asfgit closed pull request #1279: METRON-1893 Syslog RFC-3164 parser
URL: https://github.com/apache/metron/pull/1279
 
 
   

This is a PR merged from a forked repository.
As GitHub hides the original diff on merge, it is displayed below for
the sake of provenance:

As this is a foreign pull request (from a fork), the diff is supplied
below (as it won't show otherwise due to GitHub magic):

diff --git a/dependencies_with_url.csv b/dependencies_with_url.csv
index 17453f5718..745e3c9f8a 100644
--- a/dependencies_with_url.csv
+++ b/dependencies_with_url.csv
@@ -488,7 +488,7 @@ org.sonatype.sisu:sisu-inject-bean:jar:2.2.2:compile
 org.sonatype.sisu:sisu-inject-plexus:jar:2.2.2:compile
 
com.zaxxer:HikariCP:jar:2.7.8:compile,ASLv2,https://github.com/brettwooldridge/HikariCP
 
org.hibernate.validator:hibernate-validator:jar:6.0.9.Final:compile,ASLv2,https://github.com/hibernate/hibernate-validator
-com.github.palindromicity:simple-syslog-5424:jar:0.0.9:compile,ASLv2,https://github.com/palindromicity/simple-syslog-5424
+com.github.palindromicity:simple-syslog:jar:0.0.1:compile,ASLv2,https://github.com/palindromicity/simple-syslog
 
org.elasticsearch.client:elasticsearch-rest-high-level-client:jar:5.6.14:compile,ASLv2,https://github.com/elastic/elasticsearch/blob/master/LICENSE.txt
 
org.elasticsearch.plugin:aggs-matrix-stats-client:jar:5.6.14:compile,ASLv2,https://github.com/elastic/elasticsearch/blob/master/LICENSE.txt
 
org.fusesource.jansi:jansi:jar:1.16:compile,ASLv2,https://github.com/fusesource/jansi/blob/master/license.txt
diff --git 
a/metron-platform/metron-integration-test/src/main/sample/data/syslog3164/parsed/Syslog3164Parsed
 
