I removed the 'stop' from every single directive, as this is confusing the matter.
It looks as such, and yet the TRAFFIC messages do not log anywhere. -- root@syslog-server-vnic-primary:/etc/rsyslog.d# more 11-paloalto-cef.conf # Use the template for logs coming from your Palo Alto firewall if $fromhost-ip == '10.40.0.210' then { *.* /var/log/rsyslog/palo-alto-cef.log } root@syslog-server-vnic-primary:/etc/rsyslog.d# more 10-paloalto-traffic.conf # Define a template for Palo Alto TRAFFIC logs $template PaloAltoTraffic,"/var/log/rsyslog/paloalto/traffic.log" # Filter and direct TRAFFIC logs to the specified file if $fromhost-ip == '10.40.0.210' and $msg contains 'TRAFFIC' then { action(type="omfile" dynaFile="PaloAltoTraffic") } root@syslog-server-vnic-primary:/etc/rsyslog.d# more 10- 10-azuremonitoragent-omfwd.conf 10-paloalto-traffic.conf root@syslog-server-vnic-primary:/etc/rsyslog.d# more 10-azuremonitoragent-omfwd.conf # Azure Monitor Agent configuration: forward logs to azuremonitoragent template(name="AMA_RSYSLOG_TraditionalForwardFormat" type="string" string="<%PRI%>%TIMESTAMP% %HOSTNAME% %syslogtag%%msg:::sp-if-no-1st-sp%%msg%") # queue.workerThreads sets the maximum worker threads, it will scale back to 0 if there is no activity # Forwarding all events through TCP port *.* action(type="omfwd" template="AMA_RSYSLOG_TraditionalForwardFormat" queue.type="LinkedList" queue.filename="omfwd-azuremonitoragent" queue.maxFileSize="32m" action.resumeRetryCount="-1" action.resumeInterval="5" action.reportSuspension="on" action.reportSuspensionContinuation="on" queue.size="25000" queue.workerThreads="100" queue.dequeueBatchSize="2048" queue.saveonshutdown="on" target="127.0.0.1" Port="28330" Protocol="tcp") -----Original Message----- From: David Lang <da...@lang.hm> Sent: Monday, August 12, 2024 5:58 PM To: Drumm, Daniel <daniel.dr...@dob.texas.gov> Cc: David Lang <da...@lang.hm>; Drumm, Daniel via rsyslog <rsyslog@lists.adiscon.com> Subject: RE: [rsyslog] Formatting CEF to log. On Mon, 12 Aug 2024, Drumm, Daniel wrote: > Date: Mon, 12 Aug 2024 22:41:21 +0000 > From: "Drumm, Daniel" <daniel.dr...@dob.texas.gov> > To: David Lang <da...@lang.hm> > Cc: "Drumm, Daniel via rsyslog" <rsyslog@lists.adiscon.com> > Subject: RE: [rsyslog] Formatting CEF to log. > > Here is that file with the -o flag: > > root@syslog-server-vnic-primary:/tmp# more rsyslog_combined.conf ## > full conf created by rsyslog version 8.2001.0 at 2024-08-12 22:38:01 > ## > > ##### BEGIN CONFIG: /etc/rsyslog.conf > # /etc/rsyslog.conf configuration file for rsyslog # # For more > information install rsyslog-doc and see # > /usr/share/doc/rsyslog-doc/html/configuration/index.html > # > # Default logging rules can be found in /etc/rsyslog.d/50-default.conf > > > ################# > #### MODULES #### > ################# > module(load="imudp") # needs to be done just once input(type="imudp" > port="514") > > $ModLoad imuxsock # needs to be done just once > > # $AllowedSender - specifies which remote systems are allowed to send > syslog messages to rsyslogd # -------------- $AllowedSender UDP, > 127.0.0.1, 10.40.0.0/16, 10.30.0.0/23 > > $SystemLogSocketFlowControl on # enable flow control (use if needed) > $ActionFileEnableSync off > > # A template that resambles traditional syslogd file output: > $template TraditionalFormat,"%timegenerated% %HOSTNAME% > %syslogtag%%msg:::drop-last-lf%\n" > # A more verbose template: > $template > precise,"%syslogpriority%,%syslogfacility%,%timegenerated::fulltime%,%HOSTNAME%,%syslogtag%,%msg%\n" > # A template that resembles RFC 3164 on-the-wire format: > # (yes, there is NO space betwen syslogtag and msg! that's important!) > $template RFC3164fmt,"<%PRI%>%TIMESTAMP% %HOSTNAME% %syslogtag%%msg%" > # a template resembling traditional wallmessage format: > $template wallmsg,"\r\n\7Message from syslogd@%HOSTNAME% at %timegenerated% > ...