logstash-input-sdee 0.6.9 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +3 -0
- data/examples/{sdee.conf → 10-inputs.conf} +0 -6
- data/examples/20-filter.conf +57 -0
- data/examples/30-outputs.conf +5 -0
- data/examples/patterns/cisco +72 -18
- data/examples/patterns/cisco.dictionary +131 -0
- data/examples/patterns/cisco.facility +82 -0
- data/logstash-input-sdee.gemspec +1 -1
- metadata +6 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: a309cfe8bdd6daec2c0e3abe3b2ce8378eaaecf0
|
4
|
+
data.tar.gz: 538f3991ba62d609540830549fcc58f4e24e1659
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f7756854ba4d3c0532c74f04f7672f6eba87f56c33fc9c85ace7c2f14f0031003e33845f85564d4e306badd4d1068eb9309819427c0546ef431cee24be5dab69
|
7
|
+
data.tar.gz: d5b12d693b98aa61ab37789d8089091978fa92820680b85e8db4da32230dc635ee1faffeef368f9b8096ebf00140cc470351ac749b2b4b594c441751ea90b7bb
|
data/CHANGELOG.md
CHANGED
@@ -0,0 +1,57 @@
|
|
1
|
+
filter {
|
2
|
+
if ([type] and ([type] == "syslog-relay") and !("_grokparsefailure" in [tags]) and !("pre-processed" in [tags])) {
|
3
|
+
grok {
|
4
|
+
match => {
|
5
|
+
"message" => "%{GREEDYDATA:cisco_message}"
|
6
|
+
}
|
7
|
+
add_tag => [ "parser_begin" ]
|
8
|
+
}
|
9
|
+
grok {
|
10
|
+
patterns_dir => [ "/etc/logstash/patterns" ]
|
11
|
+
match => {
|
12
|
+
"message" => "%{CTIMESTAMP}( %{SYSLOGHOST:host})? (?:%{INT:sequence}: %{MONTH} %{MONTHDAY} %{HOUR}:%{MINUTE}:%{SECOND}\.[0-9]+: )%{GREEDYDATA:message}"
|
13
|
+
}
|
14
|
+
overwrite => [ "message" ]
|
15
|
+
add_tag => [ "pre-processed" ]
|
16
|
+
add_field => {
|
17
|
+
"vendor" => "Cisco"
|
18
|
+
"device" => "SW or Router"
|
19
|
+
}
|
20
|
+
}
|
21
|
+
grok {
|
22
|
+
patterns_dir => [ "/etc/logstash/patterns" ]
|
23
|
+
match => {
|
24
|
+
"message" => "%{CISCO_TAG}: %{GREEDYDATA:message}"
|
25
|
+
}
|
26
|
+
overwrite => [ "message" ]
|
27
|
+
}
|
28
|
+
if [cisco_facility] {
|
29
|
+
translate {
|
30
|
+
field => "cisco_facility"
|
31
|
+
destination => "facility"
|
32
|
+
dictionary_path => [ "/etc/logstash/patterns/cisco.facility" ]
|
33
|
+
override => true
|
34
|
+
remove_field => [cisco_facility]
|
35
|
+
}
|
36
|
+
}
|
37
|
+
if [cisco_severity] {
|
38
|
+
translate {
|
39
|
+
field => "cisco_severity"
|
40
|
+
destination => "severity"
|
41
|
+
dictionary => [
|
42
|
+
"0", "Emergency",
|
43
|
+
"1", "Alert",
|
44
|
+
"2", "Critical",
|
45
|
+
"3", "Error",
|
46
|
+
"4", "Warning",
|
47
|
+
"5", "Notification",
|
48
|
+
"6", "Informational",
|
49
|
+
"7", "Debugging" ]
|
50
|
+
override => true
|
51
|
+
remove_field => [cisco_severity]
|
52
|
+
}
|
53
|
+
}
|
54
|
+
|
55
|
+
}
|
56
|
+
}
|
57
|
+
|
data/examples/patterns/cisco
CHANGED
@@ -1,79 +1,133 @@
|
|
1
1
|
#== Cisco ASA ==
|
2
2
|
HOSTNAME \b(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62})(?:\.(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62}))*(\.?|\b)
|
3
|
-
CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})?%{ISO8601_TIMEZONE}
|
4
|
-
CISCO_TAGGED %{CTIMESTAMP
|
5
|
-
|
3
|
+
CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})(?:\.[0-9]+)?%{ISO8601_TIMEZONE}
|
4
|
+
CISCO_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_TAG:ciscotag}:
|
5
|
+
CISCO_ASA_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_ASA_TAG:ciscotag}:
|
6
|
+
CISCO_CLASS [0-9]{3}
|
7
|
+
CISCO_STRUC [A-Z0-9_]+
|
8
|
+
CISCO_TAG %{CISCO_STRUC:cisco_facility}-%{INT:cisco_severity}-%{CISCO_STRUC:cisco_mnemonic}|WLC[0-9]+
|
9
|
+
CISCO_ASA_TAG %[A-Z0-9_]+-%{INT:cisco_severity}-%{CISCO_CLASS:cisco_class}[0-9]{3}
|
6
10
|
# Common Particles
|
7
|
-
CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|created|deleted|SENDING|RECEIVED|monitored|dropped
|
8
|
-
CISCO_ASA_REASON Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
|
11
|
+
CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|dropping|created|deleted|SENDING|RECEIVED|monitored|dropped|terminated|Rejected
|
12
|
+
CISCO_ASA_REASON AAA failure|Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
|
9
13
|
CISCO_ASA_DIRECTION Inbound|inbound|Outbound|outbound
|
10
14
|
CISCO_ASA_INTERVAL first hit|%{INT}-second interval
|
11
15
|
CISCO_ASA_XLATE_TYPE static|dynamic
|
12
16
|
# ASA-2-106001
|
13
|
-
CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{
|
17
|
+
CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{DATA:action} from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{GREEDYDATA:tcp_flags} on interface %{GREEDYDATA:interface}
|
14
18
|
# ASA-2-106006, ASA-2-106007, ASA-2-106010
|
15
|
-
CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:
|
19
|
+
CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:src_user}\))? (?:to|dst) %{IP:dst_ip}/%{INT:dst_port}(\(%{DATA:dst_user}\))? (?:on interface %{DATA:interface}|due to %{CISCO_ASA_REASON:reason})
|
16
20
|
# ASA-3-106014
|
17
|
-
CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:
|
21
|
+
CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IP:dst_ip}(\(%{DATA:dst_user}\))? \(type %{INT:icmp_type}, code %{INT:icmp_code}\)
|
18
22
|
# ASA-6-106015
|
19
23
|
CISCOASA106015 %{CISCO_ASA_ACTION:action} %{WORD:protocol} \(%{DATA:policy_id}\) from %{IPORHOST:src_ip}/%{INT:src_port} to %{IPORHOST:dst_ip}/%{INT:dst_port} flags %{DATA:tcp_flags} on interface %{GREEDYDATA:interface}
|
20
24
|
# ASA-1-106021
|
21
25
|
CISCOASA106021 %{CISCO_ASA_ACTION:action} %{WORD:protocol} reverse path check from %{IP:src_ip} to %{IP:dst_ip} on interface %{GREEDYDATA:interface}
|
22
26
|
# ASA-4-106023
|
23
|
-
CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:
|
27
|
+
CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(\(%{DATA:dst_user}\))?( \(type %{INT:icmp_type}, code %{INT:icmp_code}\))? by access-group "%{DATA:policy_id}" \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
|
24
28
|
# ASA-5-106100
|
25
|
-
CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:
|
29
|
+
CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:src_user}\))? -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\)(\(%{DATA:dst_user}\))? hit-cnt %{INT:hit_count} %{CISCO_ASA_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
|
26
30
|
# ASA-6-110002
|
27
31
|
CISCOASA110002 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
|
28
32
|
# ASA-5-111008
|
29
|
-
CISCOASA111008 User
|
33
|
+
CISCOASA111008 User '%{DATA:user}' executed the '%{GREEDYDATA:cmd}' command\.