b/metron-platform/metron-integration-test/src/main/sample/data/syslog3164/parsed/Syslog3164Parsed
new file mode 100644
index 0000000000..4e90b46a0c
--- /dev/null
+++ 
b/metron-platform/metron-integration-test/src/main/sample/data/syslog3164/parsed/Syslog3164Parsed
@@ -0,0 +1,100 @@
+{"syslog.header.hostName":"10.22.8.216","original_string":"<167>Jan  5 
08:52:35 10.22.8.216 %ASA-7-609001: Built local-host 
inside:10.22.8.205","syslog.header.facility":"20","guid":"4f2beee4-c6d3-4282-b5e1-be42417e717e","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-7-609001: Built local-host 
inside:10.22.8.205","syslog.header.pri":"167","syslog.header.severity":"7","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302021: Teardown ICMP connection for faddr 
10.22.8.74\/0(LOCAL\\user.name) gaddr 10.22.8.205\/0 laddr 
10.22.8.205\/0","syslog.header.facility":"20","guid":"4e86e51e-a970-4a96-bb79-7d400030755c","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302021: Teardown ICMP connection for 
faddr 10.22.8.74\/0(LOCAL\\user.name) gaddr 10.22.8.205\/0 laddr 
10.22.8.205\/0","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<167>Jan  5 
08:52:35 10.22.8.216 %ASA-7-609002: Teardown local-host inside:10.22.8.205 
duration 
0:00:00","syslog.header.facility":"20","guid":"430bbc53-48e9-4f57-bfa6-18a28b7b0223","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-7-609002: Teardown local-host 
inside:10.22.8.205 duration 
0:00:00","syslog.header.pri":"167","syslog.header.severity":"7","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488167725 for 
Outside_VPN:147.111.72.16\/26436 to DMZ-Inside:10.22.8.53\/443 duration 0:00:00 
bytes 9687 TCP 
FINs","syslog.header.facility":"17","guid":"8032a334-9c48-4863-ae7b-1b14bfdb5ca7","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488167725 for Outside_VPN:147.111.72.16\/26436 to DMZ-Inside:10.22.8.53\/443 
duration 0:00:00 bytes 9687 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302014: Teardown TCP connection 212805593 for 
outside:10.22.8.223\/59614(LOCAL\\user.name) to inside:10.22.8.78\/8102 
duration 0:00:07 bytes 3433 TCP FINs 
(user.name)","syslog.header.facility":"20","guid":"583888b8-52a7-4833-a62e-0a53572c956c","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
212805593 for outside:10.22.8.223\/59614(LOCAL\\user.name) to 
inside:10.22.8.78\/8102 duration 0:00:07 bytes 3433 TCP FINs 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:35 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 76245503 for 
outside:10.22.8.233\/54209 (10.22.8.233\/54209) to inside:198.111.72.238\/443 
(198.111.72.238\/443) 
(user.name)","syslog.header.facility":"21","guid":"07ed512a-6572-4a51-b63e-3953eaa18d1b","syslog.header.timestamp":"Jan
  5 14:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
76245503 for outside:10.22.8.233\/54209 (10.22.8.233\/54209) to 
inside:198.111.72.238\/443 (198.111.72.238\/443) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 212806031 for 
outside:10.22.8.17\/58633 (10.22.8.17\/58633)(LOCAL\\user.name) to 
inside:10.22.8.12\/389 (10.22.8.12\/389) 
(user.name)","syslog.header.facility":"20","guid":"7a90799e-3ecd-4928-9096-557b1d012b8e","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
212806031 for outside:10.22.8.17\/58633 (10.22.8.17\/58633)(LOCAL\\user.name) 
to inside:10.22.8.12\/389 (10.22.8.12\/389) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168292 for 
DMZ-Inside:10.22.8.51\/51231 to Inside-Trunk:10.22.8.174\/40004 duration 
0:00:00 bytes 2103 TCP 
FINs","syslog.header.facility":"17","guid":"8e56f63c-2b81-4802-83c5-28648f407a93","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168292 for DMZ-Inside:10.22.8.51\/51231 to Inside-Trunk:10.22.8.174\/40004 
duration 0:00:00 bytes 2103 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-106015: Deny TCP (no connection) from 
186.111.72.11\/80 to 204.111.72.226\/45019 flags SYN ACK  on interface 
Outside_VPN","syslog.header.facility":"17","guid":"f883a23c-85b7-4f8d-9f23-ca934aece337","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-106015: Deny TCP (no connection) from 
186.111.72.11\/80 to 204.111.72.226\/45019 flags SYN ACK  on interface 
Outside_VPN","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:35 
10.22.8.12 %ASA-6-302014: Teardown TCP connection 17604987 for 
outside:209.111.72.151\/443 to inside:10.22.8.188\/64306 duration 0:00:31 bytes 
10128 TCP 
FINs","syslog.header.facility":"20","guid":"6f1baf12-3725-447c-9ca4-c4ae4b9fd801","syslog.header.timestamp":"Jan
  5 09:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 17604987 
for outside:209.111.72.151\/443 to inside:10.22.8.188\/64306 duration 0:00:31 
bytes 10128 TCP 
FINs","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:35 
10.22.8.12 %ASA-6-302014: Teardown TCP connection 17604999 for 
outside:209.111.72.151\/443 to inside:10.22.8.188\/64307 duration 0:00:30 bytes 
6370 TCP 
FINs","syslog.header.facility":"20","guid":"8dcb24c3-6b65-4057-9c7d-cb5c63f72016","syslog.header.timestamp":"Jan
  5 09:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 17604999 
for outside:209.111.72.151\/443 to inside:10.22.8.188\/64307 duration 0:00:30 
bytes 6370 TCP 
FINs","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488167347 for 
Outside_VPN:198.111.72.24\/2134 to DMZ-Inside:10.22.8.53\/443 duration 0:00:01 
bytes 9785 TCP 
FINs","syslog.header.facility":"17","guid":"cb019c2b-302b-4c7f-8726-f70bd88b2d69","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488167347 for Outside_VPN:198.111.72.24\/2134 to DMZ-Inside:10.22.8.53\/443 
duration 0:00:01 bytes 9785 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:35 10.22.8.212 %ASA-6-302015: Built inbound UDP connection 76245506 for 
outside:10.22.8.110\/49886 (10.22.8.110\/49886) to inside:192.111.72.8\/8612 
(192.111.72.8\/8612) 
(user.name)","syslog.header.facility":"21","guid":"b2de2222-95bd-492e-bd2a-785242d7adcd","syslog.header.timestamp":"Jan
  5 14:52:35","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
76245506 for outside:10.22.8.110\/49886 (10.22.8.110\/49886) to 
inside:192.111.72.8\/8612 (192.111.72.8\/8612) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302014: Teardown TCP connection 212805993 for 
outside:10.22.8.89\/56917(LOCAL\\user.name) to inside:216.111.72.126\/443 
duration 0:00:00 bytes 0 TCP FINs 
(user.name)","syslog.header.facility":"20","guid":"10b7f2e0-1f40-4f7f-a0fd-d40d32a11837","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
212805993 for outside:10.22.8.89\/56917(LOCAL\\user.name) to 
inside:216.111.72.126\/443 duration 0:00:00 bytes 0 TCP FINs 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<167>Jan  5 
08:52:35 10.22.8.216 %ASA-7-710005: UDP request discarded from 
10.22.8.223\/49192 to 
outside:224.111.72.252\/5355","syslog.header.facility":"20","guid":"663af706-af43-4c02-8308-1513c8111bea","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-7-710005: UDP request discarded from 
10.22.8.223\/49192 to 
outside:224.111.72.252\/5355","syslog.header.pri":"167","syslog.header.severity":"7","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488166143 for 
Outside_VPN:198.111.72.64\/80 to Inside-Trunk:10.22.8.39\/54883 duration 
0:00:04 bytes 1148 TCP 
FINs","syslog.header.facility":"17","guid":"4ccf7d55-4281-475f-acaa-909b3efd81f0","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488166143 for Outside_VPN:198.111.72.64\/80 to Inside-Trunk:10.22.8.39\/54883 
duration 0:00:04 bytes 1148 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-106015: Deny TCP (no connection) from 
10.22.8.84\/445 to 10.22.8.219\/60726 flags ACK  on interface 
inside","syslog.header.facility":"20","guid":"48d112e2-7569-4661-ba42-f33db2f4e190","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-106015: Deny TCP (no connection) from 
10.22.8.84\/445 to 10.22.8.219\/60726 flags ACK  on interface 
inside","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168344 for 
DMZ-Inside:10.22.8.53\/61682 to Inside-Trunk:10.22.8.174\/40004 duration 
0:00:00 bytes 5648 TCP 
FINs","syslog.header.facility":"17","guid":"2bc1288b-8216-460a-8060-f12f51118085","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168344 for DMZ-Inside:10.22.8.53\/61682 to Inside-Trunk:10.22.8.174\/40004 
duration 0:00:00 bytes 5648 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168345 for 
DMZ-Inside:10.22.8.16\/31454 to Inside-Trunk:10.22.8.21\/443 duration 0:00:00 
bytes 756 TCP 
FINs","syslog.header.facility":"17","guid":"ee8145ce-60a1-4059-95a2-ddf29f23159d","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168345 for DMZ-Inside:10.22.8.16\/31454 to Inside-Trunk:10.22.8.21\/443 
duration 0:00:00 bytes 756 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.4","original_string":"<182>Jan  5 20:22:35 
10.22.8.4 %ASA-6-302020: Built inbound ICMP connection for faddr 10.22.8.12\/0 
gaddr 10.22.8.45\/1 laddr 
10.22.8.45\/1","syslog.header.facility":"22","guid":"83246ca7-d2ce-494e-86c3-c2a38f44c581","syslog.header.timestamp":"Jan
  5 20:22:35","syslog.message":"%ASA-6-302020: Built inbound ICMP connection 
for faddr 10.22.8.12\/0 gaddr 10.22.8.45\/1 laddr 
10.22.8.45\/1","syslog.header.pri":"182","syslog.header.severity":"6","timestamp":1515183755000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-106015: Deny TCP (no connection) from 
50.111.72.230\/80 to 204.111.72.254\/53077 flags RST  on interface 
Outside_VPN","syslog.header.facility":"17","guid":"c7019d2a-819c-44c3-a31a-27d104dc8b2c","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-106015: Deny TCP (no connection) from 
50.111.72.230\/80 to 204.111.72.254\/53077 flags RST  on interface 
Outside_VPN","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:35 
10.22.8.12 %ASA-6-302016: Teardown UDP connection 17603649 for 
outside:206.111.72.2\/161 to inside:10.22.8.48\/63297 duration 0:02:01 bytes 
209","syslog.header.facility":"20","guid":"f4a6f93d-d94e-4fd0-bd3d-e3ecd22ead31","syslog.header.timestamp":"Jan
  5 09:52:35","syslog.message":"%ASA-6-302016: Teardown UDP connection 17603649 
for outside:206.111.72.2\/161 to inside:10.22.8.48\/63297 duration 0:02:01 
bytes 
209","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:35 
10.22.8.12 %ASA-6-302016: Teardown UDP connection 17603650 for 
outside:207.111.72.122\/161 to inside:10.22.8.48\/63298 duration 0:02:01 bytes 
209","syslog.header.facility":"20","guid":"4eeed9d1-0619-482a-815d-8e2711c9197d","syslog.header.timestamp":"Jan
  5 09:52:35","syslog.message":"%ASA-6-302016: Teardown UDP connection 17603650 
for outside:207.111.72.122\/161 to inside:10.22.8.48\/63298 duration 0:02:01 
bytes 
209","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:35 
10.22.8.12 %ASA-6-302016: Teardown UDP connection 17603652 for 
outside:206.111.72.2\/161 to inside:10.22.8.48\/63300 duration 0:02:01 bytes 
115","syslog.header.facility":"20","guid":"ace7f8c0-fdbd-475b-81d0-42ea557f9b02","syslog.header.timestamp":"Jan
  5 09:52:35","syslog.message":"%ASA-6-302016: Teardown UDP connection 17603652 
for outside:206.111.72.2\/161 to inside:10.22.8.48\/63300 duration 0:02:01 
bytes 
115","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:35 
10.22.8.12 %ASA-6-302016: Teardown UDP connection 17603657 for 
outside:206.111.72.2\/161 to inside:10.22.8.48\/63306 duration 0:02:01 bytes 
115","syslog.header.facility":"20","guid":"88652169-336a-49ad-a0cc-cdbe627dabe3","syslog.header.timestamp":"Jan
  5 09:52:35","syslog.message":"%ASA-6-302016: Teardown UDP connection 17603657 
for outside:206.111.72.2\/161 to inside:10.22.8.48\/63306 duration 0:02:01 
bytes 
115","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168436 for 
DMZ-Inside:10.22.8.51\/51235 to Inside-Trunk:10.22.8.174\/40004 duration 
0:00:00 bytes 2497 TCP 
FINs","syslog.header.facility":"17","guid":"cce6c817-4237-4970-9868-95bb9cb88769","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168436 for DMZ-Inside:10.22.8.51\/51235 to Inside-Trunk:10.22.8.174\/40004 
duration 0:00:00 bytes 2497 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488167656 for 
Outside_VPN:69.111.72.70\/21560 to DMZ-Inside:10.22.8.53\/443 duration 0:00:01 
bytes 11410 TCP 
FINs","syslog.header.facility":"17","guid":"c80fe260-62a1-44bc-9790-380730505321","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488167656 for Outside_VPN:69.111.72.70\/21560 to DMZ-Inside:10.22.8.53\/443 
duration 0:00:01 bytes 11410 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 212806050 for 
outside:10.22.8.62\/53965 (10.22.8.62\/53965)(LOCAL\\user.name) to 
inside:10.22.8.85\/53 (10.22.8.85\/53) 
(user.name)","syslog.header.facility":"20","guid":"d2aeae4b-099e-44a8-803e-e6f3efc6b681","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
212806050 for outside:10.22.8.62\/53965 (10.22.8.62\/53965)(LOCAL\\user.name) 
to inside:10.22.8.85\/53 (10.22.8.85\/53) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 212806052 for 
outside:10.22.8.62\/56500 (10.22.8.62\/56500)(LOCAL\\user.name) to 
inside:198.111.72.83\/443 (198.111.72.83\/443) 
(user.name)","syslog.header.facility":"20","guid":"4c17cf2e-7614-4bff-b786-b928ac108949","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
212806052 for outside:10.22.8.62\/56500 (10.22.8.62\/56500)(LOCAL\\user.name) 
to inside:198.111.72.83\/443 (198.111.72.83\/443) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 212806054 for 
outside:10.22.8.62\/56502 (10.22.8.62\/56502)(LOCAL\\user.name) to 
inside:50.111.72.252\/443 (50.111.72.252\/443) 
(user.name)","syslog.header.facility":"20","guid":"d14e6612-5694-4114-b305-c8176c661f04","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
212806054 for outside:10.22.8.62\/56502 (10.22.8.62\/56502)(LOCAL\\user.name) 
to inside:50.111.72.252\/443 (50.111.72.252\/443) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:35 
10.22.8.12 %ASA-6-305011: Built dynamic TCP translation from 
inside:10.22.8.188\/64340 to 
outside:206.111.72.41\/2013","syslog.header.facility":"20","guid":"4ecfc895-d27b-448f-8d29-88fae8bfdc15","syslog.header.timestamp":"Jan
  5 09:52:35","syslog.message":"%ASA-6-305011: Built dynamic TCP translation 
from inside:10.22.8.188\/64340 to 
outside:206.111.72.41\/2013","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.33","original_string":"<166>Jan  5 15:52:35 
10.22.8.33 %ASA-6-305012: Teardown dynamic UDP translation from 
inside:192.111.72.2\/62251 to outside:79.111.72.174\/21311 duration 
0:02:30","syslog.header.facility":"20","guid":"e1cf9c5f-40e9-4cce-8d96-ca4b54fcbe89","syslog.header.timestamp":"Jan
  5 15:52:35","syslog.message":"%ASA-6-305012: Teardown dynamic UDP translation 
from inside:192.111.72.2\/62251 to outside:79.111.72.174\/21311 duration 
0:02:30","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515167555000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 212806058 for 
outside:10.22.8.221\/56631 (10.22.8.221\/56631)(LOCAL\\user.name) to 
inside:10.22.8.26\/389 (10.22.8.26\/389) 
(user.name)","syslog.header.facility":"20","guid":"749d6df7-18d1-4a81-bbea-0dee8f4c89a8","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
212806058 for outside:10.22.8.221\/56631 (10.22.8.221\/56631)(LOCAL\\user.name) 
to inside:10.22.8.26\/389 (10.22.8.26\/389) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168189 for 
Outside_VPN:209.111.72.10\/56619 to DMZ-Inside:10.22.8.53\/443 duration 0:00:00 
bytes 2477 TCP 
FINs","syslog.header.facility":"17","guid":"131157d7-fcb9-4f4f-82c9-9b8f0c21bcd0","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168189 for Outside_VPN:209.111.72.10\/56619 to DMZ-Inside:10.22.8.53\/443 
duration 0:00:00 bytes 2477 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-106015: Deny TCP (no connection) from 
10.22.8.112\/52235 to 198.111.72.227\/80 flags ACK  on interface 
Inside-Trunk","syslog.header.facility":"17","guid":"cdedb97f-8a06-4427-95e4-2dae888b5942","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-106015: Deny TCP (no connection) from 
10.22.8.112\/52235 to 198.111.72.227\/80 flags ACK  on interface 
