<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vyatta Rule Field Extraction in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87718#M22426</link>
    <description>&lt;P&gt;Thanks.  Works perfectly so far.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Mar 2012 16:21:53 GMT</pubDate>
    <dc:creator>mrjester</dc:creator>
    <dc:date>2012-03-08T16:21:53Z</dc:date>
    <item>
      <title>Vyatta Rule Field Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87716#M22424</link>
      <description>&lt;P&gt;I am consuming logs from my Vyatta firewall and I am having trouble getting the field extractor to reliably pull the rule name from the events.  It looks like I need to manually build the regex query, but unfortunately I lack that skill.  &lt;/P&gt;

&lt;P&gt;The rule name is always the 7th field as identified by spaces.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;[&amp;lt;ruleset&amp;gt;-&amp;lt;ruleNumber&amp;gt;-&amp;lt;action&amp;gt;]&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;
* Ruleset could be trust-service-6, trust-untrust6, dmz-local etc in my instance.  Generically, it could be any text.&lt;BR /&gt;
* RuleNumber could be 1-9999 or default.&lt;BR /&gt;
* Action could be A, R or D&lt;/P&gt;

&lt;P&gt;These are examples of the form the rule names take in my environment.&lt;/P&gt;

&lt;P&gt;[dmz-local-6-10-A]&lt;BR /&gt;&lt;BR /&gt;
[dmz-local-100-A]&lt;BR /&gt;&lt;BR /&gt;
[trust-untrust-2-D]&lt;BR /&gt;&lt;BR /&gt;
[untrust-trust-3-D]&lt;BR /&gt;&lt;BR /&gt;
[work-untrust-20-A]&lt;BR /&gt;&lt;BR /&gt;
[trust-untrust-default-D]&lt;BR /&gt;&lt;BR /&gt;
[trust-service-6-default-D]&lt;BR /&gt;&lt;BR /&gt;
[dmz-local-6-50-R]&lt;BR /&gt;&lt;BR /&gt;
[dmz-mgmt-100-R]  &lt;/P&gt;