|
30
34
|
# ASA-7-111009
|
31
|
-
CISCOASA111009 User
|
35
|
+
CISCOASA111009 User '%{DATA:user}' executed cmd: %{GREEDYDATA:cmd}
|
32
36
|
# ASA-5-111010
|
33
|
-
CISCOASA111010 User
|
37
|
+
CISCOASA111010 User '%{DATA:user}', running '%{WORD:service}' from IP %{IPORHOST:src_ip}, executed '%{GREEDYDATA:cmd}'
|
38
|
+
# ASA-6-113004
|
39
|
+
CISCOASA113004 AAA user authentication Successful : server = \s*%{IPORHOST:server} : user = %{DATA:user}
|
40
|
+
# ASA-6-113005
|
41
|
+
CISCOASA113005 AAA user authentication %{CISCO_ASA_ACTION:action} : reason = %{CISCO_ASA_REASON} : server = %{IPORHOST:server} : user = %{DATA:user} : user IP = %{IP:src_ip}
|
42
|
+
# ASA-6-113008
|
43
|
+
CISCOASA113008 AAA transaction status ACCEPT : user = %{DATA:user}
|
44
|
+
# ASA-6-113009
|
45
|
+
CISCOASA113009 AAA retrieved default group policy \(%{DATA:policy}\) for user = %{DATA:user}
|
46
|
+
# ASA-6-302004
|
47
|
+
CISCOASA302004 Pre-allocate %{DATA:protocol} backconnection for faddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})? to laddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})?
|
34
48
|
# ASA-6-302010
|
35
49
|
CISCOASA302010 %{INT:connection_count} in use, %{INT:connection_count_max} most used
|
36
50
|
# ASA-6-302013, ASA-6-302014, ASA-6-302015, ASA-6-302016
|
37
|
-
CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:
|
51
|
+
CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:src_user}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port}( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?(\(%{DATA:dst_user}\))?( duration %{TIME:duration} bytes %{INT:bytes})?(?: %{CISCO_ASA_REASON:reason})?( \(%{DATA:user}\))?
|
38
52
|
# ASA-6-302020, ASA-6-302021
|
39
|
-
CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:
|
53
|
+
CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:user}\))? gaddr %{IPORHOST:src_xlated_ip}/%{INT:icmp_code_xlated} laddr %{IPORHOST:src_ip}/%{INT:icmp_code}( \(%{DATA:user}\))?
|
54
|
+
# ASA-6-303002
|
55
|
+
CISCOASA303002 FTP connection from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?, user %{DATA:user} %{WORD:action} file %{DATA:filename}
|
40
56
|
# ASA-3-305006
|
41
57
|
CISCOASA305006 regular translation creation failed for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(?: \(type %{INT:icmp_type}, code %{INT:icmp_code}\))?
|
42
58
|
# ASA-6-305011
|
43
|
-
CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:
|
59
|
+
CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? to %{DATA:src_xlated_interface}:%{IPORHOST:src_xlated_ip}/%{DATA:src_xlated_port}
|
44
60
|
# ASA-5-305013
|
45
61
|
CISCOASA305013 Asymmetric NAT rules matched for forward and reverse flows; Connection for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? %{CISCO_ASA_ACTION:action} due to NAT reverse path failure
|
46
62
|
# ASA-3-313001, ASA-3-313004, ASA-3-313008
|
47
63
|
CISCOASA313001_313004_313008 %{CISCO_ASA_ACTION:action} %{WORD:protocol} type=%{INT:icmp_type}, code=%{INT:icmp_code} from %{IP:src_ip} on interface %{DATA:interface}( to %{IP:dst_ip})?
|
48
64
|
# ASA-4-313005
|
49
|
-
CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:
|
65
|
+
CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:err_src_user}\))? dst %{DATA:err_dst_interface}:%{IPORHOST:err_dst_ip}(\(%{DATA:err_dst_user}\))? \(type %{INT:err_icmp_type}, code %{INT:err_icmp_code}\) on %{DATA:interface} interface\. Original IP payload: %{WORD:protocol} src %{IPORHOST:orig_src_ip}/%{INT:orig_src_port}(\(%{DATA:orig_src_user}\))? dst %{IPORHOST:orig_dst_ip}/%{INT:orig_dst_port}(\(%{DATA:orig_dst_user}\))?
