Patterns documentation
You will find here a generated documentation of all the patterns loaded by crowdsec. They are sorted by pattern length, and are meant to be used in parsers, in the form %{PATTERN_NAME}.
#
MONGO3_SEVERITYPattern :
\w
#
GREEDYDATAPattern :
.*
#
RAIL_ACTIONPattern :
\w+
#
NOTSPACEPattern :
\S+
#
SPACEPattern :
\s*
#
DATAPattern :
.*?
#
JAVALOGMESSAGEPattern :
(.*)
#
NOTDQUOTEPattern :
[^"]*
#
DAY2Pattern :
\d{2}
#
RAILS_CONSTROLLERPattern :
[^#]+
#
RUUIDPattern :
\s{32}
#
SYSLOG5424PRINTASCIIPattern :
[!-~]+
#
BACULA_JOBPattern :
%{USER}
#
BACULA_VERSIONPattern :
%{USER}
#
CRON_ACTIONPattern :
[A-Z ]+
#
BACULA_DEVICEPattern :
%{USER}
#
WORDPattern :
\b\w+\b
#
BACULA_VOLUMEPattern :
%{USER}
#
TZPattern :
[A-Z]{3}
#
MONGO3_COMPONENTPattern :
%{WORD}|-
#
NUMTZPattern :
[+-]\d{4}
#
MINUTEPattern :
[0-5][0-9]
#
NAGIOS_TYPE_HOST_ALERTPattern :
HOST ALERT
#
NONNEGINTPattern :
\b[0-9]+\b
#
MONGO_WORDDASHPattern :
\b[\w-]+\b
#
USERPattern :
%{USERNAME}
#
BACULA_DEVICEPATHPattern :
%{UNIXPATH}
#
REDISLOG1Pattern :
%{REDISLOG}
#
SYSLOGHOSTPattern :
%{IPORHOST}
#
SYSLOG5424SDPattern :
\[%{DATA}\]+
#
NUMBERPattern :
%{BASE10NUM}
#
ISO8601_SECONDPattern :
%{SECOND}|60
#
MONTHNUM2Pattern :
0[1-9]|1[0-2]
#
NGUSERPattern :
%{NGUSERNAME}
#
EXIM_PIDPattern :
\[%{POSINT}\]
#
YEARPattern :
(?:\d\d){1,2}
#
BACULA_HOSTPattern :
[a-zA-Z0-9-]+
#
NAGIOS_TYPE_SERVICE_ALERTPattern :
SERVICE ALERT
#
MONTHNUMPattern :
0?[1-9]|1[0-2]
#
CISCO_XLATE_TYPEPattern :
static|dynamic
#
RAILS_CONTEXTPattern :
(?:%{DATA}\n)*
#
BACULA_LOG_ENDPRUNEPattern :
End auto prune.
#
USERNAMEPattern :
[a-zA-Z0-9._-]+
#
POSINTPattern :
\b[1-9][0-9]*\b
#
QSPattern :
%{QUOTEDSTRING}
#
MODSECRULEVERSPattern :
\[ver "[^"]+"\]
#
INTPattern :
[+-]?(?:[0-9]+)
#
IPPattern :
%{IPV6}|%{IPV4}
#
NAGIOS_EC_ENABLE_SVC_CHECKPattern :
ENABLE_SVC_CHECK
#
NAGIOS_TYPE_EXTERNAL_COMMANDPattern :
EXTERNAL COMMAND
#
NAGIOS_EC_ENABLE_HOST_CHECKPattern :
ENABLE_HOST_CHECK
#
NAGIOS_TYPE_HOST_NOTIFICATIONPattern :
HOST NOTIFICATION
#
NAGIOS_EC_DISABLE_SVC_CHECKPattern :
DISABLE_SVC_CHECK
#
IPORHOSTPattern :
%{IP}|%{HOSTNAME}
#
DATESTAMPPattern :
%{DATE}[- ]%{TIME}
#
NAGIOS_EC_DISABLE_HOST_CHECKPattern :
DISABLE_HOST_CHECK
#
NAGIOS_TYPE_HOST_EVENT_HANDLERPattern :
HOST EVENT HANDLER
#
NAGIOS_TYPE_CURRENT_HOST_STATEPattern :
CURRENT HOST STATE
#
NAGIOS_TYPE_PASSIVE_HOST_CHECKPattern :
PASSIVE HOST CHECK
#
HOURPattern :
2[0123]|[01]?[0-9]
#
NAGIOS_TYPE_HOST_FLAPPING_ALERTPattern :
HOST FLAPPING ALERT
#
NGUSERNAMEPattern :
[a-zA-Z\.\@\-\+_%]+
#
NAGIOS_TYPE_HOST_DOWNTIME_ALERTPattern :
HOST DOWNTIME ALERT
#
BACULA_LOG_BEGIN_PRUNE_FILESPattern :
Begin pruning Files.
#
NAGIOS_TYPE_SERVICE_NOTIFICATIONPattern :
SERVICE NOTIFICATION
#
JAVAFILEPattern :
(?:[A-Za-z0-9_. -]+)
#
HOSTPORTPattern :
%{IPORHOST}:%{POSINT}
#
NAGIOS_TYPE_CURRENT_SERVICE_STATEPattern :
CURRENT SERVICE STATE
#
NAGIOS_TYPE_PASSIVE_SERVICE_CHECKPattern :
PASSIVE SERVICE CHECK
#
NAGIOS_TYPE_SERVICE_EVENT_HANDLERPattern :
SERVICE EVENT HANDLER
#
NAGIOS_TYPE_TIMEPERIOD_TRANSITIONPattern :
TIMEPERIOD TRANSITION
#
EXIM_FLAGSPattern :
(<=|[-=>*]>|[*]{2}|==)
#
NAGIOS_TYPE_SERVICE_DOWNTIME_ALERTPattern :
SERVICE DOWNTIME ALERT
#
SSHD_CORRUPT_MACPattern :
Corrupted MAC on input
#
NAGIOS_EC_SCHEDULE_HOST_DOWNTIMEPattern :
SCHEDULE_HOST_DOWNTIME
#
PATHPattern :
%{UNIXPATH}|%{WINPATH}
#
EXIM_SUBJECTPattern :
(T=%{QS:exim_subject})
#
NAGIOS_TYPE_SERVICE_FLAPPING_ALERTPattern :
SERVICE FLAPPING ALERT
#
BACULA_LOG_NOPRUNE_JOBSPattern :
No Jobs found to prune.
#
HTTPDUSERPattern :
%{EMAILADDRESS}|%{USER}
#
BACULA_CAPACITYPattern :
%{INT}{1,3}(,%{INT}{3})*
#
EXIM_PROTOCOLPattern :
(P=%{NOTSPACE:protocol})
#
NAGIOS_EC_ENABLE_SVC_NOTIFICATIONSPattern :
ENABLE_SVC_NOTIFICATIONS
#
URIPROTOPattern :
[A-Za-z]+(\+[A-Za-z+]+)?
#
BACULA_LOG_NOPRUNE_FILESPattern :
No Files found to prune.
#
NAGIOS_EC_SCHEDULE_SERVICE_DOWNTIMEPattern :
SCHEDULE_SERVICE_DOWNTIME
#
MONGO_QUERYPattern :
\{ \{ .* \} ntoreturn: \}
#
PROGPattern :
[\x21-\x5a\x5c\x5e-\x7e]+
#
NAGIOS_EC_DISABLE_SVC_NOTIFICATIONSPattern :
DISABLE_SVC_NOTIFICATIONS
#
NAGIOS_EC_PROCESS_HOST_CHECK_RESULTPattern :
PROCESS_HOST_CHECK_RESULT
#
BACULA_LOG_VSSPattern :
(Generate )?VSS (Writer)?
#
NAGIOS_EC_ENABLE_HOST_NOTIFICATIONSPattern :
ENABLE_HOST_NOTIFICATIONS
#
UNIXPATHPattern :
(/([\w_%!$@:.,~-]+|\\.)*)+
#
EMAILLOCALPARTPattern :
[a-zA-Z][a-zA-Z0-9_.+-=:]+
#
URIPATHPARAMPattern :
%{URIPATH}(?:%{URIPARAM})?
#
KITCHENPattern :
\d{1,2}:\d{2}(AM|PM|am|pm)
#
NAGIOS_EC_DISABLE_HOST_NOTIFICATIONSPattern :
DISABLE_HOST_NOTIFICATIONS
#
NAGIOSTIMEPattern :
\[%{NUMBER:nagios_epoch}\]
#
RUBY_LOGLEVELPattern :
DEBUG|FATAL|ERROR|WARN|INFO
#
TIMEPattern :
%{HOUR}:%{MINUTE}:%{SECOND}
#
JAVATHREADPattern :
(?:[A-Z]{2}-Processor[\d]+)
#
EXIM_MSG_SIZEPattern :
(S=%{NUMBER:exim_msg_size})
#
REDISTIMESTAMPPattern :
%{MONTHDAY} %{MONTH} %{TIME}
#
NAGIOS_EC_PROCESS_SERVICE_CHECK_RESULTPattern :
PROCESS_SERVICE_CHECK_RESULT
#
BASE16NUMPattern :
[+-]?(?:0x)?(?:[0-9A-Fa-f]+)
#
ISO8601_TIMEZONEPattern :
Z|[+-]%{HOUR}(?::?%{MINUTE})
#
MODSECRULEIDPattern :
\[id %{QUOTEDSTRING:ruleid}\]
#
SYSLOGTIMESTAMPPattern :
%{MONTH} +%{MONTHDAY} %{TIME}
#
SSHD_PACKET_CORRUPTPattern :
Disconnecting: Packet corrupt
#
SYSLOG5424PRIPattern :
<%{NONNEGINT:syslog5424_pri}>
#
EMAILADDRESSPattern :
%{EMAILLOCALPART}@%{HOSTNAME}
#
NAGIOS_EC_ENABLE_HOST_SVC_NOTIFICATIONSPattern :
ENABLE_HOST_SVC_NOTIFICATIONS
#
NAGIOS_EC_DISABLE_HOST_SVC_NOTIFICATIONSPattern :
DISABLE_HOST_SVC_NOTIFICATIONS
#
URIHOSTPattern :
%{IPORHOST}(?::%{POSINT:port})?
