Reporting

How can I create report with following logs

matthewoh
New Member

Hi

I am trying to create report on following log

9/4/12
3:30:38.000 AM  
Sep  4 03:30:38 175.**.***.** Sep  3 16:44:55 penta-np syslogmd:  INTRUSION  DETECTION TIME : 12/9/3 16:44:55  RULE NAME : ParameterTampering  (client 203.**.**.** ) -> (server 175.**.**.**:80)
host=175.**.***.**   Options|  sourcetype=udp:514   Options|  source=udp:514   Options

This log is from Web Application Firewall and I want to
1. count by RULE NAME
2. count by client(in brackets)
3. count by server(in brackets)

I've been thinking of adding tags or fields but it is out of my ability.

Can some one help me ?

Tags (1)
0 Karma

lguinn2
Legend

Try (typo corrected)

<yoursearchhere>
| rex "RULE NAME : (?<rule>.*?)  \(client (?<client>.*?)\s*\) -\> \(server (?<server>.*?)\s*\)"
| stats count by rule client server

This will create three temporary fields and use them to count. I think your search may be as simple as

sourcetype=udp:514

lguinn2
Legend

Sorry - I fixed the typo in the original answer,

0 Karma

matthewoh
New Member

Lisa,

I have tried
sourcetype="udp:514" | rex "RULE NAME : (?<rule>.*?) \(client (?<client>.*?)\s*\) -\> (\server (?<server>.*?)\s*\)"
| stats count by rule client server

and it returns me with following error.

[EventsViewer module] Error in 'rex' command: Encountered the following error while compiling the regex 'RULE NAME : (?<rule>.*?) \(client (?<client>.*?)\s*\) -\> (\server (?<server>.*?)\s*\)': Regex: missing )

0 Karma

matthewoh
New Member

Thank you Lisa. I will try this out.

0 Karma
Get Updates on the Splunk Community!

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...

Unlock Instant Security Insights from Amazon S3 with Splunk Cloud — Try Federated ...

Availability: Must be on Splunk Cloud Platform version 10.1.2507.x to view the free trial banner. If you are ...