OTX Threat Intel pegs Process Buffer

So I am trying to integrate Threat intel lookups into my Graylog using a Pipeline rule. Right now the setup is all firewalls are forwarding into Graylog, Grok pattern extraction (these are Cisco Firepower Firewalls). The builtin for AbuseCH, Spamhaus and TOR work perfect, no issues. When I set up a stage for OTX per information here I can watch my Process Buffer fill and then the journal starts to fill up with no end in sight to it. I remove the OTX lookups and everything goes back to normal. HEre is what I have as a rule:

rule "Threat Intelligence Lookups: OTX src"

when

  has_field("src_addr")

then

let intel = otx_lookup_ip(to_string($message.src_addr));
// let intel = otx_lookup_domain(to_string($message.dns_question))

set_field("src_OTX_threat_indicated", intel.otx_threat_indicated);
set_field("src_threat_ids", intel.otx_threat_ids);
set_field("src_threat_names", intel.otx_threat_names);

end

This is run against the All Messages Stream, but the firewalls are the only thing going into Graylog at this point. Any help would be appreciated.

Did you see any entry in your server.log? How many messages did you try to resolve? Did you checked if you are rate-limited?

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.