %{INT:bytes})?(?: %{CISCO_ASA_REASON:reason})?( \(%{DATA:user}\))?
|
38
52
|
# ASA-6-302020, ASA-6-302021
|
39
|
-
CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:
|
53
|
+
CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:user}\))? gaddr %{IPORHOST:src_xlated_ip}/%{INT:icmp_code_xlated} laddr %{IPORHOST:src_ip}/%{INT:icmp_code}( \(%{DATA:user}\))?
|
54
|
+
# ASA-6-303002
|
55
|
+
CISCOASA303002 FTP connection from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?, user %{DATA:user} %{WORD:action} file %{DATA:filename}
|
40
56
|
# ASA-3-305006
|
41
57
|
CISCOASA305006 regular translation creation failed for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(?: \(type %{INT:icmp_type}, code %{INT:icmp_code}\))?
|
42
58
|
# ASA-6-305011
|
43
|
-
CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:
|
59
|
+
CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? to %{DATA:src_xlated_interface}:%{IPORHOST:src_xlated_ip}/%{DATA:src_xlated_port}
|
44
60
|
# ASA-5-305013
|
45
61
|
CISCOASA305013 Asymmetric NAT rules matched for forward and reverse flows; Connection for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? %{CISCO_ASA_ACTION:action} due to NAT reverse path failure
|
46
62
|
# ASA-3-313001, ASA-3-313004, ASA-3-313008
|
47
63
|
CISCOASA313001_313004_313008 %{CISCO_ASA_ACTION:action} %{WORD:protocol} type=%{INT:icmp_type}, code=%{INT:icmp_code} from %{IP:src_ip} on interface %{DATA:interface}( to %{IP:dst_ip})?
|
48
64
|
# ASA-4-313005
|
49
|
-
CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:
|
65
|
+
CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:err_src_user}\))? dst %{DATA:err_dst_interface}:%{IPORHOST:err_dst_ip}(\(%{DATA:err_dst_user}\))? \(type %{INT:err_icmp_type}, code %{INT:err_icmp_code}\) on %{DATA:interface} interface\. Original IP payload: %{WORD:protocol} src %{IPORHOST:orig_src_ip}/%{INT:orig_src_port}(\(%{DATA:orig_src_user}\))? dst %{IPORHOST:orig_dst_ip}/%{INT:orig_dst_port}(\(%{DATA:orig_dst_user}\))?
|
66
|
+
# ASA-4-313004
|
67
|
+
#CISCOASA338004 Denied ICMP type=%{INT:icmp_type}, from laddr %{IPORHOST:src_ip} on interface %{DATA:src_interface} to %{IPORHOST:dst_ip}: no matching session
|
50
68
|
# ASA-4-338004, ASA-4-338008
|
51
69
|
CISCOASA338004_338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: %{IPORHOST:blacklisted_ip}/%{IPORHOST:blacklisted_netmask}, threat-level: %{DATA:threat_level}, category: %{DATA:category}
|
52
70
|
# ASA-4-338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: 221.204.186.0/255.255.255.0, threat-level: very-high, category: admin-added
|
71
|
+
# ASA-6-338304
|
72
|
+
CISCOASA338304 Successfully downloaded dynamic filter data file from updater server %{DATA:url}
|
73
|
+
# ASA-4-400013
|
74
|
+
CISCOASA400013 IDS:2003 ICMP redirect from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
|
75
|
+
# ASA-4-400028
|
76
|
+
CISCOASA400028 IDS:3042 TCP FIN only flags from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
|
77
|
+
# ASA-4-400037
|
78
|
+
CISCOASA400037 IDS:6053 DNS all records request from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
|
53
79
|
# ASA-4-402117
|
54
80
|
CISCOASA402117 %{WORD:protocol}: Received a non-IPSec packet \(protocol= %{WORD:orig_protocol}\) from %{IP:src_ip} to %{IP:dst_ip}
|
55
81
|
# ASA-4-402119
|
56
82
|
CISCOASA402119 %{WORD:protocol}: Received an %{WORD:orig_protocol} packet \(SPI= %{DATA:spi}, sequence number= %{DATA:seq_num}\) from %{IP:src_ip} \(user= %{DATA:user}\) to %{IP:dst_ip} that failed anti-replay checking
|
83
|
+
# ASA-4-405104
|
84
|
+
CISCOASA405104 %{WORD:protocol} message %{DATA:voip_message} received from %{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_ip}(/%{INT:dst_port})? before SETUP
|
57
85
|
# ASA-4-419001
|
58
86
|
CISCOASA419001 %{CISCO_ASA_ACTION:action} %{WORD:protocol} packet from %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port}, reason: %{GREEDYDATA:reason}
|
59
87
|
# ASA-4-419002
|
60
88
|
CISCOASA419002 %{CISCO_ASA_REASON:reason} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} with different initial sequence number
|
61
89
|
# ASA-4-500004
|
62
90
|
CISCOASA500004 %{CISCO_ASA_REASON:reason} for protocol=%{WORD:protocol}, from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
|
91
|
+
# ASA-5-502103
|
92
|
+
CISCOASA502103 User priv level changed: Uname: %{DATA:user} From: %{INT:from_level} To: %{INT:to_level}
|
93
|
+
# ASA-4-507003
|
94
|
+
CISCOASA507003 %{WORD:protocol} flow from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} %{CISCO_ASA_ACTION:action} by inspection engine, reason - %{DATA:reason}?\.
