###################################################### # # Splunk Technology Add-On for Cisco IOS # # # Copyright (C) 2013 Mikael Bjerkeland # All Rights Reserved # ###################################################### # # Forcing the Sourcetype of Cisco IOS events # # Original: unknown # New: cisco:ios # [force_sourcetype_for_cisco_ios] DEST_KEY = MetaData:Sourcetype # This also gets process_name for IOS XE REGEX = (?:(?:\S+)\s)?(?:(?:\d+)?\:\s(?:.\S+\:\s)?(?:[\.\*])?(?:.+)?)?\:\s+(?:%|#)(?:(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-(?:(?:[A-Z012_]*(?:-?[A-Z_][^-]*))-?)?(?:[0-7])-(?:[A-Z0-9_]+):(?:(?:[A-Za-z0-9_]+):)?\s?(?:.+) FORMAT = sourcetype::cisco:ios # Match 1: Oct 9 09:59:46 10.117.0.147 85915: za-mid-mtb-msr01 RP/0/RSP0/CPU0:Oct 9 09:59:46.271 : exec[65908]: %SECURITY-login-6-AUTHEN_SUCCESS : Successfully authenticated user 'argus' from '10.117.1.18' on 'vty3' # Match 2: Mar 5 18:00:20 1.1.1.1 85915: LC/0/2/CPU0:Aug 15 21:39:11.325 2008: ifmgr[163]: %PKT_INFRA-LINEPROTO-5-UPDOWN : Line protocol on Interface POS0/2/0/2, changed state to Down [force_sourcetype_for_cisco_ios-xr] DEST_KEY = MetaData:Sourcetype REGEX = (?:(?:\S+)\s)?(?:\d+)\:\s(?:(?:\S+)\s)?(?:(?:[A-Z]+)\/(?:\d+)\/(?:[A-Z0-9]+)\/(?:[A-Z0-9]+))\:(?:.+)\s?\:\s?(?:[A-Za-z0-9_]+)\[(?:\d+)\]\:\s+%(?:[A-Za-z0-9_]+)-(?:[A-Za-z0-9_]+)-(?:(?:[A-Za-z12_]*(?:-?[A-Za-z_][^-]*))-?)?(?:[0-7])-(?:[A-Z0-9_]+)\s:\s?(?:.+) FORMAT = sourcetype::cisco:ios [force_sourcetype_for_cisco_ios-xe] DEST_KEY = MetaData:Sourcetype REGEX = (?:(?:\S+)\s)?(?:(?:\d+)?\:\s(?:.\S+\:\s)?(?:[\.\*])?(?:.+)?)?\:\s+(?:%|#)(?:(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-(?:(?:[A-Z012_]*(?:-?[A-Z_][^-]*))-?)?(?:[0-7])-(?:[A-Z0-9_]+):(?:(?:[A-Za-z0-9_]+):)?\s?(?:.+) FORMAT = sourcetype::cisco:ios # VERY experimental for RFC5424 support [force_sourcetype_for_cisco_ios-rfc5424] DEST_KEY = MetaData:Sourcetype REGEX = (?:\<(?:\d+)\>)(?:\d+) (?:\S+) (?:\S+)? (?:\d+)\s+(?:\S+)\s+(?:\S+)(?:.+)?\:\s+(?:%|#)(?:(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-(?:(?:[A-Z0-2_]*(?:-?[A-Z_][^-]*))-?)?(?:[0-7])-(?:[A-Z0-9_]+):\s?(?:.+) FORMAT = sourcetype::cisco:ios [force_sourcetype_cisco_traceback] DEST_KEY = MetaData:Sourcetype REGEX = \-Traceback\= FORMAT = sourcetype::cisco:ios:traceback # TODO: ADD SUPPORT FOR THIS: # Some messages also indicate the card and slot reporting the error. These messages begin with a percent # sign (%) and are structured as follows: # %CARD-SEVERITY-MSG:SLOT %FACILITY-SEVERITY-MNEMONIC: Message-text # CARD is a code that describes the type of card reporting the error. CIP, CIP2, ECPA, ECPA4, FEIP, PCPA, # and VIP are possible card types. # MSG is a mnemonic that indicates that this is a message. It is always shown as MSG. # SLOT indicates the slot number of the card reporting the error. It is shown as SLOT followed by a number # (for example, SLOT5). [force_index_for_cisco_ios] DEST_KEY = _MetaData:Index REGEX = (?:(?:\S+)\s)?(?:(?:\d+)?\:\s(?:.\S+\:\s)?(?:[\.\*])?(?:.+)?)?\:\s+(?:%|#)(?:(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-(?:(?:[A-Z012_]*(?:-?[A-Z_][^-]*))-?)?(?:[0-7])-(?:[A-Z0-9_]+):(?:(?:[A-Za-z0-9_]+):)?\s?(?:.+) FORMAT = ios [force_index_for_cisco_ios-xr] DEST_KEY = _MetaData:Index REGEX = (?:(?:\S+)\s)?(?:\d+)\:\s(?:(?:\S+)\s)?(?:(?:[A-Z]+)\/(?:\d+)\/(?:[A-Z0-9]+)\/(?:[A-Z0-9]+))\:(?:.+)\s?\:\s?(?:[A-Za-z0-9_]+)\[(?:\d+)\]\:\s+%(?:[A-Za-z0-9_]+)-(?:[A-Za-z0-9_]+)-(?:(?:[A-Za-z12_]*(?:-?[A-Za-z_][^-]*))-?)?(?:[0-7])-(?:[A-Z0-9_]+)\s:\s?(?:.