Hey all,
I’m pretty new to graylog and I’m starting to ingest all types of logs. I’m already processing json logs from my docker hosts and also syslog from my hosts. I also just upgraded to 5.0, the upgrade went super smooth!
Now to my question: One of my hypervisors is proxmox and it has a built in firewall. The logs this firewall produces look like this for tcp:
proxmoxhostname pvefw 123 6 tap123i0-IN 03/Jan/2023:19:11:20 +0100 policy DROP: IN=fwbr123i0 OUT=fwbr123i0 PHYSIN=fwln123i0 PHYSOUT=tap123i0 MAC=11:11:11:11:11:11:11:11:11:11:11:11:11:11 SRC=123.123.123.123 DST=456.456.456.456 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=12345 PROTO=TCP SPT=59763 DPT=12345 SEQ=1234567890 ACK=0 WINDOW=1024 SYN
and like this for udp:
proxmoxhostname pvefw 123 6 veth123i0-IN 03/Jan/2023:19:43:23 +0100 policy DROP: IN=fwbr123i0 OUT=fwbr123i0 PHYSIN=fwln123i0 PHYSOUT=veth123i0 MAC=11:11:11:11:11:11:11:11:11:11:11:11:11:11 SRC=123.123.123.123 DST=456.456.456.456 LEN=76 TOS=0x00 PREC=0x00 TTL=242 ID=12321 PROTO=UDP SPT=43605 DPT=123 LEN=56
I tried my best with my grok beginner skills but couldn’t progress after getting stuck on trying to extract the policy correctly. I tried using some online debugger but I’m just not familiar enough with the syntax yet to figure it out.
Here is what I got so far:
%{WORD:pve} %{WORD:pvefw} %{INT:vmid} %{INT:dontknow} %{USERNAME:interface} %{HTTPDATE:interface}
Appreciate any type of help! Please let me know if you need more info.
Thanks!