cancel
Showing results for 
Search instead for 
Did you mean: 

Advanced System Parser: Parse SYSLOG JSON

Hello,

I'm attempting to parse SYSLOG JSON alerts from a Wazuh instance (based on ELK stack). When the logs come into the ERC, there appears to be a syslog header before the start of the JSON. If I paste just the pure JSON and change the Format:JSON, it parses everything automatically, but it appears due to this syslog header, it doesn't know how to parse the entire text and I have to start use regex to pull specific pieces of information. I'd like to let the ASP automatically parse the JSON and then map the fields accordingly, but it seems like I have create an ASP rule for every single event type I care about, which isn't ideal if we can just automatically parse the raw JSON and then map to fields in McAfee ESM, to eliminate having to use regex and create a specific parsing rule for every event type.

Below is how the syslog comes in from the Wazuh host:

SYSLOGHEADER: {JSON CONTENT}

1 Reply

Re: Advanced System Parser: Parse SYSLOG JSON

Have you tried the Include Syslog header checkbox?
More McAfee Tools to Help You
  • Subscription Service Notification (SNS)
  • How-to: Endpoint Removal Tool
  • Support: Endpoint Security
  • eSupport: Policy Orchestrator
  • Community Help Hub

      New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

    • Find Forum FAQs
    • Learn How to Earn Badges
    • Ask for Help
    Go to Community Help

    Join the Community

      Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

    • Get helpful solutions from McAfee experts.
    • Stay connected to product conversations that matter to you.
    • Participate in product groups led by McAfee employees.
    Join the Community
    Join the Community