<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Parse rsyslog message in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160601#M52338</link>
    <description>&lt;P&gt;In this case, if all 3 messages appear with a succesful login, the proposed solution will probably already work, because these strings will match only the first of the 3 messages.&lt;/P&gt;&lt;P&gt;In your WLC documentation or with the snmp MIB of your WLC you should be able to see which one is the correct one.&lt;/P&gt;</description>
    <pubDate>Sun, 11 Jun 2017 19:49:08 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2017-06-11T19:49:08Z</dc:date>
    <item>
      <title>Parse rsyslog message</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160566#M52327</link>
      <description>&lt;P&gt;I want to integrate WLC to Palo-Alto&lt;/P&gt;&lt;P&gt;I've done converting the snmp to syslog using rsyslog&lt;/P&gt;&lt;P&gt;But I don't get how to parse it in palo alto&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here 3&amp;nbsp;syslog messages I got from wireshark when a user tries to login&lt;/P&gt;&lt;P&gt;Jun 10 14:08:37 localhost snmptrapd[10216]: 2017-06-10 14:08:37 &amp;lt;UNKNOWN&amp;gt; [UDP: [172.20.253.50]:32768-&amp;gt;[172.20.10.43]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (2630000) 7:18:20.00#011SNMPv2-MIB::snmpTrapOID.0 = OID: SNMPv2-SMI::enterprises.9.9.599.0.4#011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.1.0 = Hex-STRING: 60 D8 19 CD 36 11 #011SNMPv2-SMI::enterprises.9.9.513.1.1.1.1.5.0 = STRING: "AP33-Barat"#011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.8.0 = Hex-STRING: 00 2C C8 67 33 90 #011SNMPv2-SMI::enterprises.9.9.513.1.2.1.1.1.0 = Gauge32: 0#011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.10.0 = IpAddress: 172.20.40.3#011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.27.0 = STRING: "amet"#011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.28.0 = STRING: "IPC_WIFI_NEW"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jun 10 14:08:37 localhost snmptrapd[10216]: 2017-06-10 14:08:37 &amp;lt;UNKNOWN&amp;gt; [UDP: [172.20.253.50]:32768-&amp;gt;[172.20.10.43]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (2630000) 7:18:20.00#011SNMPv2-MIB::snmpTrapOID.0 = OID: SNMPv2-SMI::enterprises.9.9.599.0.8#011SNMPv2-SMI::enterprises.9.9.513.1.2.1.1.1.0 = Gauge32: 0#011SNMPv2-SMI::enterprises.9.9.513.1.1.1.1.5.0.44.200.103.51.144 = STRING: "AP33-Barat"#011SNMPv2-SMI::enterprises.9.9.599.1.3.2.1.2.0 = INTEGER: 1#011SNMPv2-SMI::enterprises.9.9.599.1.3.2.1.3.0 = Hex-STRING: AC 14 28 03 #011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.27.96.216.25.205.54.17 = STRING: "amet"#011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.28.96.216.25.205.54.17 = STRING: "IPC_WIFI_NEW"#011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.38.96.216.25.205.54.17 = ""#011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.8.96.216.25.205.54.17 = Hex-STRING: 00 2C C8 67 33 90&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jun 10 14:08:37 localhost snmptrapd[10216]: 2017-06-10 14:08:37 &amp;lt;UNKNOWN&amp;gt; [UDP: [172.20.253.50]:32768-&amp;gt;[172.20.10.43]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (2630000) 7:18:20.00#011SNMPv2-MIB::snmpTrapOID.0 = OID: SNMPv2-SMI::enterprises.9.9.515.0.3#011SNMPv2-SMI::enterprises.9.9.515.1.1.0 = STRING: "amet"#011SNMPv2-SMI::enterprises.9.9.515.2.5.1.1.6.0 = Hex-STRING: 00 2C C8 67 33 90 #011SNMPv2-SMI::enterprises.9.9.515.2.5.1.1.3.0 = Hex-STRING: 60 D8 19 CD 36 11 #011SNMPv2-SMI::enterprises.9.9.599.1.3.1.1.10.0 = IpAddress: 172.20.40.3#011SNMPv2-SMI::enterprises.9.9.513.1.1.1.1.5.0 = STRING: "AP33-Barat"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The user info is&lt;/P&gt;&lt;P&gt;username = amet&lt;/P&gt;&lt;P&gt;IP user = 172.20.40.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please let me know which is,&lt;/P&gt;&lt;P&gt;- event string&lt;/P&gt;&lt;P&gt;- username prefix&lt;/P&gt;&lt;P&gt;- username delimiter&lt;/P&gt;&lt;P&gt;- address prefix&lt;/P&gt;&lt;P&gt;- address delimiter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jun 2017 21:20:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160566#M52327</guid>
      <dc:creator>mzharfan</dc:creator>
      <dc:date>2017-06-10T21:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: Parse rsyslog message</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160595#M52333</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/65811"&gt;@mzharfan&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a user only "trying" to log in or is one of these 3 messages a successful login event? The explanation for these fields you also find here:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/configure-user-id-to-monitor-syslog-senders-for-user-mapping#_81430" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/configure-user-id-to-monitor-syslog-senders-for-user-mapping#_81430&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for this example I assume the first is a successful login event:&lt;/P&gt;&lt;P&gt;Event string:&amp;nbsp;&lt;SPAN&gt;9.9.599.1.3.1.1.1.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Username prefix:&amp;nbsp;&lt;SPAN&gt;.9.9.599.1.3.1.1.27.0 = STRING: "&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Username delimiter: "&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Address prefix:&amp;nbsp; IpAddress:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Address delimiter: \s&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Or the whole thing with regex:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Event regex: (9.9.599.1.3.1.1.1.0){1}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Username regex:&amp;nbsp;\.9\.9\.599\.1\.3\.1\.1\.27\.0\s=\sSTRING:\s"([a-zA-Z0-9\\\._]+)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Address regex: IpAddress:\s([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3})&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Jun 2017 10:42:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160595#M52333</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-11T10:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: Parse rsyslog message</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160598#M52336</link>
      <description>all those 3 messages appear when a user login (successfully), I don't know which one is the successful login event</description>
      <pubDate>Sun, 11 Jun 2017 14:23:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160598#M52336</guid>
      <dc:creator>mzharfan</dc:creator>
      <dc:date>2017-06-11T14:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: Parse rsyslog message</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160601#M52338</link>
      <description>&lt;P&gt;In this case, if all 3 messages appear with a succesful login, the proposed solution will probably already work, because these strings will match only the first of the 3 messages.&lt;/P&gt;&lt;P&gt;In your WLC documentation or with the snmp MIB of your WLC you should be able to see which one is the correct one.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Jun 2017 19:49:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/parse-rsyslog-message/m-p/160601#M52338</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-11T19:49:08Z</dc:date>
    </item>
  </channel>
</rss>

