I wonder if someone here can help, I have a palo alto firewall log tha contains IP information upon whichI am looking up for threats using otx. However in the pipeline rule, it is failing. The code is as follows
Expected behaviour:
Any IP address containing 168.254 should be ignored
Your pipeline rule worked for me as expected in graylog 3.3.2
Try to change line with function contains to: cidr_match("169.254.0.0/16", to_ip($message.dest_addr))
@Magneton Which Graylog version are you using? I think your pipeline rule having operator precedence or expression construction issue. The NOT is trying to evaluate something that has boolean value, but when executed it getting the result of the “169.254”. Can you also check server.log where you will get some errors related to it?
The when condition is evaluating correctly, there are no errors in the log regarding AST trees which is the error you get when a rule when condition breaks.
The rule is running over firewall logs with 10k events per min.