Inside-Trunk","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488167192 for 
Outside_VPN:115.111.72.7\/49196 to DMZ-Inside:10.22.8.57\/443 duration 0:00:02 
bytes 20588 TCP 
Reset-O","syslog.header.facility":"17","guid":"1fc183f6-8390-425f-a79b-a7e17ce95747","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488167192 for Outside_VPN:115.111.72.7\/49196 to DMZ-Inside:10.22.8.57\/443 
duration 0:00:02 bytes 20588 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302016: Teardown UDP connection 212806055 for 
outside:10.22.8.62\/55383(LOCAL\\user.name) to inside:10.22.8.85\/53 duration 
0:00:00 bytes 349 
(user.name)","syslog.header.facility":"20","guid":"1dd165c4-602d-444b-88f4-600d6c05cb96","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302016: Teardown UDP connection 
212806055 for outside:10.22.8.62\/55383(LOCAL\\user.name) to 
inside:10.22.8.85\/53 duration 0:00:00 bytes 349 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168380 for 
Outside_VPN:74.111.72.12\/443 to Inside-Trunk:10.22.8.39\/54894 duration 
0:00:00 bytes 5701 TCP 
FINs","syslog.header.facility":"17","guid":"920adf53-ca83-40b2-9ddf-2b034047dafb","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168380 for Outside_VPN:74.111.72.12\/443 to Inside-Trunk:10.22.8.39\/54894 
duration 0:00:00 bytes 5701 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:35 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 76245522 for 
outside:10.22.8.147\/56343 (10.22.8.147\/56343) to inside:209.111.72.151\/443 
(209.111.72.151\/443) 
(user.name)","syslog.header.facility":"21","guid":"26d79381-d0be-44ec-ba05-93cec39f5461","syslog.header.timestamp":"Jan
  5 14:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
76245522 for outside:10.22.8.147\/56343 (10.22.8.147\/56343) to 
inside:209.111.72.151\/443 (209.111.72.151\/443) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168443 for 
Outside_VPN:23.111.72.27\/80 to Inside-Trunk:10.22.8.81\/64713 duration 0:00:00 
bytes 2426 TCP 
FINs","syslog.header.facility":"17","guid":"54c06801-f175-46e9-b6e5-d47cd9fb4731","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168443 for Outside_VPN:23.111.72.27\/80 to Inside-Trunk:10.22.8.81\/64713 
duration 0:00:00 bytes 2426 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488111566 for 
Outside_VPN:131.111.72.49\/443 to Inside-Trunk:10.22.8.127\/56558 duration 
0:01:57 bytes 3614 TCP 
Reset-O","syslog.header.facility":"17","guid":"f556360d-b58b-469a-a8e9-29fa4915915f","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488111566 for Outside_VPN:131.111.72.49\/443 to Inside-Trunk:10.22.8.127\/56558 
duration 0:01:57 bytes 3614 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 212806061 for 
outside:10.22.8.17\/58635 (10.22.8.17\/58635)(LOCAL\\user.name) to 
inside:10.22.8.12\/389 (10.22.8.12\/389) 
(user.name)","syslog.header.facility":"20","guid":"68149a18-1f1f-4b5e-b619-61077e84ee2e","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
212806061 for outside:10.22.8.17\/58635 (10.22.8.17\/58635)(LOCAL\\user.name) 
to inside:10.22.8.12\/389 (10.22.8.12\/389) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302014: Teardown TCP connection 212806010 for 
outside:10.22.8.33\/60223(LOCAL\\user.name) to inside:10.22.8.86\/389 duration 
0:00:00 bytes 416 TCP Reset-I 
(user.name)","syslog.header.facility":"20","guid":"222989b0-267e-4679-a28f-e3561f4b40f0","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
212806010 for outside:10.22.8.33\/60223(LOCAL\\user.name) to 
inside:10.22.8.86\/389 duration 0:00:00 bytes 416 TCP Reset-I 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 212806062 for 
outside:10.22.8.221\/56632 (10.22.8.221\/56632)(LOCAL\\user.name) to 
inside:10.22.8.73\/389 (10.22.8.73\/389) 
(user.name)","syslog.header.facility":"20","guid":"01a3c7d7-a847-472f-912f-9fed08122a21","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
212806062 for outside:10.22.8.221\/56632 (10.22.8.221\/56632)(LOCAL\\user.name) 
to inside:10.22.8.73\/389 (10.22.8.73\/389) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<167>Jan  5 
08:52:35 10.22.8.216 %ASA-7-609002: Teardown local-host inside:10.22.8.205 
duration 
0:00:00","syslog.header.facility":"20","guid":"b21487c7-a268-4389-8daf-48553e24be9e","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-7-609002: Teardown local-host 
inside:10.22.8.205 duration 
0:00:00","syslog.header.pri":"167","syslog.header.severity":"7","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168231 for 
Outside_VPN:204.111.72.243\/3011 to Inside-Trunk:10.22.8.208\/60037 duration 
0:00:00 bytes 19415 TCP 
FINs","syslog.header.facility":"17","guid":"aa78ab45-e5f7-4c78-91ac-7782278121ba","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168231 for Outside_VPN:204.111.72.243\/3011 to 
Inside-Trunk:10.22.8.208\/60037 duration 0:00:00 bytes 19415 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.41","original_string":"<166>Jan  5 16:52:35 
10.22.8.41 %ASA-6-302013: Built inbound TCP connection 45476108 for 
Outside:10.22.8.97\/53484 (10.22.8.97\/53484)(LOCAL\\user.name) to 
Inside:141.111.72.70\/7576 (141.111.72.70\/7576) 
(user.name)","syslog.header.facility":"20","guid":"17255787-8e0b-441b-95f3-2847562976a0","syslog.header.timestamp":"Jan
  5 16:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
45476108 for Outside:10.22.8.97\/53484 (10.22.8.97\/53484)(LOCAL\\user.name) to 
Inside:141.111.72.70\/7576 (141.111.72.70\/7576) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515171155000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:35 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 76245527 for 
outside:10.22.8.97\/65195 (10.22.8.97\/65195) to inside:17.111.72.212\/5223 
(17.111.72.212\/5223) 
(user.name)","syslog.header.facility":"21","guid":"2afc28ff-6abc-4687-8980-29520e29fdd0","syslog.header.timestamp":"Jan
  5 14:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
76245527 for outside:10.22.8.97\/65195 (10.22.8.97\/65195) to 
inside:17.111.72.212\/5223 (17.111.72.212\/5223) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302014: Teardown TCP connection 212806018 for 
outside:10.22.8.17\/58632(LOCAL\\user.name) to inside:10.22.8.12\/389 duration 
0:00:00 bytes 0 TCP FINs 
(user.name)","syslog.header.facility":"20","guid":"e1b89dd1-ac20-449d-89f3-c0bd6854e5f4","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
212806018 for outside:10.22.8.17\/58632(LOCAL\\user.name) to 
inside:10.22.8.12\/389 duration 0:00:00 bytes 0 TCP FINs 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168562 for 
DMZ-Inside:10.22.8.51\/51236 to Inside-Trunk:10.22.8.174\/40004 duration 
0:00:00 bytes 2273 TCP 
FINs","syslog.header.facility":"17","guid":"883c4b0a-6fce-473b-accb-05e685f0cbf8","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168562 for DMZ-Inside:10.22.8.51\/51236 to Inside-Trunk:10.22.8.174\/40004 
duration 0:00:00 bytes 2273 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 212806065 for 
outside:10.22.8.62\/59829 (10.22.8.62\/59829)(LOCAL\\user.name) to 
inside:10.22.8.85\/53 (10.22.8.85\/53) 
(user.name)","syslog.header.facility":"20","guid":"1163b376-fc70-4ae9-81b4-0b037327fa5a","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
212806065 for outside:10.22.8.62\/59829 (10.22.8.62\/59829)(LOCAL\\user.name) 
to inside:10.22.8.85\/53 (10.22.8.85\/53) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 212806067 for 
outside:10.22.8.143\/62675 (10.22.8.143\/62675)(LOCAL\\user.name) to 
inside:141.111.72.12\/389 (141.111.72.12\/389) 
(user.name)","syslog.header.facility":"20","guid":"48775c39-c9d8-4da9-a543-7a70abb2e456","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
212806067 for outside:10.22.8.143\/62675 (10.22.8.143\/62675)(LOCAL\\user.name) 
to inside:141.111.72.12\/389 (141.111.72.12\/389) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<167>Jan  5 
08:52:35 10.22.8.216 %ASA-7-710005: UDP request discarded from 
10.22.8.223\/61122 to 
outside:224.111.72.252\/5355","syslog.header.facility":"20","guid":"3ec72d5a-d659-4f0a-8be7-328f990d1678","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-7-710005: UDP request discarded from 
10.22.8.223\/61122 to 
outside:224.111.72.252\/5355","syslog.header.pri":"167","syslog.header.severity":"7","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302020: Built inbound ICMP connection for faddr 
10.22.8.143\/0(LOCAL\\user.name) gaddr 141.111.72.12\/0 laddr 141.111.72.12\/0 
(user.name)","syslog.header.facility":"20","guid":"ce7ccaf5-f676-455d-a612-1c5856416c9c","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302020: Built inbound ICMP connection 
for faddr 10.22.8.143\/0(LOCAL\\user.name) gaddr 141.111.72.12\/0 laddr 
141.111.72.12\/0 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168547 for 
Outside_VPN:107.111.72.102\/80 to Inside-Trunk:10.22.8.54\/61676 duration 
0:00:00 bytes 1030 TCP 
FINs","syslog.header.facility":"17","guid":"fe02e22f-f3f4-4ba3-afe9-500519b4f0f4","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168547 for Outside_VPN:107.111.72.102\/80 to Inside-Trunk:10.22.8.54\/61676 
duration 0:00:00 bytes 1030 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 212806078 for 
outside:10.22.8.221\/56633 (10.22.8.221\/56633)(LOCAL\\user.name) to 
inside:10.22.8.20\/389 (10.22.8.20\/389) 
(user.name)","syslog.header.facility":"20","guid":"4e748582-a989-4605-abc1-70e30c6ce5b5","syslog.header.timestamp":"Jan
  5 08:52:35","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
212806078 for outside:10.22.8.221\/56633 (10.22.8.221\/56633)(LOCAL\\user.name) 
to inside:10.22.8.20\/389 (10.22.8.20\/389) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142355000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:35 
10.22.8.12 %ASA-6-305011: Built dynamic TCP translation from 
inside:10.22.8.83\/59915 to 
outside:206.111.72.41\/22776","syslog.header.facility":"20","guid":"557f3bc8-e889-427d-97fe-7d9e4b61e932","syslog.header.timestamp":"Jan
  5 09:52:35","syslog.message":"%ASA-6-305011: Built dynamic TCP translation 
from inside:10.22.8.83\/59915 to 
outside:206.111.72.41\/22776","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145955000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168044 for 
Outside_VPN:50.111.72.39\/80 to Inside-Trunk:10.22.8.75\/60877 duration 0:00:01 
bytes 13304 TCP 
FINs","syslog.header.facility":"17","guid":"d81d66f2-e6e0-42ff-b886-a02fd3893032","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168044 for Outside_VPN:50.111.72.39\/80 to Inside-Trunk:10.22.8.75\/60877 
duration 0:00:01 bytes 13304 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488118326 for 
Outside_VPN:23.111.72.27\/80 to Inside-Trunk:10.22.8.229\/57901 duration 
0:01:45 bytes 1942 TCP 
FINs","syslog.header.facility":"17","guid":"e33243a6-d361-48da-9dd6-30fe1a2b0dbe","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488118326 for Outside_VPN:23.111.72.27\/80 to Inside-Trunk:10.22.8.229\/57901 
duration 0:01:45 bytes 1942 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488160565 for 
Outside_VPN:72.111.72.29\/80 to Inside-Trunk:10.22.8.42\/57520 duration 0:00:15 
bytes 1025 TCP 
FINs","syslog.header.facility":"17","guid":"0833ee92-e4b0-4cec-aed6-73e0f3afa0e8","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488160565 for Outside_VPN:72.111.72.29\/80 to Inside-Trunk:10.22.8.42\/57520 
duration 0:00:15 bytes 1025 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488096423 for 
Outside_VPN:72.111.72.43\/80 to Inside-Trunk:10.22.8.127\/59096 duration 
0:02:27 bytes 99347 TCP 
Reset-O","syslog.header.facility":"17","guid":"5afa5b9b-af47-4954-820f-1a2a72249f5c","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488096423 for Outside_VPN:72.111.72.43\/80 to Inside-Trunk:10.22.8.127\/59096 
duration 0:02:27 bytes 99347 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488095522 for 
Outside_VPN:72.111.72.43\/80 to Inside-Trunk:10.22.8.127\/59087 duration 
0:02:29 bytes 154785 TCP 
Reset-O","syslog.header.facility":"17","guid":"cc093a83-1f7d-468a-b09a-982e62a5371a","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488095522 for Outside_VPN:72.111.72.43\/80 to Inside-Trunk:10.22.8.127\/59087 
duration 0:02:29 bytes 154785 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488106557 for 
Outside_VPN:72.111.72.43\/80 to Inside-Trunk:10.22.8.127\/59134 duration 
0:02:09 bytes 25319 TCP 
Reset-O","syslog.header.facility":"17","guid":"30e86e48-6d96-4ebc-8865-262c67d1801b","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488106557 for Outside_VPN:72.111.72.43\/80 to Inside-Trunk:10.22.8.127\/59134 
duration 0:02:09 bytes 25319 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488096426 for 
Outside_VPN:72.111.72.43\/80 to Inside-Trunk:10.22.8.127\/59099 duration 
0:02:27 bytes 26171 TCP 
Reset-O","syslog.header.facility":"17","guid":"e9d40894-606f-4f14-9bb3-367fbc0c19a0","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488096426 for Outside_VPN:72.111.72.43\/80 to Inside-Trunk:10.22.8.127\/59099 
duration 0:02:27 bytes 26171 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:36 10.22.8.216 %ASA-6-302014: Teardown TCP connection 212806005 for 
outside:10.22.8.17\/58630(LOCAL\\user.name) to inside:10.22.8.12\/389 duration 
0:00:00 bytes 3942 TCP FINs 
(user.name)","syslog.header.facility":"20","guid":"ada1044a-5805-494a-a814-2907ad6ad665","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
212806005 for outside:10.22.8.17\/58630(LOCAL\\user.name) to 
inside:10.22.8.12\/389 duration 0:00:00 bytes 3942 TCP FINs 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:36 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 212806085 for 
outside:10.22.8.143\/54018 (10.22.8.143\/54018)(LOCAL\\user.name) to 
inside:10.22.8.85\/53 (10.22.8.85\/53) 
(user.name)","syslog.header.facility":"20","guid":"7e38f864-4c30-4f06-9dd7-0bc8f405bbe6","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
212806085 for outside:10.22.8.143\/54018 (10.22.8.143\/54018)(LOCAL\\user.name) 
to inside:10.22.8.85\/53 (10.22.8.85\/53) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:36 10.22.8.212 %ASA-6-302020: Built inbound ICMP connection for faddr 
10.22.8.96\/2708 gaddr 10.22.8.30\/0 laddr 10.22.8.30\/0 
(user.name)","syslog.header.facility":"21","guid":"57fb779c-227a-4f64-afde-d993f5f163fb","syslog.header.timestamp":"Jan
  5 14:52:36","syslog.message":"%ASA-6-302020: Built inbound ICMP connection 
for faddr 10.22.8.96\/2708 gaddr 10.22.8.30\/0 laddr 10.22.8.30\/0 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163956000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:36 10.22.8.212 %ASA-6-302015: Built inbound UDP connection 76245537 for 
outside:10.22.8.110\/49886 (10.22.8.110\/49886) to inside:192.111.72.11\/8612 
(192.111.72.11\/8612) 
(user.name)","syslog.header.facility":"21","guid":"55f3aa3a-fa7f-42c2-86fa-23602434c716","syslog.header.timestamp":"Jan
  5 14:52:36","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
76245537 for outside:10.22.8.110\/49886 (10.22.8.110\/49886) to 
inside:192.111.72.11\/8612 (192.111.72.11\/8612) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163956000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.41","original_string":"<166>Jan  5 16:52:36 
10.22.8.41 %ASA-6-106015: Deny TCP (no connection) from 10.22.8.85\/58359 to 
10.22.8.11\/88 flags RST ACK  on interface 
Outside","syslog.header.facility":"20","guid":"04bf0433-398f-4369-8a10-b6b6800b94dc","syslog.header.timestamp":"Jan
  5 16:52:36","syslog.message":"%ASA-6-106015: Deny TCP (no connection) from 
10.22.8.85\/58359 to 10.22.8.11\/88 flags RST ACK  on interface 
Outside","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515171156000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:36 10.22.8.216 %ASA-6-302021: Teardown ICMP connection for faddr 
10.22.8.82\/0(LOCAL\\user.name) gaddr 10.22.8.205\/0 laddr 
10.22.8.205\/0","syslog.header.facility":"20","guid":"0ca4a23e-9dc1-46ea-bbd4-e5fa1566a5fa","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302021: Teardown ICMP connection for 