+) FORMAT = ios # [force_host_for_cisco_ios-telemetry] DEST_KEY = MetaData:Host REGEX = host=(\S+) FORMAT = host::$1 # # Lookups # [cisco_ios_severity] filename = cisco_ios_severity.csv [cisco_ios_acl_excluded_ips] filename = cisco_ios_acl_excluded_ips.csv [cisco_ios_actions] filename = cisco_ios_actions.csv [cisco_ios_icmp_code] filename = cisco_ios_icmp_code.csv [cisco_ios_vendor] filename = cisco_ios_vendor.csv [cisco_ios_aci_fault_codes] filename = cisco_ios_aci_fault_codes.csv [cisco_ios_interface_name] filename = cisco_ios_interface_name.csv case_sensitive_match = true ##################################### # # Field Extractions # ##################################### # Severity [extract_cisco_ios-general] # ap_mac for Access Points logging directly. Tested with: # May 7 10:10:10 10.10.0.154 61: AP:7cad.7428.3ddb: *May 7 17:10:10.731: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down REGEX = ((?:\S+)\s)?((?\d+)?\:\s(AP:(?[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}):\s)?(?:.\S+\:\s)?(?[\.\*])?(?.+)?)?(\:\s+)?(?:%|#|\*%)(?(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-((?[A-Z012_]*(-?[A-Z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+):\s?(?.+) # This one worked before Ryan and Mark made me change it. #REGEX = ((?:\S+)\s)?((?\d+)?\:\s(AP:(?[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}):\s)?(?:.\S+\:\s)?(?[\.\*])?(?.+)?)?\:\s+(?:%|#|\*%)(?(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-((?[A-Z012_]*(-?[A-Z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+):\s(?.+) #REGEX = ((?\S+)\s)?((?\d+)?\:\s(AP:(?[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}):\s)?(?:.\S+\:\s)?(?[\.\*])?(?.+)?)?\:\s+(?:%|#)(?(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-((?[A-Z012_]*(-?[A-Z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+):\s(?.+) #REGEX = ((?\S+)\s)?((?\d+)?\:\s(?:.\S+\:\s)?(?[\.\*])?(?.+)?)?\:\s+(?:%|#)(?(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-((?[A-Z012_]*(-?[A-Z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+):\s(?.+) # VERY experimental for RFC5424 support [extract_cisco_ios-general-rfc5424] REGEX = (?\<(?\d+)\>)(?\d+) (?\S+) (?\S+)? (?\d+)\s+(?\S+)\s+(?\S+)(?.+)?\:\s+(?:%|#)(?(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-((?[A-Z0-2_]*(-?[A-Z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+):\s?(?.+) # Cisco IOS XR [extract_cisco_ios-general-xr] REGEX = ((?\S+)\s)?(?\d+)\:\s((?\S+)\s)?(?(?:[A-Z]+)\/(?:\d+)\/(?:[A-Z0-9]+)\/(?:[A-Z0-9]+))\:(?.+)\s?\:\s?(?[A-Za-z0-9_]+)\[(?\d+)\]\:\s+%(?[A-Za-z0-9_]+)-(?[A-Za-z0-9_]+)-((?[A-Za-z12_]*(-?[A-Za-z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+)\s:\s?(?.+) # Cisco IOS XE [extract_cisco_ios-general-xe] REGEX = (?:(?\S+)\:\s)?(?:(?\d+)\:\s)?(?:(?\d+)\:\s)?(?[\.\*])?(?.+):\s%(?IOSXE)-6-(?PLATFORM):(?:\s\w+\d:\s)?(?\S+): QFP:(?\d+.\d+) Thread:(?\d+) TS:(?\d+) %(?[A-Z0-9_]+)-((?[A-Z0-2_]*(-?[A-Z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+):\s?(?.+) #REGEX = (?:(?\S+)\:\s)?(?:(?\d+)\:\s)?(?:(?\d+)\:\s)?(?[\.\*])?(?\w+ \d+ \d+\:\d+\:\d+\.\d+ \w+):\s%(?IOSXE)-6-(?PLATFORM):(?:\s\w+\d:\s)?(?\S+): QFP:(?\d+.\d+) Thread:(?\d+) TS:(?\d+) %(?[A-Z0-9_]+)-((?[A-Z0-2_]*(-?[A-Z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+):\s(?.+) # Cisco ACI [extract_cisco_ios-general-aci] REGEX = ((?\S+)\s)?%(?(LOG_LOCAL)[0-7])-(?[0-7])-(?SYSTEM_MSG)\s?(?.+) [extract_cisco_ios-wlc-fields] REGEX = ^(?\S+):(?\d+) SOURCE_KEY = message_text # Cisco ACI [extract_cisco_ios-aci-fields] REGEX = \[(?[^\]]+)\]\[(?[^\]]+)\]\[(?[^\]]+)\]\[(?[^\]]+)\]\[(?[^\]]+)\](?.+) SOURCE_KEY = aci_message_text # SC4S compatibility # Redundant to what the extract_cisco_ios-general does, but required for SC4S based syslog ingest. [extract_cisco_ios-sc4s_cisco_header] REGEX = ((?:\S+)\s)?((?\d+)?\:\s(AP:(?[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}):\s)?(?:.\S+\:\s)?(?[\.\*])?(?.+(?\d+)?\:\s(AP:(?[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}\.[0-9a-fA-F]{4}):\s)?(?:.\S+\:\s)?(?[\.\*])?(?.+)?)?