\r\n %syslogtag%%msg%\n\r" > # The template below emulates winsyslog format, but we need to check > the time # stamps used. It is also a good sampleof the property replacer in > action. > $template > WinSyslogFmt,"%HOSTNAME%,%timegenerated:1:10:date-rfc3339%,%timegenera > ted:12:19:date-rfc3339%,%timegenerated:1:10:date-rfc3339%,%timegenerat > ed:12:19:date-rfc3339%,%syslogfacility%,%syslo > gpriority%,%syslogtag%%msg%\n" > # A template used for database writing (notice it *is* an actual # > sql-statement): > $template dbFormat,"insert into SystemEvents (Message, > Facility,FromHost, Priority, DeviceReportedTime, ReceivedAt, > InfoUnitID, SysLogTag) values ('%msg%', %syslogfacility%, > '%HOSTNAME%',%syslogpr iority%, '%timereported:::date-mysql%', > '%timegenerated:::date-mysql%', %iut%, '%syslogtag%')",sql > > > # Turn off message reception via local log socket; # local messages > are retrieved through imjournal now. > # $OmitLocalLogging on > > ########################### > #### GLOBAL DIRECTIVES #### > ########################### > $DebugLevel 2 > $DebugFile /var/log/rsyslog/rsyslog.debug # # Use traditional > timestamp format. > # To enable high precision timestamps, comment out the following line. > # > $ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat > > # Filter duplicated messages > $RepeatedMsgReduction on > > # > # Set the default permissions for all log files. > # > $FileOwner syslog > $FileGroup syslog > $FileCreateMode 0660 > $DirCreateMode 0755 > $Umask 0022 > $PrivDropToUser syslog > $PrivDropToGroup syslog > > # > # Where to place spool and state files # $WorkDirectory > /var/log/rsyslog > > # Include all config files in /etc/rsyslog.d/ > $IncludeConfig /etc/rsyslog.d/ # whole directory (must > contain the final slash)/etc/rsyslog.d/ > ##### BEGIN CONFIG: /etc/rsyslog.d/50-default.conf > > ##### BEGIN CONFIG: /etc/rsyslog.d/21-cloudinit.conf > > ##### BEGIN CONFIG: /etc/rsyslog.d/20-ufw.conf > > ##### BEGIN CONFIG: /etc/rsyslog.d/12-azuremonitoragent-omfwd.conf > > ##### BEGIN CONFIG: /etc/rsyslog.d/11-paloalto-cef.conf > > ##### BEGIN CONFIG: /etc/rsyslog.d/10-paloalto-traffic.conf > > ##### BEGIN CONFIG: /etc/rsyslog.d/10-azuremonitoragent-omfwd.conf > # Azure Monitor Agent configuration: forward logs to azuremonitoragent > > template(name="AMA_RSYSLOG_TraditionalForwardFormat" type="string" > string="<%PRI%>%TIMESTAMP% %HOSTNAME% > %syslogtag%%msg:::sp-if-no-1st-sp%%msg%") > # queue.workerThreads sets the maximum worker threads, it will scale > back to 0 if there is no activity # Forwarding all events through TCP > port > *.* action(type="omfwd" > template="AMA_RSYSLOG_TraditionalForwardFormat" > queue.type="LinkedList" > queue.filename="omfwd-azuremonitoragent" > queue.maxFileSize="32m" > action.resumeRetryCount="-1" > action.resumeInterval="5" > action.reportSuspension="on" > action.reportSuspensionContinuation="on" > queue.size="25000" > queue.workerThreads="100" > queue.dequeueBatchSize="2048" > queue.saveonshutdown="on" > target="127.0.0.1" Port="28330" Protocol="tcp") > > ##### END CONFIG: /etc/rsyslog.d/10-azuremonitoragent-omfwd.conf > # Define a template for Palo Alto TRAFFIC logs $template > PaloAltoTraffic,"/var/log/rsyslog/paloalto/traffic.log" > > # Filter and direct TRAFFIC logs to the specified file if $fromhost-ip > == '10.40.0.210' and $msg contains 'TRAFFIC' then { > action(type="omfile" dynaFile="PaloAltoTraffic") > stop > } because you have stop here, your TRAFFIC logs will not be processed past this point. That is why they don't appear in the palo-alto-cef.log file below > ##### END CONFIG: /etc/rsyslog.d/10-paloalto-traffic.conf > # Define a template for CEF logs > $template PaloAltoCEF,"/var/log/rsyslog/e%.log" > > # Use the template for logs coming from your Palo Alto firewall if > $fromhost-ip == '10.40.0.210' then { > *.