Catherine Edwards created METRON-331:
----------------------------------------

             Summary: Creating Redseal Parser
                 Key: METRON-331
                 URL: https://issues.apache.org/jira/browse/METRON-331
             Project: Metron
          Issue Type: New Feature
            Reporter: Catherine Edwards
            Priority: Minor


Create Parser for Redseal logs.

Sample RedSeal Server log message:
<134>Jun 29 23:02:00 www.burnbook.com local0: SRM_SERVER [INFO ] 
[com.redsealsys.srm.server.util.PurgeDataUtils.execute | Thread-58 ] - SQL:[ 
DROP TABLE IF EXISTS current_device_purge_id_temp ] 

Data after parsing:
{code:none}
{   "source:type": "redseal-server", 
    "priority": "134",
    "timestamp": "June 29th 2016 23:02:00",
    "hostname": "www.burnbook.com"
    "syslog_facility": "local0",
    "message": "SRM_SERVER [INFO ] 
[com.redsealsys.srm.server.util.PurgeDataUtils.execute | Thread-58 ] - SQL:[ 
DROP TABLE IF EXISTS current_device_purge_id_temp ]"
} 
{code}

Sample RedSeal Audit log message 1:
<150>Jun 22 11:11:33 www.burnbook.com local2: [ aaronsamuels ] https user 
authenticated OK - initial access to /data/reports/vuln_reporting - from remote 
host ' 99.999.99.999 ' 

Data after parsing:
{code:none}
{   "source:type": "redseal-audit",
    "priority": "134",
    "timestamp": "June 22nd 11:11:33",
    "hostname": "www.burnbook.com",
    "syslog_facility": "local2",
    "username": "aaronsamuels",
    "uri_path": "/data/report/vulnreporting",
    "authentication_result": "success",
    "ip_src_addr": "99.999.99.99",
    "protocol": "https"
} 
{code}

Sample RedSeal Audit log message 2:
<150>Jun 22 13:29:33 www.burnbook.com local2: [ gretchenweiners ] user 
authenticated OK - from remote host ' 99.99.999.999 ' 

Data after parsing:
{code:none}
{   "source:type": "redseal-audit",
    "priority": "150",
    "timestamp": "June 22nd 2016 11:11:33",
    "hostname": "www.burnbook.com",
    "syslog_facility": "local2",
    "username": "gretchenweiners",
    "authentication_result": "success",
    "ip_src_addr": "10.218.143.228"
} 
{code}

Sample RedSeal Audit log message 3:
<150>Jun 22 13:29:35 www.burnbook.com local2: [ JMS user connection 
authenticated for: [gretchenweiners] ] 

Data after parsing:
{code:none}
{   "source:type": "redseal-audit",
    "priority": "150",
    "timestamp": "June 22nd 13:29:35",
    "hostname": "www.burnbook.com",
    "syslog_facility": "local2",
    "username": "gretchenweiners",
    "authentication_result": "success",
    "protocol": "JMS" 
}
{code}

Sample RedSeal Audit log message 4:
<150>Jun 8 09:31:27 www.burnbook.com local2: [ gretchenweiners ] user 
authentication FAILED - from remote host ' 99.999.9.999 ' 

Data after parsing:
{code:none}
{   "source:type": "redseal-audit",
    "priority": "150",
    "timestamp": "June 8th 2016 09:31:27",
    "hostname": "www.burnbook.com",
    "syslog_facility": "local2",
    "username": "gretchenweiners",
    "vauthentication_result": "failure",
    "ip_src_addr": "99.999.9.999" 
}
{code}

Sample RedSeal Audit log message 5:
<150>Jun 10 14:58:43 www.burnbook.com local2: [ gretchenweiners ] failed to do 
final environmental check for Actuate reports . (permission denied) 

Data after parsing:
{code:none}
{   "source:type": "redseal-audit",
    "priority": "150",
    "timestamp": "June 10th 2016 14:58:43",
    "hostname": "www.burnbook.com",
    "syslog_facility": "local2",
    "username": "gretchenweiners",
    "message": "failed to do final environmental check for Actuate reports . 
(permission denied)" 
}
{code}