faddr 10.22.8.82\/0(LOCAL\\user.name) gaddr 10.22.8.205\/0 laddr 
10.22.8.205\/0","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:36 10.22.8.216 %ASA-6-302016: Teardown UDP connection 212799832 for 
outside:10.22.8.230\/55549(LOCAL\\user.name) to inside:10.22.8.11\/389 duration 
0:02:01 bytes 354 
(user.name)","syslog.header.facility":"20","guid":"b472dd59-9ede-42ed-a67b-e5d34e8b7b9d","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302016: Teardown UDP connection 
212799832 for outside:10.22.8.230\/55549(LOCAL\\user.name) to 
inside:10.22.8.11\/389 duration 0:02:01 bytes 354 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:36 10.22.8.216 %ASA-6-302016: Teardown UDP connection 212799867 for 
outside:10.22.8.240\/138(LOCAL\\user.name) to inside:10.22.8.255\/138 duration 
0:02:01 bytes 214 
(user.name)","syslog.header.facility":"20","guid":"9231563a-4e43-440d-9bcd-ff67d2f01b17","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302016: Teardown UDP connection 
212799867 for outside:10.22.8.240\/138(LOCAL\\user.name) to 
inside:10.22.8.255\/138 duration 0:02:01 bytes 214 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<167>Jan  5 
08:52:36 10.22.8.216 %ASA-7-609001: Built local-host 
inside:67.111.72.204","syslog.header.facility":"20","guid":"e717a671-9e5f-4bb7-b0b0-0e1cbcfe5b4a","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-7-609001: Built local-host 
inside:67.111.72.204","syslog.header.pri":"167","syslog.header.severity":"7","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:36 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 76245544 for 
outside:10.22.8.227\/54540 (10.22.8.227\/54540) to inside:63.111.72.124\/80 
(63.111.72.124\/80) 
(user.name)","syslog.header.facility":"21","guid":"49cc4afe-467b-4b4c-b883-d6aa2ebe1d9f","syslog.header.timestamp":"Jan
  5 14:52:36","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
76245544 for outside:10.22.8.227\/54540 (10.22.8.227\/54540) to 
inside:63.111.72.124\/80 (63.111.72.124\/80) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163956000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168135 for 
Outside_VPN:198.111.72.66\/36797 to DMZ-Inside:10.22.8.53\/80 duration 0:00:01 
bytes 89039 TCP 
FINs","syslog.header.facility":"17","guid":"de2a851d-4860-4625-b870-c7f3a10c219a","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168135 for Outside_VPN:198.111.72.66\/36797 to DMZ-Inside:10.22.8.53\/80 
duration 0:00:01 bytes 89039 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:36 10.22.8.216 %ASA-6-302014: Teardown TCP connection 212805836 for 
outside:10.22.8.62\/56471(LOCAL\\user.name) to inside:208.111.72.1\/443 
duration 0:00:04 bytes 1700 TCP FINs 
(user.name)","syslog.header.facility":"20","guid":"6f37c953-20ea-4fa3-aa96-0b91c689e110","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
212805836 for outside:10.22.8.62\/56471(LOCAL\\user.name) to 
inside:208.111.72.1\/443 duration 0:00:04 bytes 1700 TCP FINs 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:36 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 76245546 for 
outside:10.22.8.227\/54542 (10.22.8.227\/54542) to inside:63.111.72.124\/80 
(63.111.72.124\/80) 
(user.name)","syslog.header.facility":"21","guid":"4e9f6ee9-55fc-40da-8e3c-77ba4f072013","syslog.header.timestamp":"Jan
  5 14:52:36","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
76245546 for outside:10.22.8.227\/54542 (10.22.8.227\/54542) to 
inside:63.111.72.124\/80 (63.111.72.124\/80) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163956000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:36 10.22.8.216 %ASA-6-302021: Teardown ICMP connection for faddr 
10.22.8.74\/0(LOCAL\\user.name) gaddr 10.22.8.205\/0 laddr 
10.22.8.205\/0","syslog.header.facility":"20","guid":"79538743-01a6-49e1-860a-80fe58111d59","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302021: Teardown ICMP connection for 
faddr 10.22.8.74\/0(LOCAL\\user.name) gaddr 10.22.8.205\/0 laddr 
10.22.8.205\/0","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:36 10.22.8.212 %ASA-6-302020: Built outbound ICMP connection for faddr 
10.22.8.96\/2708 gaddr 10.22.8.30\/0 laddr 
10.22.8.30\/0","syslog.header.facility":"21","guid":"7ba31a57-915e-466e-8efb-dfdbc9a7d515","syslog.header.timestamp":"Jan
  5 14:52:36","syslog.message":"%ASA-6-302020: Built outbound ICMP connection 
for faddr 10.22.8.96\/2708 gaddr 10.22.8.30\/0 laddr 
10.22.8.30\/0","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163956000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168388 for 
DMZ-Inside:10.22.8.10\/49771 to Inside-Trunk:10.22.8.128\/443 duration 0:00:00 
bytes 19132 TCP 
Reset-O","syslog.header.facility":"17","guid":"5fb3a31a-84f7-465e-b4a5-648edc12c9f3","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168388 for DMZ-Inside:10.22.8.10\/49771 to Inside-Trunk:10.22.8.128\/443 
duration 0:00:00 bytes 19132 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488168692 for 
DMZ-Inside:10.22.8.53\/61694 to Inside-Trunk:10.22.8.174\/40004 duration 
0:00:00 bytes 5660 TCP 
FINs","syslog.header.facility":"17","guid":"89922414-2c06-45b2-9c96-e2a62956eb4b","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488168692 for DMZ-Inside:10.22.8.53\/61694 to Inside-Trunk:10.22.8.174\/40004 
duration 0:00:00 bytes 5660 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:36 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 76245552 for 
outside:10.22.8.92\/51042 (10.22.8.92\/51042) to inside:10.22.8.193\/9100 
(10.22.8.193\/9100) 
(user.name)","syslog.header.facility":"21","guid":"af712b8d-55d8-46c0-9ab0-92e075aaf546","syslog.header.timestamp":"Jan
  5 14:52:36","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
76245552 for outside:10.22.8.92\/51042 (10.22.8.92\/51042) to 
inside:10.22.8.193\/9100 (10.22.8.193\/9100) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163956000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.41","original_string":"<166>Jan  5 16:52:36 
10.22.8.41 %ASA-6-302016: Teardown UDP connection 45474680 for 
Outside:10.22.8.49\/137(LOCAL\\user.name) to Inside:10.22.8.12\/137 duration 
0:02:03 bytes 486 
(user.name)","syslog.header.facility":"20","guid":"756ac82f-e710-4dac-b7d6-8e22931b3cfd","syslog.header.timestamp":"Jan
  5 16:52:36","syslog.message":"%ASA-6-302016: Teardown UDP connection 45474680 
for Outside:10.22.8.49\/137(LOCAL\\user.name) to Inside:10.22.8.12\/137 
duration 0:02:03 bytes 486 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515171156000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.41","original_string":"<166>Jan  5 16:52:36 
10.22.8.41 %ASA-6-302016: Teardown UDP connection 45474694 for 
Outside:10.22.8.49\/138(LOCAL\\user.name) to Inside:10.22.8.12\/138 duration 
0:02:01 bytes 184 
(user.name)","syslog.header.facility":"20","guid":"c7cbc688-5c80-43f0-b3a9-6e026c988c83","syslog.header.timestamp":"Jan
  5 16:52:36","syslog.message":"%ASA-6-302016: Teardown UDP connection 45474694 
for Outside:10.22.8.49\/138(LOCAL\\user.name) to Inside:10.22.8.12\/138 
duration 0:02:01 bytes 184 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515171156000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488167720 for 
Outside_VPN:198.111.72.75\/1033 to DMZ-Inside:10.22.8.53\/443 duration 0:00:01 
bytes 9634 TCP 
FINs","syslog.header.facility":"17","guid":"fd20d131-6fe5-4258-a822-982db9b3bcc2","syslog.header.timestamp":"Jan
  5 08:52:36","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488167720 for Outside_VPN:198.111.72.75\/1033 to DMZ-Inside:10.22.8.53\/443 
duration 0:00:01 bytes 9634 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142356000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488165627 for 
Outside_VPN:170.111.72.22\/27463 to DMZ-Inside:10.22.8.53\/443 duration 0:00:01 
bytes 9756 TCP 
FINs","syslog.header.facility":"17","guid":"de48f6be-b9c8-42e5-8db9-4fdec5458dbf","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488165627 for Outside_VPN:170.111.72.22\/27463 to DMZ-Inside:10.22.8.53\/443 
duration 0:00:01 bytes 9756 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142352000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:32 10.22.8.216 %ASA-6-302016: Teardown UDP connection 212805854 for 
outside:10.22.8.62\/54704(LOCAL\\user.name) to inside:10.22.8.85\/53 duration 
0:00:00 bytes 114 
(user.name)","syslog.header.facility":"20","guid":"84c5fb3b-ae49-4eb8-af3f-57c63fc6d079","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-6-302016: Teardown UDP connection 
212805854 for outside:10.22.8.62\/54704(LOCAL\\user.name) to 
inside:10.22.8.85\/53 duration 0:00:00 bytes 114 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142352000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:32 
10.22.8.12 %ASA-6-302020: Built inbound ICMP connection for faddr 
207.111.72.122\/0 gaddr 206.111.72.24\/512 laddr 
10.22.8.57\/512","syslog.header.facility":"20","guid":"a7fcb975-e65a-4f01-939e-839cf4f599b0","syslog.header.timestamp":"Jan
  5 09:52:32","syslog.message":"%ASA-6-302020: Built inbound ICMP connection 
for faddr 207.111.72.122\/0 gaddr 206.111.72.24\/512 laddr 
10.22.8.57\/512","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145952000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:32 
10.22.8.12 %ASA-6-302013: Built outbound TCP connection 17605397 for 
outside:69.111.72.0\/80 (69.111.72.0\/80) to inside:10.22.8.102\/55659 
(206.111.72.41\/40627)","syslog.header.facility":"20","guid":"12f475f4-04c8-41de-8d41-547f98933048","syslog.header.timestamp":"Jan
  5 09:52:32","syslog.message":"%ASA-6-302013: Built outbound TCP connection 
17605397 for outside:69.111.72.0\/80 (69.111.72.0\/80) to 
inside:10.22.8.102\/55659 
(206.111.72.41\/40627)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145952000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.212","original_string":"<174>Jan  5 
14:52:32 10.22.8.212 %ASA-6-302015: Built inbound UDP connection 76245230 for 
outside:10.22.8.96\/123 (10.22.8.96\/123) to inside:10.22.8.12\/123 
(10.22.8.12\/123) 
(user.name)","syslog.header.facility":"21","guid":"9b26768a-1a11-4777-b1fb-906821b7f05b","syslog.header.timestamp":"Jan
  5 14:52:32","syslog.message":"%ASA-6-302015: Built inbound UDP connection 
76245230 for outside:10.22.8.96\/123 (10.22.8.96\/123) to 
inside:10.22.8.12\/123 (10.22.8.12\/123) 
(user.name)","syslog.header.pri":"174","syslog.header.severity":"6","timestamp":1515163952000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488031413 for 
Outside_VPN:184.111.72.216\/50341 to DMZ-Inside:10.22.8.57\/443 duration 
0:05:01 bytes 13543 TCP 
Reset-O","syslog.header.facility":"17","guid":"b177327e-d674-470a-8f82-bacd18d47df2","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488031413 for Outside_VPN:184.111.72.216\/50341 to DMZ-Inside:10.22.8.57\/443 
duration 0:05:01 bytes 13543 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142352000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.41","original_string":"<166>Jan  5 16:52:32 
10.22.8.41 %ASA-6-302020: Built inbound ICMP connection for faddr 
10.22.8.95\/1(LOCAL\\user.name) gaddr 10.22.8.12\/0 laddr 10.22.8.12\/0 
(user.name)","syslog.header.facility":"20","guid":"69f69569-66c2-4846-9f12-3b24a416e876","syslog.header.timestamp":"Jan
  5 16:52:32","syslog.message":"%ASA-6-302020: Built inbound ICMP connection 
for faddr 10.22.8.95\/1(LOCAL\\user.name) gaddr 10.22.8.12\/0 laddr 
10.22.8.12\/0 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515171152000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488030393 for 
DMZ-Inside:[10.22.8.10\/57109 to Inside-Trunk:10.22.8.128\/443 duration 0:05:04 
bytes 13541 TCP 
Reset-O","syslog.header.facility":"17","guid":"bf63019f-7895-495f-8406-2b50b9186a90","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488030393 for DMZ-Inside:[10.22.8.10\/57109 to Inside-Trunk:10.22.8.128\/443 
duration 0:05:04 bytes 13541 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142352000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:32 
10.22.8.12 %ASA-6-305012: Teardown dynamic TCP translation from 
inside:10.22.8.149\/62156 to outside:206.111.72.41\/19576 duration 
0:00:44","syslog.header.facility":"20","guid":"28cc755f-1acb-41bf-a454-ee392fb7ef1a","syslog.header.timestamp":"Jan
  5 09:52:32","syslog.message":"%ASA-6-305012: Teardown dynamic TCP translation 
from inside:10.22.8.149\/62156 to outside:206.111.72.41\/19576 duration 
0:00:44","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145952000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.12","original_string":"<166>Jan  5 09:52:32 
10.22.8.12 %ASA-6-305012: Teardown dynamic TCP translation from 
inside:10.22.8.149\/62159 to outside:206.111.72.41\/39634 duration 
0:00:44","syslog.header.facility":"20","guid":"d6c11c2e-c0b4-4981-b6bc-768c5437b7d9","syslog.header.timestamp":"Jan
  5 09:52:32","syslog.message":"%ASA-6-305012: Teardown dynamic TCP translation 
from inside:10.22.8.149\/62159 to outside:206.111.72.41\/39634 duration 
0:00:44","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515145952000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488031793 for 
Outside_VPN:198.111.72.146\/28026 to DMZ-Inside:10.22.8.53\/443 duration 
0:05:00 bytes 119 TCP 
FINs","syslog.header.facility":"17","guid":"6816c488-5bc9-4854-97cb-c26c31f223fb","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488031793 for Outside_VPN:198.111.72.146\/28026 to DMZ-Inside:10.22.8.53\/443 
duration 0:05:00 bytes 119 TCP 
FINs","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142352000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 488030810 for 
DMZ-Inside:10.22.8.10\/56930 to Inside-Trunk:10.22.8.128\/443 duration 0:05:03 
bytes 13543 TCP 
Reset-O","syslog.header.facility":"17","guid":"abaf91ea-8b0f-4157-9222-3492585e19e4","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-6-302014: Teardown TCP connection 
488030810 for DMZ-Inside:10.22.8.10\/56930 to Inside-Trunk:10.22.8.128\/443 
duration 0:05:03 bytes 13543 TCP 
Reset-O","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142352000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.201","original_string":"<142>Jan  5 
08:52:32 10.22.8.201 %ASA-6-106015: Deny TCP (no connection) from 
186.111.72.11\/80 to 204.111.72.199\/61438 flags SYN ACK  on interface 
Outside_VPN","syslog.header.facility":"17","guid":"25830358-2bde-4c75-bc90-0aba594625dd","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-6-106015: Deny TCP (no connection) from 
186.111.72.11\/80 to 204.111.72.199\/61438 flags SYN ACK  on interface 
Outside_VPN","syslog.header.pri":"142","syslog.header.severity":"6","timestamp":1515142352000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<166>Jan  5 
08:52:32 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 212805863 for 
outside:10.22.8.144\/61999 (10.22.8.144\/61999)(LOCAL\\user.name) to 
inside:10.22.8.163\/80 (10.22.8.163\/80) 
(user.name)","syslog.header.facility":"20","guid":"78461d6a-8008-4c55-b8cd-b48b90e9d519","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-6-302013: Built inbound TCP connection 
212805863 for outside:10.22.8.144\/61999 (10.22.8.144\/61999)(LOCAL\\user.name) 
to inside:10.22.8.163\/80 (10.22.8.163\/80) 
(user.name)","syslog.header.pri":"166","syslog.header.severity":"6","timestamp":1515142352000,"source.type":"syslog3164"}
+{"syslog.header.hostName":"10.22.8.216","original_string":"<167>Jan  5 
08:52:32 10.22.8.216 %ASA-7-609002: Teardown local-host inside:10.22.8.205 
duration 
0:00:00","syslog.header.facility":"20","guid":"0d48864f-dcd5-40b5-8ec3-a37ccf2f1527","syslog.header.timestamp":"Jan
  5 08:52:32","syslog.message":"%ASA-7-609002: Teardown local-host 
inside:10.22.8.205 duration 
0:00:00","syslog.header.pri":"167","syslog.header.severity":"7","timestamp":1515142352000,"source.type":"syslog3164"}
\ No newline at end of file
diff --git 
a/metron-platform/metron-integration-test/src/main/sample/data/syslog3164/raw/Syslog3164Output
 