#
EXIM_HEADER_IDPattern :
(id=%{NOTSPACE:exim_header_id})
#
SSHD_TUNN_TIMEOUTPattern :
Timeout, client not responding.
#
MODSECRULEREVPattern :
\[rev %{QUOTEDSTRING:rulerev}\]
#
MCOLLECTIVEAUDITPattern :
%{TIMESTAMP_ISO8601:timestamp}:
#
DATEPattern :
%{DATE_US}|%{DATE_EU}|%{DATE_X}
#
CISCOTAGPattern :
[A-Z0-9]+-%{INT}-(?:[A-Z0-9_]+)
#
WINPATHPattern :
(?:[A-Za-z]+:|\\)(?:\\[^\\?*]*)+
#
DATE_XPattern :
%{YEAR}/%{MONTHNUM2}/%{MONTHDAY}
#
SSHD_INITPattern :
%{SSHD_LISTEN}|%{SSHD_TERMINATE}
#
HAPROXYCAPTUREDREQUESTHEADERSPattern :
%{DATA:captured_request_headers}
#
CISCO_INTERVALPattern :
first hit|%{INT}-second interval
#
MODSECRULEFILEPattern :
\[file %{QUOTEDSTRING:rulefile}\]
#
MODSECURIPattern :
\[uri ["']%{DATA:targeturi}["']\]
#
HAPROXYCAPTUREDRESPONSEHEADERSPattern :
%{DATA:captured_response_headers}
#
MODSECRULELINEPattern :
\[line %{QUOTEDSTRING:ruleline}\]
#
MODSECRULEDATAPattern :
\[data %{QUOTEDSTRING:ruledata}\]
#
CISCO_DIRECTIONPattern :
Inbound|inbound|Outbound|outbound
#
BACULA_LOG_CANCELLINGPattern :
Cancelling duplicate JobId=%{INT}.
#
SECONDPattern :
(?:[0-5]?[0-9]|60)(?:[:.,][0-9]+)?
#
MODSECRULEMSGPattern :
\[msg %{QUOTEDSTRING:rulemessage}\]
#
SSHD_TUNN_ERR3Pattern :
error: bind: Address already in use
#
BACULA_LOG_STARTRESTOREPattern :
Start Restore Job %{BACULA_JOB:job}
#
SYSLOGLINEPattern :
%{SYSLOGBASE2} %{GREEDYDATA:message}
#
COMMONMACPattern :
(?:[A-Fa-f0-9]{2}:){5}[A-Fa-f0-9]{2}
#
WINDOWSMACPattern :
(?:[A-Fa-f0-9]{2}-){5}[A-Fa-f0-9]{2}
#
SYSLOGPROGPattern :
%{PROG:program}(?:\[%{POSINT:pid}\])?
#
JAVAMETHODPattern :
(?:(<init>)|[a-zA-Z$_][a-zA-Z$_0-9]*)
#
DATE_USPattern :
%{MONTHNUM}[/-]%{MONTHDAY}[/-]%{YEAR}
#
CISCOMACPattern :
(?:[A-Fa-f0-9]{4}\.){2}[A-Fa-f0-9]{4}
#
ELB_URIPATHPARAMPattern :
%{URIPATH:path}(?:%{URIPARAM:params})?
#
MACPattern :
%{CISCOMAC}|%{WINDOWSMAC}|%{COMMONMAC}
#
MODSECUIDPattern :
\[unique_id %{QUOTEDSTRING:uniqueid}\]
#
BACULA_LOG_NOPRIORPattern :
No prior Full backup Job record found.
#
BACULA_TIMESTAMPPattern :
%{MONTHDAY}-%{MONTH} %{HOUR}:%{MINUTE}
#
MODSECMATCHOFFSETPattern :
\[offset %{QUOTEDSTRING:matchoffset}\]
#
DATE_EUPattern :
%{MONTHDAY}[./-]%{MONTHNUM}[./-]%{YEAR}
#
MODSECHOSTNAMEPattern :
\[hostname ['"]%{DATA:targethost}["']\]
#
URIPATHPattern :
(?:/[A-Za-z0-9$.+!*'(){},~:;=@#%_\-]*)+
#
TTYPattern :
/dev/(pts|tty([pq])?)(\w+)?/?(?:[0-9]+)
#
HTTPD_ERRORLOGPattern :
%{HTTPD20_ERRORLOG}|%{HTTPD24_ERRORLOG}
#
MONTHDAYPattern :
(?:0[1-9])|(?:[12][0-9])|(?:3[01])|[1-9]
#
BACULA_LOG_USEDEVICEPattern :
Using Device \"%{BACULA_DEVICE:device}\"
#
MODSECRULESEVERITYPattern :
\[severity ["']%{WORD:ruleseverity}["']\]
#
ANSICPattern :
%{DAY} %{MONTH} [_123]\d %{TIME} %{YEAR}"
#
RFC822ZPattern :
[0-3]\d %{MONTH} %{YEAR} %{TIME} %{NUMTZ}
#
SSHD_CONN_CLOSEPattern :
Connection closed by %{IP:sshd_client_ip}$
#
CISCOTIMESTAMPPattern :
%{MONTH} +%{MONTHDAY}(?: %{YEAR})? %{TIME}
#
GENERICAPACHEERRORPattern :
%{APACHEERRORPREFIX} %{GREEDYDATA:message}
#
CISCOFW104004Pattern :
\((?:Primary|Secondary)\) Switching to OK\.
#
APACHEERRORTIMEPattern :
%{DAY} %{MONTH} %{MONTHDAY} %{TIME} %{YEAR}
#
HTTPDERROR_DATEPattern :
%{DAY} %{MONTH} %{MONTHDAY} %{TIME} %{YEAR}
#
HTTPDATEPattern :
%{MONTHDAY}/%{MONTH}/%{YEAR}:%{TIME} %{INT}
#
EXIM_MSGIDPattern :
[0-9A-Za-z]{6}-[0-9A-Za-z]{6}-[0-9A-Za-z]{2}
#
NAGIOS_WARNINGPattern :
Warning:%{SPACE}%{GREEDYDATA:nagios_message}
#
BACULA_LOG_NOJOBSTATPattern :
Fatal error: No Job status returned from FD.
#
EXIM_QTPattern :
((\d+y)?(\d+w)?(\d+d)?(\d+h)?(\d+m)?(\d+s)?)
#
REDISLOGPattern :
\[%{POSINT:pid}\] %{REDISTIMESTAMP:time} \*\s
#
BASE10NUMPattern :
[+-]?(?:(?:[0-9]+(?:\.[0-9]+)?)|(?:\.[0-9]+))
#
SYSLOGFACILITYPattern :
<%{NONNEGINT:facility}.%{NONNEGINT:priority}>
#
COMBINEDAPACHELOGPattern :
%{COMMONAPACHELOG} %{QS:referrer} %{QS:agent}
#
URIPARAMPattern :
\?[A-Za-z0-9$.+!*'|(){},~@#%&/=:;_?\-\[\]<>]*
#
RFC850Pattern :
%{DAY}, [0-3]\d-%{MONTH}-%{YEAR} %{TIME} %{TZ}
#
RFC1123Pattern :
%{DAY}, [0-3]\d %{MONTH} %{YEAR} %{TIME} %{TZ}
#
UNIXDATEPattern :
%{DAY} %{MONTH} [_123]\d %{TIME} %{TZ} %{YEAR}
#
CISCOFW104003Pattern :
\((?:Primary|Secondary)\) Switching to FAILED\.
#
SYSLOG5424LINEPattern :
%{SYSLOG5424BASE} +%{GREEDYDATA:syslog5424_msg}
#
BACULA_LOG_STARTJOBPattern :
Start Backup JobId %{INT}, Job=%{BACULA_JOB:job}
#
RUBYDATEPattern :
%{DAY} %{MONTH} [0-3]\d %{TIME} %{NUMTZ} %{YEAR}
#
BACULA_LOG_NOOPENPattern :
\s+Cannot open %{DATA}: ERR=%{GREEDYDATA:berror}
#
RFC1123ZPattern :
%{DAY}, [0-3]\d %{MONTH} %{YEAR} %{TIME} %{NUMTZ}
#
DATESTAMP_RFC822Pattern :
%{DAY} %{MONTH} %{MONTHDAY} %{YEAR} %{TIME} %{TZ}
#
DATESTAMP_OTHERPattern :
%{DAY} %{MONTH} %{MONTHDAY} %{TIME} %{TZ} %{YEAR}
#
RFC3339Pattern :
%{YEAR}-[01]\d-[0-3]\dT%{TIME}%{ISO8601_TIMEZONE}
#
SSHD_TERMINATEPattern :
Received signal %{NUMBER:sshd_signal}; terminating.
#
BACULA_LOG_NOSTATPattern :
\s+Could not stat %{DATA}: ERR=%{GREEDYDATA:berror}
#
UUIDPattern :
[A-Fa-f0-9]{8}-(?:[A-Fa-f0-9]{4}-){3}[A-Fa-f0-9]{12}
#
SSHD_LOGOUT_ERRPattern :
syslogin_perform_logout: logout\(\) returned an error
#
RCONTROLLERPattern :
%{RAILS_CONSTROLLER:controller}#%{RAIL_ACTION:action}
#
DATESTAMP_EVENTLOGPattern :
%{YEAR}%{MONTHNUM2}%{MONTHDAY}%{HOUR}%{MINUTE}%{SECOND}
#
JAVACLASSPattern :
(?:[a-zA-Z$_][a-zA-Z$_0-9]*\.)*[a-zA-Z$_][a-zA-Z$_0-9]*
#
RFC3339NANOPattern :
%{YEAR}-[01]\d-[0-3]\dT%{TIME}\.\d{9}%{ISO8601_TIMEZONE}
#
NGINXERRTIMEPattern :
%{YEAR}/%{MONTHNUM2}/%{DAY2} %{HOUR}:%{MINUTE}:%{SECOND}
#
BACULA_LOG_BEGIN_PRUNE_JOBSPattern :
Begin pruning Jobs older than %{INT} month %{INT} days .
#
BACULA_LOG_NEW_VOLUMEPattern :
Created new Volume \"%{BACULA_VOLUME:volume}\" in catalog.
#
BACULA_LOG_MARKCANCELPattern :
JobId %{INT}, Job %{BACULA_JOB:job} marked to be canceled.
