I am unable to parse certain JSON messages

Hey there,

In fact I found the issue. Even though my message in Json format its not being tagged or parsed correctly. Not sure why and would really appreciate if someone can help me on this. Initially I thought my issue is resolved but message is not being parsed correctly. what I notice is - It is not able to parse the messages section.
Here is my original Message -

{"transaction":{"client_ip":"192.168.5.76","time_stamp":"Thu Apr  2 10:13:46 2020","server_id":"023a162ad8c7afb2e1d2db424a6741ad78f46987","client_port":56357,"host_ip":"192.168.5.181","host_port":80,"unique_id":"158580262648.434183","request":{"method":"GET","http_version":1.1,"uri":"/submitPhp?submit=../../../var/www","headers":{"Host":"192.168.5.181","Connection":"keep-alive","DNT":"1","User-Agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36","Upgrade-Insecure-Requests":"1","Accept":"text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9","Accept-Encoding":"gzip, deflate","Accept-Language":"en-GB,en-US;q=0.9,en;q=0.8,hi;q=0.7"}},"response":{"body":"<html>\r\n<head><title>403 Forbidden</title></head>\r\n<body>\r\n<center><h1>403 Forbidden</h1></center>\r\n<hr><center>nginx/1.17.9</center>\r\n</body>\r\n</html>\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n","http_code":403,"headers":{"Server":"nginx/1.17.9","Date":"Thu, 02 Apr 2020 04:43:46 GMT","Content-Length":"555","Content-Type":"text/html","Connection":"keep-alive"}},"producer":{"modsecurity":"ModSecurity v3.0.4 (Linux)","connector":"ModSecurity-nginx v1.0.1","secrules_engine":"Enabled","components":["OWASP_CRS/3.0.2\""]},"messages":[{"message":"Host header is a numeric IP address","details":{"match":"Matched \"Operator `Rx' with parameter `^[\\d.:]+$' against variable `REQUEST_HEADERS:Host' (Value: `192.168.5.181' )","reference":"o0,13v54,13","ruleId":"920350","file":"/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf","lineNumber":"777","data":"192.168.5.181","severity":"4","ver":"OWASP_CRS/3.0.0","rev":"2","tags":["application-multi","language-multi","platform-multi","attack-protocol","OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST","WASCTC/WASC-21","OWASP_TOP_10/A7","PCI/6.5.10"],"maturity":"9","accuracy":"9"}},{"message":"Path Traversal Attack (/../)","details":{"match":"Matched \"Operator `Rx' with parameter `(?i)(?:\\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5 (400 characters omitted)' against variable `REQUEST_URI_RAW' (Value: `/submitPhp?submit=../../../var/www' )","reference":"o20,4v4,34","ruleId":"930100","file":"/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf","lineNumber":"29","data":"Matched Data: /../ found within REQUEST_URI_RAW: /submitPhp?submit=../../../var/www","severity":"2","ver":"OWASP_CRS/3.0.0","rev":"3","tags":["application-multi","language-multi","platform-multi","attack-lfi","OWASP_CRS/WEB_ATTACK/DIR_TRAVERSAL"],"maturity":"9","accuracy":"7"}},{"message":"Path Traversal Attack (/../)","details":{"match":"Matched \"Operator `Pm' with parameter `..\\ ../' against variable `REQUEST_URI' (Value: `/submitPhp?submit=../../../var/www' )","reference":"o18,3v4,34","ruleId":"930110","file":"/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf","lineNumber":"55","data":"Matched Data: ../ found within REQUEST_URI: /submitPhp?submit=../../../var/www","severity":"2","ver":"OWASP_CRS/3.0.0","rev":"1","tags":[],"maturity":"9","accuracy":"7"}},{"message":"Path Traversal Attack (/../)","details":{"match":"Matched \"Operator `Pm' with parameter `..\\ ../' against variable `REQUEST_URI' (Value: `/submitPhp?submit=../../../var/www' )","reference":"o18,3v4,34t:cmdLine","ruleId":"930110","file":"/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf","lineNumber":"55","data":"Matched Data: ../ found within REQUEST_URI: /submitphp?submit=../../../var/www","severity":"2","ver":"OWASP_CRS/3.0.0","rev":"1","tags":[],"maturity":"9","accuracy":"7"}},{"message":"Inbound Anomaly Score Exceeded (Total Score: 18)","details":{"match":"Matched \"Operator `Ge' with parameter `5' against variable `TX:ANOMALY_SCORE' (Value: `18' )","reference":"","ruleId":"949110","file":"/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-949-BLOCKING-EVALUATION.conf","lineNumber":"44","data":"","severity":"2","ver":"","rev":"","tags":["application-multi","language-multi","platform-multi","attack-generic"],"maturity":"0","accuracy":"0"}}]}}