&lt;P&gt;The following are raw sources.&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Mar  8 09:25:21 carbon kernel: [8195160.290370] [trust-local-6-10-A] IN=eth0.100 OUT= MAC=00:30:48:9f:33:b2:54:04:a6:42:be:92:86:dd SRC=2001:0db8:0100:0100:0000:0000:0000:0010 DST=2001:0db8:0100:0100:0000:0000:0000:0001 LEN=89 TC=0 HOPLIMIT=64 FLOWLBL=0 PROTO=UDP SPT=59399 DPT=53 LEN=49 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:21 carbon kernel: [8195160.293139] [service-untrust-10-A] IN=eth1.600 OUT=eth1.999 MAC=00:30:48:9f:33:b3:00:0c:29:47:da:a1:08:00 SRC=10.0.6.5 DST=204.246.162.10 LEN=117 TOS=0x00 PREC=0x00 TTL=63 ID=46094 PROTO=UDP SPT=21394 DPT=53 LEN=97 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:21 carbon kernel: [8195160.386377] [trust-local-6-10-A] IN=eth0.100 OUT= MAC=00:30:48:9f:33:b2:54:04:a6:42:be:92:86:dd SRC=2001:0db8:0100:0100:0000:0000:0000:0010 DST=2001:0db8:0100:0100:0000:0000:0000:0001 LEN=89 TC=0 HOPLIMIT=64 FLOWLBL=0 PROTO=UDP SPT=63647 DPT=53 LEN=49 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:21 carbon kernel: [8195160.388007] [service-untrust-10-A] IN=eth1.600 OUT=eth1.999 MAC=00:30:48:9f:33:b3:00:0c:29:47:da:a1:08:00 SRC=10.0.6.5 DST=204.246.162.10 LEN=117 TOS=0x00 PREC=0x00 TTL=63 ID=46095 PROTO=UDP SPT=28420 DPT=53 LEN=97 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:21 carbon kernel: [8195160.472564] [trust-untrust-20-A] IN=eth0.100 OUT=eth1.999 MAC=00:30:48:9f:33:b2:54:04:a6:42:be:92:08:00 SRC=10.0.1.10 DST=204.236.229.254 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=30076 DF PROTO=TCP SPT=51287 DPT=80 WINDOW=8192 RES=0x00 SYN URGP=0 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:23 carbon kernel: [8195162.690082] [work-service-20-A] IN=eth0.300 OUT=eth1.600 MAC=00:30:48:9f:33:b2:00:13:c3:d2:f0:b2:08:00 SRC=10.0.4.120 DST=10.0.6.25 LEN=52 TOS=0x00 PREC=0x00 TTL=126 ID=31426 DF PROTO=TCP SPT=60668 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:23 carbon kernel: [8195162.693543] [work-service-20-A] IN=eth0.300 OUT=eth1.600 MAC=00:30:48:9f:33:b2:00:13:c3:d2:f0:b2:08:00 SRC=10.0.4.120 DST=10.0.6.25 LEN=52 TOS=0x00 PREC=0x00 TTL=126 ID=31429 DF PROTO=TCP SPT=60669 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:24 carbon kernel: [8195163.148490] [work-service-20-A] IN=eth0.300 OUT=eth1.600 MAC=00:30:48:9f:33:b2:00:13:c3:d2:f0:b2:08:00 SRC=10.0.4.120 DST=10.0.6.25 LEN=52 TOS=0x00 PREC=0x00 TTL=126 ID=31455 DF PROTO=TCP SPT=60670 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:26 carbon kernel: [8195165.241861] [work-service-20-A] IN=eth0.300 OUT=eth1.600 MAC=00:30:48:9f:33:b2:00:13:c3:d2:f0:b2:08:00 SRC=10.0.4.120 DST=10.0.6.25 LEN=52 TOS=0x00 PREC=0x00 TTL=126 ID=31483 DF PROTO=TCP SPT=60671 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0 &lt;/LI&gt;
&lt;LI&gt;Mar  8 09:25:27 carbon kernel: [8195166.278045] [untrust-local-6-10-A] IN=eth1.999 OUT= MAC=00:30:48:9f:33:b3:00:0c:29:af:6d:87:86:dd SRC=2001:0470:1f11:03f2:0000:0000:0000:0203 DST=2001:0470:1f11:03f2:0000:0000:0000:0001 LEN=82 TC=0 HOPLIMIT=64 FLOWLBL=0 PROTO=UDP SPT=33103 DPT=53 LEN=42&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 08 Mar 2012 14:43:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87716#M22424</guid>
      <dc:creator>mrjester</dc:creator>
      <dc:date>2012-03-08T14:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Vyatta Rule Field Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87717#M22425</link>
      <description>&lt;P&gt;Assuming that the sourcetype of your data is vyatta, put this in $SPLUNK_HOME/etc/system/local/props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[vyatta]
EXTRACT-e1=\[.*?]\s\[(?&amp;lt;ruleName&amp;gt;.+?)]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This should extract the field and call it ruleName.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Mar 2012 15:35:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87717#M22425</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2012-03-08T15:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: Vyatta Rule Field Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87718#M22426</link>
      <description>&lt;P&gt;Thanks.  Works perfectly so far.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Mar 2012 16:21:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87718#M22426</guid>
      <dc:creator>mrjester</dc:creator>
      <dc:date>2012-03-08T16:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vyatta Rule Field Extraction</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87719#M22427</link>
      <description>&lt;P&gt;Try:&lt;/P&gt;

&lt;P&gt;\w{3}\s+\d+\s+\d+:\d+:\d+\s+\w+\s+\w+:\s+[\d+.\d+]\s+[(?&lt;RULESET&gt;\w+-\w+(?:-\d+)?)-(?&lt;RULENUMBER&gt;[\ddefault]+)-(?&lt;ACTION&gt;\w+)]\s+&lt;/ACTION&gt;&lt;/RULENUMBER&gt;&lt;/RULESET&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2014 06:59:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Vyatta-Rule-Field-Extraction/m-p/87719#M22427</guid>
      <dc:creator>vipiao</dc:creator>
      <dc:date>2014-04-08T06:59:21Z</dc:date>
    </item>
  </channel>
</rss>