* /var/log/rsyslog/palo-alto-cef.log > stop > } > > ##### END CONFIG: /etc/rsyslog.d/11-paloalto-cef.conf > # Azure Monitor Agent configuration: forward logs to azuremonitoragent > > # Azure Monitor Agent configuration: forward logs to azuremonitoragent > template(name="AMA_RSYSLOG_TraditionalForwardFormat" type="string" > string="<%PRI%>%TIMESTAMP% %HOSTNAME% > %syslogtag%%msg:::sp-if-no-1st-sp%%msg%") > > *.* action(type="omfwd" > template="AMA_RSYSLOG_TraditionalForwardFormat" > queue.type="LinkedList" > queue.filename="omfwd-azuremonitoragent" > queue.maxFileSize="32m" > action.resumeRetryCount="-1" > action.resumeInterval="30" > action.reportSuspension="on" > action.reportSuspensionContinuation="on" > queue.size="100000" > queue.discardmark="97500" > queue.discardseverity="0" > queue.checkpointInterval="100" > queue.workerThreads="4" > queue.timeoutEnqueue="10000" > queue.timeoutWorkerthreadShutdown="60000" > queue.saveOnShutdown="on" > target="127.0.0.1" Port="28330" Protocol="tcp" > ) > > ##### END CONFIG: /etc/rsyslog.d/12-azuremonitoragent-omfwd.conf > # Log kernel generated UFW log messages to file :msg,contains,"[UFW " > /var/log/ufw.log > > # Uncomment the following to stop logging anything that matches the last rule. > # Doing this will stop logging kernel generated UFW log messages to > the file # normally containing kern.* messages (eg, /var/log/kern.log) > #& stop > > ##### END CONFIG: /etc/rsyslog.d/20-ufw.conf > # Log cloudinit generated log messages to file :syslogtag, isequal, > "[CLOUDINIT]" /var/log/cloud-init.log > > # comment out the following line to allow CLOUDINIT messages through. > # Doing so means you'll also get CLOUDINIT messages in /var/log/syslog > & stop > > ##### END CONFIG: /etc/rsyslog.d/21-cloudinit.conf > # Default rules for rsyslog. > # > # For more information see rsyslog.conf(5) and > /etc/rsyslog.conf > > # > # First some standard log files. Log by facility. > # > auth,authpriv.* /var/log/rsyslog/auth.log > cron.* /var/log/rsyslog/cron.log > daemon.* /var/log/rsyslog/daemon.log > kern.* /var/log/rsyslog/kern.log > lpr.* /var/log/rsyslog/lpr.log > mail.* /var/log/rsyslog/mail.log > user.* /var/log/rsyslog/user.log > local0.info /var/log/rsyslog/local0_info.log > #*.* > /var/log/rsyslog/traditionalfile.log;TraditionalFormat # log to a file > in the traditional format > *.* /var/log/rsyslog/all-the-stuff.log > > # > # Logging for the mail system. Split it up so that # it is easy to > write scripts to parse these files. > # > # mail.info -/var/log/rsyslog/mail.info > # mail.warn -/var/log/rsyslog/mail.warn > # mail.err /var/log/rsyslog/mail.err > > # > # Some "catch-all" log files. > # > *.=debug;auth,authpriv.none;news.none;mail.none /var/log/debug > PreprocFileLineNumber(33) > *.=info;*.=notice;*.=warn;auth,authpriv.none;cron,daemon.none;mail,news.none > /var/log/messages > PreprocFileLineNumber(37) > > # > # Emergencies are sent to everybody logged in. > # > *.emerg :omusrmsg:* > > # > # I like to have messages displayed on the console, but only on a > virtual # console I usually leave idle. > # > #daemon,mail.*;# news.=crit;news.=err;news.=notice;# > *.=debug;*.=info;# *.=notice;*.=warn /dev/tty8 > > ##### END CONFIG: /etc/rsyslog.d/50-default.conf > # whole directory (must contain the final slash) > > ##### END CONFIG: /etc/rsyslog.conf > > -----Original Message----- > From: David Lang <da...