I am having an issue with getting the Graylog Threat Intelligence plug-in 
and the associated pipelines setup properly.  I have created a pipeline, 
added a rule, and linked it to the default stream.  The pipeline metric 
shows messages going through it, but it is not creating the new fields 
based on the threat intel lookups and it is not clear to me where the issue 
is (pipleine, rule, plugin, etc.....)

Here is the rule:

rule "Threat Intel Lookup SourceAddress"
when
    has_field("SourceAddress")
then
    let src_addr_intel = 
threat_intel_lookup_ip(to_string($message.SourceAddress), "SourceAddress");
    set_fields(src_addr_intel);
end

The pipleline has a single stage with just the rule above in it.  The 
pipeline connection is using the default stream.

Any assistance or suggestions that people could provide to help 
troubleshoot this would be greatly appreciated.

Thanks,

Karl

-- 
You received this message because you are subscribed to the Google Groups 
"Graylog Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/graylog2/8c6a637b-ad15-46cf-b562-410a4239932f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to