I want to parse a firewall syslog stream.
Depends on firewall action the syslog message field contains additional information like the outbound interface or the service-name of well known ports or not.
I have three examples:
|10.15.40.25|443|http-s|p3|Allow-443|
|10.15.40.25|53|dns|53||BLOCKALL|
|10.15.40.25|60000|||BLOCKALL|
Do I need for each type a single gork filter (like below) and how I have to configure the gork filter finaly.
|%{IPV4:Dst-IP}|%{INT:Dst-Port}|%{USERNAME:Dst-Service}|%{WORD:Dst-Inf}|%{WORD:Rule-Name}
|%{IPV4:Dst-IP}|%{INT:Dst-Port}|%{USERNAME:Dst-Service}||%{WORD:Rule-Name}
|%{IPV4:Dst-IP}|%{INT:Dst-Port}|||%{WORD:Rule-Name}
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.