|
66
|
+
# ASA-4-313004
|
67
|
+
#CISCOASA338004 Denied ICMP type=%{INT:icmp_type}, from laddr %{IPORHOST:src_ip} on interface %{DATA:src_interface} to %{IPORHOST:dst_ip}: no matching session
|
50
68
|
# ASA-4-338004, ASA-4-338008
|
51
69
|
CISCOASA338004_338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: %{IPORHOST:blacklisted_ip}/%{IPORHOST:blacklisted_netmask}, threat-level: %{DATA:threat_level}, category: %{DATA:category}
|
52
70
|
# ASA-4-338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: 221.204.186.0/255.255.255.0, threat-level: very-high, category: admin-added
|
71
|
+
# ASA-6-338304
|
72
|
+
CISCOASA338304 Successfully downloaded dynamic filter data file from updater server %{DATA:url}
|
73
|
+
# ASA-4-400013
|
74
|
+
CISCOASA400013 IDS:2003 ICMP redirect from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
|
75
|
+
# ASA-4-400028
|
76
|
+
CISCOASA400028 IDS:3042 TCP FIN only flags from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
|
77
|
+
# ASA-4-400037
|
78
|
+
CISCOASA400037 IDS:6053 DNS all records request from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
|
53
79
|
# ASA-4-402117
|
54
80
|
CISCOASA402117 %{WORD:protocol}: Received a non-IPSec packet \(protocol= %{WORD:orig_protocol}\) from %{IP:src_ip} to %{IP:dst_ip}
|
55
81
|
# ASA-4-402119
|
56
82
|
CISCOASA402119 %{WORD:protocol}: Received an %{WORD:orig_protocol} packet \(SPI= %{DATA:spi}, sequence number= %{DATA:seq_num}\) from %{IP:src_ip} \(user= %{DATA:user}\) to %{IP:dst_ip} that failed anti-replay checking
|
83
|
+
# ASA-4-405104
|
84
|
+
CISCOASA405104 %{WORD:protocol} message %{DATA:voip_message} received from %{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_ip}(/%{INT:dst_port})? before SETUP
|
57
85
|
# ASA-4-419001
|
58
86
|
CISCOASA419001 %{CISCO_ASA_ACTION:action} %{WORD:protocol} packet from %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port}, reason: %{GREEDYDATA:reason}
|
59
87
|
# ASA-4-419002
|
60
88
|
CISCOASA419002 %{CISCO_ASA_REASON:reason} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} with different initial sequence number
|
61
89
|
# ASA-4-500004
|
62
90
|
CISCOASA500004 %{CISCO_ASA_REASON:reason} for protocol=%{WORD:protocol}, from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
|
91
|
+
# ASA-5-502103
|
92
|
+
CISCOASA502103 User priv level changed: Uname: %{DATA:user} From: %{INT:from_level} To: %{INT:to_level}
|
93
|
+
# ASA-4-507003
|
94
|
+
CISCOASA507003 %{WORD:protocol} flow from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} %{CISCO_ASA_ACTION:action} by inspection engine, reason - %{DATA:reason}?\.
|
63
95
|
# ASA-6-602303, ASA-6-602304
|
64
96
|
CISCOASA602303_602304 %{WORD:protocol}: An %{CISCO_ASA_DIRECTION:direction} %{GREEDYDATA:tunnel_type} SA \(SPI= %{DATA:spi}\) between %{IP:src_ip} and %{IP:dst_ip} \(user= %{DATA:user}\) has been %{CISCO_ASA_ACTION:action}
|
97
|
+
# ASA-6-605005
|
98
|
+
CISCOASA605005 Login permitted from %{IPORHOST:src_ip}/%{INT:src_port} %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{WORD:dst_port} for user "%{DATA:user}"
|
99
|
+
# ASA-6-607001
|
100
|
+
CISCOASA607001 Pre-allocate %{GREEDYDATA:protocol} secondary channel for %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? from %{DATA:voip_message} message
|
65
101
|
# ASA-7-609001, ASA-7-609002
|
66
102
|
CISCOASA609001_609002 %{CISCO_ASA_ACTION:action} local-host %{DATA:src_interface}:%{IPORHOST:src_ip}(?: duration %{TIME:duration})?
