I have been beating my head on this for a while. My syslog is hitting my if statement and using the columns I have below but they are off by one. I tried adding/removing the first column to account for the shift but it doubles my error somehow. Is there something silly that I am doing wrong here?
(Column reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/monitoring/use-syslog-for-monitoring/syslog-field-descriptions/threat-log-fields.html)
if ([message] =~ /THREAT/) {
csv {
source => "message"
columns => [
"FUTUREUSE", "ReceiveTime", "SerialNumber", "Type", "Threat/ContentType", "FUTUREUSE",
"GeneratedTime", "SourceAddress", "DestinationIP", "NATSourceIP", "NATDestinationIP",
"RuleName", "SourceUser", "DestinationUser", "Application", "VirtualSystem", "SourceZone",
"DestinationZone", "InboundInterface", "OutboundInterface", "LogAction", "FUTUREUSE",
"SessionID", "RepeatCount", "SourcePort", "DestinationPort", "NATSourcePort",
"NATDestinationPort", "Flags", "Protocol", "Action", "URL/Filename", "ThreatID",
"Category", "Severity", "Direction", "SequenceNumber", "ActionFlags", "SourceLocation",
"DestinationLocation", "FUTUREUSE", "ContentType", "PCAP_ID", "FileDigest", "Cloud",
"URLIndex", "User Agent", "FileType", "X-Forwarded-For", "Referer", "Sender", "Subject",
"Recipient", "ReportID", "DeviceGroupHierarchyLevel1", "DeviceGroupHierarchyLevel2",
"DeviceGroupHierarchyLevel3", "DeviceGroupHierarchyLevel4", "VirtualSystemName",
"DeviceName", "FUTUREUSE", "SourceVMUUID", "DestinationVMUUID", "HTTPMethod",
"TunnelID/IMSI", "MonitorTag/IMEI", "ParentSessionID", "ParentStartTime", "TunnelType",
"ThreatCategory", "ContentVersion", "FUTUREUSE", "SCTPAssociationID", "PayloadProtocolID",
"HTTPHeaders", "URLCategoryList", "UUIDforrule", "HTTP/2Connection"
]
}
Output in ElasticSearch showing SerialNumber mapped to Type