@lang.hm> > Sent: Monday, August 12, 2024 5:32 PM > To: Drumm, Daniel <daniel.dr...@dob.texas.gov> > Cc: David Lang <da...@lang.hm>; Drumm, Daniel via rsyslog > <rsyslog@lists.adiscon.com> > Subject: RE: [rsyslog] Formatting CEF to log. > > start rsyslog with the command line option -o /path/to/file > > that will write the combined config files to that file as rsyslog sees > it. Post that and we can look for other interactions that may cause > some logs to be thrown away first > > look especially for othe stop commands earlier than the clause looking > at the fromhost-ip > > David Lang > > On Mon, 12 Aug 2024, Drumm, Daniel wrote: > >> Date: Mon, 12 Aug 2024 22:18:02 +0000 >> From: "Drumm, Daniel" <daniel.dr...@dob.texas.gov> >> To: David Lang <da...@lang.hm>, >> "Drumm, Daniel via rsyslog" <rsyslog@lists.adiscon.com> >> Subject: RE: [rsyslog] Formatting CEF to log. >> >> Thank you, I should have corrected that as I iterated. >> >> What I see with this directive: >> >> root@syslog-server-vnic-primary:/etc/rsyslog.d# more >> 10-paloalto-cef.conf # Define a template for CEF logs $template >> PaloAltoCEF,"/var/log/rsyslog/DOB-FW-HA-1.OCI/%programname%.log" >> >> # Use the template for logs coming from your Palo Alto firewall if >> $fromhost-ip == '10.40.0.210' then { >> *.* /var/log/rsyslog/palo-alto-cef.log >> stop >> } >> >> Is that the log has SYSTEM messages, but none of the Traffic messages: >> >> root@syslog-server-vnic-primary:/var/log/rsyslog# tail -f >> palo-alto-cef.log Aug 12 17:07:12 DOB-FW-HA-1.OCI Ashburn FD1 >> CEF:0|Palo >> Alto#012Networks|PAN-OS|11.2.0|url-filtering|SYSTEM|1|rt=Aug 12 2024 >> 22:07:12 GMT#012deviceExternalId=007959000479054 cs3Label=Virtual >> System cs3= fname= flexString2Label=Module#012flexString2=general >> msg="PAN-DB was upgraded to version 20240812.20332." >> externalId=7392297676068399997 cat=upgrade-url-database-success >> PanOSDGl1=0#012PanOSDGl2=0 PanOSDGl3=0 PanOSDGl4=0#012PanOSVsysName= >> dvchost=DOB-FW-HA-1 >> PanOSActionFlags=0x0#012anOSTimeGeneratedHighResolution=2024-08-12T17: >> 07:12.563-05:00 Aug 12 17:08:17 DOB-FW-HA-1.OCI Ashburn FD1 >> CEF:0|Palo >> Alto#012Networks|PAN-OS|11.2.0|url-filtering|SYSTEM|1|rt=Aug 12 2024 >> 22:08:17 GMT#012deviceExternalId=007959000479054 cs3Label=Virtual >> System cs3= fname= flexString2Label=Module#012flexString2=general >> msg="PAN-DB was upgraded to version 20240812.20333." >> externalId=7392297676068399998 cat=upgrade-url-database-success >> PanOSDGl1=0#012PanOSDGl2=0 PanOSDGl3=0 PanOSDGl4=0#012PanOSVsysName= >> dvchost=DOB-FW-HA-1 >> PanOSActionFlags=0x0#012anOSTimeGeneratedHighResolution=2024-08-12T17: >> 08:17.737-05:00 Aug 12 17:08:50 DOB-FW-HA-1.OCI Ashburn FD1 >> CEF:0|Palo Alto#012Networks|PAN-OS|11.2.0|userid|SYSTEM|1|rt=Aug 12 >> 2024 22:08:49 >> GMT#012deviceExternalId=007959000479054 cs3Label=Virtual System cs3= >> fname= flexString2Label=Module#012flexString2=general msg="gRPC >> connection to identity.services-edge.paloaltonetworks.com:443 is >> established, 10.40.0.210:46846 -> 34.136.155.117:443 time: 2024-08-12 >> 17:08:50" externalId=7392297676068399999 cat=cuid-conn >> PanOSDGl1=0#012PanOSDGl2=0 PanOSDGl3=0 PanOSDGl4=0#012PanOSVsysName= >> dvchost=DOB-FW-HA-1 >> PanOSActionFlags=0x0#012anOSTimeGeneratedHighResolution=2024-08-12T17: >> 08:50.292-05:00 Aug 12 17:08:54 DOB-FW-HA-1.OCI Ashburn FD1 >> CEF:0|Palo Alto#012Networks|PAN-OS|11.2.0|userid|SYSTEM|4|rt=Aug 12 >> 2024 22:08:53 >> GMT#012deviceExternalId=007959000479054 cs3Label=Virtual System cs3= >> fname= flexString2Label=Module#012flexString2=general msg="gRPC >> connection to identity.services-edge.paloaltonetworks.com:443 is >> broken, error: rpc error: code = Unknown desc = [UploadCUID] >> [007959000479054] tenantId