|
103
|
+
# ASA-6-611101
|
104
|
+
CISCOASA611101 User authentication succeeded: Uname: %{DATA:user}
|
67
105
|
# ASA-7-710001, ASA-7-710002, ASA-7-710003, ASA-7-710005, ASA-7-710006
|
68
106
|
CISCOASA710001_710002_710003_710005_710006_710007 %{WORD:protocol} (?:request|access|keepalive) %{CISCO_ASA_ACTION:action} from %{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{DATA:dst_port}
|
69
107
|
# ASA-6-713172
|
70
108
|
CISCOASA713172 Group = %{GREEDYDATA:group}, IP = %{IP:src_ip}, Automatic NAT Detection Status:\s+Remote end\s*%{DATA:is_remote_natted}\s*behind a NAT device\s+This\s+end\s*%{DATA:is_local_natted}\s*behind a NAT device
|
71
109
|
# ASA-7-713236
|
72
110
|
CISCOASA713236 IP = %{IPORHOST:src_ip}, IKE_DECODE %{CISCO_ASA_ACTION} Message \(msgid=%{DATA:msgid}\) with payloads : %{GREEDYDATA:payload} total length : %{INT:length}
|
111
|
+
# ASA-5-713257
|
112
|
+
CISCOASA713257 Phase %{DATA} failure: Mismatched attribute types for class %{DATA:vpn_class}: Rcv'd: %{DATA:vpn_rcvd} Cfg'd: %{DATA:vpn_cfgd}
|
113
|
+
# ASA-5-713904
|
114
|
+
CISCOASA713904 IP = %{IPORHOST:src_ip}, Received encrypted packet with no matching SA, %{CISCO_ASA_ACTION:action}
|
73
115
|
# ASA-7-713906
|
74
116
|
CISCOASA713906 IKE Receiver: Packet received on %{IPORHOST:dst_ip}:%{INT:dst_port} from %{IPORHOST:src_ip}:%{INT:src_port}
|
75
117
|
# ASA-7-715046
|
76
|
-
CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:
|
118
|
+
CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:user},)? IP = %{IP:src_ip},%{GREEDYDATA:vpn_action}
|
77
119
|
# ASA-4-733100
|
78
120
|
CISCOASA733100 \[\s*%{DATA:drop_type}\s*\] drop %{DATA:drop_rate_id} exceeded. Current burst rate is %{INT:drop_rate_current_burst} per second, max configured rate is %{INT:drop_rate_max_burst}; Current average rate is %{INT:drop_rate_current_avg} per second, max configured rate is %{INT:drop_rate_max_avg}; Cumulative total count is %{INT:drop_total_count}
|
121
|
+
# ASA-6-734001
|
122
|
+
CISCOASA734001 DAP: User %{DATA:user}, Addr %{IP:src_ip}, Connection %{DATA:protocol}: The following DAP records were selected for this connection: %{GREEDYDATA:policy_id}
|
123
|
+
# ASA-6-737006
|
124
|
+
CISCOASA737006 IPAA: Local pool request succeeded for tunnel-group '%{DATA:vpn_group}'
|
125
|
+
# ASA-6-737016
|
126
|
+
CISCOASA737016 IPAA: Freeing local pool address %{IP:src_ip}
|
127
|
+
# ASA-6-737026
|
128
|
+
CISCOASA737026 IPAA: Client assigned %{IP:src_ip} from local pool
|
129
|
+
# ASA-6-737029
|
130
|
+
CISCOASA737029 IPAA: Added %{IP:src_ip} to standby
|
131
|
+
# ASA-6-737031
|
132
|
+
CISCOASA737031 IPAA: Removed %{IP:src_ip} from standby
|
79
133
|
#== End Cisco ASA ==
|
@@ -0,0 +1,131 @@
|
|
1
|
+
"101": High Availability (Failover)
|
2
|
+
"102": High Availability (Failover)
|
3
|
+
"103": High Availability (Failover)
|
4
