I may be wrong, but that looks like a fortinet/fortigate log. Have you 
tried looking at the fortigate stuff available in the marketplace for some 
examples?

https://marketplace.graylog.org/addons/a91344aa-fced-4d1a-928d-f3ded6e5a2f8
https://marketplace.graylog.org/addons/d41d3728-4722-4de6-b697-71efa579c4e2

I create extractors that will run on the input where the expected logs will 
flow in.
What I do to match the src ip is this
srcip="?([0-9.]+)

What I do to match the dst ip is this
dstip="?([0-9.]+)

Regards,
Brandon

On Thursday, December 8, 2016 at 1:06:59 PM UTC-6, Martin Germano wrote:
>
>
>   Maybe, ok i'll try it. Later i will post the expression if i get it.
>
> Thanks.
>
> On Thursday, December 8, 2016 at 1:58:27 PM UTC-3, Jochen Schalanda wrote:
>>
>> Hi Martin,
>>
>> your regular expression has to work with Java's regular expression engine.
>>
>> You can use http://www.regexplanet.com/advanced/java/index.html to 
>> fiddle around with the regular expression and your message.
>>
>> Cheers,
>> Jochen
>>
>> On Thursday, 8 December 2016 17:36:24 UTC+1, Martin Germano wrote:
>>>
>>>
>>>   Hi Jochen, for example this msg:
>>>
>>> "date=2016-12-07 time=17:43:01 logid=0262034961 type=utm* subtype=virus* 
>>> eventtype=scanerror level=notice vd="root" *msg="File* reached 
>>> uncompressed size limit." action=monitored service=HTTP sessionid=3723464* 
>>> srcip=1.1.1.1 dstip=2.2.2.2* srcport=17633 dstport=80 srcintf="port1" 
>>> dstintf="port2" proto=6 direction=incoming 
>>> filename="2017-calendar-template.zip" quarskip=No-skip url="
>>> http://downloadscdn3.freepik.com/d/911040/1107/1/212/2017-calendar-template.zip?ttl=1481143658&token=24b45d89f0dbd3e92d1fe274ff03cb87";
>>>  
>>> profile="default" user="" agent="Mozilla/5.0" 
>>> analyticscksum="f08144093ffdea250ba225babade9e25e5e9f399dd93bdc21fa9b5fd49efc050"
>>>  
>>> analyticssubmit=false crscore=50 crlevel=critical"
>>>
>>> i put in bold letters all matches.
>>>
>>> Regex: 
>>> (srcip=)|(dstip=)|(subtype=virus)|(attack=[^\s]+)|(msg=[^\s]+)|(\d{*.}\d)|\b(?:\d{1,3}\.){3}\d{1,3}
>>>
>>> i use this online software: http://regexr.com/
>>>
>>>
>>>
>>> Thanks.
>>>   
>>>
>>>
>>> On Thursday, December 8, 2016 at 7:25:44 AM UTC-3, Jochen Schalanda 
>>> wrote:
>>>>
>>>> Hi Martin,
>>>>
>>>> which message should be matched by this regular expression and what 
>>>> should be the result in your opinion?
>>>>
>>>> It looks a bit strange to me.
>>>>
>>>> Cheers,
>>>> Jochen
>>>>
>>>> On Wednesday, 7 December 2016 22:33:42 UTC+1, Martin Germano wrote:
>>>>>
>>>>>
>>>>>   Hi all, i newby on Graylog:
>>>>>
>>>>>   I try to get works this regex:
>>>>>
>>>>>
>>>>>> (srcip=)|(dstip=)|(subtype=virus)|(attack=[^\s]+)|(msg=[^\s]+)|(\d{*.}\d)|\b(?:\d{1,3}\.){3}\d{1,3}
>>>>>>
>>>>>   
>>>>>   I get this error:
>>>>>   
>>>>> *Could not try regular expression. Make sure that it is valid.*
>>>>>
>>>>> *Details: Error: cannot POST 
>>>>> http://10.10.10.10:13900/tools/regex_tester 
>>>>> <http://10.10.10.10:13900/tools/regex_tester> (500)*
>>>>>
>>>>>   But, when i get test on this on line tool, works fine.
>>>>>
>>>>>   https://regex101.com/  (java script)
>>>>>
>>>>>   Any ideas?!
>>>>>   Thanks.
>>>>>   
>>>>>
>>>>>
>>>>>
>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/graylog2/c188ebd3-46a2-4150-8cac-75b656b68975%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to