- 收到syslog的一条信息格式如下:
date=2020-09-24 time=10:39:36 devname=XX_WSZF_FG1 devid=FGT5HD3915804298 logid=0419016384 type=utm subtype=ips eventtype=signature level=alert vd="root" severity=high srcip=61.xxx.127.82 srccountry="China" dstip=xxx.xxx.xxx.148 srcintf="port9" dstintf="port10" policyid=137 sessionid=483136267 action=detected proto=6 service=service-8111 attack="Apache.Optionsbleed.Scanner" srcport=30546 dstport=8111 hostname="xx.xxx.xx" direction=outgoing attackid=44633 profile="default" ref="http://www.xxxx.com/ids/VID44633" incidentserialno=1441570553 msg="applications3: Apache.Optionsbleed.Scanner," crscore=30 crlevel=high
- logstash新增配置文件内容如下
input {
syslog{
host => "xxx.xxx.xxx.188"