(\:\s+)? SOURCE_KEY = cisco_header ## TODO: NEED TO ADD extract_cisco_ios-general-wlc (8500) and remove the # extraction above. Because time ends up in reported_hostname # May 9 15:48:09 IP.ADD.RE.SS dig-4105-ct5508-2: *broffu_SocketReceive: May 09 15:48:09.868: #DATAPLANE-4-DP_MSG: broffu_fp_dapi_cmd.c:3613 FP0.07:(13731947)[cmdAddTclas:4941]failed to find scb 442b.0355.8067 # Work on this: # (?\S+) (?\S+): (?\S+): ((?.+)?)?\:\s+(?:%|#)(?(?!POLICY_ENGINE|UCSM|FWSM|ASA|FTD|PIX|ACE)[A-Z0-9_]+)-((?[A-Z012_]*(-?[A-Z_][^-]*))-?)?(?[0-7])-(?[A-Z0-9_]+):\s(?.+) ##################################### Specific extractions below [extract_cisco_ios-acl] REGEX = (IPACCESSLOGP|IPACCESSLOGSP|IPACCESSLOGRP|IPACCESSLOGNP|ACCESSLOGP|ACCESSLOGSP|ACCESSLOGNP)(\s)?:(?:.+)list\s(?.+)\s(?denied|permitted)\s(?\d+|tcp|udp|igmp|ipinip|gre|eigrp|ospf|nosip|pim|sctp)\s(?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::))\(?(?\d+)?\)?(\s\((?\S+) (?\S+)\))?\s->\s(?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::))(\(?(?\d+)?\))?(, (?\S+) packet(s)?)?(\s\[(?\S+)\])? [extract_cisco_ios-acl-2] REGEX = IPACCESSLOGS(\s)?:(?:.+)list (?.+) (?denied|permitted) (?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)) (?\d+) packet(s)?(\s\[(?\S+)\])? [extract_cisco_ios-acl-3] REGEX = (ACCESSLOGDP|IPACCESSLOGDP)(\s)?:(?:.+)list\s(?.+)\s(?denied|permitted)\s(?\d+|icmp|icmpv6)\s(?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::))\(?(?\d+)?\)?(\s\((?\S+) (?\S+)\))?\s->\s(?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)) (\(?(?\d+)\/(?\d+)?\))?(, (?\S+) packet(s)?)?(\s\[(?\S+)\])? [extract_cisco_ios-acl-4] REGEX = SGACLHIT(\s)?:(?:.+)list\s(?.+)\s(?denied|permitted|Denied|Permitted)\s(?\d+|tcp|udp|igmp|ipinip|gre|eigrp|ospf|nosip|pim|sctp)\s(?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::))\(?(?\d+)?\)?(\s\((?\S+) (?\S+)\))?\s->\s(?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::))(\(?(?\d+)?\))?(, SGT\s?(?\d+) DGT\s?(?\d+))? [extract_cisco_ios-acl-nexus] REGEX = %ACLLOG-.+-(ACLLOG_NEW_FLOW|ACLLOG_FLOW_INTERVAL)(\s)?: Source IP: (?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)), Destination IP: (?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)), Source Port: (?\d+), Destination Port: (?\d+), Source Interface: (?\S+)?, Protocol: "(?\S+)"\((?\d+)\), Hit-count = (?\d+) [extract_cisco_ios-SEC-6-IPACCESSLOGRL] REGEX = %SEC-.+-IPACCESSLOGRL(\s)?: access-list logging rate-limited or missed (?\d+) packets [extract_cisco_ios-AFLSEC-6-OALP] REGEX = %AFLSEC-.+-OALP(\s)?: (?\S+) (?\S+) (?\S+)\((?\d+)\) -> (?\S+)\((?\d+)\), (?\d+) packet [extract_cisco_ios-duplex_mismatch] REGEX = %CDP-.+-DUPLEX_MISMATCH(\s)?: duplex mismatch discovered on (?\S+) \((?.+)\), with (?\S+) (?.+) \((?.+)\) [extract_cisco_ios-link_error] REGEX = %LINK-.+-ERROR(\s)?: (?\S+) is experiencing errors ######################## # RADIUS ######################## [extract_cisco_ios-radius_dead_alive] REGEX = %RADIUS-.+-RADIUS_(DEAD|ALIVE)(\s)?: RADIUS server (?\S+):(?\d+),(?\d+) (?.+) ######################## # 802.1x / Dot1x / AUTHMGR / EPM ######################## [extract_cisco_ios-dot1x_switch_err_vlan_not_found] REGEX = %DOT1X_SWITCH-.+-ERR_VLAN_NOT_FOUND(\s)?: Attempt to assign non-existent or shutdown VLAN (?\d+) to 802.1x port (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-dot1x_auth] REGEX = %DOT1X-.+-[^:]+(\s)?: Authentication (?\S+) for client \((?\w+.\w+.\w+)\) on Interface (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-mab_auth] REGEX = %MAB-.+-[^:]+(\s)?: Authentication (?\S+) for client \((?\w+.\w+.\w+)\) on Interface (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-authmgr_fail_success] REGEX = %AUTHMGR-.+-(FAIL|SUCCESS)(\s)?: Authorization (?\S+) (.+)?for client \((?\w+.\w+.\w+)\) on Interface (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-authmgr_start] REGEX = %AUTHMGR-.