b/metron-platform/metron-integration-test/src/main/sample/data/syslog3164/raw/Syslog3164Output
new file mode 100644
index 0000000000..6009d4888e
--- /dev/null
+++ 
b/metron-platform/metron-integration-test/src/main/sample/data/syslog3164/raw/Syslog3164Output
@@ -0,0 +1,100 @@
+<167>Jan  5 08:52:35 10.22.8.216 %ASA-7-609001: Built local-host 
inside:10.22.8.205
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302021: Teardown ICMP connection for 
faddr 10.22.8.74/0(LOCAL\user.name) gaddr 10.22.8.205/0 laddr 10.22.8.205/0
+<167>Jan  5 08:52:35 10.22.8.216 %ASA-7-609002: Teardown local-host 
inside:10.22.8.205 duration 0:00:00
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488167725 for Outside_VPN:147.111.72.16/26436 to DMZ-Inside:10.22.8.53/443 
duration 0:00:00 bytes 9687 TCP FINs
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302014: Teardown TCP connection 
212805593 for outside:10.22.8.223/59614(LOCAL\user.name) to 
inside:10.22.8.78/8102 duration 0:00:07 bytes 3433 TCP FINs (user.name)
+<174>Jan  5 14:52:35 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 
76245503 for outside:10.22.8.233/54209 (10.22.8.233/54209) to 
inside:198.111.72.238/443 (198.111.72.238/443) (user.name)
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 
212806031 for outside:10.22.8.17/58633 (10.22.8.17/58633)(LOCAL\user.name) to 
inside:10.22.8.12/389 (10.22.8.12/389) (user.name)
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168292 for DMZ-Inside:10.22.8.51/51231 to Inside-Trunk:10.22.8.174/40004 
duration 0:00:00 bytes 2103 TCP FINs
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-106015: Deny TCP (no connection) from 
186.111.72.11/80 to 204.111.72.226/45019 flags SYN ACK  on interface Outside_VPN
+<166>Jan  5 09:52:35 10.22.8.12 %ASA-6-302014: Teardown TCP connection 
17604987 for outside:209.111.72.151/443 to inside:10.22.8.188/64306 duration 
0:00:31 bytes 10128 TCP FINs
+<166>Jan  5 09:52:35 10.22.8.12 %ASA-6-302014: Teardown TCP connection 
17604999 for outside:209.111.72.151/443 to inside:10.22.8.188/64307 duration 
0:00:30 bytes 6370 TCP FINs
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488167347 for Outside_VPN:198.111.72.24/2134 to DMZ-Inside:10.22.8.53/443 
duration 0:00:01 bytes 9785 TCP FINs
+<174>Jan  5 14:52:35 10.22.8.212 %ASA-6-302015: Built inbound UDP connection 
76245506 for outside:10.22.8.110/49886 (10.22.8.110/49886) to 
inside:192.111.72.8/8612 (192.111.72.8/8612) (user.name)
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302014: Teardown TCP connection 
212805993 for outside:10.22.8.89/56917(LOCAL\user.name) to 
inside:216.111.72.126/443 duration 0:00:00 bytes 0 TCP FINs (user.name)
+<167>Jan  5 08:52:35 10.22.8.216 %ASA-7-710005: UDP request discarded from 
10.22.8.223/49192 to outside:224.111.72.252/5355
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488166143 for Outside_VPN:198.111.72.64/80 to Inside-Trunk:10.22.8.39/54883 
duration 0:00:04 bytes 1148 TCP FINs
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-106015: Deny TCP (no connection) from 
10.22.8.84/445 to 10.22.8.219/60726 flags ACK  on interface inside
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168344 for DMZ-Inside:10.22.8.53/61682 to Inside-Trunk:10.22.8.174/40004 
duration 0:00:00 bytes 5648 TCP FINs
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168345 for DMZ-Inside:10.22.8.16/31454 to Inside-Trunk:10.22.8.21/443 
duration 0:00:00 bytes 756 TCP FINs
+<182>Jan  5 20:22:35 10.22.8.4 %ASA-6-302020: Built inbound ICMP connection 
for faddr 10.22.8.12/0 gaddr 10.22.8.45/1 laddr 10.22.8.45/1
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-106015: Deny TCP (no connection) from 
50.111.72.230/80 to 204.111.72.254/53077 flags RST  on interface Outside_VPN
+<166>Jan  5 09:52:35 10.22.8.12 %ASA-6-302016: Teardown UDP connection 
17603649 for outside:206.111.72.2/161 to inside:10.22.8.48/63297 duration 
0:02:01 bytes 209
+<166>Jan  5 09:52:35 10.22.8.12 %ASA-6-302016: Teardown UDP connection 
17603650 for outside:207.111.72.122/161 to inside:10.22.8.48/63298 duration 
0:02:01 bytes 209
+<166>Jan  5 09:52:35 10.22.8.12 %ASA-6-302016: Teardown UDP connection 
17603652 for outside:206.111.72.2/161 to inside:10.22.8.48/63300 duration 
0:02:01 bytes 115
+<166>Jan  5 09:52:35 10.22.8.12 %ASA-6-302016: Teardown UDP connection 
17603657 for outside:206.111.72.2/161 to inside:10.22.8.48/63306 duration 
0:02:01 bytes 115
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168436 for DMZ-Inside:10.22.8.51/51235 to Inside-Trunk:10.22.8.174/40004 
duration 0:00:00 bytes 2497 TCP FINs
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488167656 for Outside_VPN:69.111.72.70/21560 to DMZ-Inside:10.22.8.53/443 
duration 0:00:01 bytes 11410 TCP FINs
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 
212806050 for outside:10.22.8.62/53965 (10.22.8.62/53965)(LOCAL\user.name) to 
inside:10.22.8.85/53 (10.22.8.85/53) (user.name)
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 
212806052 for outside:10.22.8.62/56500 (10.22.8.62/56500)(LOCAL\user.name) to 
inside:198.111.72.83/443 (198.111.72.83/443) (user.name)
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 
212806054 for outside:10.22.8.62/56502 (10.22.8.62/56502)(LOCAL\user.name) to 
inside:50.111.72.252/443 (50.111.72.252/443) (user.name)
+<166>Jan  5 09:52:35 10.22.8.12 %ASA-6-305011: Built dynamic TCP translation 
from inside:10.22.8.188/64340 to outside:206.111.72.41/2013
+<166>Jan  5 15:52:35 10.22.8.33 %ASA-6-305012: Teardown dynamic UDP 
translation from inside:192.111.72.2/62251 to outside:79.111.72.174/21311 
duration 0:02:30
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 
212806058 for outside:10.22.8.221/56631 (10.22.8.221/56631)(LOCAL\user.name) to 
inside:10.22.8.26/389 (10.22.8.26/389) (user.name)
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168189 for Outside_VPN:209.111.72.10/56619 to DMZ-Inside:10.22.8.53/443 
duration 0:00:00 bytes 2477 TCP FINs
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-106015: Deny TCP (no connection) from 
10.22.8.112/52235 to 198.111.72.227/80 flags ACK  on interface Inside-Trunk
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488167192 for Outside_VPN:115.111.72.7/49196 to DMZ-Inside:10.22.8.57/443 
duration 0:00:02 bytes 20588 TCP Reset-O
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302016: Teardown UDP connection 
212806055 for outside:10.22.8.62/55383(LOCAL\user.name) to inside:10.22.8.85/53 
duration 0:00:00 bytes 349 (user.name)
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168380 for Outside_VPN:74.111.72.12/443 to Inside-Trunk:10.22.8.39/54894 
duration 0:00:00 bytes 5701 TCP FINs
+<174>Jan  5 14:52:35 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 
76245522 for outside:10.22.8.147/56343 (10.22.8.147/56343) to 
inside:209.111.72.151/443 (209.111.72.151/443) (user.name)
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168443 for Outside_VPN:23.111.72.27/80 to Inside-Trunk:10.22.8.81/64713 
duration 0:00:00 bytes 2426 TCP FINs
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488111566 for Outside_VPN:131.111.72.49/443 to Inside-Trunk:10.22.8.127/56558 
duration 0:01:57 bytes 3614 TCP Reset-O
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 
212806061 for outside:10.22.8.17/58635 (10.22.8.17/58635)(LOCAL\user.name) to 
inside:10.22.8.12/389 (10.22.8.12/389) (user.name)
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302014: Teardown TCP connection 
212806010 for outside:10.22.8.33/60223(LOCAL\user.name) to 
inside:10.22.8.86/389 duration 0:00:00 bytes 416 TCP Reset-I (user.name)
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 
212806062 for outside:10.22.8.221/56632 (10.22.8.221/56632)(LOCAL\user.name) to 
inside:10.22.8.73/389 (10.22.8.73/389) (user.name)
+<167>Jan  5 08:52:35 10.22.8.216 %ASA-7-609002: Teardown local-host 
inside:10.22.8.205 duration 0:00:00
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168231 for Outside_VPN:204.111.72.243/3011 to Inside-Trunk:10.22.8.208/60037 
duration 0:00:00 bytes 19415 TCP FINs
+<166>Jan  5 16:52:35 10.22.8.41 %ASA-6-302013: Built inbound TCP connection 
45476108 for Outside:10.22.8.97/53484 (10.22.8.97/53484)(LOCAL\user.name) to 
Inside:141.111.72.70/7576 (141.111.72.70/7576) (user.name)
+<174>Jan  5 14:52:35 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 
76245527 for outside:10.22.8.97/65195 (10.22.8.97/65195) to 
inside:17.111.72.212/5223 (17.111.72.212/5223) (user.name)
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302014: Teardown TCP connection 
212806018 for outside:10.22.8.17/58632(LOCAL\user.name) to 
inside:10.22.8.12/389 duration 0:00:00 bytes 0 TCP FINs (user.name)
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168562 for DMZ-Inside:10.22.8.51/51236 to Inside-Trunk:10.22.8.174/40004 
duration 0:00:00 bytes 2273 TCP FINs
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 
212806065 for outside:10.22.8.62/59829 (10.22.8.62/59829)(LOCAL\user.name) to 
inside:10.22.8.85/53 (10.22.8.85/53) (user.name)
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 
212806067 for outside:10.22.8.143/62675 (10.22.8.143/62675)(LOCAL\user.name) to 
inside:141.111.72.12/389 (141.111.72.12/389) (user.name)
+<167>Jan  5 08:52:35 10.22.8.216 %ASA-7-710005: UDP request discarded from 
10.22.8.223/61122 to outside:224.111.72.252/5355
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302020: Built inbound ICMP connection 
for faddr 10.22.8.143/0(LOCAL\user.name) gaddr 141.111.72.12/0 laddr 
141.111.72.12/0 (user.name)
+<142>Jan  5 08:52:35 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168547 for Outside_VPN:107.111.72.102/80 to Inside-Trunk:10.22.8.54/61676 
duration 0:00:00 bytes 1030 TCP FINs
+<166>Jan  5 08:52:35 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 
212806078 for outside:10.22.8.221/56633 (10.22.8.221/56633)(LOCAL\user.name) to 
inside:10.22.8.20/389 (10.22.8.20/389) (user.name)
+<166>Jan  5 09:52:35 10.22.8.12 %ASA-6-305011: Built dynamic TCP translation 
from inside:10.22.8.83/59915 to outside:206.111.72.41/22776
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168044 for Outside_VPN:50.111.72.39/80 to Inside-Trunk:10.22.8.75/60877 
duration 0:00:01 bytes 13304 TCP FINs
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488118326 for Outside_VPN:23.111.72.27/80 to Inside-Trunk:10.22.8.229/57901 
duration 0:01:45 bytes 1942 TCP FINs
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488160565 for Outside_VPN:72.111.72.29/80 to Inside-Trunk:10.22.8.42/57520 
duration 0:00:15 bytes 1025 TCP FINs
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488096423 for Outside_VPN:72.111.72.43/80 to Inside-Trunk:10.22.8.127/59096 
duration 0:02:27 bytes 99347 TCP Reset-O
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488095522 for Outside_VPN:72.111.72.43/80 to Inside-Trunk:10.22.8.127/59087 
duration 0:02:29 bytes 154785 TCP Reset-O
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488106557 for Outside_VPN:72.111.72.43/80 to Inside-Trunk:10.22.8.127/59134 
duration 0:02:09 bytes 25319 TCP Reset-O
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488096426 for Outside_VPN:72.111.72.43/80 to Inside-Trunk:10.22.8.127/59099 
duration 0:02:27 bytes 26171 TCP Reset-O
+<166>Jan  5 08:52:36 10.22.8.216 %ASA-6-302014: Teardown TCP connection 
212806005 for outside:10.22.8.17/58630(LOCAL\user.name) to 
inside:10.22.8.12/389 duration 0:00:00 bytes 3942 TCP FINs (user.name)
+<166>Jan  5 08:52:36 10.22.8.216 %ASA-6-302015: Built inbound UDP connection 
212806085 for outside:10.22.8.143/54018 (10.22.8.143/54018)(LOCAL\user.name) to 
inside:10.22.8.85/53 (10.22.8.85/53) (user.name)
+<174>Jan  5 14:52:36 10.22.8.212 %ASA-6-302020: Built inbound ICMP connection 
for faddr 10.22.8.96/2708 gaddr 10.22.8.30/0 laddr 10.22.8.30/0 (user.name)
+<174>Jan  5 14:52:36 10.22.8.212 %ASA-6-302015: Built inbound UDP connection 
76245537 for outside:10.22.8.110/49886 (10.22.8.110/49886) to 
inside:192.111.72.11/8612 (192.111.72.11/8612) (user.name)
+<166>Jan  5 16:52:36 10.22.8.41 %ASA-6-106015: Deny TCP (no connection) from 
10.22.8.85/58359 to 10.22.8.11/88 flags RST ACK  on interface Outside
+<166>Jan  5 08:52:36 10.22.8.216 %ASA-6-302021: Teardown ICMP connection for 
faddr 10.22.8.82/0(LOCAL\user.name) gaddr 10.22.8.205/0 laddr 10.22.8.205/0
+<166>Jan  5 08:52:36 10.22.8.216 %ASA-6-302016: Teardown UDP connection 
212799832 for outside:10.22.8.230/55549(LOCAL\user.name) to 
inside:10.22.8.11/389 duration 0:02:01 bytes 354 (user.name)
+<166>Jan  5 08:52:36 10.22.8.216 %ASA-6-302016: Teardown UDP connection 
212799867 for outside:10.22.8.240/138(LOCAL\user.name) to 
inside:10.22.8.255/138 duration 0:02:01 bytes 214 (user.name)
+<167>Jan  5 08:52:36 10.22.8.216 %ASA-7-609001: Built local-host 
inside:67.111.72.204
+<174>Jan  5 14:52:36 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 
76245544 for outside:10.22.8.227/54540 (10.22.8.227/54540) to 
inside:63.111.72.124/80 (63.111.72.124/80) (user.name)
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168135 for Outside_VPN:198.111.72.66/36797 to DMZ-Inside:10.22.8.53/80 
duration 0:00:01 bytes 89039 TCP FINs
+<166>Jan  5 08:52:36 10.22.8.216 %ASA-6-302014: Teardown TCP connection 
212805836 for outside:10.22.8.62/56471(LOCAL\user.name) to 
inside:208.111.72.1/443 duration 0:00:04 bytes 1700 TCP FINs (user.name)
+<174>Jan  5 14:52:36 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 
76245546 for outside:10.22.8.227/54542 (10.22.8.227/54542) to 
inside:63.111.72.124/80 (63.111.72.124/80) (user.name)
+<166>Jan  5 08:52:36 10.22.8.216 %ASA-6-302021: Teardown ICMP connection for 
faddr 10.22.8.74/0(LOCAL\user.name) gaddr 10.22.8.205/0 laddr 10.22.8.205/0
+<174>Jan  5 14:52:36 10.22.8.212 %ASA-6-302020: Built outbound ICMP connection 
for faddr 10.22.8.96/2708 gaddr 10.22.8.30/0 laddr 10.22.8.30/0
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168388 for DMZ-Inside:10.22.8.10/49771 to Inside-Trunk:10.22.8.128/443 
duration 0:00:00 bytes 19132 TCP Reset-O
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488168692 for DMZ-Inside:10.22.8.53/61694 to Inside-Trunk:10.22.8.174/40004 
duration 0:00:00 bytes 5660 TCP FINs
+<174>Jan  5 14:52:36 10.22.8.212 %ASA-6-302013: Built inbound TCP connection 
76245552 for outside:10.22.8.92/51042 (10.22.8.92/51042) to 
inside:10.22.8.193/9100 (10.22.8.193/9100) (user.name)
+<166>Jan  5 16:52:36 10.22.8.41 %ASA-6-302016: Teardown UDP connection 
45474680 for Outside:10.22.8.49/137(LOCAL\user.name) to Inside:10.22.8.12/137 
duration 0:02:03 bytes 486 (user.name)
+<166>Jan  5 16:52:36 10.22.8.41 %ASA-6-302016: Teardown UDP connection 
45474694 for Outside:10.22.8.49/138(LOCAL\user.name) to Inside:10.22.8.12/138 
duration 0:02:01 bytes 184 (user.name)
+<142>Jan  5 08:52:36 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488167720 for Outside_VPN:198.111.72.75/1033 to DMZ-Inside:10.22.8.53/443 
duration 0:00:01 bytes 9634 TCP FINs
+<142>Jan  5 08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488165627 for Outside_VPN:170.111.72.22/27463 to DMZ-Inside:10.22.8.53/443 
duration 0:00:01 bytes 9756 TCP FINs
+<166>Jan  5 08:52:32 10.22.8.216 %ASA-6-302016: Teardown UDP connection 
212805854 for outside:10.22.8.62/54704(LOCAL\user.name) to inside:10.22.8.85/53 
duration 0:00:00 bytes 114 (user.name)
+<166>Jan  5 09:52:32 10.22.8.12 %ASA-6-302020: Built inbound ICMP connection 
for faddr 207.111.72.122/0 gaddr 206.111.72.24/512 laddr 10.22.8.57/512
+<166>Jan  5 09:52:32 10.22.8.12 %ASA-6-302013: Built outbound TCP connection 
17605397 for outside:69.111.72.0/80 (69.111.72.0/80) to 
inside:10.22.8.102/55659 (206.111.72.41/40627)
+<174>Jan  5 14:52:32 10.22.8.212 %ASA-6-302015: Built inbound UDP connection 
76245230 for outside:10.22.8.96/123 (10.22.8.96/123) to inside:10.22.8.12/123 
(10.22.8.12/123) (user.name)
+<142>Jan  5 08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488031413 for Outside_VPN:184.111.72.216/50341 to DMZ-Inside:10.22.8.57/443 
duration 0:05:01 bytes 13543 TCP Reset-O
+<166>Jan  5 16:52:32 10.22.8.41 %ASA-6-302020: Built inbound ICMP connection 
for faddr 10.22.8.95/1(LOCAL\user.name) gaddr 10.22.8.12/0 laddr 10.22.8.12/0 
(user.name)
+<142>Jan  5 08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488030393 for DMZ-Inside:[10.22.8.10/57109 to Inside-Trunk:10.22.8.128/443 
duration 0:05:04 bytes 13541 TCP Reset-O
+<166>Jan  5 09:52:32 10.22.8.12 %ASA-6-305012: Teardown dynamic TCP 
translation from inside:10.22.8.149/62156 to outside:206.111.72.41/19576 
duration 0:00:44
+<166>Jan  5 09:52:32 10.22.8.12 %ASA-6-305012: Teardown dynamic TCP 
translation from inside:10.22.8.149/62159 to outside:206.111.72.41/39634 
duration 0:00:44
+<142>Jan  5 08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488031793 for Outside_VPN:198.111.72.146/28026 to DMZ-Inside:10.22.8.53/443 
duration 0:05:00 bytes 119 TCP FINs
+<142>Jan  5 08:52:32 10.22.8.201 %ASA-6-302014: Teardown TCP connection 
488030810 for DMZ-Inside:10.22.8.10/56930 to Inside-Trunk:10.22.8.128/443 
duration 0:05:03 bytes 13543 TCP Reset-O
+<142>Jan  5 08:52:32 10.22.8.201 %ASA-6-106015: Deny TCP (no connection) from 
186.111.72.11/80 to 204.111.72.199/61438 flags SYN ACK  on interface Outside_VPN
+<166>Jan  5 08:52:32 10.22.8.216 %ASA-6-302013: Built inbound TCP connection 
212805863 for outside:10.22.8.144/61999 (10.22.8.144/61999)(LOCAL\user.name) to 
inside:10.22.8.163/80 (10.22.8.163/80) (user.name)
+<167>Jan  5 08:52:32 10.22.8.216 %ASA-7-609002: Teardown local-host 
inside:10.22.8.205 duration 0:00:00
\ No newline at end of file
diff --git 
a/metron-platform/metron-integration-test/src/main/sample/data/syslog5424/parsed/Syslog5424Parsed
 
