Sha256: 66a09d32738af1616393c527b7e8b8caaa0a8bc6b4acd98ee542aa70f87a51fe
Contents?: true
Size: 1.75 KB
Versions: 1
Compression:
Stored size: 1.75 KB
Contents
# encoding: utf-8 require "spec_helper" require "logstash/patterns/core" describe "FIREWALLS" do let(:pattern104001) { "CISCOFW104001" } context "parsing a 104001 message" do let(:value) { "(Secondary) Switching to ACTIVE - Service card in other unit has failed" } subject { grok_match(pattern104001, value) } it { should include("switch_reason" => "Service card in other unit has failed") } it "generates a message field" do expect(subject["message"]).to include("(Secondary) Switching to ACTIVE - Service card in other unit has failed") end end let(:pattern106100) { "CISCOFW106100" } context "parsing a 106100 message" do let(:value) { "access-list inside permitted tcp inside/10.10.123.45(51763) -> outside/192.168.67.89(80) hit-cnt 1 first hit [0x62c4905, 0x0]" } subject { grok_match(pattern106100, value) } it { should include("policy_id" => "inside") } it "generates a message field" do expect(subject["message"]).to include("access-list inside permitted tcp inside/10.10.123.45(51763) -> outside/192.168.67.89(80) hit-cnt 1 first hit [0x62c4905, 0x0]") end end let(:pattern106100) { "CISCOFW106100" } context "parsing a 106100 message with hypen in acl name" do let(:value) { "access-list outside-entry permitted tcp outside/10.11.12.13(54726) -> inside/192.168.17.18(80) hit-cnt 1 300-second interval [0x32b3835, 0x0]" } subject { grok_match(pattern106100, value) } it { should include("policy_id" => "outside-entry") } it "generates a message field" do expect(subject["message"]).to include("access-list outside-entry permitted tcp outside/10.11.12.13(54726) -> inside/192.168.17.18(80) hit-cnt 1 300-second interval [0x32b3835, 0x0]") end end end
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
logstash-patterns-core-0.3.0 | spec/patterns/firewalls_spec.rb |