|
63
95
|
# ASA-6-602303, ASA-6-602304
|
64
96
|
CISCOASA602303_602304 %{WORD:protocol}: An %{CISCO_ASA_DIRECTION:direction} %{GREEDYDATA:tunnel_type} SA \(SPI= %{DATA:spi}\) between %{IP:src_ip} and %{IP:dst_ip} \(user= %{DATA:user}\) has been %{CISCO_ASA_ACTION:action}
|
97
|
+
# ASA-6-605005
|
98
|
+
CISCOASA605005 Login permitted from %{IPORHOST:src_ip}/%{INT:src_port} %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{WORD:dst_port} for user "%{DATA:user}"
|
99
|
+
# ASA-6-607001
|
100
|
+
CISCOASA607001 Pre-allocate %{GREEDYDATA:protocol} secondary channel for %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? from %{DATA:voip_message} message
|
65
101
|
# ASA-7-609001, ASA-7-609002
|
66
102
|
CISCOASA609001_609002 %{CISCO_ASA_ACTION:action} local-host %{DATA:src_interface}:%{IPORHOST:src_ip}(?: duration %{TIME:duration})?
|
103
|
+
# ASA-6-611101
|
104
|
+
CISCOASA611101 User authentication succeeded: Uname: %{DATA:user}
|
67
105
|
# ASA-7-710001, ASA-7-710002, ASA-7-710003, ASA-7-710005, ASA-7-710006
|
68
106
|
CISCOASA710001_710002_710003_710005_710006_710007 %{WORD:protocol} (?:request|access|keepalive) %{CISCO_ASA_ACTION:action} from %{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{DATA:dst_port}
|
69
107
|
# ASA-6-713172
|
70
108
|
CISCOASA713172 Group = %{GREEDYDATA:group}, IP = %{IP:src_ip}, Automatic NAT Detection Status:\s+Remote end\s*%{DATA:is_remote_natted}\s*behind a NAT device\s+This\s+end\s*%{DATA:is_local_natted}\s*behind a NAT device
|
71
109
|
# ASA-7-713236
|
72
110
|
CISCOASA713236 IP = %{IPORHOST:src_ip}, IKE_DECODE %{CISCO_ASA_ACTION} Message \(msgid=%{DATA:msgid}\) with payloads : %{GREEDYDATA:payload} total length : %{INT:length}
|
111
|
+
# ASA-5-713257
|
112
|
+
CISCOASA713257 Phase %{DATA} failure: Mismatched attribute types for class %{DATA:vpn_class}: Rcv'd: %{DATA:vpn_rcvd} Cfg'd: %{DATA:vpn_cfgd}
|
113
|
+
# ASA-5-713904
|
114
|
+
CISCOASA713904 IP = %{IPORHOST:src_ip}, Received encrypted packet with no matching SA, %{CISCO_ASA_ACTION:action}
|
73
115
|
# ASA-7-713906
|
74
116
|
CISCOASA713906 IKE Receiver: Packet received on %{IPORHOST:dst_ip}:%{INT:dst_port} from %{IPORHOST:src_ip}:%{INT:src_port}
|
75
117
|
# ASA-7-715046
|
76
|
-
CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:
|
118
|
+
CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:user},)? IP = %{IP:src_ip},%{GREEDYDATA:vpn_action}
|
77
119
|
# ASA-4-733100
|
78
120
|
CISCOASA733100 \[\s*%{DATA:drop_type}\s*\] drop %{DATA:drop_rate_id} exceeded. Current burst rate is %{INT:drop_rate_current_burst} per second, max configured rate is %{INT:drop_rate_max_burst}; Current average rate is %{INT:drop_rate_current_avg} per second, max configured rate is %{INT:drop_rate_max_avg}; Cumulative total count is %{INT:drop_total_count}
|
121
|
+
# ASA-6-734001
|
122
|
+
CISCOASA734001 DAP: User %{DATA:user}, Addr %{IP:src_ip}, Connection %{DATA:protocol}: The following DAP records were selected for this connection: %{GREEDYDATA:policy_id}
|
123
|
+
# ASA-6-737006
|
124
|
+