+-START(\s)?: Starting '(?\w+)' for client \((?\w+.\w+.\w+)\) on Interface (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-authmgr_result] REGEX = %AUTHMGR-.+-RESULT(\s)?: Authentication result '(?\S+)' from '(?\w+)' for client \((?\w+.\w+.\w+)\) on Interface (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-authmgr_failover] REGEX = %AUTHMGR-.+-FAILOVER(\s)?: Failing over from '(?\w+)' for client \((?\w+.\w+.\w+)\) on Interface (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-authmgr_nomoremethods] REGEX = %AUTHMGR-.+-NOMOREMETHODS(\s)?: Exhausted all authentication methods for client \((?\w+.\w+.\w+)\) on Interface (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-authmgr_vlanassign] REGEX = %AUTHMGR-.+-VLANASSIGN(\s)?: VLAN (?\d+) assigned to Interface (?(?\D+)(?(\d+)(\S)*))(\sAuditSessionID (?\S+))? [extract_cisco_ios-AUTHMGR-5-SECURITY_VIOLATION] REGEX = %AUTHMGR-.+-SECURITY_VIOLATION(_VLAN)?(\s)?: Security violation on the interface (?\S+), new MAC address \((?\w+.\w+.\w+)\) is seen( on vlan (?\d+))?.(\s?)(AuditSessionID (?\S+))? [extract_cisco_ios-epm_ipevent] REGEX = %EPM-.+-(IPEVENT|POLICY_REQ)(\s)?: IP (?\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b)\| MAC (?\w+.\w+.\w+)\| AuditSessionID (?[A-F0-9]+)?(\| AUTHTYPE (?\w+))?\| EVENT (?\S+) [extract_cisco_ios-EPM-6-POLICY_APP_SUCCESS_FAILURE] REGEX = %EPM-.+-POLICY_APP_(SUCCESS|FAILURE)(\s)?: IP (?\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b)\| MAC (?\w+.\w+.\w+)\| AuditSessionID (?[A-F0-9]+)\| AUTHTYPE (?\w+)\| POLICY_TYPE (?.+)\| POLICY_NAME (?.+)\| RESULT (?[^\|]+)(\| REASON (?.+))? ######################## # DHCP ######################## [extract_cisco_ios-dhcp_snooping_match_mac_fail] REGEX = %DHCP_SNOOPING-.+-DHCP_SNOOPING_MATCH_MAC_FAIL(\s)?: DHCP_SNOOPING drop message because the chaddr doesn't match source mac, message type: (?[A-Z_]+), chaddr: (?[0-9a-fA-F]{4}.[0-9a-fA-F]{4}.[0-9a-fA-F]{4}), MAC sa: (?[0-9a-fA-F]{4}.[0-9a-fA-F]{4}.[0-9a-fA-F]{4}) ######################## # IP_SOURCE_GUARD # SW_DAI # ARP # PORT_SECURITY # SISF ######################## [extract_cisco_ios-IP_SOURCE_GUARD-4-DENY_INVALID_PACKET] REGEX = %IP_SOURCE_GUARD-.+-DENY_INVALID_PACKET(\s)?: (?Detected and dropped illegal traffic on port) (?(?\D+)(?(\d+)(\S)*)) and vlan (?\d+)(,|\s)? the non-cumulative packet dropped count is (?\d+). [extract_cisco_ios-SW_DAI-4-DHCP_SNOOPING_DENY] REGEX = %SW_DAI-.+-DHCP_SNOOPING_DENY(\s)?: (?\d+) (?Invalid ARPs) \((?Req|Res)\) on (?(?\D+)(?(\d+)(\S)*)), vlan (?\d+).(\(\[(?\w+.\w+.\w+)\/(?\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b)\/(?\w+.\w+.\w+)\/(?\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b)\/(?.+)]\))? [extract_cisco_ios-SW_DAI-4-PACKET_RATE_EXCEEDED] REGEX = %SW_DAI-.+-PACKET_RATE_EXCEEDED(\s)?: (?\d+) packets received in (?\d+) milliseconds on (?(?\D+)(?(\d+)(\S)*)). [extract_cisco_ios-SW_DAI-4-SPECIAL_LOG_ENTRY] REGEX = %SW_DAI-.+-SPECIAL_LOG_ENTRY(\s)?: (?\d+) (?Invalid ARP packets) \[(?.+)] [extract_cisco_ios-ARP-4-TRAPENTRY] REGEX = %ARP-.+-TRAPENTRY(\s)?: (?\d+) dynamic ARP entries on (?(?\D+)(?(\d+)(\S)*)) (?.+) [extract_cisco_ios-PORT_SECURITY-2-PSECURE_VIOLATION] REGEX = %PORT_SECURITY-.+-PSECURE_VIOLATION(\s)?: Security violation occurred(,)? caused by MAC address (?\w+.\w+.\w+) on port (?(?\D+)(?(\d+)(\S)*)) [extract_cisco_ios-PORT_SECURITY-2-PSECURE_VIOLATION_VLAN] REGEX = %PORT_SECURITY-.+-PSECURE_VIOLATION_VLAN(\s)?: Security violation occurred on port (?(?\D+)(?(\d+)(\S)*)) due to MAC address (?\w+.\w+.\w+) on VLAN (?\d+) [extract_cisco_ios-SISF-4-IP_MAC_MAC_AND_IP_THEFT] REGEX = %SISF-.+-(MAC|IP|MAC_AND_IP)_THEFT(\s)?: (?(?:MAC|IP|MAC_AND_IP) Theft) A=(?\S+) V=(?\d+) I=(?(?\D+)(?(\d+)(\S)*)) M=(?\w+.