#
SSHD_TCPWRAP_FAIL5Pattern :
warning: can't get client address: Connection reset by peer
#
EXIM_INTERFACEPattern :
(I=\[%{IP:exim_interface}\](:%{NUMBER:exim_interface_port}))
#
BACULA_LOG_NOOPENDIRPattern :
\s+Could not open directory %{DATA}: ERR=%{GREEDYDATA:berror}
#
BACULA_LOG_CLIENT_RBJPattern :
shell command: run ClientRunBeforeJob \"%{GREEDYDATA:runjob}\"
#
SSHD_IDENT_FAILPattern :
Did not receive identification string from %{IP:sshd_client_ip}
#
BACULA_LOG_MAXSTARTPattern :
Fatal error: Job canceled because max start delay time exceeded.
#
DATESTAMP_RFC2822Pattern :
%{DAY}, %{MONTHDAY} %{MONTH} %{YEAR} %{TIME} %{ISO8601_TIMEZONE}
#
REDISLOG2Pattern :
%{POSINT:pid}:M %{REDISTIMESTAMP:time} [*#] %{GREEDYDATA:message}
#
QUOTEDSTRINGPattern :
("(\\.|[^\\"]+)+")|""|('(\\.|[^\\']+)+')|''|(`(\\.|[^\\`]+)+`)|``
#
BACULA_LOG_PRUNED_JOBSPattern :
Pruned %{INT} Jobs* for client %{BACULA_HOST:client} from catalog.
#
RT_FLOW_EVENTPattern :
(RT_FLOW_SESSION_CREATE|RT_FLOW_SESSION_CLOSE|RT_FLOW_SESSION_DENY)
#
CISCOFW302010Pattern :
%{INT:connection_count} in use, %{INT:connection_count_max} most used
#
BACULA_LOG_NOSUITPattern :
No prior or suitable Full backup found in catalog. Doing FULL backup.
#
SSHD_SESSION_CLOSEPattern :
pam_unix\(sshd:session\): session closed for user %{USERNAME:sshd_user}
#
SSHD_INVAL_USERPattern :
Invalid user\s*%{USERNAME:sshd_invalid_user}? from %{IP:sshd_client_ip}
#
MONGO_LOGPattern :
%{SYSLOGTIMESTAMP:timestamp} \[%{WORD:component}\] %{GREEDYDATA:message}
#
BACULA_LOG_JOBPattern :
(Error: )?Bacula %{BACULA_HOST} %{BACULA_VERSION} \(%{BACULA_VERSION}\):
#
BACULA_LOG_READYAPPENDPattern :
Ready to append to end of Volume \"%{BACULA_VOLUME:volume}\" size=%{INT}
#
CRONLOGPattern :
%{SYSLOGBASE} \(%{USER:user}\) %{CRON_ACTION:action} \(%{DATA:message}\)
#
URIPattern :
%{URIPROTO}://(?:%{USER}(?::[^@]*)?@)?(?:%{URIHOST})?(?:%{URIPATHPARAM})?
#
SSHD_LISTENPattern :
Server listening on %{IP:sshd_listen_ip} port %{NUMBER:sshd_listen_port}.
#
HAPROXYTIMEPattern :
%{HOUR:haproxy_hour}:%{MINUTE:haproxy_minute}(?::%{SECOND:haproxy_second})
#
RAILS3Pattern :
%{RAILS3HEAD}(?:%{RPROCESSING})?%{RAILS_CONTEXT:context}(?:%{RAILS3FOOT})?
#
BASE16FLOATPattern :
\b[+-]?(?:0x)?(?:(?:[0-9A-Fa-f]+(?:\.[0-9A-Fa-f]*)?)|(?:\.[0-9A-Fa-f]+))\b
#
CISCOFW104001Pattern :
\((?:Primary|Secondary)\) Switching to ACTIVE - %{GREEDYDATA:switch_reason}
#
HOSTNAMEPattern :
\b[0-9A-Za-z][0-9A-Za-z-]{0,62}(?:\.[0-9A-Za-z][0-9A-Za-z-]{0,62})*(\.?|\b)
#
CISCOFW105008Pattern :
\((?:Primary|Secondary)\) Testing [Ii]nterface %{GREEDYDATA:interface_name}
#
CATALINA_DATESTAMPPattern :
%{MONTH} %{MONTHDAY}, 20%{YEAR} %{HOUR}:?%{MINUTE}(?::?%{SECOND}) (?:AM|PM)
#
CISCOFW104002Pattern :
\((?:Primary|Secondary)\) Switching to STANDBY - %{GREEDYDATA:switch_reason}
#
BACULA_LOG_VOLUME_PREVWRITTENPattern :
Volume \"%{BACULA_VOLUME:volume}\" previously written, moving to end of data.
#
BACULA_LOG_PRUNED_FILESPattern :
Pruned Files from %{INT} Jobs* for client %{BACULA_HOST:client} from catalog.
#
SSHD_BAD_VERSIONPattern :
Bad protocol version identification '%{GREEDYDATA}' from %{IP:sshd_client_ip}
#
SSHD_BADL_PREAUTHPattern :
Bad packet length %{NUMBER:sshd_packet_length}. \[%{GREEDYDATA:sshd_privsep}\]
#
EXIM_DATEPattern :
%{YEAR:exim_year}-%{MONTHNUM:exim_month}-%{MONTHDAY:exim_day} %{TIME:exim_time}
#
BACULA_LOG_DUPLICATEPattern :
Fatal error: JobId %{INT:duplicate} already running. Duplicate job not allowed.
#
RAILS_TIMESTAMPPattern :
%{YEAR}-%{MONTHNUM}-%{MONTHDAY} %{HOUR}:%{MINUTE}:%{SECOND} %{ISO8601_TIMEZONE}
#
SSHD_TUNN_ERR1Pattern :
error: connect_to %{IP:sshd_listen_ip} port %{NUMBER:sshd_listen_port}: failed.
#
CATALINALOGPattern :
%{CATALINA_DATESTAMP:timestamp} %{JAVACLASS:class} %{JAVALOGMESSAGE:logmessage}
#
SSHD_REFUSE_CONNPattern :
refused connect from %{DATA:sshd_client_hostname} \(%{IPORHOST:sshd_client_ip}\)
#
BACULA_LOG_ALL_RECORDS_PRUNEDPattern :
All records pruned from Volume \"%{BACULA_VOLUME:volume}\"; marking it \"Purged\"
#
SSHD_TOOMANY_AUTHPattern :
Disconnecting: Too many authentication failures for %{USERNAME:sshd_invalid_user}
#
SSHD_DISR_PREAUTHPattern :
Disconnecting: %{GREEDYDATA:sshd_disconnect_status} \[%{GREEDYDATA:sshd_privsep}\]
#
MCOLLECTIVEPattern :
., \[%{TIMESTAMP_ISO8601:timestamp} #%{POSINT:pid}\]%{SPACE}%{LOGLEVEL:event_level}
#
SSHD_TUNN_ERR2Pattern :
error: channel_setup_fwd_listener: cannot listen to port: %{NUMBER:sshd_listen_port}
#
BACULA_LOG_DIFF_FSPattern :
\s+%{UNIXPATH} is a different filesystem. Will not descend from %{UNIXPATH} into it.
#
BACULA_LOG_NO_AUTHPattern :
Fatal error: Unable to authenticate with File daemon at %{HOSTNAME}. Possible causes:
#
CISCOFW321001Pattern :
Resource '%{WORD:resource_name}' limit of %{POSINT:resource_limit} reached for system
#
ELB_REQUEST_LINEPattern :
(?:%{WORD:verb} %{ELB_URI:request}(?: HTTP/%{NUMBER:httpversion})?|%{DATA:rawrequest})
#
POSTGRESQLPattern :
%{DATESTAMP:timestamp} %{TZ} %{DATA:user_id} %{GREEDYDATA:connection_id} %{POSINT:pid}
#
SSHD_SESSION_OPENPattern :
pam_unix\(sshd:session\): session opened for user %{USERNAME:sshd_user} by \(uid=\d+\)
#
S3_REQUEST_LINEPattern :
(?:%{WORD:verb} %{NOTSPACE:request}(?: HTTP/%{NUMBER:httpversion})?|%{DATA:rawrequest})
#
TOMCAT_DATESTAMPPattern :
20%{YEAR}-%{MONTHNUM}-%{MONTHDAY} %{HOUR}:?%{MINUTE}(?::?%{SECOND}) %{ISO8601_TIMEZONE}
#
CISCOFW105004Pattern :
\((?:Primary|Secondary)\) Monitoring on [Ii]nterface %{GREEDYDATA:interface_name} normal
#
RAILS3FOOTPattern :
Completed %{NUMBER:response}%{DATA} in %{NUMBER:totalms}ms %{RAILS3PROFILE}%{GREEDYDATA}
#
CISCOFW105003Pattern :
\((?:Primary|Secondary)\) Monitoring on [Ii]nterface %{GREEDYDATA:interface_name} waiting
#
TIMESTAMP_ISO8601Pattern :
%{YEAR}-%{MONTHNUM}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})?%{ISO8601_TIMEZONE}?
#
BACULA_LOG_JOBENDPattern :
Job write elapsed time = %{DATA:elapsed}, Transfer rate = %{NUMBER} (K|M|G)? Bytes/second
#
SYSLOGBASEPattern :
%{SYSLOGTIMESTAMP:timestamp} (?:%{SYSLOGFACILITY} )?%{SYSLOGHOST:logsource} %{SYSLOGPROG}:
#
SSHD_TUNN_ERR4Pattern :
error: channel_setup_fwd_listener_tcpip: cannot listen to port: %{NUMBER:sshd_listen_port}
#
MODSECPREFIXPattern :
%{APACHEERRORPREFIX} ModSecurity: %{NOTSPACE:modsecseverity}\. %{GREEDYDATA:modsecmessage}
#
DAYPattern :
Mon(?:day)?|Tue(?:sday)?|Wed(?:nesday)?|Thu(?:rsday)?|Fri(?:day)?|Sat(?:urday)?|Sun(?:day)?
