With pipeline rules you can do that for sure.

I made a rule like this:

*rule "Security"*
*when*
*    has_field("Channel") && (contains(to_string($message.Channel), 
"Security")) *
*then*
*    set_field("tag", "Security");*
*end*

Add the rule to a pipeline, on stage 0, then connect the pipeline to any 
stream and it will tag your messages accordingly.

Just have a look at the pipeline rules howto and use the cidr part.
http://docs.graylog.org/en/2.1/pages/pipelines/rules.html

based on this I would do:

*rule "from firewall subnet" *
*when *
*     cidr_match("10.10.10.0/24", to_ip($message.gl2_remote_ip)) *


*then    set_field("tag", "Firewall");end*

Attached you can see how I tag some messages in the NXLog output section. 
In case you are using NXLog with sidecar-collector, simply add the code as 
a verbatim configuration to the given output.
The tagging will happen on the clients - reducing the load on the server. 

On Tuesday, 31 January 2017 20:48:02 UTC+1, Joe G wrote:
>
> If I have numerous streams (i.e. one for linux, one for networking, etc), 
> can I tag them somehow based on the IP CIDR of the sending devices so I can 
> use a tag such as site or region to filter my traffic?
>

-- 
You received this message because you are subscribed to the Google Groups 
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/graylog2/af278eb3-8271-4f29-8f2c-50fa45d13163%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
#this configuration deletes the computer account logins 
        Exec if ($EventID == 4624 or $EventID == 4634  or $EventID == 4678) and 
($EventType == "AUDIT_SUCCESS")        \
                {                                               \
                    if $TargetUserName =~ /.\$/ {               \
                        $raw_event = "Time:" + $EventTime + ", EventID:" + 
$EventID + ", LogonType:" + $LogonType + ", User:" + $TargetDomainName + "\\" + 
$TargetUserName + ", IPAddr:" + $IPAddress + "\n"; \
                        file_write("C:\\Program Files 
(x86)\\nxlog\data\\security_drop.log",  $raw_event);\
                        drop();                                 \
                    }                                           \
                }
        Exec $tag = 'PCI-DSS';
#this configuration tags the PCI-DSS related messages 
        Exec if $EventID == 1102 {$action = 'Log Clear';}
        Exec if $EventID == 4608 {$action = 'Windows Start';}
        Exec if $EventID == 4609 {$action = 'Windows Shutdown';}
        Exec if $EventID == 4610 {$action = 'An authentication package was 
loaded by the Local Security Authority.';}
        Exec if $EventID == 4611 {$action = 'A trusted logon process has 
registered with the Local Security Authority.';}
        Exec if $EventID == 4612 {$action = 'Internal resources allocated for 
the queuing of security event messages have been exhausted, leading to the loss 
of some security event messages.';}
        Exec if $EventID == 4614 {$action = 'A notification package was loaded 
by the Security Accounts Manager';}
        Exec if $EventID == 4616 {$action = 'Server time out of synchronization 
with Domain Controller';}
        Exec if $EventID == 4624 {$action = 'Successful Logon (on DC)';}
        Exec if $EventID == 4625 {$action = 'Failed Logon attempts – All 
users';}
        Exec if $EventID == 4634 {$action = 'logoff';}
        Exec if $EventID == 4647 {$action = 'logoff initiated';}
        Exec if $EventID == 4657 {$action = 'A registry value was 
modified(System Level Object)';}
        Exec if $EventID == 4660 {$action = 'Creation or deletion of files in 
folders containing Cardholder Data';}
        Exec if $EventID == 4663 {$action = 'All access to files containing 
Cardholder Data';}
        Exec if $EventID == 4670 {$action = 'Changes to access privileges or 
ownership on folders containing Cardholder Data';}
        Exec if $EventID == 4674 {$action = 'Privilege use (Failure only) for 
the following user groups: Accounts (User, service or process) with access to 
Cardholder Data';}
        Exec if $EventID == 4697 {$action = 'A service was installed in the 
system.';}
        Exec if $EventID == 4720 {$action = 'User Account Created';}
        Exec if $EventID == 4722 {$action = 'User Account Enabled';}
        Exec if $EventID == 4723 {$action = 'User changed own password';}
        Exec if $EventID == 4724 {$action = 'Password Reset';}
        Exec if $EventID == 4725 {$action = 'Disable Account';}
        Exec if $EventID == 4726 {$action = 'User Account Deleted';}
        Exec if $EventID == 4727 {$action = 'Global Security Group Created';}
        Exec if $EventID == 4728 {$action = 'Global Security Group Member 
added';}