And here is message copied from Kibana

{
  "_index": "logstash-2020.04.01-000001",
  "_type": "_doc",
  "_id": "oDAzOXEBYWrV-uU8y5w8",
  "_version": 1,
  "_score": null,
  "_source": {
    "transaction": {
      "response": {
        "http_code": 403,
        "headers": {
          "Server": "nginx/1.17.9",
          "Content-Length": "555",
          "Connection": "keep-alive",
          "Date": "Thu, 02 Apr 2020 04:43:46 GMT",
          "Content-Type": "text/html"
        },
        "body": "<html>\r\n<head><title>403 Forbidden</title></head>\r\n<body>\r\n<center><h1>403 Forbidden</h1></center>\r\n<hr><center>nginx/1.17.9</center>\r\n</body>\r\n</html>\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n<!-- a padding to disable MSIE and Chrome friendly error page -->\r\n"
      },
      "request": {
        "method": "GET",
        "uri": "/submitPhp?submit=../../../var/www",
        "headers": {
          "Accept-Language": "en-GB,en-US;q=0.9,en;q=0.8,hi;q=0.7",
          "Connection": "keep-alive",
          "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
          "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36",
          "DNT": "1",
          "Host": "192.168.5.181",
          "Accept-Encoding": "gzip, deflate",
          "Upgrade-Insecure-Requests": "1"
        },
        "http_version": 1.1
      },
      "host_port": 80,
      "producer": {
        "connector": "ModSecurity-nginx v1.0.1",
        "secrules_engine": "Enabled",
        "components": [
          "OWASP_CRS/3.0.2\""
        ],
        "modsecurity": "ModSecurity v3.0.4 (Linux)"
      },
      "server_id": "023a162ad8c7afb2e1d2db424a6741ad78f46987",
      "messages": [
        {
          "message": "Host header is a numeric IP address",
          "details": {
            "data": "192.168.5.181",
            "lineNumber": "777",
            "ver": "OWASP_CRS/3.0.0",
            "accuracy": "9",
            "match": "Matched \"Operator `Rx' with parameter `^[\\d.:]+$' against variable `REQUEST_HEADERS:Host' (Value: `192.168.5.181' )",
            "tags": [
              "application-multi",
              "language-multi",
              "platform-multi",
              "attack-protocol",
              "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST",
              "WASCTC/WASC-21",
              "OWASP_TOP_10/A7",
              "PCI/6.5.10"
            ],
            "severity": "4",
            "reference": "o0,13v54,13",
            "ruleId": "920350",
            "file": "/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf",
            "rev": "2",
            "maturity": "9"
          }
        },
        {
          "message": "Path Traversal Attack (/../)",
          "details": {
            "data": "Matched Data: /../ found within REQUEST_URI_RAW: /submitPhp?submit=../../../var/www",
            "lineNumber": "29",
            "ver": "OWASP_CRS/3.0.0",
            "accuracy": "7",
            "match": "Matched \"Operator `Rx' with parameter `(?i)(?:\\x5c|(?:%(?:c(?:0%(?:[2aq]f|5c|9v)|1%(?:[19p]c|8s|af))|2(?:5(?:c(?:0%25af|1%259c)|2f|5c)|%46|f)|(?:(?:f(?:8%8)?0%8|e)0%80%a|bg%q)f|%3(?:2(?:%(?:%6|4)6|F)|5%%63)|u(?:221[56]|002f|EFC8|F025)|1u|5 (400 characters omitted)' against variable `REQUEST_URI_RAW' (Value: `/submitPhp?submit=../../../var/www' )",
            "tags": [
              "application-multi",
              "language-multi",
              "platform-multi",
              "attack-lfi",
              "OWASP_CRS/WEB_ATTACK/DIR_TRAVERSAL"
            ],
            "severity": "2",
            "reference": "o20,4v4,34",
            "ruleId": "930100",
            "file": "/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf",
            "rev": "3",
            "maturity": "9"
          }
        },
        {
          "message": "Path Traversal Attack (/../)",
          "details": {
            "data": "Matched Data: ../ found within REQUEST_URI: /submitPhp?submit=../../../var/www",
            "lineNumber": "55",
            "ver": "OWASP_CRS/3.0.0",
            "accuracy": "7",
            "match": "Matched \"Operator `Pm' with parameter `..\\ ../' against variable `REQUEST_URI' (Value: `/submitPhp?submit=../../../var/www' )",
            "tags": [],
            "severity": "2",
            "reference": "o18,3v4,34",
            "ruleId": "930110",
            "file": "/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf",
            "rev": "1",
            "maturity": "9"
          }
        },
        {
          "message": "Path Traversal Attack (/../)",
          "details": {
            "data": "Matched Data: ../ found within REQUEST_URI: /submitphp?submit=../../../var/www",
            "lineNumber": "55",
            "ver": "OWASP_CRS/3.0.0",
            "accuracy": "7",
            "match": "Matched \"Operator `Pm' with parameter `..\\ ../' against variable `REQUEST_URI' (Value: `/submitPhp?submit=../../../var/www' )",
            "tags": [],
            "severity": "2",
            "reference": "o18,3v4,34t:cmdLine",
            "ruleId": "930110",
            "file": "/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-930-APPLICATION-ATTACK-LFI.conf",
            "rev": "1",
            "maturity": "9"
          }
        },
        {
          "message": "Inbound Anomaly Score Exceeded (Total Score: 18)",
          "details": {
            "data": "",
            "lineNumber": "44",
            "ver": "",
            "accuracy": "0",
            "match": "Matched \"Operator `Ge' with parameter `5' against variable `TX:ANOMALY_SCORE' (Value: `18' )",
            "tags": [
              "application-multi",
              "language-multi",
              "platform-multi",
              "attack-generic"
            ],
            "severity": "2",
            "reference": "",
            "ruleId": "949110",
            "file": "/usr/local/owasp-modsecurity-crs-3.0.2/rules/REQUEST-949-BLOCKING-EVALUATION.conf",
            "rev": "",
            "maturity": "0"
          }
        }
      ],
      "time_stamp": "Thu Apr  2 10:13:46 2020",
      "host_ip": "192.168.5.181",
      "unique_id": "158580262648.434183",
      "client_ip": "192.168.5.76",
      "client_port": 56357
    },
    "host": "gw",
    "type": "json",
    "@timestamp": "2020-04-02T04:43:47.787Z",
    "path": "/var/log/modsec_audit.log",
    "@version": "1"
  },
  "fields": {
    "@timestamp": [
      "2020-04-02T04:43:47.787Z"
    ]
  },
  "sort": [
    1585802627787
  ]
}