#
JAVASTACKTRACEPARTPattern :
%{SPACE}at %{JAVACLASS:class}\.%{JAVAMETHOD:method}\(%{JAVAFILE:file}(?::%{NUMBER:line})?\)
#
ELB_URIPattern :
%{URIPROTO:proto}://(?:%{USER}(?::[^@]*)?@)?(?:%{URIHOST:urihost})?(?:%{ELB_URIPATHPARAM})?
#
EXIM_REMOTE_HOSTPattern :
(H=(%{NOTSPACE:remote_hostname} )?(\(%{NOTSPACE:remote_heloname}\) )?\[%{IP:remote_host}\])
#
SSHD_SESSION_FAILPattern :
pam_systemd\(sshd:session\): Failed to release session: %{GREEDYDATA:sshd_disconnect_status}
#
SSHD_TUNNPattern :
%{SSHD_TUNN_ERR1}|%{SSHD_TUNN_ERR2}|%{SSHD_TUNN_ERR3}|%{SSHD_TUNN_ERR4}|%{SSHD_TUNN_TIMEOUT}
#
BACULA_LOG_NOJOBSPattern :
There are no more Jobs associated with Volume \"%{BACULA_VOLUME:volume}\". Marking it purged.
#
RPROCESSINGPattern :
\W*Processing by %{RCONTROLLER} as %{NOTSPACE:format}(?:\W*Parameters: \{\%\{DATA:params}}\W*)?
#
CISCOFW105009Pattern :
\((?:Primary|Secondary)\) Testing on [Ii]nterface %{GREEDYDATA:interface_name} (?:Passed|Failed)
#
SSHD_LOGPattern :
%{SSHD_INIT}|%{SSHD_NORMAL_LOG}|%{SSHD_PROBE_LOG}|%{SSHD_CORRUPTED}|%{SSHD_TUNN}|%{SSHD_PREAUTH}
#
SSHD_DISC_PREAUTHPattern :
Disconnected from %{IP:sshd_client_ip} port %{NUMBER:sshd_port}\s*(?:\[%{GREEDYDATA:sshd_privsep}\]|)
#
TOMCATLOGPattern :
%{TOMCAT_DATESTAMP:timestamp} \| %{LOGLEVEL:level} \| %{JAVACLASS:class} - %{JAVALOGMESSAGE:logmessage}
#
SSHD_REST_PREAUTHPattern :
Connection reset by %{IP:sshd_client_ip} port %{NUMBER:sshd_port}\s*(?:\[%{GREEDYDATA:sshd_privsep}\]|)
#
SSHD_CLOS_PREAUTHPattern :
Connection closed by %{IP:sshd_client_ip} port %{NUMBER:sshd_port}\s*(?:\[%{GREEDYDATA:sshd_privsep}\]|)
#
CISCO_TAGGED_SYSLOGPattern :
^<%{POSINT:syslog_pri}>%{CISCOTIMESTAMP:timestamp}( %{SYSLOGHOST:sysloghost})? ?: %%{CISCOTAG:ciscotag}:
#
SSHD_INVA_PREAUTHPattern :
input_userauth_request: invalid user %{USERNAME:sshd_invalid_user}?\s*(?:\[%{GREEDYDATA:sshd_privsep}\]|)
#
RAILS3HEADPattern :
(?m)Started %{WORD:verb} "%{URIPATHPARAM:request}" for %{IPORHOST:clientip} at %{RAILS_TIMESTAMP:timestamp}
#
CISCOFW105005Pattern :
\((?:Primary|Secondary)\) Lost Failover communications with mate on [Ii]nterface %{GREEDYDATA:interface_name}
#
BACULA_LOG_NEW_LABELPattern :
Labeled new Volume \"%{BACULA_VOLUME:volume}\" on device \"%{BACULA_DEVICE:device}\" \(%{BACULA_DEVICEPATH}\).
#
CISCO_ACTIONPattern :
Built|Teardown|Deny|Denied|denied|requested|permitted|denied by ACL|discarded|est-allowed|Dropping|created|deleted
#
NAGIOS_EC_LINE_ENABLE_HOST_CHECKPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_ENABLE_HOST_CHECK:nagios_command};%{DATA:nagios_hostname}
#
COWRIE_NEW_COPattern :
New connection: %{IPV4:source_ip}:[0-9]+ \(%{IPV4:dest_ip}:%{INT:dest_port}\) \[session: %{DATA:telnet_session}\]$
#
NAGIOS_EC_LINE_DISABLE_HOST_CHECKPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_DISABLE_HOST_CHECK:nagios_command};%{DATA:nagios_hostname}
#
CISCOFW402117Pattern :
%{WORD:protocol}: Received a non-IPSec packet \(protocol= %{WORD:orig_protocol}\) from %{IP:src_ip} to %{IP:dst_ip}
#
BACULA_LOG_WROTE_LABELPattern :
Wrote label to prelabeled Volume \"%{BACULA_VOLUME:volume}\" on device \"%{BACULA_DEVICE}\" \(%{BACULA_DEVICEPATH}\)
#
CISCOFW500004Pattern :
%{CISCO_REASON:reason} for protocol=%{WORD:protocol}, from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
#
RAILS3PROFILEPattern :
(?:\(Views: %{NUMBER:viewms}ms \| ActiveRecord: %{NUMBER:activerecordms}ms|\(ActiveRecord: %{NUMBER:activerecordms}ms)?
#
NAGIOS_PASSIVE_HOST_CHECKPattern :
%{NAGIOS_TYPE_PASSIVE_HOST_CHECK:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_state};%{GREEDYDATA:nagios_comment}
#
NAGIOS_TIMEPERIOD_TRANSITIONPattern :
%{NAGIOS_TYPE_TIMEPERIOD_TRANSITION:nagios_type}: %{DATA:nagios_service};%{DATA:nagios_unknown1};%{DATA:nagios_unknown2}
#
NAGIOS_HOST_DOWNTIME_ALERTPattern :
%{NAGIOS_TYPE_HOST_DOWNTIME_ALERT:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_state};%{GREEDYDATA:nagios_comment}
#
HTTPD20_ERRORLOGPattern :
\[%{HTTPDERROR_DATE:timestamp}\] \[%{LOGLEVEL:loglevel}\] (?:\[client %{IPORHOST:clientip}\] ){0,1}%{GREEDYDATA:errormsg}
#
NAGIOS_HOST_FLAPPING_ALERTPattern :
%{NAGIOS_TYPE_HOST_FLAPPING_ALERT:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_state};%{GREEDYDATA:nagios_message}
#
MYSQL_AUTH_FAILPattern :
%{TIMESTAMP_ISO8601:time} %{NUMBER} \[Note\] Access denied for user '%{DATA:user}'@'%{IP:source_ip}' \(using password: YES\)
#
NGINXERRORPattern :
%{NGINXERRTIME:time} \[%{LOGLEVEL:loglevel}\] %{NONNEGINT:pid}#%{NONNEGINT:tid}: (\*%{NONNEGINT:cid} )?%{GREEDYDATA:message}
#
BACULA_LOG_MAX_CAPACITYPattern :
User defined maximum volume capacity %{BACULA_CAPACITY} exceeded on device \"%{BACULA_DEVICE:device}\" \(%{BACULA_DEVICEPATH}\)
#
HAPROXYDATEPattern :
%{MONTHDAY:haproxy_monthday}/%{MONTH:haproxy_month}/%{YEAR:haproxy_year}:%{HAPROXYTIME:haproxy_time}.%{INT:haproxy_milliseconds}
#
NAGIOS_EC_LINE_ENABLE_HOST_NOTIFICATIONSPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_ENABLE_HOST_NOTIFICATIONS:nagios_command};%{GREEDYDATA:nagios_hostname}
#
CISCOFW106021Pattern :
%{CISCO_ACTION:action} %{WORD:protocol} reverse path check from %{IP:src_ip} to %{IP:dst_ip} on interface %{GREEDYDATA:interface}
#
NAGIOS_EC_LINE_DISABLE_HOST_NOTIFICATIONSPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_DISABLE_HOST_NOTIFICATIONS:nagios_command};%{GREEDYDATA:nagios_hostname}
#
RUBY_LOGGERPattern :
[DFEWI], \[%{TIMESTAMP_ISO8601:timestamp} #%{POSINT:pid}\] *%{RUBY_LOGLEVEL:loglevel} -- +%{DATA:progname}: %{GREEDYDATA:message}
#
CISCOFW110002Pattern :
%{CISCO_REASON:reason} for %{WORD:protocol} from %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
#
NAGIOS_EC_LINE_ENABLE_HOST_SVC_NOTIFICATIONSPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_ENABLE_HOST_SVC_NOTIFICATIONS:nagios_command};%{GREEDYDATA:nagios_hostname}
#
NAGIOS_EC_LINE_DISABLE_HOST_SVC_NOTIFICATIONSPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_DISABLE_HOST_SVC_NOTIFICATIONS:nagios_command};%{GREEDYDATA:nagios_hostname}
#
HAPROXYHTTPPattern :
(?:%{SYSLOGTIMESTAMP:syslog_timestamp}|%{TIMESTAMP_ISO8601:timestamp8601}) %{IPORHOST:syslog_server} %{SYSLOGPROG}: %{HAPROXYHTTPBASE}
#
SSHD_RMAP_FAILPattern :
reverse mapping checking getaddrinfo for %{HOSTNAME:sshd_client_hostname} \[%{IP:sshd_client_ip}\] failed - POSSIBLE BREAK-IN ATTEMPT!