\w+.\w+) New=(?(?\D+)(?(\d+)(\S)*)) [extract_cisco_ios-SISF-4-PAK_DROP] REGEX = %SISF-.+-PAK_DROP(\s)?: Message dropped A=(?\S+) (G=(?:-)|G=(?[^-]+)) V=(?\d+) I=(?(?\D+)(?(\d+)(\S)*)) P=(?\S+) Reason=(?.+) ######################## # Threshold ######################## [extract_cisco_ios-sff8472_threshold-violation] REGEX = %SFF8472-.+-THRESHOLD_VIOLATION(\s)?: (?(?\D+)(?(\d+)(\S)*)): (?.+) (?low|high) (?alarm|warning);\s+Operating value:\s+(?\S+) (?\S+), Threshold value:\s+(?\S+) (\S+)\.(\s\((?.+)\))? ######################## # SSH + AUTHPRIV + LOGIN + CONFIG ######################## [extract_cisco_ios-ssh_ssh2_session] REGEX = %SSH-.+-SSH2_(SESSION|CLOSE)(\s)?: SSH2 Session(\srequest)? from (?\S+) \(tty = (?\d+)\)(\sfor user '(?\S+)')? using crypto cipher '(?\S*)', hmac '(?\S*)' (?Failed|Succeeded|closed) [extract_cisco_ios-ssh_ssh2_userauth] REGEX = %SSH-.+-SSH2_USERAUTH(\s)?: User '(?\S*)' authentication for SSH2 Session from (?\S+) \(tty = (?\d+)\) using crypto cipher '(?\S*)', hmac '(?\S*)' (?Failed|Succeeded) [extract_cisco_ios-authpriv_system_msg] REGEX = %AUTHPRIV-.+-SYSTEM_MSG(\s)?: pam_aaa:Authentication (?failed|[Ss]ucc[a-z]+) for(?: user (?\S+))? from (?\S+) [extract_cisco_ios-SEC_LOGIN-5-LOGIN_SUCCESS] REGEX = %SEC_LOGIN-.+-LOGIN_SUCCESS(\s)?: Login (?Success) \[user: (?\S+)\] \[Source: (?\S+)\] \[localport: (?\d+)\] [extract_cisco_ios-SEC_LOGIN-4-LOGIN_FAILED] REGEX = %SEC_LOGIN-.+-LOGIN_FAILED(\s)?: Login (?failed) \[user: (?\S+)?\] \[Source: (?\S+)\] \[localport: (?\d+)\] \[Reason: (?.+)\] [extract_cisco_ios-web_admin_userauth] REGEX = Authentication (?failed|[Ss]ucc[a-z]+) for(?: (\S+) user '(?\S+))?' on (?\S+) [extract_cisco_ios-web_userauth] REGEX = Authentication (?failed|[Ss]ucc[a-z]+) for(?: (\S+) user '(?\S*))?' [extract_cisco_ios-SEC_LOGIN-1-QUIET_MODE_ON] REGEX = %SEC_LOGIN-.+-QUIET_MODE_ON(\s)?: Still timeleft for watching failures is (?\d+) secs, \[user: (?\S+)?\] \[Source: (?\S+)\] \[localport: (?\d+)\] \[Reason: (?.+)\] \[ACL: (?.+)\] ######################## # SMI (Smart Install/Vstack) # http://www.cisco.com/en/US/docs/switches/lan/smart_install/configuration/guide/messages.html ######################## [extract_cisco_ios-smi_upgrd] REGEX = %SMI-.+-UPGRD_(STARTED|SUCCESS|FAILED)(\s)?: Device \(IP address: (?\S+)\) (?.+) [extract_cisco_ios-smi_switch_add] REGEX = %SMI-.+-SWITCH_ADD(\s)?: (?New Device detected by Director) with mac address: (?[0-9a-fA-F]{4}.[0-9a-fA-F]{4}.[0-9a-fA-F]{4}) [extract_cisco_ios-smi_switch_remove] REGEX = %SMI-.+-SWITCH_REMOVE(\s)?: Device (?[0-9a-fA-F]{4}.[0-9a-fA-F]{4}.[0-9a-fA-F]{4}) (?.+) ######################## # HSRP # http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094afd.shtml#topic13 ######################## [extract_cisco_ios-standby_statechange] REGEX = %(STANDBY|HSRP)-.+-STATECHANGE(\s)?: (?\S+) (Grp|Group) (?\d+) state (?\S+) -> (?\S+) ######################## # DTP (Dynamic Trunking Protocol) ######################## # switchport nonegotiate should be suggested when we get this... [extract_cisco_ios-dtp_domainmismatch] REGEX = %DTP-.+-DOMAINMISMATCH(\s)?: Unable to perform trunk negotiation on port (?\S+) because of VTP domain mismatch [extract_cisco_ios-dtp_trunkporton] REGEX = %DTP-.+-(NON)?TRUNKPORTON(\s)?: Port (?\S+) has become (?dot1q trunk|non-trunk) [extract_cisco_ios-ip_dupaddr] REGEX = %IP-.+-DUPADDR(\s)?: Duplicate address (?\S+) on (?\S+), sourced by (?[0-9a-fA-F]{4}.[0-9a-fA-F]{4}.[0-9a-fA-F]{4}) ######################## # SNMP ######################## [extract_cisco_ios-ip_snmp_notrapip] REGEX = %IP_SNMP-.+-NOTRAPIP(\s)?: SNMP trap source (?\S+) has no ip address ######################## # ILPOWER (PoE) ######################## [extract_cisco_ios-ilpower] REGEX = %ILPOWER-.+-(POWER_GRANTED|IEEE_DISCONNECT)(\s)?: Interface (?