is empty time: 2024-08-12 17:08:54" >> externalId=7392297676068400000 cat=cuid-conn >> PanOSDGl1=0#012PanOSDGl2=0 PanOSDGl3=0 PanOSDGl4=0#012PanOSVsysName= >> dvchost=DOB-FW-HA-1 >> PanOSActionFlags=0x0#012anOSTimeGeneratedHighResolution=2024-08-12T17: >> 08:54.050-05:00 >> >> Yet I know for a fact that the TRAFFIC messages are hitting the NIC of the >> syslog server: >> >> root@syslog-server-vnic-primary:/etc/rsyslog.d# tcpdump -v "port 514" >> tcpdump: listening on ens3, link-type EN10MB (Ethernet), capture size >> 262144 bytes >> 22:16:32.237523 IP (tos 0x0, ttl 63, id 30088, offset 0, flags [+], proto >> UDP (17), length 1500) >> 10.40.0.210.40933 > 10.30.0.18.syslog: SYSLOG, length: 1472 >> Facility local0 (16), Severity info (6) >> Msg: Aug 12 17:16:36 DOB-FW-HA-1.OCI Ashburn FD1 CEF:0|Palo >> Alto Networks|PAN-OS|11.2.0|drop|TRAFFIC|1|rt=Aug 12 2024 22:16:31 >> GMT\0x0adeviceExternalId=007959000479054 src=162.216.149.73 >> dst=10.40.1.97 >> sourceTranslatedAddress=0.0.0.0\0x0adestinationTranslatedAddress=0.0. >> 0 >> .0 cs1Label=Rule cs1=Inbound Drop Logging Rule suser= duser= >> app=not-applicable\0x0acs3Label=Virtual System cs3=vsys1 >> cs4Label=Source Zone cs4=Untrust cs5Label=Destination Zone >> cs5=Trust\0x0adeviceInboundInterface=ethernet1/2 >> deviceOutboundInterface= cs6Label=LogProfile cs6=OCI Syslog Server >> Profile\0x0acn1Label=SessionID cn1=0 cnt=1 spt=54491 dpt=9408 >> sourceTranslatedPort=0\0x0adestinationTranslatedPort=0 >> flexString1Label=Flags flexString1=0x0 proto=tcp >> act=drop\0x0aflexNumber1Label=Total bytes flexNumber1=58 in=58 out=0 >> cn2Label=Packets\0x0acn2=1 PanOSPacketsReceived=0 >> PanOSPacketsSent=1\0x0astart=Aug 12 2024 22:16:31 GMT >> cn3Label=Elapsed time in seconds cn3=0 cs2Label=URL >> Category\0x0acs2=any externalId=7 > 392297676068829896 reason=policy-deny PanOSDGl1=0\0x0aPanOSDGl2=0 > PanOSDGl3=0 PanOSDGl4=0\0x0aPanOSVsysName= dvchost=DOB-FW-HA-1 > cat=from-policy PanOSActionFlags=0x0\0x0aPanOSSrcUUID= PanOSDstUUID= > PanOSTunnelID=0 PanOSMonitorTag=\0x0aPanOSParentSessionID=0 > PanOSParentStartTime= PanOSTunnelType=N/A\0x0aPanOSSCTPAssocID=0 > PanOSSCTPChunks=0 PanOSSCTPChunkSent=0\0x0aPanOSSCTPChunksRcv=0 > PanOSRuleUUID=d6ca6ff0-71e9-4f09-8e8d-2204deb98205 > PanOSHTTP2Con=0\0x0aPanLinkChange=0 PanPolicyID= > PanLinkDetail=\0x0aPanSDWANCluster= > PanSDWANDevice=\0x0aPanSDWANClustype >> 22:16:32.237613 IP (tos 0x0, ttl 63, id 30089, offset 0, flags [+], >> proto UDP (17), length 1500) >> >> So why are they not logging? >> >> >> -----Original Message----- >> From: David Lang <da...@lang.hm> >> Sent: Monday, August 12, 2024 3:51 PM >> To: Drumm, Daniel via rsyslog <rsyslog@lists.adiscon.com> >> Cc: Drumm, Daniel <daniel.dr...@dob.texas.gov> >> Subject: Re: [rsyslog] Formatting CEF to log. >> >> On Mon, 12 Aug 2024, Drumm, Daniel via rsyslog wrote: >> >>> When I perform a "tcpdump -v" I see that the Palo Alto is sending the >>> rsyslog server the correct logs for traffic flows. But the only logs coming >>> from the firewall that are logging are the system messages. I had to >>> convert the traffic flow messages coming in from the Palo Alto on 514/udp >>> to the CEF (Command Event Format) and I do not see them anywhere in logs: >>> >>> Here is how I know they are arriving to the Ubuntu server: >>> >>> >>> >>> root@syslog-server-vnic-primary:/var/log/rsyslog/DOB-FW-HA-1.OCI#<mailto:root@syslog-server-vnic-primary:/var/log/rsyslog/DOB-FW-HA-1.OCI#> >>> tcpdump -v "port 514" >>> >>> tcpdump: listening on ens3, link-type EN10MB (Ethernet), capture >>> size >>> 262144 bytes >>> >>> 20:30:06.780950 IP (tos 0x0, ttl 63, id 25948, offset 0, flags [+], >>> proto UDP (17), length 1500) >>> >>> 10.40.0.210.40933 > 10.30.0.18.syslog: SYSLOG, length: 1472 >>> >>> Facility local0 (16), Severity info (6) >>> >>> Msg: Aug 12 15:30:11 DOB-FW-HA-1.OCI Ashburn FD1 CEF:0|Palo >>> Alto Networks|PAN-OS|11.2.0|drop|TRAFFIC|1|rt=Aug 12 2024 20:30:08 >>> GMT\0x0adeviceExternalId=007959000479054 src=193.163.125.224 >>> dst=10.40.1.98 >>> sourceTranslatedAddress=0.0.0.0\0x0adestinationTranslatedAddress=0.0. >>> 0 >>> .0 cs1Label=Rule cs1=Inbound Drop Logging Rule suser= duser= >>> app=not-applicable\0x0acs3Label=Virtual System cs3=vsys1 >>> cs4Label=Source Zone cs4=Untrust cs5Label=Destination Zone >>> cs5=Trust\0x0adeviceInboundInterface=ethernet1/2 >>> deviceOutboundInterface= cs6Label=LogProfile cs6=OCI Syslog Server >>> Profile\0x0acn1Label=SessionID cn1=0 cnt=1 spt=42495 dpt=2650 >>> sourceTranslatedPort=0\0x0adestinationTranslatedPort=0 >>> flexString1Label=Flags flexString1=0x0 proto=tcp >>> act=drop\0x0aflexNumber1Label=Total bytes flexNumber1=58 in=58 out=0 >>> cn2Label=Packets\0x0acn2=1 PanOSPacketsReceived=0 >>> PanOSPacketsSent=1\0x0astart=Aug 12 2024 20:30:08 GMT >>> cn3Label=Elapsed time in seconds cn3=0 cs2Label=URL >>> Category\0x0acs2=any externalId= >> 7 >>> 392297676068828287 reason=policy-deny PanOSDGl1=0\0x0aPanOSDGl2=0 >>> PanOSDGl3=0 PanOSDGl4=0\0x0aPanOSVsysName= dvchost=DOB-FW-HA-1 >>> cat=from-policy PanOSActionFlags=0x0\0x0aPanOSSrcUUID= PanOSDstUUID= >>> PanOSTunnelID=0 PanOSMonitorTag=\0x0aPanOSParentSessionID=0 >>> PanOSParentStartTime= PanOSTunnelType=N/A\0x0aPanOSSCTPAssocID=0 >>> PanOSSCTPChunks=0 PanOSSCTPChunkSent=0\0x0aPanOSSCTPChunksRcv=0 >>> PanOSRuleUUID=d6ca6ff0-71e9-4f09-8e8d-2204deb98205 >>> PanOSHTTP2Con=0\0x0aPanLinkChange=0 PanPolicyID= >>> PanLinkDetail=\0x0aPanSDWANCluster= >>> PanSDWANDevice=\0x0aPanSDWANClustyp >>> >>> 20:30:06.780979 IP (tos 0x0, ttl 63, id 25949, offset 0, flags [+], >>> proto UDP (17), length 1500) >>> >>> 10.40.0.210.40933 > 10.30.0.18.syslog: SYSLOG, length: 1472 >>> >>> Here is my rsyslog.conf file: >>> >>> root@syslog-server-vnic-primary:/etc# more rsyslog.conf >>> >>> # /etc/rsyslog.conf configuration file for rsyslog >>> >>> # >>> >>> # For more information install rsyslog-doc and see >>> >>> # /usr/share/doc/rsyslog-doc/html/configuration/index.html >>> >>> # >>> >>> # Default logging rules can be found in >>> /etc/rsyslog.d/50-default.conf >>> >>> >>> >>> >>> >>> ################# >>> >>> #### MODULES #### >>> >>> ################# >>> >>> module(load="imudp") # needs to be done just once >>> >>> input(type="imudp" port="514") >>> >>> >>> >>> $ModLoad imuxsock # needs to be done just once >>> >>> >>> >>> # $AllowedSender - specifies which remote systems are allowed to >>> send syslog messages to rsyslogd >>> >>> # -------------- >>> >>> $AllowedSender UDP, 127.0.0.1, 10.40.0.0/16, 10.30.0.0/23 >> >> this is why the legacy format is depriciated, you should not mix new >> style >> input() module() with old style $foo directives >> >>> >>> >>> $SystemLogSocketFlowControl on # enable flow control (use if needed) >>> >>> $ActionFileEnableSync off >>> >>> >>> >>> # A template that resambles traditional syslogd file output: >>> >>> $template TraditionalFormat,"%timegenerated% %HOSTNAME% >>> %syslogtag%%msg:::drop-last-lf%\n" >>> >>> # A more verbose template: >>> >>> $template >>> precise,"%syslogpriority%,%syslogfacility%,%timegenerated::fulltime%,%HOSTNAME%,%syslogtag%,%msg%\n" >>> >>> # A template that resembles RFC 3164 on-the-wire format: >>> >>> # (yes, there is NO space betwen syslogtag and msg! that's >>> important!) >>> >>> $template RFC3164fmt,"<%PRI%>%TIMESTAMP% %HOSTNAME% %syslogtag%%msg%" >>> >>> # a template resembling traditional wallmessage format: >>> >>> $template wallmsg,"\r\n\7Message from syslogd@%HOSTNAME% at %timegenerated% >>> ...