CISCOASA737006 IPAA: Local pool request succeeded for tunnel-group '%{DATA:vpn_group}'
|
125
|
+
# ASA-6-737016
|
126
|
+
CISCOASA737016 IPAA: Freeing local pool address %{IP:src_ip}
|
127
|
+
# ASA-6-737026
|
128
|
+
CISCOASA737026 IPAA: Client assigned %{IP:src_ip} from local pool
|
129
|
+
# ASA-6-737029
|
130
|
+
CISCOASA737029 IPAA: Added %{IP:src_ip} to standby
|
131
|
+
# ASA-6-737031
|
132
|
+
CISCOASA737031 IPAA: Removed %{IP:src_ip} from standby
|
79
133
|
#== End Cisco ASA ==
|
@@ -0,0 +1,131 @@
|
|
1
|
+
"101": High Availability (Failover)
|
2
|
+
"102": High Availability (Failover)
|
3
|
+
"103": High Availability (Failover)
|
4
|
+
"104": High Availability (Failover)
|
5
|
+
"105": High Availability (Failover)
|
6
|
+
"106": Access Lists
|
7
|
+
"107": RIP Routing
|
8
|
+
"108": User Session
|
9
|
+
"109": User Authentication
|
10
|
+
"110": Transparent Firewall
|
11
|
+
"111": Command Interface
|
12
|
+
"112": Command Interface
|
13
|
+
"113": User Authentication
|
14
|
+
"120": Smart Call Home
|
15
|
+
"199": System
|
16
|
+
"201": User Session
|
17
|
+
"202": User Session
|
18
|
+
"204": User Session
|
19
|
+
"208": Command Interface
|
20
|
+
"209": IP Stack
|
21
|
+
"210": High Availability (Failover)
|
22
|
+
"211": System
|
23
|
+
"212": SNMP
|
24
|
+
"213": PPTP and L2TP Sessions
|
25
|
+
"214": System
|
26
|
+
"215": IP Stack
|
27
|
+
"216": System
|
28
|
+
"220": Transparent Firewall
|
29
|
+
"302": User Session
|
30
|
+
"303": User Session
|
31
|
+
"304": User Session
|
32
|
+
"305": NAT and PAT
|
33
|
+
"306": System
|
34
|
+
"307": System
|
35
|
+
"308": Command Interface
|
36
|
+
"311": High Availability (Failover)
|
37
|
+
"312": RIP Routing
|
38
|
+
"313": IP Stack
|
39
|
+
"314": User Session
|
40
|
+
"315": System
|
41
|
+
"316": IKE and IPSec
|
42
|
+
"317": IP Stack
|
43
|
+
"318": OSPF Routing
|
44
|
+
"319": Network Processor
|
45
|
+
"320": IKE and IPSec
|
46
|
+
"321": Resource Manager
|
47
|
+
"325": IPv6
|
48
|
+
"321": Resource Manager
|
49
|
+
"323": Card Management
|
50
|
+
"333": EAP or EAPoUDP for NAC
|
51
|
+
"334": EAP or EAPoUDP for NAC
|
52
|
+
"336": EIGRP Routing
|
53
|
+
"337": Phone Proxy
|
54
|
+
"338": Blacklists, Whitelists, and Graylists
|
55
|
+
"339": UC-IME
|
56
|
+
"400": Intrusion Protection System
|
57
|
+
"401": Intrusion Protection System
|
58
|
+
"402": IKE and IPSec
|
59
|
+
"403": PPTP and L2TP Sessions
|
60
|
+
"404": IKE and IPSec
|
61
|
+
"405": User Session
|
62
|
+
"406": User Session
|
63
|
+
"407": User Session
|
64
|
+
"408": IP Stack
|
65
|
+
"409": OSPF Routing
|
66
|
+
"414": System
|
67
|
+
"415": Application Firewall
|
68
|
+
"419": Intrusion Protection System
|
69
|
+
"420": Intrusion Protection System
|
70
|
+
"444": Licensing
|
71
|
+
"500": User Session
|
72
|
+
"501": IKE and IPSec
|
73
|
+
"502": User Session
|
74
|
+
"503": OSPF Routing
|
75
|
+
"505": System
|
76
|
+
"602": IKE and IPSec
|
77
|
+
"603": PPTP and L2TP Sessions
|
78
|
+
"604": System
|
79
|
+
"605": System
|
80
|
+
"606": System
|
81
|
+
"607": User Session