#
SYSLOGBASE2Pattern :
(?:%{SYSLOGTIMESTAMP:timestamp}|%{TIMESTAMP_ISO8601:timestamp8601}) (?:%{SYSLOGFACILITY} )?%{SYSLOGHOST:logsource}+(?: %{SYSLOGPROG}:|)
#
SSHD_USER_FAILPattern :
Failed password for invalid user %{USERNAME:sshd_invalid_user} from %{IP:sshd_client_ip} port %{NUMBER:sshd_port} %{WORD:sshd_protocol}
#
NAGIOS_EC_LINE_ENABLE_SVC_CHECKPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_ENABLE_SVC_CHECK:nagios_command};%{DATA:nagios_hostname};%{DATA:nagios_service}
#
SSHD_NORMAL_LOGPattern :
%{SSHD_SUCCESS}|%{SSHD_DISCONNECT}|%{SSHD_CONN_CLOSE}|%{SSHD_SESSION_OPEN}|%{SSHD_SESSION_CLOSE}|%{SSHD_SESSION_FAIL}|%{SSHD_LOGOUT_ERR}
#
SSHD_FAILPattern :
Failed %{WORD:sshd_auth_type} for %{USERNAME:sshd_invalid_user} from %{IP:sshd_client_ip} port %{NUMBER:sshd_port} %{WORD:sshd_protocol}
#
CISCO_REASONPattern :
Duplicate TCP SYN|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
#
NAGIOS_EC_LINE_DISABLE_SVC_CHECKPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_DISABLE_SVC_CHECK:nagios_command};%{DATA:nagios_hostname};%{DATA:nagios_service}
#
SSHD_CORRUPTEDPattern :
%{SSHD_IDENT_FAIL}|%{SSHD_MAPB_FAIL}|%{SSHD_RMAP_FAIL}|%{SSHD_TOOMANY_AUTH}|%{SSHD_CORRUPT_MAC}|%{SSHD_PACKET_CORRUPT}|%{SSHD_BAD_VERSION}
#
SSHD_DISCONNECTPattern :
Received disconnect from %{IP:sshd_client_ip} port %{NUMBER:sshd_port}:%{NUMBER:sshd_disconnect_code}: %{GREEDYDATA:sshd_disconnect_status}
#
BACULA_LOG_NO_CONNECTPattern :
Warning: bsock.c:127 Could not connect to (Client: %{BACULA_HOST:client}|Storage daemon) on %{HOSTNAME}:%{POSINT}. ERR=%{GREEDYDATA:berror}
#
SSHD_MAPB_FAILPattern :
Address %{IP:sshd_client_ip} maps to %{HOSTNAME:sshd_client_hostname}, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
#
SSHD_TCPWRAP_FAIL2Pattern :
warning: %{DATA:sshd_tcpd_file}, line %{NUMBER}: host name/address mismatch: %{IPORHOST:sshd_client_ip} != %{HOSTNAME:sshd_paranoid_hostname}
#
MONGO3_LOGPattern :
%{TIMESTAMP_ISO8601:timestamp} %{MONGO3_SEVERITY:severity} %{MONGO3_COMPONENT:component}%{SPACE}(?:\[%{DATA:context}\])? %{GREEDYDATA:message}
#
BACULA_LOG_FATAL_CONNPattern :
Fatal error: bsock.c:133 Unable to connect to (Client: %{BACULA_HOST:client}|Storage daemon) on %{HOSTNAME}:%{POSINT}. ERR=%{GREEDYDATA:berror}
#
SSHD_TCPWRAP_FAIL4Pattern :
warning: %{DATA:sshd_tcpd_file}, line %{NUMBER}: host name/name mismatch: reverse lookup results in non-FQDN %{HOSTNAME:sshd_paranoid_hostname}
#
NAGIOS_PASSIVE_SERVICE_CHECKPattern :
%{NAGIOS_TYPE_PASSIVE_SERVICE_CHECK:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_service};%{DATA:nagios_state};%{GREEDYDATA:nagios_comment}
#
CISCOFW710001_710002_710003_710005_710006Pattern :
%{WORD:protocol} (?:request|access) %{CISCO_ACTION:action} from %{IP:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port}
#
NAGIOS_SERVICE_FLAPPING_ALERTPattern :
%{NAGIOS_TYPE_SERVICE_FLAPPING_ALERT:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_service};%{DATA:nagios_state};%{GREEDYDATA:nagios_message}
#
NAGIOS_SERVICE_DOWNTIME_ALERTPattern :
%{NAGIOS_TYPE_SERVICE_DOWNTIME_ALERT:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_service};%{DATA:nagios_state};%{GREEDYDATA:nagios_comment}
#
TCPDUMP_OUTPUTPattern :
%{GREEDYDATA:timestamp} IP %{IPORHOST:source_ip}\.%{INT:source_port} > %{IPORHOST:dest_ip}\.%{INT:dest_port}: Flags \[%{GREEDYDATA:tcpflags}\], seq
#
SSHD_TCPWRAP_FAIL1Pattern :
warning: %{DATA:sshd_tcpd_file}, line %{NUMBER}: can't verify hostname: getaddrinfo\(%{DATA:sshd_paranoid_hostname}, %{DATA:sshd_sa_family}\) failed
#
SSHD_FAIL_PREAUTHPattern :
fatal: Unable to negotiate with %{IP:sshd_client_ip} port %{NUMBER:sshd_port}:\s*%{GREEDYDATA:sshd_disconnect_status}? \[%{GREEDYDATA:sshd_privsep}\]
#
SSHD_TCPWRAP_FAIL3Pattern :
warning: %{DATA:sshd_tcpd_file}, line %{NUMBER}: host name/name mismatch: %{HOSTNAME:sshd_paranoid_hostname_1} != %{HOSTNAME:sshd_paranoid_hostname_2}
#
NAGIOS_EC_LINE_ENABLE_SVC_NOTIFICATIONSPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_ENABLE_SVC_NOTIFICATIONS:nagios_command};%{DATA:nagios_hostname};%{GREEDYDATA:nagios_service}
#
NAGIOS_EC_LINE_DISABLE_SVC_NOTIFICATIONSPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_DISABLE_SVC_NOTIFICATIONS:nagios_command};%{DATA:nagios_hostname};%{GREEDYDATA:nagios_service}
#
NAGIOS_HOST_EVENT_HANDLERPattern :
%{NAGIOS_TYPE_HOST_EVENT_HANDLER:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_state};%{DATA:nagios_statelevel};%{DATA:nagios_event_handler_name}
#
CISCOFW313001_313004_313008Pattern :
%{CISCO_ACTION:action} %{WORD:protocol} type=%{INT:icmp_type}, code=%{INT:icmp_code} from %{IP:src_ip} on interface %{DATA:interface}( to %{IP:dst_ip})?
#
BACULA_LOG_END_VOLUMEPattern :
End of medium on Volume \"%{BACULA_VOLUME:volume}\" Bytes=%{BACULA_CAPACITY} Blocks=%{BACULA_CAPACITY} at %{MONTHDAY}-%{MONTH}-%{YEAR} %{HOUR}:%{MINUTE}.
#
SSHD_SUCCESSPattern :
Accepted %{WORD:sshd_auth_type} for %{USERNAME:sshd_user} from %{IP:sshd_client_ip} port %{NUMBER:sshd_port} %{WORD:sshd_protocol}: %{GREEDYDATA:sshd_cipher}
#
SMB_AUTH_FAILPattern :
Auth:%{GREEDYDATA} user \[%{DATA:smb_domain}\]\\\[%{DATA:user}\]%{GREEDYDATA} status \[NT_STATUS_NO_SUCH_USER\]%{GREEDYDATA} remote host \[ipv4:%{IP:ip_source}
#
BACULA_LOG_NEW_MOUNTPattern :
New volume \"%{BACULA_VOLUME:volume}\" mounted on device \"%{BACULA_DEVICE:device}\" \(%{BACULA_DEVICEPATH}\) at %{MONTHDAY}-%{MONTH}-%{YEAR} %{HOUR}:%{MINUTE}.
#
NAGIOS_HOST_ALERTPattern :
%{NAGIOS_TYPE_HOST_ALERT:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_state};%{DATA:nagios_statelevel};%{NUMBER:nagios_attempt};%{GREEDYDATA:nagios_message}
#
NAGIOS_HOST_NOTIFICATIONPattern :
%{NAGIOS_TYPE_HOST_NOTIFICATION:nagios_type}: %{DATA:nagios_notifyname};%{DATA:nagios_hostname};%{DATA:nagios_state};%{DATA:nagios_contact};%{GREEDYDATA:nagios_message}
#
SYSLOGPAMSESSIONPattern :
%{SYSLOGBASE} %{GREEDYDATA:message}%{WORD:pam_module}\(%{DATA:pam_caller}\): session %{WORD:pam_session_state} for user %{USERNAME:username}(?: by %{GREEDYDATA:pam_by})?
#
NAGIOS_CURRENT_HOST_STATEPattern :
%{NAGIOS_TYPE_CURRENT_HOST_STATE:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_state};%{DATA:nagios_statetype};%{DATA:nagios_statecode};%{GREEDYDATA:nagios_message}
#
CISCOFW419002Pattern :
%{CISCO_REASON:reason} from %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port} with different initial sequence number
#
IPV4Pattern :
(?:(?:[0-1]?[0-9]{1,2}|2[0-4][0-9]|25[0-5])[.](?:[0-1]?[0-9]{1,2}|2[0-4][0-9]|25[0-5])[.](?:[0-1]?[0-9]{1,2}|2[0-4][0-9]|25[0-5])[.](?:[0-1]?[0-9]{1,2}|2[0-4][0-9]|25[0-5]))
#
SSHD_FAI2_PREAUTHPattern :
fatal: %{GREEDYDATA:sshd_fatal_status}: Connection from %{IP:sshd_client_ip} port %{NUMBER:sshd_port}:\s*%{GREEDYDATA:sshd_disconnect_status}? \[%{GREEDYDATA:sshd_privsep}\]
#
APACHEERRORPREFIXPattern :
\[%{APACHEERRORTIME:timestamp}\] \[%{NOTSPACE:apacheseverity}\] (\[pid %{INT}:tid %{INT}\] )?\[client %{IPORHOST:sourcehost}(:%{INT:source_port})?\] (\[client %{IPORHOST}\])?
