2019-10-24 02:20:38 +02:00
|
|
|
# filters kernel messages
|
|
|
|
{
|
|
|
|
resource."graylog_pipeline_rule" = {
|
|
|
|
|
|
|
|
routeToKernelMessage = {
|
|
|
|
|
|
|
|
description = "route kernel messages to kernel stream (TF)";
|
|
|
|
source = ''
|
|
|
|
rule "route kernel message"
|
|
|
|
when
|
|
|
|
to_string($message.facility) == "kernel"
|
|
|
|
then
|
|
|
|
route_to_stream(id:"''${ graylog_stream.kernel.id }", remove_from_default: true);
|
|
|
|
end
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
2019-12-20 05:54:26 +01:00
|
|
|
extractFirewallDeny = {
|
2019-10-24 02:20:38 +02:00
|
|
|
description = "extract information form a firewall deny (TF)";
|
|
|
|
source = ''
|
|
|
|
rule "extract firewall deny"
|
|
|
|
when
|
|
|
|
starts_with(to_string($message.message), "refused connection:")
|
|
|
|
then
|
|
|
|
set_fields(grok("SRC=%{IP:source_ip} .* DPT=%{NUMBER:destination_port}", to_string($message.message)));
|
|
|
|
set_field("is_thread", true);
|
|
|
|
route_to_stream(id:"''${ graylog_stream.thread.id }");
|
|
|
|
end
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
|
|
|
|
2019-12-20 05:54:26 +01:00
|
|
|
graylog.all_messages.rules = [ "route kernel message" ];
|
2019-10-24 02:20:38 +02:00
|
|
|
|
|
|
|
graylog.stream.kernel = {
|
|
|
|
index_set_id = "\${data.graylog_index_set.default.id}";
|
|
|
|
pipelines = [ "\${graylog_pipeline.processKernelMessage.id}" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
graylog.pipeline.processKernelMessage = {
|
|
|
|
source = ''
|
|
|
|
stage 0 match all
|
|
|
|
rule "extract firewall deny";
|
|
|
|
'';
|
|
|
|
description = "process messages of the kernel stream(TF)";
|
|
|
|
};
|
|
|
|
|
|
|
|
}
|