        Exec if $EventID == 4729 {$action = 'Global Security Group Member 
removed';}
        Exec if $EventID == 4730 {$action = 'Global Security Group Deleted';}
        Exec if $EventID == 4731 {$action = 'Local Security Group Created';}
        Exec if $EventID == 4732 {$action = 'Local Security Group Member 
added';}
        Exec if $EventID == 4733 {$action = 'Local Security Group Member 
removed';}
        Exec if $EventID == 4734 {$action = 'Local Security Group Deleted';}
        Exec if $EventID == 4735 {$action = 'A local security group was 
changed';}
        Exec if $EventID == 4737 {$action = 'A global security group was 
changed.';}
        Exec if $EventID == 4738 {$action = 'User Account Changed (password 
set)';}
        Exec if $EventID == 4740 {$action = 'Account Lockouts – All users';}
        Exec if $EventID == 4741 {$action = 'A computer account was created.';}
        Exec if $EventID == 4742 {$action = 'A computer account was changed.';}
        Exec if $EventID == 4743 {$action = 'A computer account was deleted.';}
        Exec if $EventID == 4744 {$action = 'Local Distribution group created';}
        Exec if $EventID == 4745 {$action = 'Local Distribution group changed';}
        Exec if $EventID == 4746 {$action = 'Local Distribution group member 
added';}
        Exec if $EventID == 4747 {$action = 'Local Distribution group member 
removed';}
        Exec if $EventID == 4748 {$action = 'Local Distribution group deleted';}
        Exec if $EventID == 4749 {$action = 'Global Distribution Group 
created';}
        Exec if $EventID == 4750 {$action = 'Global Distribution Group 
changed';}
        Exec if $EventID == 4751 {$action = 'Global Distribution Group member 
added';}
        Exec if $EventID == 4752 {$action = 'Global Distribution Group member 
removed';}
        Exec if $EventID == 4753 {$action = 'Global Distribution Group 
deleted';}
        Exec if $EventID == 4754 {$action = 'A universal security group was 
created.';}
        Exec if $EventID == 4755 {$action = 'A universal security group was 
changed';}
        Exec if $EventID == 4756 {$action = 'A universal security group member 
added';}
        Exec if $EventID == 4757 {$action = 'A universal security group member 
removed';}
        Exec if $EventID == 4758 {$action = 'A security-enabled universal group 
was deleted.';}
        Exec if $EventID == 4759 {$action = 'Universal Deistribution Group 
Created';}
        Exec if $EventID == 4760 {$action = 'Universal Deistribution Group 
Changed';}
        Exec if $EventID == 4761 {$action = 'Universal Deistribution Group 
Member added';}
        Exec if $EventID == 4762 {$action = 'Universal Deistribution Group 
Member removed';}
        Exec if $EventID == 4763 {$action = 'Universal Deistribution Group 
Deleted';}
        Exec if $EventID == 4764 {$action = 'A group’s type was changed.';}
        Exec if $EventID == 4767 {$action = 'Account Lockout Release – All 
users';}
        Exec if $EventID == 4768 {$action = 'Authentication Request (logged on 
the DC)';}
        Exec if $EventID == 4771 {$action = 'Kerberos Pre-authentication 
failed';}
        Exec if $EventID == 4772 {$action = 'Kerberos Authentication ticket 
request failed';}
        Exec if $EventID == 4776 {$action = 'Account Logon (with a local 
Computer account)';}
        Exec if $EventID == 4778 {$action = 'Remote desktop Session 
Reconnected';}
        Exec if $EventID == 4779 {$action = 'Remote desktop Session 
Disconnected';}
        Exec if $EventID == 4781 {$action = 'Userr account name changed';}
        Exec if $EventID == 4800 {$action = 
'Source:Microsoft-Windows-Security-Auditing,The workstation was locked.';}
        Exec if $EventID == 4801 {$action = 
'Source:Microsoft-Windows-Security-Auditing,The workstation was unlocked.';}
        Exec if $EventID == 4802 {$action = 'Screen Saver invoked';}
        Exec if $EventID == 4803 {$action = 'Screen Saver dismissed';}
        Exec if $EventID == 5136 {$action = 
'Source:Microsoft-Windows-Security-Auditing,A directory service object was 
modified.';}
        Exec if $EventID == 5137 {$action = 'A directory service object was 
created.';}
        Exec if $EventID == 5141 {$action = 'A directory service object was 
deleted.';}
        Exec if $EventID == 5143 {$action = 'All access to folders containing 
Cardholder Data';}
        Exec if $EventID == 5143 {$action = 'Changes to %SYSTEMROOT%\SYSTEM32 
folder contents (System Level Object)';}
        Exec if $EventID == 5144 {$action = 'network share was deleted';}
        Exec if $EventID == 47239 {$action = 'Password Change';}
        Exec if $EventID == 6144 {$action = 'Application of group policies to a 
container';}

Reply via email to