Thank you!
It works, looks like this was copy&paste problem
Anyway, I can't understand why it works in debugger and does not work in logstash.
Yet another example, firepower module:
<46>Oct 5 05:05:33 firepower-mts SFIMS: Protocol: TCP, SrcIP: 192.168.42.131, OriginalClientIP: 127.0.0.1, DstIP: 148.251.159.22, SrcPort: 50084, DstPort: 80, TCPFlags: 0x0, IngressInterface: inside, EgressInterface: outside, IngressZone: inside, EgressZone: outside, DE: Primary Detection Engine (52b0a118-69b8-11e8-b8c9-b6b1432be13e), Policy: Default Allow All Traffic, ConnectType: End, AccessControlRuleName: url filtering, AccessControlRuleAction: Block with reset, Prefilter Policy: Unknown, UserName: No Authentication Required, UserAgent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0, Client: Firefox, ClientVersion: 62.0, ApplicationProtocol: HTTP, WebApplication: Squid, InitiatorPackets: 3, ResponderPackets: 1, InitiatorBytes: 694, ResponderBytes: 74, NAPPolicy: Balanced Security and Connectivity, DNSResponseType: No Error, Sinkhole: Unknown, ReferencedHost: rbnt.org, URLCategory: Malware Sites, URLReputation: High risk, URL: http://rbnt.org/
%{POSINT:syslog_pri}>%{SYSLOGTIMESTAMP:timestamp} %{HOSTNAME:host} %{WORD:blockedReason}: Protocol: %{WORD:protocol}, SrcIP: %{IP:srcIP}, OriginalClientIP: (?[^,]), DstIP: %{IP:dstIP}, SrcPort: %{NUMBER:srcPort}, DstPort: %{NUMBER:dstPort}, TCPFlags: %{WORD:tcpFlags}, IngressInterface: %{WORD:ingressINT}, EgressInterface: %{WORD:egressINT}, IngressZone: %{WORD:ingressZone}, EgressZone: %{WORD:egressZone}, DE: (?[^,]), Policy: (?[^,]), ConnectType: %{WORD:ConnectType}, AccessControlRuleName: (?[^,]), AccessControlRuleAction: (?[^,]), Prefilter Policy: %{WORD:PrefilterPolicy}, UserName: (?[^,]), UserAgent: (?[^,]), Client: (?[^,]), ClientVersion: (?[^,]), ApplicationProtocol: %{WORD:appProtocol}, WebApplication: %{WORD:WebApplication}, InitiatorPackets: %{NUMBER:initPackets}, ResponderPackets: %{NUMBER:respPackets}, InitiatorBytes: %{NUMBER:initBytes}, ResponderBytes: %{NUMBER:respondBytes}, NAPPolicy: (?[^,]), DNSResponseType: (?[^,]), Sinkhole: %{WORD:sinkhole}, ReferencedHost: (?[^,]), URLCategory: (?[^,]), URLReputation: (?[^,]), URL: %{URI:URL}
I get in Kibana Grok Debugger:
{
"Policy": "Default Allow All Traffic",
"DE": "Primary Detection Engine (52b0a118-69b8-11e8-b8c9-b6b1432be13e)",
"srcIP": "192.168.42.131",
"PrefilterPolicy": "Unknown",
"NAPPolicy": "Balanced Security and Connectivity",
"AccessControlRuleAction": "Block with reset",
"respondBytes": "74",
"appProtocol": "HTTP",
"srcPort": "50084",
"respPackets": "1",
"ClientVersion": "62.0",
"sinkhole": "Unknown",
"URLCategory": "Malware Sites",
"URL": "http://rbnt.org/",
"ConnectType": "End",
"protocol": "TCP",
"dstPort": "80",
"host": "firepower-mts",
"UserAgent": "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0",
"ReferencedHost": "rbnt.org",
"dstIP": "148.251.159.22",
"tcpFlags": "0x0",
"egressZone": "outside",
"Client": "Firefox",
"WebApplication": "Squid",
"syslog_pri": "46",
"timestamp": "Oct 5 05:05:33",
"UserName": "No Authentication Required",
"blockedReason": "SFIMS",
"URLReputation": "High risk",
"initPackets": "3",
"DNSResponseType": "No Error",
"ingressINT": "inside",
"initBytes": "694",
"egressINT": "outside",
"ingressZone": "inside",
"AccessControlRuleName": "url filtering",
"OriginalClientIP": "127.0.0.1"
}
But "tags": [
"_grokparsefailure"
],
in logstash.
Could you, please, tell me how can I find error if debugger shows everything is fine?
Thank you!