(?\D+)(?(\d+)(\S)*)): (?.+) [extract_cisco_ios-ILPOWER-3-CONTROLLER_PORT_ERR] REGEX = %ILPOWER-.+-CONTROLLER_PORT_ERR(\s)?: Controller port error, Interface (?(?\D+)(?(\d+)(\S)*)): (?.+) ######################## # Wireless ######################## [extract_cisco_ios-lwapp_radio_crash] REGEX = (?:%|#)LWAPP-.+-RADIO_CRASH(\s)?: .+ Radio \((?\d+)\) .+ AP (?[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}) [extract_cisco_ios-lwapp_akita_err] REGEX = (?:%|#)LWAPP-.+-AKITA_ERR(\s)?: AP \((?[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2})\) is not supported [extract_cisco_ios-LWAPP-4_AP_DUPLEX_MISMATCH] REGEX = (?:%|#)LWAPP-.+-AP_DUPLEX_MISMATCH(\s)?: \S+ Duplex mismatch discovered on (?\S+) \((?.+)\), with (?\S+) (?.+) \((?.+)\) for AP (?\S+) [extract_cisco_ios-DOT1X-src_mac] REGEX = (?:%|#)DOT1X-.+(C|c)lient (?[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}) [extract_cisco_ios-PEM-1-WEBAUTHFAIL] REGEX = (?:%|#)PEM-.+-WEBAUTHFAIL(\s)?: .+ (?.+) for (the\s)?station (?[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}) [extract_cisco_ios-WIRELESS-AP] REGEX = (?:%|#)(LWAPP|CAPWAP|APF)-.+-.+(\s)?:.+AP (Client)?(?[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}) [extract_cisco_ios-APF-6-USER_NAME_CREATED] REGEX = (?:%|#)APF-.+-USER_NAME_CREATED(\s)?:.+Username entry \(((?.+)\\)?(?\S+)\)(.+(?[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}:[0-9a-fA-F]{2}))? ######################## # Nexus ######################## # Link up or down [extract_cisco_ios-ethport_if_down] REGEX = %ETHPORT-.+-IF_DOWN_.+: Interface (?\S+)(\s\(description:(?.+)\))? is (?down)\s?\((?.+)\) [extract_cisco_ios-VIM-5-IF_ATTACHED] REGEX = %VIM-.+-IF_ATTACHED:\sInterface\s(?\S+)\sis\sattached\sto\sNetwork\sAdapter\s(?\d?)\sof\s(?\w+)\son\sport\s(?\d+)\sof\smodule\s(?\d+)\swith\sdvport\sid\s(?\d+)$ [extract_cisco_ios-INTERFACE_VLAN-5-IF_DOWN_] REGEX = %INTERFACE_VLAN-.+-IF_DOWN_.+: Interface (?\S+ \d+) is down\s?\((?.+)\) [extract_cisco_ios-INTERFACE_VLAN-5-UPDOWN] REGEX = %INTERFACE_VLAN-.+-UPDOWN(\s)?: Line Protocol on Interface (?\S+ \d+), changed state to (?up|down|administratively down) [extract_cisco_ios-ethport_if_up] REGEX = %ETHPORT-.+-IF_UP(\s)?: Interface (?\S+)(\s\(description:(?.+)\))? is (?up) in mode (?\S+) [extract_cisco_ios-ethport_if_speed] REGEX = %ETHPORT-.+-SPEED(\s)?: Interface (?\S+), operational speed changed to (?\d+) (?\S+) # Port channel / Etherchannel # Etherchannel up or down [extract_cisco_ios-eth_port-port] REGEX = %ETH_PORT_CHANNEL-.+-PORT_(UP|DOWN|SUSPENDED)(\s)?: (?\S+): (?\S+) is (?up|down|suspended) [extract_cisco_ios-eth_port-port_individual_down] REGEX = %ETH_PORT_CHANNEL-.+-PORT_INDIVIDUAL_DOWN(\s)?: individual port (?\S+) is (?down) [extract_cisco_ios-eth_port-port_individual] REGEX = %ETH_PORT_CHANNEL-.+-PORT_INDIVIDUAL(\s)?: port (?\S+) is (?operationally individual) [extract_cisco_ios-ethport_if_down_port_channel_members_down] REGEX = %ETHPORT-.+-IF_DOWN_PORT_CHANNEL_MEMBERS_DOWN(\s)?: Interface (?\S+) is (?down) \((?.+)\) [extract_cisco_ios-EC-5-L3DONTBNDL] REGEX = %EC-.+-L3DONTBNDL(1|2)(\s)?: (?(?\D+)(?(\d+)(\S)*)) suspended: (?.+). [extract_cisco_ios-EC-5-PORTDOWN] REGEX = %EC-.+-PORTDOWN(\s)?: Shutting down (?(?\D+)(?(\d+)(\S)*)) (?.+) [extract_cisco_ios-EC-5-STAYDOWN] REGEX = %EC-.+-STAYDOWN(\s)?: (?(?\D+)(?(\d+)(\S)*)) (?.+) ######################## # Spanning tree ######################## # %SPANTREE-6-PORT_STATE: Port Fa2/0/20 instance 205 moving from forwarding to disabled (RG-SW-S-2) [extract_cisco_ios-spantree-port_state] REGEX = %SPANTREE-.+-PORT_STATE(\s)?: Port (?(?\D+)(?(\d+)(\S)*)) instance (?\d+) moving from (?\S+) to (?\S+)(\s\(?(?.+)\))? # %SPANTREE-7-PORTDEL_SUCCESS: FastEthernet2/0/20 deleted from Vlan 205 (RG-SW-S-2) [extract_cisco_ios-spantree-portdel_success] REGEX = %SPANTREE-.