#
NAGIOS_SERVICE_EVENT_HANDLERPattern :
%{NAGIOS_TYPE_SERVICE_EVENT_HANDLER:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_service};%{DATA:nagios_state};%{DATA:nagios_statelevel};%{DATA:nagios_event_handler_name}
#
NAGIOS_EC_LINE_PROCESS_HOST_CHECK_RESULTPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_PROCESS_HOST_CHECK_RESULT:nagios_command};%{DATA:nagios_hostname};%{DATA:nagios_state};%{GREEDYDATA:nagios_check_result}
#
NAXSI_EXLOGPattern :
^NAXSI_EXLOG: ip=%{IPORHOST:naxsi_src_ip}&server=%{IPORHOST:naxsi_dst_ip}&uri=%{PATH:http_path}&id=%{INT:naxsi_id}&zone=%{WORD:naxsi_zone}&var_name=%{DATA:naxsi_var_name}&content=
#
SSHD_PROBE_LOGPattern :
%{SSHD_REFUSE_CONN}|%{SSHD_TCPWRAP_FAIL1}|%{SSHD_TCPWRAP_FAIL2}|%{SSHD_TCPWRAP_FAIL3}|%{SSHD_TCPWRAP_FAIL4}|%{SSHD_TCPWRAP_FAIL5}|%{SSHD_FAIL}|%{SSHD_USER_FAIL}|%{SSHD_INVAL_USER}
#
MONTHPattern :
\bJan(?:uary|uar)?|Feb(?:ruary|ruar)?|M(?:a|ä)?r(?:ch|z)?|Apr(?:il)?|Ma(?:y|i)?|Jun(?:e|i)?|Jul(?:y)?|Aug(?:ust)?|Sep(?:tember)?|O(?:c|k)?t(?:ober)?|Nov(?:ember)?|De(?:c|z)(?:ember)?\b
#
CISCOFW419001Pattern :
%{CISCO_ACTION:action} %{WORD:protocol} packet from %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port}, reason: %{GREEDYDATA:reason}
#
SSHD_PREAUTHPattern :
%{SSHD_DISC_PREAUTH}|%{SSHD_MAXE_PREAUTH}|%{SSHD_DISR_PREAUTH}|%{SSHD_INVA_PREAUTH}|%{SSHD_REST_PREAUTH}|%{SSHD_FAIL_PREAUTH}|%{SSHD_CLOS_PREAUTH}|%{SSHD_FAI2_PREAUTH}|%{SSHD_BADL_PREAUTH}
#
NAGIOS_SERVICE_ALERTPattern :
%{NAGIOS_TYPE_SERVICE_ALERT:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_service};%{DATA:nagios_state};%{DATA:nagios_statelevel};%{NUMBER:nagios_attempt};%{GREEDYDATA:nagios_message}
#
CISCOFW106015Pattern :
%{CISCO_ACTION:action} %{WORD:protocol} \(%{DATA:policy_id}\) from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{DATA:tcp_flags} on interface %{GREEDYDATA:interface}
#
CISCOFW602303_602304Pattern :
%{WORD:protocol}: An %{CISCO_DIRECTION:direction} %{GREEDYDATA:tunnel_type} SA \(SPI= %{DATA:spi}\) between %{IP:src_ip} and %{IP:dst_ip} \(user= %{DATA:user}\) has been %{CISCO_ACTION:action}
#
NAGIOS_SERVICE_NOTIFICATIONPattern :
%{NAGIOS_TYPE_SERVICE_NOTIFICATION:nagios_type}: %{DATA:nagios_notifyname};%{DATA:nagios_hostname};%{DATA:nagios_service};%{DATA:nagios_state};%{DATA:nagios_contact};%{GREEDYDATA:nagios_message}
#
RT_FLOW3Pattern :
%{RT_FLOW_EVENT:event}: session denied %{IP:src-ip}/%{INT:src-port}->%{IP:dst-ip}/%{INT:dst-port} %{DATA:service} %{INT:protocol-id}\(\d\) %{DATA:policy-name} %{DATA:from-zone} %{DATA:to-zone} .*
#
NAGIOS_CURRENT_SERVICE_STATEPattern :
%{NAGIOS_TYPE_CURRENT_SERVICE_STATE:nagios_type}: %{DATA:nagios_hostname};%{DATA:nagios_service};%{DATA:nagios_state};%{DATA:nagios_statetype};%{DATA:nagios_statecode};%{GREEDYDATA:nagios_message}
#
CISCOFW713172Pattern :
Group = %{GREEDYDATA:group}, IP = %{IP:src_ip}, Automatic NAT Detection Status:\s+Remote end\s*%{DATA:is_remote_natted}\s*behind a NAT device\s+This\s+end\s*%{DATA:is_local_natted}\s*behind a NAT device
#
CISCOFW402119Pattern :
%{WORD:protocol}: Received an %{WORD:orig_protocol} packet \(SPI= %{DATA:spi}, sequence number= %{DATA:seq_num}\) from %{IP:src_ip} \(user= %{DATA:user}\) to %{IP:dst_ip} that failed anti-replay checking
#
NAGIOS_EC_LINE_PROCESS_SERVICE_CHECK_RESULTPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_PROCESS_SERVICE_CHECK_RESULT:nagios_command};%{DATA:nagios_hostname};%{DATA:nagios_service};%{DATA:nagios_state};%{GREEDYDATA:nagios_check_result}
#
COMMONAPACHELOGPattern :
%{IPORHOST:clientip} %{HTTPDUSER:ident} %{USER:auth} \[%{HTTPDATE:timestamp}\] "(?:%{WORD:verb} %{NOTSPACE:request}(?: HTTP/%{NUMBER:httpversion})?|%{DATA:rawrequest})" %{NUMBER:response} (?:%{NUMBER:bytes}|-)
#
SSHD_MAXE_PREAUTHPattern :
error: maximum authentication attempts exceeded for (?:invalid user |)%{USERNAME:sshd_invalid_user} from %{IP:sshd_client_ip} port %{NUMBER:sshd_port} %{WORD:sshd_protocol}\s*(?:\[%{GREEDYDATA:sshd_privsep}\]|)
#
CISCOFW106001Pattern :
%{CISCO_DIRECTION:direction} %{WORD:protocol} connection %{CISCO_ACTION:action} from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{GREEDYDATA:tcp_flags} on interface %{GREEDYDATA:interface}
#
LOGLEVELPattern :
[Aa]lert|ALERT|[Tt]race|TRACE|[Dd]ebug|DEBUG|[Nn]otice|NOTICE|[Ii]nfo|INFO|[Ww]arn?(?:ing)?|WARN?(?:ING)?|[Ee]rr?(?:or)?|ERR?(?:OR)?|[Cc]rit?(?:ical)?|CRIT?(?:ICAL)?|[Ff]atal|FATAL|[Ss]evere|SEVERE|EMERG(?:ENCY)?|[Ee]merg(?:ency)?
#
CISCOFW305011Pattern :
%{CISCO_ACTION:action} %{CISCO_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IP:src_ip}(/%{INT:src_port})?(\(%{DATA:src_fwuser}\))? to %{DATA:src_xlated_interface}:%{IP:src_xlated_ip}/%{DATA:src_xlated_port}
#
MONGO_SLOWQUERYPattern :
%{WORD} %{MONGO_WORDDASH:database}\.%{MONGO_WORDDASH:collection} %{WORD}: %{MONGO_QUERY:query} %{WORD}:%{NONNEGINT:ntoreturn} %{WORD}:%{NONNEGINT:ntoskip} %{WORD}:%{NONNEGINT:nscanned}.*nreturned:%{NONNEGINT:nreturned}..+ %{POSINT:duration}ms
#
NAXSI_FMTPattern :
^NAXSI_FMT: ip=%{IPORHOST:src_ip}&server=%{IPORHOST:target_ip}&uri=%{PATH:http_path}&learning=\d&vers=%{DATA:naxsi_version}&total_processed=\d+&total_blocked=\d+&block=\d+(&cscore\d=%{WORD:score_label}&score\d=%{INT:score})+&zone0=%{WORD:zone}
#
CISCOFW106014Pattern :
%{CISCO_ACTION:action} %{CISCO_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:src_fwuser}\))? dst %{DATA:dst_interface}:%{IP:dst_ip}(\(%{DATA:dst_fwuser}\))? \(type %{INT:icmp_type}, code %{INT:icmp_code}\)
#
NGINXACCESSPattern :
%{IPORHOST:remote_addr} - %{NGUSER:remote_user} \[%{HTTPDATE:time_local}\] "%{WORD:method} %{URIPATHPARAM:request} HTTP/%{NUMBER:http_version}" %{NUMBER:status} %{NUMBER:body_bytes_sent} "%{NOTDQUOTE:http_referer}" "%{NOTDQUOTE:http_user_agent}"
#
EXIM_EXCLUDE_TERMSPattern :
(Message is frozen|(Start|End) queue run| Warning: | retry time not reached | no (IP address|host name) found for (IP address|host) | unexpected disconnection while reading SMTP command | no immediate delivery: |another process is handling this message)
#
CISCOFW302020_302021Pattern :
%{CISCO_ACTION:action}(?: %{CISCO_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IP:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:fwuser}\))? gaddr %{IP:src_xlated_ip}/%{INT:icmp_code_xlated} laddr %{IP:src_ip}/%{INT:icmp_code}( \(%{DATA:user}\))?