|
+
"104": High Availability (Failover)
|
5
|
+
"105": High Availability (Failover)
|
6
|
+
"106": Access Lists
|
7
|
+
"107": RIP Routing
|
8
|
+
"108": User Session
|
9
|
+
"109": User Authentication
|
10
|
+
"110": Transparent Firewall
|
11
|
+
"111": Command Interface
|
12
|
+
"112": Command Interface
|
13
|
+
"113": User Authentication
|
14
|
+
"120": Smart Call Home
|
15
|
+
"199": System
|
16
|
+
"201": User Session
|
17
|
+
"202": User Session
|
18
|
+
"204": User Session
|
19
|
+
"208": Command Interface
|
20
|
+
"209": IP Stack
|
21
|
+
"210": High Availability (Failover)
|
22
|
+
"211": System
|
23
|
+
"212": SNMP
|
24
|
+
"213": PPTP and L2TP Sessions
|
25
|
+
"214": System
|
26
|
+
"215": IP Stack
|
27
|
+
"216": System
|
28
|
+
"220": Transparent Firewall
|
29
|
+
"302": User Session
|
30
|
+
"303": User Session
|
31
|
+
"304": User Session
|
32
|
+
"305": NAT and PAT
|
33
|
+
"306": System
|
34
|
+
"307": System
|
35
|
+
"308": Command Interface
|
36
|
+
"311": High Availability (Failover)
|
37
|
+
"312": RIP Routing
|
38
|
+
"313": IP Stack
|
39
|
+
"314": User Session
|
40
|
+
"315": System
|
41
|
+
"316": IKE and IPSec
|
42
|
+
"317": IP Stack
|
43
|
+
"318": OSPF Routing
|
44
|
+
"319": Network Processor
|
45
|
+
"320": IKE and IPSec
|
46
|
+
"321": Resource Manager
|
47
|
+
"325": IPv6
|
48
|
+
"321": Resource Manager
|
49
|
+
"323": Card Management
|
50
|
+
"333": EAP or EAPoUDP for NAC
|
51
|
+
"334": EAP or EAPoUDP for NAC
|
52
|
+
"336": EIGRP Routing
|
53
|
+
"337": Phone Proxy
|
54
|
+
"338": Blacklists, Whitelists, and Graylists
|
55
|
+
"339": UC-IME
|
56
|
+
"400": Intrusion Protection System
|
57
|
+
"401": Intrusion Protection System
|
58
|
+
"402": IKE and IPSec
|
59
|
+
"403": PPTP and L2TP Sessions
|
60
|
+
"404": IKE and IPSec
|
61
|
+
"405": User Session
|
62
|
+
"406": User Session
|
63
|
+
"407": User Session
|
64
|
+
"408": IP Stack
|
65
|
+
"409": OSPF Routing
|
66
|
+
"414": System
|
67
|
+
"415": Application Firewall
|
68
|
+
"419": Intrusion Protection System
|
69
|
+
"420": Intrusion Protection System
|
70
|
+
"444": Licensing
|
71
|
+
"500": User Session
|
72
|
+
"501": IKE and IPSec
|
73
|
+
"502": User Session
|
74
|
+
"503": OSPF Routing
|
75
|
+
"505": System
|
76
|
+
"602": IKE and IPSec
|
77
|
+
"603": PPTP and L2TP Sessions
|
78
|
+
"604": System
|
79
|
+
"605": System
|
80
|
+
"606": System
|
81
|
+
"607": User Session
|
82
|
+
"608": User Session
|
83
|
+
"609": User Session
|
84
|
+
"610": System
|
85
|
+
"611": VPN Client
|
86
|
+
"612": System
|
87
|
+
"613": OSPF Routing
|
88
|
+
"614": System
|
89
|
+
"615": System
|
90
|
+
"616": User Session
|
91
|
+
"620": User Session
|
92
|
+
"701": System
|
93
|
+
"702": IKE and IPSec
|
94
|
+
"703": User Session
|
95
|
+
"709": High Availability (Failover)
|
96
|
+
"710": User Session
|