+-PORTDEL_SUCCESS(\s)?: (?\S+) (?.+) from (?\S+) (?\d+)(\s\(?(?.+)\))? [extract_cisco_ios-spantree_topotrap] REGEX = %SPANTREE-.+-TOPOTRAP(\s)?: Topology Change Trap for ((vlan (?\d+))|(instance (?\d+))) [extract_cisco_ios-spantree_rootchange] REGEX = %SPANTREE-.+-ROOTCHANGE(\s)?: Root Changed for ((vlan (?\d+))|(instance (?\d+))): New Root Port is (?\S+). New Root Mac Address is (?\w+.\w+.\w+) ######################## # Routing ######################## [extract_cisco_ios-LDP-5-SP] REGEX = %LDP-.+-SP(\s)?: (?\S+):\d+: (?.+) [extract_cisco_ios-OSPF-4-ERRRCV] REGEX = %OSPF-.+-ERRRCV(\s)?: Received invalid packet: (?.+) from (?\S+), (?\S+) ######################## # Configuration ######################## [extract_cisco_ios-SYS-5-PRIV_I] REGEX = %SYS-.+-PRIV_I(\s)?: Privilege level set to (?\d+) by (?\S+)(\son)?(\s)?(?\w+)?(\s\()?(?[^\)]+)?\)? [extract_cisco_ios-SYS-5-PRIV_AUTH_FAIL] REGEX = %SYS-.+-PRIV_AUTH_FAIL(\s)?: Authentication to privilege level (?\d+) (?failed) by (?\S+)(\son)?(\s)?(?\w+)?(\s\()?(?[^\)]+)?\)? [extract_cisco_ios-SYS-6-LOGOUT] REGEX = %SYS-.+-LOGOUT(\s)?: User (?\S+) has exited tty session (?\d+)\((?\S+)\) ######################## # IOS Firewall # http://www.cisco.com/c/en/us/support/docs/security/ios-firewall/117721-technote-iosfirewall-00.html ######################## [extract_cisco_ios-FW-6-SESS_AUDIT_TRAIL] REGEX = %FW-.+-SESS_AUDIT_TRAIL(\s)?: (\(target:class\)-\((?\S+):(?\S+)\):)?(?\S+) (?\S+) session: initiator \((?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+)\) sent (?\d+) bytes -- responder \((?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+)\) sent (?\d+) bytes [extract_cisco_ios-FW-6-SESS_AUDIT_TRAIL_START_STOP] REGEX = %FW-.+-SESS_AUDIT_TRAIL_(START|STOP)(\s)?: (\(target:class\)-\((?\S+):(?\S+)\):)?(?\S+) (?\S+) session: initiator \((?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+)\) -- responder \((?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+)\) #REGEX = %FW-.+-SESS_AUDIT_TRAIL_(START|STOP)(\s)?: (?\S+) (?\S+) session: initiator \((?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+)\) -- responder \((?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+)\) # Seen in IOS-XE 3.1 [extract_cisco_ios-zbf-FW-6-SESS_AUDIT_TRAIL_START_STOP] REGEX = %FW-.+-SESS_AUDIT_TRAIL_(START|STOP)(\s)?: (\(target:class\)-\((?\S+):(?\S+)\):)?(?\S+) (?\S+) session: initiator \((?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+)\) -- responder \((?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+)\)\s*(from)\s*(?\S*) [extract_cisco_ios-FW-6-DROP_PKT] REGEX = %FW-.+-DROP_PKT(\s)?: (?Dropping) (?\S+) session (?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+) (?(?:(?:\d{1,3}\.){3}(?:\d{1,3}))|(?:(?:::)?(?:[\dA-Fa-f]{1,4}:{1,2}){1,7}(?:[\d\%A-Fa-z\.]+)?(?:::)?)|(?:::[\dA-Fa-f\.]{1,15})|(?:::)):(?\d+) (on zone-pair (?\S+) class (?\S+)) due to (?.+) with ip ident (?\d+)( tcpflags (?\S+) seq.no (?\d+) ack (?\d+))? # TODO: IPv6? [extract_cisco_ios-IPNAT-6] REGEX = %IPNAT-.+-(\S+)(\s)?: ((?Created|Deleted)\s)?(?\S+) (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}):(?\d+) (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}):(?\d+) (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}):(?\d+) (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}):(?\d+) # TODO: IPv6? [extract_cisco_ios-NAT-6] REGEX = %NAT-.+-LOG_TRANSLATION(\s)?: (?\S+) Translation (?\S+) (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}):(?\d+) (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}):(?\d+) (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}):(?\d+) (?\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}):(?\d+) (?\d+) ######################## # ISDN ######################## [extract_cisco_ios-ISDN-6-CONNECT] REGEX = %ISDN-.