\r\n %syslogtag%%msg%\n\r" >>> >>> # The template below emulates winsyslog format, but we need to check >>> the time >>> >>> # stamps used. It is also a good sampleof the property replacer in action. >>> >>> $template >>> WinSyslogFmt,"%HOSTNAME%,%timegenerated:1:10:date-rfc3339%,%timegene >>> r >>> a >>> ted:12:19:date-rfc3339%,%timegenerated:1:10:date-rfc3339%,%timegener >>> a t ed:12:19:date-rfc3339%,%syslogfacility%,%syslo >>> >>> gpriority%,%syslogtag%%msg%\n" >>> >>> # A template used for database writing (notice it *is* an actual >>> >>> # sql-statement): >>> >>> $template dbFormat,"insert into SystemEvents (Message, >>> Facility,FromHost, Priority, DeviceReportedTime, ReceivedAt, >>> InfoUnitID, SysLogTag) values ('%msg%', %syslogfacility%, >>> '%HOSTNAME%',%syslogpr >>> >>> iority%, '%timereported:::date-mysql%', >>> '%timegenerated:::date-mysql%', %iut%, '%syslogtag%')",sql >>> >>> >>> >>> >>> >>> # Turn off message reception via local log socket; >>> >>> # local messages are retrieved through imjournal now. >>> >>> # $OmitLocalLogging on >>> >>> >>> >>> ########################### >>> >>> #### GLOBAL DIRECTIVES #### >>> >>> ########################### >>> >>> $DebugLevel 2 >>> >>> $DebugFile /var/log/rsyslog/rsyslog.debug >>> >>> # >>> >>> # Use traditional timestamp format. >>> >>> # To enable high precision timestamps, comment out the following line. >>> >>> # >>> >>> $ActionFileDefaultTemplate RSYSLOG_TraditionalFileFormat >>> >>> >>> >>> # Filter duplicated messages >>> >>> $RepeatedMsgReduction on >>> >>> >>> >>> # >>> >>> # Set the default permissions for all log files. >>> >>> # >>> >>> $FileOwner syslog >>> >>> $FileGroup syslog >>> >>> $FileCreateMode 0660 >>> >>> $DirCreateMode 0755 >>> >>> $Umask 0022 >>> >>> $PrivDropToUser syslog >>> >>> $PrivDropToGroup syslog >>> >>> >>> >>> # >>> >>> # Where to place spool and state files >>> >>> # >>> >>> $WorkDirectory /var/log/rsyslog >>> >>> >>> >>> # Include all config files in /etc/rsyslog.d/ >>> >>> $IncludeConfig /etc/rsyslog.d/ # whole directory (must >>> contain the final slash) >>> >>> >>> >>> Here is my rsyslog.conf file for Palo Alto directive: >>> >>> root@syslog-server-vnic-primary:/etc/rsyslog.d#<mailto:root@syslog-s >>> e r ver-vnic-primary:/etc/rsyslog.d#> more 10-paloalto-cef.conf >>> >>> # Define a template for CEF logs >>> >>> $template PaloAltoCEF,"/var/log/rsyslog/DOB-FW-HA-1.OCI/%programname%.log" >>> >>> >>> >>> # Use the template for logs coming from your Palo Alto firewall >>> >>> if $fromhost-ip == '10.40.0.210' then { >>> >>> *.* ?PaloAltoCEF >>> >>> stop >>> >>> } >>> >>> Here is my rsyslog.conf file for Catch All directive: >>> >>> root@syslog-server-vnic-primary:/etc/rsyslog.d#<mailto:root@syslog-s >>> e r ver-vnic-primary:/etc/rsyslog.d#> more 50-default.conf >>> >>> # Default rules for rsyslog. >>> >>> # >>> >>> # For more information see rsyslog.conf(5) and >>> /etc/rsyslog.conf >>> >>> >>> >>> # >>> >>> # First some standard log files. Log by facility. >>> >>> # >>> >>> auth,authpriv.* /var/log/rsyslog/auth.log >>> >>> cron.* /var/log/rsyslog/cron.log >>> >>> daemon.* /var/log/rsyslog/daemon.log >>> >>> kern.* /var/log/rsyslog/kern.log >>> >>> lpr.* /var/log/rsyslog/lpr.log >>> >>> mail.* /var/log/rsyslog/mail.log >>> >>> user.* /var/log/rsyslog/user.log >>> >>> local0.info /var/log/rsyslog/local0_info.log >>> >>> #*.* >>> /var/log/rsyslog/traditionalfile.log;TraditionalFormat # log to a file >>> in the traditional format >>> >>> *.