97
|
+
"711": System
|
98
|
+
"713": Network Access Point
|
99
|
+
"714": IKE and IPSec
|
100
|
+
"715": IKE and IPSec
|
101
|
+
"716": WebVPN Client
|
102
|
+
"717": PKI Certification Authority
|
103
|
+
"718": VPN Load Balancing
|
104
|
+
"719": E-mail Proxy
|
105
|
+
"720": VPN Failover
|
106
|
+
"721": WebVPN Failover
|
107
|
+
"722": SSL VPN Client
|
108
|
+
"723": Citrix Client
|
109
|
+
"724": Secure Desktop
|
110
|
+
"725": SSL Stack
|
111
|
+
"727": High Availability (Failover)
|
112
|
+
"728": Load Balancing
|
113
|
+
"730": VLAN Mapping
|
114
|
+
"731": NAC Policy
|
115
|
+
"732": NAC Settings to apply NAC Policy
|
116
|
+
"733": Threat Detection
|
117
|
+
"734": Dynamic Access Policies
|
118
|
+
"735": IP Address Assignment
|
119
|
+
"737": IP Address Assignment
|
120
|
+
"741": System
|
121
|
+
"742": Password Encryption
|
122
|
+
"746": Identity-based Firewall
|
123
|
+
"747": Clustering
|
124
|
+
"750": IKEv2 Toolkit
|
125
|
+
"751": IKEv2 Toolkit
|
126
|
+
"752": IKEv2 Toolkit
|
127
|
+
"775": ScanSafe
|
128
|
+
"776": Cisco TrustSec
|
129
|
+
"778": VXLAN
|
130
|
+
"779": Service Tag Switching
|
131
|
+
"802": MDM Proxy
|
@@ -0,0 +1,82 @@
|
|
1
|
+
AUTHMGR: Authentication manager
|
2
|
+
ACLMGR: ACL manager
|
3
|
+
BACKUP_INTERFACE: Flex Links
|
4
|
+
BADTRANSCEIVER: Defective transceiver
|
5
|
+
BSPATCH: Boot loader patch
|
6
|
+
CFGMGR: Configuration manager
|
7
|
+
CLS_ACC: Consoleless access
|
8
|
+
CMP: Cluster Membership Protocol
|
9
|
+
DHCP_SNOOPING: DHCP snooping
|
10
|
+
DOT1X: 802.1x
|
11
|
+
DOT1X_SWITCH: 802.1x for switches
|
12
|
+
DTP: Dynamic Trunking Protocol
|
13
|
+
DWL: Down-when-looped
|
14
|
+
EC: EtherChannel
|
15
|
+
ENVIRONMENT: Environment Messages
|
16
|
+
EPM: Enforcement Policy Module
|
17
|
+
ETHCNTR: Ethernet controller
|
18
|
+
EXPRESS_SETUP: Express Setup
|
19
|
+
FRNTEND_CTRLR: Front-end controller
|
20
|
+
GBIC_SECURITY: GBIC and SFP module security
|
21
|
+
GBIC_SECURITY_CRYPT: GBIC and SFP module security
|
22
|
+
GBIC_SECURITY_UNIQUE: GBIC and SFP module security
|
23
|
+
HARDWARE: Hardware
|
24
|
+
LFM: Local forwarding manager
|
25
|
+
HPSECURE: Port security
|
26
|
+
HULC_LICENSE: Licensing
|
27
|
+
IFMGR: Interface manager
|
28
|
+
IGMP_QUERIER: IGMP querier
|
29
|
+
ILET: Cisco IOS License Enforcement Test
|
30
|
+
ILPOWER: PoE
|
31
|
+
IMAGEMGR: Image manager
|
32
|
+
IP: Internet Protocol
|
33
|
+
IP_DEVICE_TRACKING: IP device tracking
|
34
|
+
KEYMAN: Keyman Messages
|
35
|
+
MAC_MOVE: Host activity
|
36
|
+
PAGP: Port Aggregation Protocol
|
37
|
+
PHY: PHY
|
38
|
+
PIMSN: PIM snooping
|
39
|
+
PLATFORM: Low-level platform-specific
|
40
|
+
PLATFORM_SM10G: Platform FRULink 10G Service Module
|
41
|
+
PLATFORM_ENV: Platform environment
|
42
|
+
PLATFORM_FBM: Platform fallback bridging manager
|
43
|
+
PLATFORM_HCEF: Cisco Express Forwarding