#
CISCOFW106006_106007_106010Pattern :
%{CISCO_ACTION:action} %{CISCO_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:src_fwuser}\))? (?:to|dst) %{IP:dst_ip}/%{INT:dst_port}(\(%{DATA:dst_fwuser}\))? (?:on interface %{DATA:interface}|due to %{CISCO_REASON:reason})
#
HTTPD24_ERRORLOGPattern :
\[%{HTTPDERROR_DATE:timestamp}\] \[%{WORD:module}:%{LOGLEVEL:loglevel}\] \[pid %{POSINT:pid}:tid %{NUMBER:tid}\]( \(%{POSINT:proxy_errorcode}\)%{DATA:proxy_errormessage}:)?( \[client %{IPORHOST:client}:%{POSINT:clientport}\])? %{DATA:errorcode}: %{GREEDYDATA:message}
#
MODSECAPACHEERRORPattern :
%{MODSECPREFIX} %{MODSECRULEFILE} %{MODSECRULELINE} (?:%{MODSECMATCHOFFSET} )?(?:%{MODSECRULEID} )?(?:%{MODSECRULEREV} )?(?:%{MODSECRULEMSG} )?(?:%{MODSECRULEDATA} )?(?:%{MODSECRULESEVERITY} )?(?:%{MODSECRULEVERS} )?%{MODSECRULETAGS}%{MODSECHOSTNAME} %{MODSECURI} %{MODSECUID}
#
NAGIOS_EC_LINE_SCHEDULE_HOST_DOWNTIMEPattern :
%{NAGIOS_TYPE_EXTERNAL_COMMAND:nagios_type}: %{NAGIOS_EC_SCHEDULE_HOST_DOWNTIME:nagios_command};%{DATA:nagios_hostname};%{NUMBER:nagios_start_time};%{NUMBER:nagios_end_time};%{NUMBER:nagios_fixed};%{NUMBER:nagios_trigger_id};%{NUMBER:nagios_duration};%{DATA:author};%{DATA:comment}
#
SYSLOG5424BASEPattern :
%{SYSLOG5424PRI}%{NONNEGINT:syslog5424_ver} +(?:%{TIMESTAMP_ISO8601:syslog5424_ts}|-) +(?:%{HOSTNAME:syslog5424_host}|-) +(-|%{SYSLOG5424PRINTASCII:syslog5424_app}) +(-|%{SYSLOG5424PRINTASCII:syslog5424_proc}) +(-|%{SYSLOG5424PRINTASCII:syslog5424_msgid}) +(?:%{SYSLOG5424SD:syslog5424_sd}|-|)
#
CISCOFW106100_2_3Pattern :
access-list %{NOTSPACE:policy_id} %{CISCO_ACTION:action} %{WORD:protocol} for user '%{DATA:src_fwuser}' %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\) -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\) hit-cnt %{INT:hit_count} %{CISCO_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
#
CISCOFW106100Pattern :
access-list %{NOTSPACE:policy_id} %{CISCO_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:src_fwuser}\))? -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\)(\(%{DATA:src_fwuser}\))? hit-cnt %{INT:hit_count} %{CISCO_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
#
RT_FLOW2Pattern :
%{RT_FLOW_EVENT:event}: session created %{IP:src-ip}/%{INT:src-port}->%{IP:dst-ip}/%{INT:dst-port} %{DATA:service} %{IP:nat-src-ip}/%{INT:nat-src-port}->%{IP:nat-dst-ip}/%{INT:nat-dst-port} %{DATA:src-nat-rule-name} %{DATA:dst-nat-rule-name} %{INT:protocol-id} %{DATA:policy-name} %{DATA:from-zone} %{DATA:to-zone} %{INT:session-id} .*
#
CISCOFW733100Pattern :
\[\s*%{DATA:drop_type}\s*\] drop %{DATA:drop_rate_id} exceeded. Current burst rate is %{INT:drop_rate_current_burst} per second, max configured rate is %{INT:drop_rate_max_burst}; Current average rate is %{INT:drop_rate_current_avg} per second, max configured rate is %{INT:drop_rate_max_avg}; Cumulative total count is %{INT:drop_total_count}
#
CISCOFW106023Pattern :
%{CISCO_ACTION:action}( protocol)? %{WORD:protocol} src %{DATA:src_interface}:%{DATA:src_ip}(/%{INT:src_port})?(\(%{DATA:src_fwuser}\))? dst %{DATA:dst_interface}:%{DATA:dst_ip}(/%{INT:dst_port})?(\(%{DATA:dst_fwuser}\))?( \(type %{INT:icmp_type}, code %{INT:icmp_code}\))? by access-group "?%{DATA:policy_id}"? \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
#
ELB_ACCESS_LOGPattern :
%{TIMESTAMP_ISO8601:timestamp} %{NOTSPACE:elb} %{IP:clientip}:%{INT:clientport:int} (?:(%{IP:backendip}:?:%{INT:backendport:int})|-) %{NUMBER:request_processing_time:float} %{NUMBER:backend_processing_time:float} %{NUMBER:response_processing_time:float} %{INT:response:int} %{INT:backend_response:int} %{INT:received_bytes:int} %{INT:bytes:int} "%{ELB_REQUEST_LINE}"
#
MODSECRULETAGSPattern :
(?:\[tag %{QUOTEDSTRING:ruletag0}\] )?(?:\[tag %{QUOTEDSTRING:ruletag1}\] )?(?:\[tag %{QUOTEDSTRING:ruletag2}\] )?(?:\[tag %{QUOTEDSTRING:ruletag3}\] )?(?:\[tag %{QUOTEDSTRING:ruletag4}\] )?(?:\[tag %{QUOTEDSTRING:ruletag5}\] )?(?:\[tag %{QUOTEDSTRING:ruletag6}\] )?(?:\[tag %{QUOTEDSTRING:ruletag7}\] )?(?:\[tag %{QUOTEDSTRING:ruletag8}\] )?(?:\[tag %{QUOTEDSTRING:ruletag9}\] )?(?:\[tag %{QUOTEDSTRING}\] )*
#
RT_FLOW1Pattern :
%{RT_FLOW_EVENT:event}: %{GREEDYDATA:close-reason}: %{IP:src-ip}/%{INT:src-port}->%{IP:dst-ip}/%{INT:dst-port} %{DATA:service} %{IP:nat-src-ip}/%{INT:nat-src-port}->%{IP:nat-dst-ip}/%{INT:nat-dst-port} %{DATA:src-nat-rule-name} %{DATA:dst-nat-rule-name} %{INT:protocol-id} %{DATA:policy-name} %{DATA:from-zone} %{DATA:to-zone} %{INT:session-id} \d+\(%{DATA:sent}\) \d+\(%{DATA:received}\) %{INT:elapsed-time} .*
#
BRO_CONNPattern :
%{NUMBER:ts}\t%{NOTSPACE:uid}\t%{IP:orig_h}\t%{INT:orig_p}\t%{IP:resp_h}\t%{INT:resp_p}\t%{WORD:proto}\t%{GREEDYDATA:service}\t%{NUMBER:duration}\t%{NUMBER:orig_bytes}\t%{NUMBER:resp_bytes}\t%{GREEDYDATA:conn_state}\t%{GREEDYDATA:local_orig}\t%{GREEDYDATA:missed_bytes}\t%{GREEDYDATA:history}\t%{GREEDYDATA:orig_pkts}\t%{GREEDYDATA:orig_ip_bytes}\t%{GREEDYDATA:resp_pkts}\t%{GREEDYDATA:resp_ip_bytes}\t%{GREEDYDATA:tunnel_parents}
#
S3_ACCESS_LOGPattern :
%{WORD:owner} %{NOTSPACE:bucket} \[%{HTTPDATE:timestamp}\] %{IP:clientip} %{NOTSPACE:requester} %{NOTSPACE:request_id} %{NOTSPACE:operation} %{NOTSPACE:key} (?:"%{S3_REQUEST_LINE}"|-) (?:%{INT:response:int}|-) (?:-|%{NOTSPACE:error_code}) (?:%{INT:bytes:int}|-) (?:%{INT:object_size:int}|-) (?:%{INT:request_time_ms:int}|-) (?:%{INT:turnaround_time_ms:int}|-) (?:%{QS:referrer}|-) (?:"?%{QS:agent}"?|-) (?:-|%{NOTSPACE:version_id})
#
BRO_DNSPattern :
%{NUMBER:ts}\t%{NOTSPACE:uid}\t%{IP:orig_h}\t%{INT:orig_p}\t%{IP:resp_h}\t%{INT:resp_p}\t%{WORD:proto}\t%{INT:trans_id}\t%{GREEDYDATA:query}\t%{GREEDYDATA:qclass}\t%{GREEDYDATA:qclass_name}\t%{GREEDYDATA:qtype}\t%{GREEDYDATA:qtype_name}\t%{GREEDYDATA:rcode}\t%{GREEDYDATA:rcode_name}\t%{GREEDYDATA:AA}\t%{GREEDYDATA:TC}\t%{GREEDYDATA:RD}\t%{GREEDYDATA:RA}\t%{GREEDYDATA:Z}\t%{GREEDYDATA:answers}\t%{GREEDYDATA:TTLs}\t%{GREEDYDATA:rejected}
#
CISCOFW302013_302014_302015_302016Pattern :
%{CISCO_ACTION:action}(?: %{CISCO_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port}( \(%{IP:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:src_fwuser}\))? to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port}( \(%{IP:dst_mapped_ip}/%{INT:dst_mapped_port}\))?(\(%{DATA:dst_fwuser}\))?( duration %{TIME:duration} bytes %{INT:bytes})?(?: %{CISCO_REASON:reason})?( \(%{DATA:user}\))?
#
SHOREWALLPattern :
(%{SYSLOGTIMESTAMP:timestamp}) (%{WORD:nf_host}) kernel:.*Shorewall:(%{WORD:nf_action1})?:(%{WORD:nf_action2})?.*IN=(%{USERNAME:nf_in_interface})?.*(OUT= *MAC=(%{COMMONMAC:nf_dst_mac}):(%{COMMONMAC:nf_src_mac})?|OUT=%{USERNAME:nf_out_interface}).*SRC=(%{IPV4:nf_src_ip}).*DST=(%{IPV4:nf_dst_ip}).*LEN=(%{WORD:nf_len}).*?TOS=(%{WORD:nf_tos}).*?PREC=(%{WORD:nf_prec}).*?TTL=(%{INT:nf_ttl}).*?ID=(%{INT:nf_id}).*?PROTO=(%{WORD:nf_protocol}).*?SPT=(%{INT:nf_src_port}?.*DPT=%{INT:nf_dst_port}?.*)
#
HAPROXYTCPPattern :
(?:%{SYSLOGTIMESTAMP:syslog_timestamp}|%{TIMESTAMP_ISO8601:timestamp8601}) %{IPORHOST:syslog_server} %{SYSLOGPROG}: %{IP:client_ip}:%{INT:client_port} \[%{HAPROXYDATE:accept_date}\] %{NOTSPACE:frontend_name} %{NOTSPACE:backend_name}/%{NOTSPACE:server_name} %{INT:time_queue}/%{INT:time_backend_connect}/%{NOTSPACE:time_duration} %{NOTSPACE:bytes_read} %{NOTSPACE:termination_state} %{INT:actconn}/%{INT:feconn}/%{INT:beconn}/%{INT:srvconn}/%{NOTSPACE:retries} %{INT:srv_queue}/%{INT:backend_queue}
#
CISCOFW313005Pattern :
%{CISCO_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IP:err_src_ip}(\(%{DATA:err_src_fwuser}\))? dst %{DATA:err_dst_interface}:%{IP:err_dst_ip}(\(%{DATA:err_dst_fwuser}\))? \(type %{INT:err_icmp_type}, code %{INT:err_icmp_code}\) on %{DATA:interface} interface\. Original IP payload: %{WORD:protocol} src %{IP:orig_src_ip}/%{INT:orig_src_port}(\(%{DATA:orig_src_fwuser}\))? dst %{IP:orig_dst_ip}/%{INT:orig_dst_port}(\(%{DATA:orig_dst_fwuser}\))?