|
82
|
+
"608": User Session
|
83
|
+
"609": User Session
|
84
|
+
"610": System
|
85
|
+
"611": VPN Client
|
86
|
+
"612": System
|
87
|
+
"613": OSPF Routing
|
88
|
+
"614": System
|
89
|
+
"615": System
|
90
|
+
"616": User Session
|
91
|
+
"620": User Session
|
92
|
+
"701": System
|
93
|
+
"702": IKE and IPSec
|
94
|
+
"703": User Session
|
95
|
+
"709": High Availability (Failover)
|
96
|
+
"710": User Session
|
97
|
+
"711": System
|
98
|
+
"713": Network Access Point
|
99
|
+
"714": IKE and IPSec
|
100
|
+
"715": IKE and IPSec
|
101
|
+
"716": WebVPN Client
|
102
|
+
"717": PKI Certification Authority
|
103
|
+
"718": VPN Load Balancing
|
104
|
+
"719": E-mail Proxy
|
105
|
+
"720": VPN Failover
|
106
|
+
"721": WebVPN Failover
|
107
|
+
"722": SSL VPN Client
|
108
|
+
"723": Citrix Client
|
109
|
+
"724": Secure Desktop
|
110
|
+
"725": SSL Stack
|
111
|
+
"727": High Availability (Failover)
|
112
|
+
"728": Load Balancing
|
113
|
+
"730": VLAN Mapping
|
114
|
+
"731": NAC Policy
|
115
|
+
"732": NAC Settings to apply NAC Policy
|
116
|
+
"733": Threat Detection
|
117
|
+
"734": Dynamic Access Policies
|
118
|
+
"735": IP Address Assignment
|
119
|
+
"737": IP Address Assignment
|
120
|
+
"741": System
|
121
|
+
"742": Password Encryption
|
122
|
+
"746": Identity-based Firewall
|
123
|
+
"747": Clustering
|
124
|
+
"750": IKEv2 Toolkit
|
125
|
+
"751": IKEv2 Toolkit
|
126
|
+
"752": IKEv2 Toolkit
|
127
|
+
"775": ScanSafe
|
128
|
+
"776": Cisco TrustSec
|
129
|
+
"778": VXLAN
|
130
|
+
"779": Service Tag Switching
|
131
|
+
"802": MDM Proxy
|
@@ -0,0 +1,82 @@
|
|
1
|
+
AUTHMGR: Authentication manager
|
2
|
+
ACLMGR: ACL manager
|
3
|
+
BACKUP_INTERFACE: Flex Links
|
4
|
+
BADTRANSCEIVER: Defective transceiver
|
5
|
+
BSPATCH: Boot loader patch
|
6
|
+
CFGMGR: Configuration manager
|
7
|
+
CLS_ACC: Consoleless access
|
8
|
+
CMP: Cluster Membership Protocol
|
9
|
+
DHCP_SNOOPING: DHCP snooping
|
10
|
+
DOT1X: 802.1x
|
11
|
+
DOT1X_SWITCH: 802.1x for switches
|
12
|
+
DTP: Dynamic Trunking Protocol
|
13
|
+
DWL: Down-when-looped
|
14
|
+
EC: EtherChannel
|
15
|
+
ENVIRONMENT: Environment Messages
|
16
|
+
EPM: Enforcement Policy Module
|
17
|
+
ETHCNTR: Ethernet controller
|
18
|
+
EXPRESS_SETUP: Express Setup
|
19
|
+
FRNTEND_CTRLR: Front-end controller
|
20
|
+
GBIC_SECURITY: GBIC and SFP module security
|
21
|
+
GBIC_SECURITY_CRYPT: GBIC and SFP module security
|
22
|
+
GBIC_SECURITY_UNIQUE: GBIC and SFP module security
|
23
|
+
HARDWARE: Hardware
|
24
|
+
LFM: Local forwarding manager
|
25
|
+
HPSECURE: Port security
|
26
|
+
HULC_LICENSE: Licensing
|
27
|
+
IFMGR: Interface manager
|
28
|
+
IGMP_QUERIER: IGMP querier
|
29
|
+
ILET: Cisco IOS License Enforcement Test
|
30
|
+
ILPOWER: PoE
|
31
|
+
IMAGEMGR: Image manager
|
32
|
+
IP: Internet Protocol
|
33
|
+
IP_DEVICE_TRACKING: IP device tracking
|
34
|
+
KEYMAN: Keyman Messages
|
35
|
+
MAC_MOVE: Host activity
|
36
|
+
PAGP: Port Aggregation Protocol
|
37
|
+
PHY: PHY
|
38
|
+
PIMSN: PIM snooping
|
39
|
+
PLATFORM: Low-level platform-specific
