I send logs from pfsense to graylog and am trying to find lines which block access to certain port, for example.
Log entries I have look like this:
full_message
<134>Sep 23 12:16:51 filterlog: 5,1000103483,em0,match,block,in,4,0x0,241,54321,0,none,6,tcp,40,[src ip],[dst ip],54615,80,0,SA,1245964053,2966902018,65535,
message
filterlog: 5,1000103483,em0,match,block,in,4,0x0,241,54321,0,none,6,tcp,40,[src ip],[dst ip],54615,80,0,SA,1245964053,2966902018,65535,
But if I try to search for certain things, most of my searches simply don’t return anything. For example:
these work:
source:“filterlog:” AND full_message:(block AND “Sep 23 12:16:51” AND “1000103483”)
source:“filterlog:” AND full_message:(block AND “Sep 23 12:16:51” AND “SA”)
but these don’t work:
source:“filterlog:” AND full_message:(block AND “Sep 23 12:16:51” AND “80”)
source:“filterlog:” AND full_message:(block AND “445”)
source:“filterlog:” AND full_message:(block AND “241”)
source:“filterlog:” AND full_message:(block AND “0x0”)
So if I wanted to search for lines where access to port 445 was blocked, it doesn’t work.
I can’t understand what I’m doing wrong?? I even just updated to v3.3.5 to see if it was a bug that was fixed recently, but no help.
And secondary question related to same entries:
I am sending those logs from pfsense using “remote rsyslog”. Does anybody know what I need to do to fix the “source” from one pfsense to something like “pfsense1” instead of (very annoying) “pfsense-module:”, which doesn’t even show which pfsense is actually sending them?
Thanks!
.mika