|
44
|
+
PLATFORM_HPLM: Platform pseudo-label manager
|
45
|
+
PLATFORM_IPC: Platform Interprocess Communication Protocol
|
46
|
+
PLATFORM_IPv6_UCAST: IP Version 6 Unicast
|
47
|
+
PLATFORM_PBR: Platform policy-based routing
|
48
|
+
PLATFORM_PM: Platform port manager
|
49
|
+
PLATFORM_RPC: Platform remote procedure call
|
50
|
+
PLATFORM_SPAN: Platform switched port analyzer
|
51
|
+
PLATFORM_STACKPOWER: Platform stack power
|
52
|
+
PLATFORM_UCAST: Platform unicast routing
|
53
|
+
PLATFORM_VLAN: Platform VLAN
|
54
|
+
PLATFORM_WCCP: Platform WCCP
|
55
|
+
PM: Port manager
|
56
|
+
PORT_SECURITY: Port security
|
57
|
+
POWERNET_ISSU: EnergyWise domain
|
58
|
+
PT: Protocol tunneling
|
59
|
+
QOSMGR: QoS manager
|
60
|
+
RMON: Remote Network Monitoring (RMON)
|
61
|
+
SCHED: Schedule
|
62
|
+
SDM: Switch Database Manager
|
63
|
+
SESA: SESA
|
64
|
+
SPAN: Switched port analyzer
|
65
|
+
SPANTREE: Spanning tree
|
66
|
+
SPANTREE_FAST: Spanning-tree fast convergence
|
67
|
+
SPANTREE_VLAN_SW: Spanning-tree VLAN switch
|
68
|
+
STACKMGR: Stack manager
|
69
|
+
STORM_CONTROL: Storm control
|
70
|
+
SUPERVISOR: Supervisor ASIC
|
71
|
+
SUPQ: Supervisor queue
|
72
|
+
SW_DAI: Dynamic ARP inspection
|
73
|
+
SW_MACAUTH: MAC address authentication
|
74
|
+
SW_MATM: MAC address table manager
|
75
|
+
SW_VLAN: VLAN manager
|
76
|
+
SW_QOS_TB: QoS trusted boundary
|
77
|
+
TCAMMGR: Ternary content addressable memory manager
|
78
|
+
UDLD: UniDirectional Link Detection
|
79
|
+
UFAST_MCAST_SW: UplinkFast packet transmission
|
80
|
+
VLMAPLOG: VLAN Access Map Logs
|
81
|
+
VQPCLIENT: VLAN Query Protocol client
|
82
|
+
WCCP: WCCP
|
data/logstash-input-sdee.gemspec
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
Gem::Specification.new do |s|
|
2
2
|
s.name = 'logstash-input-sdee'
|
3
|
-
s.version = '0.
|
3
|
+
s.version = '0.7.0'
|
4
4
|
s.date = '2016-08-14'
|
5
5
|
s.summary = "Logstah SDEE input from Cisco ASA"
|
6
6
|
s.description = "This Logstash input plugin allows you to call a Cisco SDEE/CIDEE HTTP API, decode the output of it into event(s), and send them on their merry way."
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: logstash-input-sdee
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.7.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- rootik
|
@@ -102,8 +102,12 @@ files:
|
|
102
102
|
- Gemfile
|
103
103
|
- LICENSE
|
104
104
|
- README.md
|
105
|
+
- examples/10-inputs.conf
|
106
|
+
- examples/20-filter.conf
|
107
|
+
- examples/30-outputs.conf
|
105
108
|
- examples/patterns/cisco
|
106
|
-
- examples/
|
109
|
+
- examples/patterns/cisco.dictionary
|
110
|
+
- examples/patterns/cisco.facility
|
107
111
|
- lib/logstash/inputs/sdee.rb
|
108
112
|
- logstash-input-sdee.gemspec
|
109
113
|
homepage: http://rubygems.org/gems/logstash-input-sdee
|