b/metron-platform/metron-integration-test/src/main/sample/data/syslog5424/parsed/Syslog5424Parsed
index e33020444f..ee1c6f6632 100644
--- 
a/metron-platform/metron-integration-test/src/main/sample/data/syslog5424/parsed/Syslog5424Parsed
+++ 
b/metron-platform/metron-integration-test/src/main/sample/data/syslog5424/parsed/Syslog5424Parsed
@@ -1,3 +1,3 @@
-{"syslog.header.appName":"d0602076-b14a-4c55-852a-981e7afeed38","syslog.header.version":"1","syslog.header.hostName":"loggregator","original_string":"<14>1
 2014-06-20T09:14:07+00:00 loggregator d0602076-b14a-4c55-852a-981e7afeed38 DEA 
- - Removing 
instance","syslog.header.facility":"1","syslog.header.msgId":"-","syslog.header.timestamp":"2014-06-20T09:14:07+00:00","syslog.message":"Removing
 
instance","syslog.header.pri":"14","syslog.header.procId":"DEA","syslog.header.severity":"6","timestamp":"2014-06-20T09:14:07+00:00","guid":"this-is-random-uuid-will-be-36-chars","source.type":"syslog5424"}
-{"syslog.structureddata.examples...@32480.iut":"4","syslog.structuredData.exampleSDID@32480.eventSource":"Other
 