#
BRO_FILESPattern :
%{NUMBER:ts}\t%{NOTSPACE:fuid}\t%{IP:tx_hosts}\t%{IP:rx_hosts}\t%{NOTSPACE:conn_uids}\t%{GREEDYDATA:source}\t%{GREEDYDATA:depth}\t%{GREEDYDATA:analyzers}\t%{GREEDYDATA:mime_type}\t%{GREEDYDATA:filename}\t%{GREEDYDATA:duration}\t%{GREEDYDATA:local_orig}\t%{GREEDYDATA:is_orig}\t%{GREEDYDATA:seen_bytes}\t%{GREEDYDATA:total_bytes}\t%{GREEDYDATA:missing_bytes}\t%{GREEDYDATA:overflow_bytes}\t%{GREEDYDATA:timedout}\t%{GREEDYDATA:parent_fuid}\t%{GREEDYDATA:md5}\t%{GREEDYDATA:sha1}\t%{GREEDYDATA:sha256}\t%{GREEDYDATA:extracted}
#
BRO_HTTPPattern :
%{NUMBER:ts}\t%{NOTSPACE:uid}\t%{IP:orig_h}\t%{INT:orig_p}\t%{IP:resp_h}\t%{INT:resp_p}\t%{INT:trans_depth}\t%{GREEDYDATA:method}\t%{GREEDYDATA:domain}\t%{GREEDYDATA:uri}\t%{GREEDYDATA:referrer}\t%{GREEDYDATA:user_agent}\t%{NUMBER:request_body_len}\t%{NUMBER:response_body_len}\t%{GREEDYDATA:status_code}\t%{GREEDYDATA:status_msg}\t%{GREEDYDATA:info_code}\t%{GREEDYDATA:info_msg}\t%{GREEDYDATA:filename}\t%{GREEDYDATA:bro_tags}\t%{GREEDYDATA:username}\t%{GREEDYDATA:password}\t%{GREEDYDATA:proxied}\t%{GREEDYDATA:orig_fuids}\t%{GREEDYDATA:orig_mime_types}\t%{GREEDYDATA:resp_fuids}\t%{GREEDYDATA:resp_mime_types}
#
NETSCREENSESSIONLOGPattern :
%{SYSLOGTIMESTAMP:date} %{IPORHOST:device} %{IPORHOST}: NetScreen device_id=%{WORD:device_id}%{DATA}: start_time=%{QUOTEDSTRING:start_time} duration=%{INT:duration} policy_id=%{INT:policy_id} service=%{DATA:service} proto=%{INT:proto} src zone=%{WORD:src_zone} dst zone=%{WORD:dst_zone} action=%{WORD:action} sent=%{INT:sent} rcvd=%{INT:rcvd} src=%{IPORHOST:src_ip} dst=%{IPORHOST:dst_ip} src_port=%{INT:src_port} dst_port=%{INT:dst_port} src-xlated ip=%{IPORHOST:src_xlated_ip} port=%{INT:src_xlated_port} dst-xlated ip=%{IPORHOST:dst_xlated_ip} port=%{INT:dst_xlated_port} session_id=%{INT:session_id} reason=%{GREEDYDATA:reason}
#
HAPROXYHTTPBASEPattern :
%{IP:client_ip}:%{INT:client_port} \[%{HAPROXYDATE:accept_date}\] %{NOTSPACE:frontend_name} %{NOTSPACE:backend_name}/%{NOTSPACE:server_name} %{INT:time_request}/%{INT:time_queue}/%{INT:time_backend_connect}/%{INT:time_backend_response}/%{NOTSPACE:time_duration} %{INT:http_status_code} %{NOTSPACE:bytes_read} %{DATA:captured_request_cookie} %{DATA:captured_response_cookie} %{NOTSPACE:termination_state} %{INT:actconn}/%{INT:feconn}/%{INT:beconn}/%{INT:srvconn}/%{NOTSPACE:retries} %{INT:srv_queue}/%{INT:backend_queue} (\\{\%\{HAPROXYCAPTUREDREQUESTHEADERS}\})?( )?(\\{\%\{HAPROXYCAPTUREDRESPONSEHEADERS}\})?( )?"(<BADREQ>|(%{WORD:http_verb} (%{URIPROTO:http_proto}://)?(?:%{USER:http_user}(?::[^@]*)?@)?(?:%{URIHOST:http_host})?(?:%{URIPATHPARAM:http_request})?( HTTP/%{NUMBER:http_version})?))?"
#
BACULA_LOGLINEPattern :
%{BACULA_TIMESTAMP:bts} %{BACULA_HOST:hostname} JobId %{INT:jobid}: (%{BACULA_LOG_MAX_CAPACITY}|%{BACULA_LOG_END_VOLUME}|%{BACULA_LOG_NEW_VOLUME}|%{BACULA_LOG_NEW_LABEL}|%{BACULA_LOG_WROTE_LABEL}|%{BACULA_LOG_NEW_MOUNT}|%{BACULA_LOG_NOOPEN}|%{BACULA_LOG_NOOPENDIR}|%{BACULA_LOG_NOSTAT}|%{BACULA_LOG_NOJOBS}|%{BACULA_LOG_ALL_RECORDS_PRUNED}|%{BACULA_LOG_BEGIN_PRUNE_JOBS}|%{BACULA_LOG_BEGIN_PRUNE_FILES}|%{BACULA_LOG_PRUNED_JOBS}|%{BACULA_LOG_PRUNED_FILES}|%{BACULA_LOG_ENDPRUNE}|%{BACULA_LOG_STARTJOB}|%{BACULA_LOG_STARTRESTORE}|%{BACULA_LOG_USEDEVICE}|%{BACULA_LOG_DIFF_FS}|%{BACULA_LOG_JOBEND}|%{BACULA_LOG_NOPRUNE_JOBS}|%{BACULA_LOG_NOPRUNE_FILES}|%{BACULA_LOG_VOLUME_PREVWRITTEN}|%{BACULA_LOG_READYAPPEND}|%{BACULA_LOG_CANCELLING}|%{BACULA_LOG_MARKCANCEL}|%{BACULA_LOG_CLIENT_RBJ}|%{BACULA_LOG_VSS}|%{BACULA_LOG_MAXSTART}|%{BACULA_LOG_DUPLICATE}|%{BACULA_LOG_NOJOBSTAT}|%{BACULA_LOG_FATAL_CONN}|%{BACULA_LOG_NO_CONNECT}|%{BACULA_LOG_NO_AUTH}|%{BACULA_LOG_NOSUIT}|%{BACULA_LOG_JOB}|%{BACULA_LOG_NOPRIOR})
#
NAGIOSLOGLINEPattern :
%{NAGIOSTIME} (?:%{NAGIOS_WARNING}|%{NAGIOS_CURRENT_SERVICE_STATE}|%{NAGIOS_CURRENT_HOST_STATE}|%{NAGIOS_SERVICE_NOTIFICATION}|%{NAGIOS_HOST_NOTIFICATION}|%{NAGIOS_SERVICE_ALERT}|%{NAGIOS_HOST_ALERT}|%{NAGIOS_SERVICE_FLAPPING_ALERT}|%{NAGIOS_HOST_FLAPPING_ALERT}|%{NAGIOS_SERVICE_DOWNTIME_ALERT}|%{NAGIOS_HOST_DOWNTIME_ALERT}|%{NAGIOS_PASSIVE_SERVICE_CHECK}|%{NAGIOS_PASSIVE_HOST_CHECK}|%{NAGIOS_SERVICE_EVENT_HANDLER}|%{NAGIOS_HOST_EVENT_HANDLER}|%{NAGIOS_TIMEPERIOD_TRANSITION}|%{NAGIOS_EC_LINE_DISABLE_SVC_CHECK}|%{NAGIOS_EC_LINE_ENABLE_SVC_CHECK}|%{NAGIOS_EC_LINE_DISABLE_HOST_CHECK}|%{NAGIOS_EC_LINE_ENABLE_HOST_CHECK}|%{NAGIOS_EC_LINE_PROCESS_HOST_CHECK_RESULT}|%{NAGIOS_EC_LINE_PROCESS_SERVICE_CHECK_RESULT}|%{NAGIOS_EC_LINE_SCHEDULE_HOST_DOWNTIME}|%{NAGIOS_EC_LINE_DISABLE_HOST_SVC_NOTIFICATIONS}|%{NAGIOS_EC_LINE_ENABLE_HOST_SVC_NOTIFICATIONS}|%{NAGIOS_EC_LINE_DISABLE_HOST_NOTIFICATIONS}|%{NAGIOS_EC_LINE_ENABLE_HOST_NOTIFICATIONS}|%{NAGIOS_EC_LINE_DISABLE_SVC_NOTIFICATIONS}|%{NAGIOS_EC_LINE_ENABLE_SVC_NOTIFICATIONS})
#
IPV6Pattern :
((([0-9A-Fa-f]{1,4}:){7}([0-9A-Fa-f]{1,4}|:))|(([0-9A-Fa-f]{1,4}:){6}(:[0-9A-Fa-f]{1,4}|((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})|:))|(([0-9A-Fa-f]{1,4}:){5}(((:[0-9A-Fa-f]{1,4}){1,2})|:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3})|:))|(([0-9A-Fa-f]{1,4}:){4}(((:[0-9A-Fa-f]{1,4}){1,3})|((:[0-9A-Fa-f]{1,4})?:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){3}(((:[0-9A-Fa-f]{1,4}){1,4})|((:[0-9A-Fa-f]{1,4}){0,2}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){2}(((:[0-9A-Fa-f]{1,4}){1,5})|((:[0-9A-Fa-f]{1,4}){0,3}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(([0-9A-Fa-f]{1,4}:){1}(((:[0-9A-Fa-f]{1,4}){1,6})|((:[0-9A-Fa-f]{1,4}){0,4}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:))|(:(((:[0-9A-Fa-f]{1,4}){1,7})|((:[0-9A-Fa-f]{1,4}){0,5}:((25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)(\.(25[0-5]|2[0-4]\d|1\d\d|[1-9]?\d)){3}))|:)))(%.+)?
Documentation generation
This documentation is generated by pkg/parser
: GO_WANT_TEST_DOC=1 go test -run TestGeneratePatternsDoc