* /var/log/rsyslog/all-the-stuff.log >>> >>> >>> >>> # >>> >>> # Logging for the mail system. Split it up so that >>> >>> # it is easy to write scripts to parse these files. >>> >>> # >>> >>> # mail.info -/var/log/rsyslog/mail.info >>> >>> # mail.warn -/var/log/rsyslog/mail.warn >>> >>> # mail.err /var/log/rsyslog/mail.err >>> >>> >>> >>> # >>> >>> # Some "catch-all" log files. >>> >>> # >>> >>> *.=debug;\ >>> >>> auth,authpriv.none;\ >>> >>> news.none;mail.none /var/log/debug >>> >>> *.=info;*.=notice;*.=warn;\ >>> >>> auth,authpriv.none;\ >>> >>> cron,daemon.none;\ >>> >>> mail,news.none /var/log/messages >>> >>> >>> >>> # >>> >>> # Emergencies are sent to everybody logged in. >>> >>> # >>> >>> *.emerg :omusrmsg:* >>> >>> >>> >>> # >>> >>> # I like to have messages displayed on the console, but only on a >>> virtual >>> >>> # console I usually leave idle. >>> >>> # >>> >>> #daemon,mail.*;\ >>> >>> # news.=crit;news.=err;news.=notice;\ >>> >>> # *.=debug;*.=info;\ >>> >>> # *.=notice;*.=warn /dev/tty8 >>> >>> >>> >>> I would think they would go to the all-the-stuff log file, but no. They are >>> not being logged anywhere and I do not know why not since the PAN-OS system >>> logs are being logged. >> >> well, you have anything arriving from that IP address being written to >> /var/log/rsyslog/DOB-FW-HA-1.OCI/%programname%.log and then you throw away >> the log, so it would never get down to the action to write it to the >> all-the-stuff file. >> >> David Lang >> >>> >>> >>> Dan. >>> _______________________________________________ >>> rsyslog mailing list >>> https://list/ >>> s.adiscon.net%2Fmailman%2Flistinfo%2Frsyslog&data=05%7C02%7CDaniel.D >>> r >>> u >>> mm%40dob.texas.gov%7Ca5b7d1daeca54918bec408dcbb106d71%7C32a53eeb2759 >>> 4 >>> e >>> f4af2858fd990c7d67%7C1%7C0%7C638590926965494771%7CUnknown%7CTWFpbGZs >>> b >>> 3 >>> d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D >>> % >>> 7 >>> C60000%7C%7C%7C&sdata=jbqBlxisDwsVCMwjaT90N%2FKimmaD8t4q2sz482zP%2FF >>> I >>> % >>> 3D&reserved=0 >>> https://gcc02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww%2F&data=05%7C02%7CDaniel.Drumm%40dob.texas.gov%7C8f8ea3ccb8764f2df23308dcbb2235d0%7C32a53eeb27594ef4af2858fd990c7d67%7C1%7C0%7C638591002828934531%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=wFHNM6fsEI4vfE8YWBLwe0W4uaH0Up7p%2Fh1vy8Py8Ak%3D&reserved=0. >>> r%2F&data=05%7C02%7CDaniel.Drumm%40dob.texas.gov%7C41a72e59343143488 >>> 7 >>> 5e08dcbb1e8a28%7C32a53eeb27594ef4af2858fd990c7d67%7C1%7C0%7C63859098 >>> 7 >>> 056813333%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz >>> I >>> iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=0VDHHDdJX2r3y >>> i >>> XUWqNO%2FD%2BEEbpPFWRRAaPIoTcHQ%2Bw%3D&reserved=0 >>> syslog.com%2Fprofessional-services%2F&data=05%7C02%7CDaniel.Drumm%40 >>> d >>> o >>> b.texas.gov%7Ca5b7d1daeca54918bec408dcbb106d71%7C32a53eeb27594ef4af2 >>> 8 >>> 5 >>> 8fd990c7d67%7C1%7C0%7C638590926965505555%7CUnknown%7CTWFpbGZsb3d8eyJ >>> W >>> I >>> joiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C6000 >>> 0 >>> % >>> 7C%7C%7C&sdata=Y1xISoLoG4QqSzyfShnzV1At6WqTfmphvcwX27vYX%2Bo%3D&rese >>> r >>> v >>> ed=0 What's up with rsyslog? Follow >>> https://twit/ >>> ter.com%2Frgerhards&data=05%7C02%7CDaniel.Drumm%40dob.texas.gov%7Ca5 >>> b >>> 7 >>> d1daeca54918bec408dcbb106d71%7C32a53eeb27594ef4af2858fd990c7d67%7C1% >>> 7 >>> C >>> 0%7C638590926965512721%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiL >>> C >>> J >>> QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C60000%7C%7C%7C&sdata=v >>> V >>> v >>> 5i4UP326ZNb2mtr1KEfnc4i9ZP58nSzWV5zmzPiw%3D&reserved=0 >>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of >>> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T >>> LIKE THAT. >>> >> >> > > _______________________________________________ rsyslog mailing list https://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.