Application","syslog.header.hostName":"loggregator","syslog.header.facility":"1","syslog.structuredData.exampleSDID@32480.eventID":"2022","syslog.structuredData.exampleSDID@32473.eventSource":"Application","syslog.header.timestamp":"2014-06-20T09:14:08+00:00","syslog.message":"Removing
 
instance","syslog.header.pri":"14","syslog.header.procId":"DEA","syslog.header.severity":"6","syslog.header.appName":"d0602076-b14a-4c55-852a-981e7afeed40","syslog.header.version":"1","syslog.structureddata.examples...@32473.iut":"3","original_string":"<14>1
 2014-06-20T09:14:08+00:00 loggregator d0602076-b14a-4c55-852a-981e7afeed40 DEA 
MSG-02 [exampleSDID@32473 iut=\"3\" eventSource=\"Application\" 
eventID=\"1011\"] [exampleSDID@32480 iut=\"4\" eventSource=\"Other 
Application\" eventID=\"2022\"] Removing 
instance","syslog.header.msgId":"MSG-02","syslog.structuredData.exampleSDID@32473.eventID":"1011","timestamp":"2014-06-20T09:14:08+00:00","guid":"this-is-random-uuid-will-be-36-chars","source.type":"syslog5424"}
-{"syslog.structureddata.examples...@32480.iut":"4","syslog.structuredData.exampleSDID@32480.eventSource":"Other
 
Application","syslog.structureddata.examples...@32474.iut":"3","syslog.structuredData.exampleSDID@32474.eventID":"1011","syslog.header.hostName":"loggregator","syslog.header.facility":"1","syslog.structuredData.exampleSDID@32480.eventID":"2022","syslog.header.timestamp":"2014-06-20T09:14:09+00:00","syslog.message":"Removing
 
instance","syslog.header.pri":"14","syslog.header.procId":"DEA","syslog.structuredData.exampleSDID@32474.eventSource":"Application","syslog.header.severity":"6","syslog.header.appName":"d0602076-b14a-4c55-852a-981e7afeed42","syslog.header.version":"1","original_string":"<14>1
 2014-06-20T09:14:09+00:00 loggregator d0602076-b14a-4c55-852a-981e7afeed42 DEA 
MSG-03 [exampleSDID@32474 iut=\"3\" eventSource=\"Application\" 
eventID=\"1011\"] [exampleSDID@32480 iut=\"4\" eventSource=\"Other 
Application\" eventID=\"2022\"] Removing 
instance","syslog.header.msgId":"MSG-03","timestamp":"2014-06-20T09:14:09+00:00","guid":"this-is-random-uuid-will-be-36-chars","source.type":"syslog5424"}
\ No newline at end of file
+{"syslog.header.hostName":"loggregator","syslog.header.facility":"1","syslog.header.timestamp":"2014-06-20T09:14:07+00:00","syslog.message":"Removing
 
instance","syslog.header.pri":"14","syslog.header.procId":"DEA","syslog.header.severity":"6","source.type":"syslog5424","syslog.header.appName":"d0602076-b14a-4c55-852a-981e7afeed38","syslog.header.version":"1","original_string":"<14>1
 2014-06-20T09:14:07+00:00 loggregator d0602076-b14a-4c55-852a-981e7afeed38 DEA 
- - Removing 
instance","syslog.header.msgId":"-","guid":"4cc6ba44-0a74-44cb-b7d0-3b3c761c1f4a","timestamp":1403255647000}
+{"syslog.structureddata.examples...@32480.iut":"4","syslog.structuredData.exampleSDID@32480.eventSource":"Other
 
Application","syslog.header.hostName":"loggregator","syslog.header.facility":"1","syslog.structuredData.exampleSDID@32480.eventID":"2022","syslog.structuredData.exampleSDID@32473.eventSource":"Application","syslog.header.timestamp":"2014-06-20T09:14:08+00:00","syslog.message":"Removing
 
instance","syslog.header.pri":"14","syslog.header.procId":"DEA","syslog.header.severity":"6","source.type":"syslog5424","syslog.header.appName":"d0602076-b14a-4c55-852a-981e7afeed40","syslog.header.version":"1","syslog.structureddata.examples...@32473.iut":"3","original_string":"<14>1
 2014-06-20T09:14:08+00:00 loggregator d0602076-b14a-4c55-852a-981e7afeed40 DEA 
MSG-02 [exampleSDID@32473 iut=\"3\" eventSource=\"Application\" 
eventID=\"1011\"] [exampleSDID@32480 iut=\"4\" eventSource=\"Other 
Application\" eventID=\"2022\"] Removing 
instance","syslog.header.msgId":"MSG-02","guid":"7bb44066-a0a8-4459-a826-7243000d6798","syslog.structuredData.exampleSDID@32473.eventID":"1011","timestamp":1403255648000}
+{"syslog.structureddata.examples...@32480.iut":"4","syslog.structuredData.exampleSDID@32480.eventSource":"Other
 
Application","syslog.structureddata.examples...@32474.iut":"3","syslog.structuredData.exampleSDID@32474.eventID":"1011","syslog.header.hostName":"loggregator","syslog.header.facility":"1","syslog.structuredData.exampleSDID@32480.eventID":"2022","syslog.header.timestamp":"2014-06-20T09:14:09+00:00","syslog.message":"Removing
 
instance","syslog.header.pri":"14","syslog.header.procId":"DEA","syslog.structuredData.exampleSDID@32474.eventSource":"Application","syslog.header.severity":"6","source.type":"syslog5424","syslog.header.appName":"d0602076-b14a-4c55-852a-981e7afeed42","syslog.header.version":"1","original_string":"<14>1
 2014-06-20T09:14:09+00:00 loggregator d0602076-b14a-4c55-852a-981e7afeed42 DEA 
MSG-03 [exampleSDID@32474 iut=\"3\" eventSource=\"Application\" 
eventID=\"1011\"] [exampleSDID@32480 iut=\"4\" eventSource=\"Other 
Application\" eventID=\"2022\"] Removing 
instance","syslog.header.msgId":"MSG-03","guid":"18a80e8f-13b8-472a-8a0e-fe80ce1a6d32","timestamp":1403255649000}
\ No newline at end of file
diff --git 
a/metron-platform/metron-parsers/src/test/java/org/apache/metron/parsers/integration/Syslog3164ParserIntegrationTest.java
 
b/metron-platform/metron-parsers/src/test/java/org/apache/metron/parsers/integration/Syslog3164ParserIntegrationTest.java
new file mode 100644
index 0000000000..e1affe641f
--- /dev/null
+++ 
b/metron-platform/metron-parsers/src/test/java/org/apache/metron/parsers/integration/Syslog3164ParserIntegrationTest.java
@@ -0,0 +1,37 @@
+/**
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.metron.parsers.integration;
+
+import org.apache.metron.parsers.integration.validation.SampleDataValidation;
+
+import java.util.ArrayList;
+import java.util.List;
+
+public class Syslog3164ParserIntegrationTest extends ParserIntegrationTest {
+  @Override
+  String getSensorType() {
+    return "syslog3164";
+  }
+
+  @Override
+  List<ParserValidation> getValidations() {
+    return new ArrayList<ParserValidation>() {{
+      add(new SampleDataValidation());
+    }};
+  }
+}
diff --git a/metron-platform/metron-parsing/README.md 
b/metron-platform/metron-parsing/README.md
index 76b6168dca..43334cbd62 100644
--- a/metron-platform/metron-parsing/README.md
+++ b/metron-platform/metron-parsing/README.md
@@ -589,6 +589,7 @@ Java parser adapters are intended for higher-velocity 
topologies and are not eas
 * org.apache.metron.parsers.sourcefire.BasicSourcefireParser : Parse 
Sourcefire messages
 * org.apache.metron.parsers.lancope.BasicLancopeParser : Parse Lancope messages
 * org.apache.metron.parsers.syslog.Syslog5424Parser : Parse Syslog RFC 5424 
messages
+* org.apache.metron.parsers.syslog.Syslog3164Parser : Parse Syslog RFC 3164 
messages
 
 ### Grok Parser Adapters
 Grok parser adapters are designed primarily for someone who is not a Java 
coder for quickly standing up a parser adapter for lower velocity topologies.  
Grok relies on Regex for message parsing, which is much slower than 
purpose-built Java parsers, but is more extensible.  Grok parsers are defined 
via a config file and the topplogy does not need to be recompiled in order to 
make changes to them.  Example of a Grok parsers are:
diff --git a/metron-platform/metron-parsing/metron-parsers-common/README.md 
b/metron-platform/metron-parsing/metron-parsers-common/README.md
index 0c5cf23e80..09499506e7 100644
--- a/metron-platform/metron-parsing/metron-parsers-common/README.md
+++ b/metron-platform/metron-parsing/metron-parsers-common/README.md
@@ -23,5 +23,6 @@ The included parsers are
 * Grok Parser
 * JSONMapParser
 * CSVParser
+* Syslog 3164 and 5424 parsers
 
