GROK patterns for use with Graylog 2.x as Input Extractors
cisco-asa.json
- an extractor for all Deny type Syslog messages from Cisco ASA v9.5 (any maybe others)cisco-firepower.json
- an extractor for SFIMS Syslog messages from ASA Firepower Modules v6.2 (and maybe others)trendmicro-deepscan-cef.json
- an extractor for CEF Syslog messages from TrendMicro DeepScan v9.x (and maybe others)iis-w3c-extended.json
- an extractor for web log files in IIS W3C Extended (6.x+) format (and maybe others)office365-auditlogs.json
- an extractor for Office 365 Audit Log CSV export (see this project for how to export)cisco-umbrella-v2.json
- an extractor for Cisco Umbrella (OpenDNS) S3 log exports (both the DNS and Proxy logs)
The Cisco patterns require the following System
/ Grok Patterns
be installed on your Graylog server:
CISCOTIMESTAMP
%{MONTH} +%{MONTHDAY}(?: %{YEAR})? %{TIME}