Sample RedSeal Analysis log message:
<142>Jun 26 04:54:11 www.burnbook.com local1: Data Collection Task: RANCID - 
us.nx1k - Completed - Task Detail: data type: Cisco NX-OS (8.2.1); 
communication type: SFTP; credential: gretchenweiners; execution: scheduled 
collection - Summary: All 55 succeeded - 55 (out of 55) devices or hosts 
imported (3 added 52 updated ) 

Data after parsing:
{code:none}
{   "source:type": "redseal-analysis",
    "priority": "142",
    "timestamp": "Jun 26th 2016 04:54:11",
    "hostname": "www.burnbook.com",
    "syslog_facility": "local1",
    "message": "Data Collection Task: RANCID - us.nx1k - Completed - Task 
Detail: data type: Cisco NX-OS (8.2.1); communication type: SFTP; credential: 
gretchenweiners; execution: scheduled collection - Summary: All 55 succeeded - 
55 (out of 55) devices or hosts imported (3 added 52 updated )"
} 
{code}

Sample RedSeal System log message:
<158>Jun 7 10:41:12 www.burnbook.com local3: RedSeal 8.2.1 (Build-1107) 
running... Tue Jun 07 10:41:12 EDT 2016 

Data after parsing:
{code:none}
{   "source:type": "redseal-system"
    "priority": "158"
    "timestamp": "Jun 7th 2016 10:41:12"
    "hostname": "www.burnbook.com"
    "syslog_facility": "local3"
    "message": "RedSeal 8.2.1 (Build-1107) running... Tue Jun 07 10:41:12 EDT 
2016"
}
{code}

Sample RedSeal Event log message:
<134>Jun 29 01:46:30 www.burnbook.com local0: SRM_SERVER [VENTS] 
[.server.services.customevents.EventAggregator.rallAnalysisComplete | ctor 
Timer] - EventAction=RedSeal Network Analysis | EventDate=Jun 29, 2016 1:46:30 
AM EDT | EventName=HostMetricsEvent | DeviceVendor=RedSeal Networks, Inc. | 
DeviceProduct=RedSeal Platform | DeviceVersion=8.2.1 | 
RedSealServerName=www.burnbook.com | RedSealServerIPAddress=99.99.999.999 | 
HostName=www.burnbook.com | HostRedSealID=8aa5577asdf3d101asdf5460c8e9cdfc30 | 
AnalysisDate=Jun 29, 2016 12:51:33 AM EDT | PrimaryService=NetBIOS Session 
Service | OSVendor=Microsoft | OperatingSystem=Windows Server 2012 R2 | 
AttackDepth=-1 | Exposure=0 | Value=10 | ServicesCount=19 | 
VulnerabilityCount=281 | Risk=0 | DownstreamRisk=0 | Confidence=1 | 
Leapfroggable=false | Exploitable=false | PrimaryIp=99.99.99.99 | 
AccessibleFromUntrusted=false | HasAccessToCritical=false | END RSExternal 
event 

Data after parsing:
{code:none}
{   "source:type": "redseal-event",
    "priority": "134",
    "timestamp": "Jun 29th",
    "hostname": "www.burnbook.com",
    "syslog_facility": "local0",
    "EventAction": "RedSeal Network Analysis",
    "EventDate": "Jun 29, 2016 1:46:30 AM EDT",
    "EventName": "HostMetricsEvent",
    "DeviceVendor": "RedSeal Networks, Inc.",
    "DeviceProduct": "RedSeal Platform",
    "DeviceVersion": "8.2.1",
    "RedSealServerName": "www.burnbook.com",
    "RedSealServerIPAddress": "10.37.215.250",
    "event_hostname": "www.example.com",
    "HostRedSealID": "8aa5577asdf3d101asdf5460c8e9cdfc30",
    "AnalysisDate": "Jun 29, 2016 12:51:33 AM EDT",
    "PrimaryService": "NetBIOS Session Service",
    "OSVendor": "Microsoft",
    "OperatingSystem": "Windows Server 2012 R2",
    "AttackDepth": "-1",
    "Exposure": "0",
    "Value": "10",
    "ServicesCount": "19",
    "VulnerabilityCount": "281",
    "Risk": "0",
    "DownstreamRisk": "0",
    "Confidence": "1",
    "Leapfroggable": "false",
    "Exploitable": "false",
    "PrimaryIp": "99.99.99.99",
    "AccessibleFromUntrusted": "false",
    "HasAccessToCritical": "false "
}
{code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to