|
40
|
+
PLATFORM_SM10G: Platform FRULink 10G Service Module
|
41
|
+
PLATFORM_ENV: Platform environment
|
42
|
+
PLATFORM_FBM: Platform fallback bridging manager
|
43
|
+
PLATFORM_HCEF: Cisco Express Forwarding
|
44
|
+
PLATFORM_HPLM: Platform pseudo-label manager
|
45
|
+
PLATFORM_IPC: Platform Interprocess Communication Protocol
|
46
|
+
PLATFORM_IPv6_UCAST: IP Version 6 Unicast
|
47
|
+
PLATFORM_PBR: Platform policy-based routing
|
48
|
+
PLATFORM_PM: Platform port manager
|
49
|
+
PLATFORM_RPC: Platform remote procedure call
|
50
|
+
PLATFORM_SPAN: Platform switched port analyzer
|
51
|
+
PLATFORM_STACKPOWER: Platform stack power
|
52
|
+
PLATFORM_UCAST: Platform unicast routing
|
53
|
+
PLATFORM_VLAN: Platform VLAN
|
54
|
+
PLATFORM_WCCP: Platform WCCP
|
55
|
+
PM: Port manager
|
56
|
+
PORT_SECURITY: Port security
|
57
|
+
POWERNET_ISSU: EnergyWise domain
|
58
|
+
PT: Protocol tunneling
|
59
|
+
QOSMGR: QoS manager
|
60
|
+
RMON: Remote Network Monitoring (RMON)
|
61
|
+
SCHED: Schedule
|
62
|
+
SDM: Switch Database Manager
|
63
|
+
SESA: SESA
|
64
|
+
SPAN: Switched port analyzer
|
65
|
+
SPANTREE: Spanning tree
|
66
|
+
SPANTREE_FAST: Spanning-tree fast convergence
|
67
|
+
SPANTREE_VLAN_SW: Spanning-tree VLAN switch
|
68
|
+
STACKMGR: Stack manager
|
69
|
+
STORM_CONTROL: Storm control
|
70
|
+
SUPERVISOR: Supervisor ASIC
|
71
|
+
SUPQ: Supervisor queue
|
72
|
+
SW_DAI: Dynamic ARP inspection
|
73
|
+
SW_MACAUTH: MAC address authentication
|
74
|
+
SW_MATM: MAC address table manager
|
75
|
+
SW_VLAN: VLAN manager
|
76
|
+
SW_QOS_TB: QoS trusted boundary
|
77
|
+
TCAMMGR: Ternary content addressable memory manager
|
78
|
+
UDLD: UniDirectional Link Detection
|
79
|
+
UFAST_MCAST_SW: UplinkFast packet transmission
|
80
|
+
VLMAPLOG: VLAN Access Map Logs
|
81
|
+
VQPCLIENT: VLAN Query Protocol client
|
82
|
+
WCCP: WCCP
|
data/logstash-input-sdee.gemspec
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
Gem::Specification.new do |s|
|
2
2
|
s.name = 'logstash-input-sdee'
|
3
|
-
s.version = '0.
|
3
|
+
s.version = '0.7.0'
|
4
4
|
s.date = '2016-08-14'
|
5
5
|
s.summary = "Logstah SDEE input from Cisco ASA"
|
6
6
|
s.description = "This Logstash input plugin allows you to call a Cisco SDEE/CIDEE HTTP API, decode the output of it into event(s), and send them on their merry way."
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: logstash-input-sdee
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.7.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- rootik
|
@@ -102,8 +102,12 @@ files:
|
|
102
102
|
- Gemfile
|
103
103
|
- LICENSE
|
104
104
|
- README.md
|
105
|
+
- examples/10-inputs.conf
|
106
|
+
- examples/20-filter.conf
|
107
|
+
- examples/30-outputs.conf
|
105
108
|
- examples/patterns/cisco
|
106
|
-
- examples/
|
109
|
+
- examples/patterns/cisco.dictionary
|
110
|
+
- examples/patterns/cisco.facility
|
107
111
|
- lib/logstash/inputs/sdee.rb
|
108
112
|
- logstash-input-sdee.gemspec
|
109
113
|
homepage: http://rubygems.org/gems/logstash-input-sdee
|