+-CONNECT(\s)?: Interface (?\S+):(?\d+) is now connected to (?\d+|unknown) [extract_cisco_ios-ISDN-6-DISCONNECT] REGEX = %ISDN-.+-DISCONNECT(\s)?: Interface (?\S+):(?\d+)\s+disconnected from (?\d+|unknown)\s?,\s?call lasted (?\d+) seconds ######################## # AUTOSMARTPORT ######################## [extract_cisco_ios-AUTOSMARTPORT-5-INSERT] REGEX = %AUTOSMARTPORT-.+-INSERT(\s)?: Device (?\S+) Device detected on interface (?\S+), executed (?\S+) [extract_cisco_ios-AUTOSMARTPORT-5-REMOVE] REGEX = %AUTOSMARTPORT-.+-REMOVE(\s)?: Device removed from interface (?\S+), executed (?\S+) to remove the configuration ######################## # UNCATEGORIZED ######################## [extract_cisco_ios-STORM_CONTROL-3-FILTERED] REGEX = %STORM_CONTROL-.+-FILTERED(\s)?: A (?\S+) storm detected on (?(?\D+)(?(\d+)(\S)*))\. [extract_cisco_ios-license_expired] REGEX = %LICENSE-.+-EXPIRED(\s)?: License for feature (?\S+) (?\S+) has expired (?.+) ago. UDI=(?\S+):(?[A-Z0-9]+)? [extract_cisco_ios-IOS_LICENSE_IMAGE_APPLICATION-6-NO_LICENSE] REGEX = %IOS_LICENSE_IMAGE_APPLICATION.+-NO_LICENSE(\s)?: .+udi = (?\S+):(?[A-Z0-9]+)? [extract_cisco_ios-SYS-3-CPUHOG] REGEX = %SYS-.+-CPUHOG(\s)?: Task is running for \((?\d+)\)msecs, more than \((?\d+)\)msecs \(.+\),process = (?.+). [extract_cisco_ios-SYS-3-CPUHOG-2] REGEX = %SYS-.+-CPUHOG(\s)?: Task ran for (?\d+) msec \(.+\), process = (?.+), [extract_cisco_ios-SYS-1-CPURISINGTHRESHOLD] REGEX = %SYS-.+-CPURISINGTHRESHOLD(\s)?: Threshold: (?Total CPU Utilization)\(Total\/Intr\): (?\d+)%\/(?\d+)% [extract_cisco_ios-SYS-1-CPUFALLINGTHRESHOLD] REGEX = %SYS-.+-CPUFALLINGTHRESHOLD(\s)?: Threshold: (?Total CPU Utilization)\(Total\/Intr\) (?\d+)%\/(?\d+)% [extract_cisco_ios-SYS-1-FREEMEMLOW] REGEX = %SYS-.+-FREEMEMLOW(\s)?: Free Memory has dropped below (?\d+)k Pool: (?\S+) Free: (?\d+) [extract_cisco_ios-DHCP-6-ADDRESS_ASSIGN] REGEX = %DHCP-.+-ADDRESS_ASSIGN(\s)?: Interface (?\S+) assigned DHCP address (?\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b), mask (?\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b), hostname (?.+) [extract_cisco_ios-CLEAR-5-COUNTERS] REGEX = %CLEAR-.+-COUNTERS(\s)?: Clear counter on interface (?\S+) by (?\S+)(\son)?(\s)?(?\w+)?(\s\()?(?[^\)]+)?\)? [extract_cisco_ios-CERM-4-RX_TX_BW_LIMIT] REGEX = %CERM-.+-(RX|TX)_BW_LIMIT(\s)?: Maximum (Rx|Tx) Bandwidth limit of (?\S+) Kbps reached for (?\S+) functionality with (?\S+) [extract_cisco_ios-UDLD-4-UDLD_PORT_DISABLED] REGEX = %UDLD-.+-UDLD_PORT_DISABLED(\s)?: UDLD disabled interface (?(?\D+)(?(\d+)(\S)*)), (?.+) [extract_cisco_ios-TRACKING-5-STATE] REGEX = %TRACKING-.+-STATE(\s)?: (?\d+) (?.+) (?\d+) reachability (?\S+)->(?\S+) [extract_cisco_ios-RTT-6-SAATHRESHOLD] REGEX = %RTT-.+-SAATHRESHOLD(\s)?:(\s)?RTR\((?\d+)\):(?.+) [extract_cisco_ios-DIALER-6-BIND_UNBIND] REGEX = %DIALER-.+-(BIND|UNBIND)(\s)?: Interface (?(?\D+)(?(\d+)(\S)*)) (bound to|unbound from) profile (?(?\D+)(?(\d+)(\S)*)) [extract_cisco_ios-XCONNECT-5-PW_STATUS] REGEX = %XCONNECT-.+-PW_STATUS(\s)?: MPLS peer (?\S+)? vcid (?\d+), VC (?(UP|DOWN))\, VC state (?(UP|DOWN)) [extract_cisco_ios-HA_EM-6-LOG] REGEX = %HA_EM-.+-LOG(\s)?: (?\S+):(?.+) # Temp alarms # TBD: Add TEMPOK etc as well [extract_cisco_ios-PLATFORM-0-MOD_TEMPMINALRM_TEMPMAJALRM] REGEX = %PLATFORM-.+-MOD_(TEMPMINALRM|TEMPMAJALRM)(\s)?: (?\S+) reported (?minor|Major) temperature alarm. Sensor=(?\S+) Temperature=(?\S+) (Min|Maj)Threshold=(?\S+) ######################## # Route Monitoring ######################## [extract_ciso_ios-HA_EM-6-LOG-route-table-monitor] REGEX = %HA_EM-.+-LOG(\s)?: (?route-table-monitor): Route changed: Type: (?remove|add), Network: (?\S+), Mask\/Prefix: (?\S+), Protocol: (?\S+), GW: (?\S+), Intf: (?\S+)?