 More details on these parsers and the overall architecture can be found in the 
metron-parsing [README](..#README.md) 
diff --git a/metron-platform/metron-parsing/metron-parsers-common/pom.xml 
b/metron-platform/metron-parsing/metron-parsers-common/pom.xml
index 617366aff2..8abc1ee7aa 100644
--- a/metron-platform/metron-parsing/metron-parsers-common/pom.xml
+++ b/metron-platform/metron-parsing/metron-parsers-common/pom.xml
@@ -217,6 +217,11 @@
             <artifactId>json-path</artifactId>
             <version>2.3.0</version>
         </dependency>
+        <dependency>
+            <groupId>com.github.palindromicity</groupId>
+            <artifactId>simple-syslog</artifactId>
+            <version>${global_simple_syslog_version}</version>
+        </dependency>
     </dependencies>
     <build>
         <plugins>
diff --git 
a/metron-platform/metron-parsing/metron-parsers-common/src/main/config/zookeeper/parsers/syslog3164.json
 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/config/zookeeper/parsers/syslog3164.json
new file mode 100644
index 0000000000..298e8ccfab
--- /dev/null
+++ 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/config/zookeeper/parsers/syslog3164.json
@@ -0,0 +1,6 @@
+{
+  "parserClassName":"org.apache.metron.parsers.syslog.Syslog3164Parser",
+  "sensorTopic":"syslog3164",
+  "parserConfig": {
+  }
+}
\ No newline at end of file
diff --git 
a/metron-platform/metron-parsing/metron-parsers/src/main/config/zookeeper/parsers/syslog5424.json
 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/config/zookeeper/parsers/syslog5424.json
similarity index 100%
rename from 
metron-platform/metron-parsing/metron-parsers/src/main/config/zookeeper/parsers/syslog5424.json
rename to 
metron-platform/metron-parsing/metron-parsers-common/src/main/config/zookeeper/parsers/syslog5424.json
diff --git 
a/metron-platform/metron-parsing/metron-parsers/src/main/java/org/apache/metron/parsers/syslog/Syslog5424Parser.java
 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/BaseSyslogParser.java
similarity index 65%
rename from 
metron-platform/metron-parsing/metron-parsers/src/main/java/org/apache/metron/parsers/syslog/Syslog5424Parser.java
rename to 
metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/BaseSyslogParser.java
index 77ebd18e9f..c05b7604ab 100644
--- 
a/metron-platform/metron-parsing/metron-parsers/src/main/java/org/apache/metron/parsers/syslog/Syslog5424Parser.java
+++ 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/BaseSyslogParser.java
@@ -18,65 +18,81 @@
 
 package org.apache.metron.parsers.syslog;
 
-import com.github.palindromicity.syslog.AllowableDeviations;
-import com.github.palindromicity.syslog.NilPolicy;
 import com.github.palindromicity.syslog.SyslogParser;
-import com.github.palindromicity.syslog.SyslogParserBuilder;
 import com.github.palindromicity.syslog.dsl.SyslogFieldKeys;
+import org.apache.commons.lang3.StringUtils;
+import org.apache.metron.parsers.DefaultMessageParserResult;
+import org.apache.metron.parsers.ParseException;
+import org.apache.metron.parsers.interfaces.MessageParser;
+import org.apache.metron.parsers.interfaces.MessageParserResult;
+import org.apache.metron.parsers.utils.SyslogUtils;
+import org.json.simple.JSONObject;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
 import java.io.BufferedReader;
 import java.io.IOException;
 import java.io.Reader;
 import java.io.Serializable;
 import java.io.StringReader;
 import java.lang.invoke.MethodHandles;
+import java.time.Clock;
 import java.time.LocalDateTime;
+import java.time.ZoneId;
+import java.time.ZoneOffset;
 import java.time.format.DateTimeFormatter;
 import java.util.ArrayList;
-import java.util.EnumSet;
 import java.util.HashMap;
 import java.util.List;
 import java.util.Map;
 import java.util.Optional;
-import org.apache.commons.lang3.StringUtils;
-import org.apache.metron.parsers.DefaultMessageParserResult;
-import org.apache.metron.parsers.interfaces.MessageParser;
-import org.apache.metron.parsers.interfaces.MessageParserResult;
-import org.json.simple.JSONObject;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
+import java.util.function.Consumer;
 
 
 /**
  * Parser for well structured RFC 5424 messages.
  */
-public class Syslog5424Parser implements MessageParser<JSONObject>, 
Serializable {
+public abstract class BaseSyslogParser implements MessageParser<JSONObject>, 
Serializable {
   protected static final Logger LOG = 
LoggerFactory.getLogger(MethodHandles.lookup().lookupClass());
-  public static final String NIL_POLICY_CONFIG = "nilPolicy";
+
+  private Optional<Consumer<JSONObject>> messageProcessorOptional = 
Optional.empty();
   private transient SyslogParser syslogParser;
 
-  @Override
-  public void configure(Map<String, Object> config) {
-    // Default to OMIT policy for nil fields
-    // this means they will not be in the returned field set
-    String nilPolicyStr = (String) config.getOrDefault(NIL_POLICY_CONFIG, 
NilPolicy.OMIT.name());
-    NilPolicy nilPolicy = NilPolicy.valueOf(nilPolicyStr);
-    syslogParser = new SyslogParserBuilder()
-            .withNilPolicy(nilPolicy)
-            
.withDeviations(EnumSet.of(AllowableDeviations.PRIORITY,AllowableDeviations.VERSION))
-            .build();
+  protected Clock deviceClock;
+
+
+  protected void setSyslogParser(SyslogParser syslogParser) {
+    this.syslogParser = syslogParser;
   }
 
+  protected void setMessageProcessor(Consumer<JSONObject> function) {
+    this.messageProcessorOptional = Optional.of(function);
+  }
+
+  protected abstract SyslogParser buildSyslogParser( Map<String,Object> 
config);
+
   @Override
-  public void init() {
+  public void configure(Map<String, Object> parserConfig) {
+    // we'll pull out the clock stuff ourselves
+    String timeZone = (String) parserConfig.get("deviceTimeZone");
+    if (timeZone != null)
+      deviceClock = Clock.system(ZoneId.of(timeZone));
+    else {
+      deviceClock = Clock.systemUTC();
+      LOG.warn("[Metron] No device time zone provided; defaulting to UTC");
+    }
+    syslogParser = buildSyslogParser(parserConfig);
   }
 
+  @Override
+  public void init(){}
+
   @Override
   public boolean validate(JSONObject message) {
-    JSONObject value = message;
-    if (!(value.containsKey("original_string"))) {
+    if (!(message.containsKey("original_string"))) {
       LOG.trace("[Metron] Message does not have original_string: {}", message);
       return false;
-    } else if (!(value.containsKey("timestamp"))) {
+    } else if (!(message.containsKey("timestamp"))) {
       LOG.trace("[Metron] Message does not have timestamp: {}", message);
       return false;
     } else {
@@ -94,7 +110,7 @@ public boolean validate(JSONObject message) {
       }
 
       String originalString = new String(rawMessage);
-      List<JSONObject> returnList = new ArrayList<>();
+      final List<JSONObject> returnList = new ArrayList<>();
       Map<Object,Throwable> errorMap = new HashMap<>();
       try (Reader reader = new BufferedReader(new 
StringReader(originalString))) {
         syslogParser.parseLines(reader, (m) -> {
@@ -102,7 +118,13 @@ public boolean validate(JSONObject message) {
           // be sure to put in the original string, and the timestamp.
           // we wil just copy over the timestamp from the syslog
           jsonObject.put("original_string", originalString);
-          setTimestamp(jsonObject);
+          try {
+            setTimestamp(jsonObject);
+          } catch (ParseException pe) {
+            errorMap.put(originalString,pe);
+            return;
+          }
+          messageProcessorOptional.ifPresent((c) -> c.accept(jsonObject));
           returnList.add(jsonObject);
         },errorMap::put);
 
@@ -116,12 +138,15 @@ public boolean validate(JSONObject message) {
   }
 
   @SuppressWarnings("unchecked")
-  private void setTimestamp(JSONObject message) {
+  private void setTimestamp(JSONObject message) throws ParseException {
     String timeStampString = (String) 
message.get(SyslogFieldKeys.HEADER_TIMESTAMP.getField());
     if (!StringUtils.isBlank(timeStampString) && !timeStampString.equals("-")) 
{
-      message.put("timestamp", timeStampString);
+      message.put("timestamp", 
SyslogUtils.parseTimestampToEpochMillis(timeStampString, deviceClock));
     } else {
-      message.put("timestamp", 
LocalDateTime.now().format(DateTimeFormatter.ISO_DATE_TIME));
+      message.put(
+          "timestamp",
+          LocalDateTime.now()
+              .toEpochSecond(ZoneOffset.UTC));
     }
   }
 }
diff --git 
a/metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/Syslog3164Parser.java
 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/Syslog3164Parser.java
new file mode 100644
index 0000000000..632bcfd195
--- /dev/null
+++ 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/Syslog3164Parser.java
@@ -0,0 +1,43 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.apache.metron.parsers.syslog;
+
+import com.github.palindromicity.syslog.AllowableDeviations;
+import com.github.palindromicity.syslog.SyslogParser;
+import com.github.palindromicity.syslog.SyslogParserBuilder;
+import com.github.palindromicity.syslog.SyslogSpecification;
+
+import java.io.Serializable;
+import java.util.EnumSet;
+import java.util.Map;
+
+
+/**
+ * Parser for RFC 3164 messages.
+ */
+public class Syslog3164Parser extends BaseSyslogParser implements Serializable 
{
+
+  @Override
+  public SyslogParser buildSyslogParser(Map<String, Object> config) {
+    return new SyslogParserBuilder()
+            .forSpecification(SyslogSpecification.RFC_3164)
+            .withDeviations(EnumSet.of(AllowableDeviations.PRIORITY, 
AllowableDeviations.VERSION))
+            .build();
+  }
+}
diff --git 
a/metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/Syslog5424Parser.java
 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/Syslog5424Parser.java
new file mode 100644
index 0000000000..cacb0e4082
--- /dev/null
+++ 
b/metron-platform/metron-parsing/metron-parsers-common/src/main/java/org/apache/metron/parsers/syslog/Syslog5424Parser.java
@@ -0,0 +1,51 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.apache.metron.parsers.syslog;
+
+import com.github.palindromicity.syslog.AllowableDeviations;
+import com.github.palindromicity.syslog.NilPolicy;
+import com.github.palindromicity.syslog.SyslogParser;
+import com.github.palindromicity.syslog.SyslogParserBuilder;
+import com.github.palindromicity.syslog.SyslogSpecification;
+
+import java.io.Serializable;
+import java.util.EnumSet;
+import java.util.Map;
+
+
+/**
+ * Parser for well structured RFC 5424 messages.
+ */
+public class Syslog5424Parser extends BaseSyslogParser implements Serializable 
{
+  public static final String NIL_POLICY_CONFIG = "nilPolicy";
+
+  @Override
+  public SyslogParser buildSyslogParser(Map<String, Object> config) {
+    // Default to OMIT policy for nil fields
+    // this means they will not be in the returned field set
+    String nilPolicyStr = (String) config.getOrDefault(NIL_POLICY_CONFIG, 
NilPolicy.OMIT.name());
+    NilPolicy nilPolicy = NilPolicy.valueOf(nilPolicyStr);
+    return new SyslogParserBuilder()
+            .forSpecification(SyslogSpecification.RFC_5424)
+            .withNilPolicy(nilPolicy)
+            .withDeviations(EnumSet.of(AllowableDeviations.PRIORITY, 
AllowableDeviations.VERSION))
+            .build();
+  }
+}
+
diff --git 
a/metron-platform/metron-parsing/metron-parsers-common/src/test/java/org/apache/metron/parsers/syslog/Syslog3164ParserTest.java
 
b/metron-platform/metron-parsing/metron-parsers-common/src/test/java/org/apache/metron/parsers/syslog/Syslog3164ParserTest.java
new file mode 100644
index 0000000000..6e8fb40cc3
--- /dev/null
+++ 
b/metron-platform/metron-parsing/metron-parsers-common/src/test/java/org/apache/metron/parsers/syslog/Syslog3164ParserTest.java
@@ -0,0 +1,187 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package org.apache.metron.parsers.syslog;
+
+import com.github.palindromicity.syslog.dsl.SyslogFieldKeys;
+import org.apache.metron.parsers.interfaces.MessageParserResult;
+import org.json.simple.JSONObject;
+import org.junit.Assert;
+import org.junit.Test;
+
+import java.time.Instant;
+import java.time.ZoneOffset;
+import java.time.ZonedDateTime;
+import java.util.HashMap;
+import java.util.List;
+import java.util.Map;
+import java.util.Optional;
+import java.util.function.Consumer;
+
+import static org.junit.Assert.assertTrue;
+
+public class Syslog3164ParserTest {
+
+  private static final String SYSLOG_LINE_ALL = 
"<181>2018-09-14T00:54:09+00:00 lzpqrst-admin.in.mycompany.com.lg 
CISE_RADIUS_Accounting 0018032501 1 0 2018-09-14 10:54:09.095 +10:00 0221114759 
3002 NOTICE Radius-Accounting: RADIUS Accounting watchdog update, 
ConfigVersionId=73, Device IP Address=00.00.000.0, RequestLatency=2, 
NetworkDeviceName=foo, User-Name=ACCOUNT-01\\\\\\\\D622322, 
NAS-IP-Address=00.00.000.0, NAS-Port=50742, Framed-IP-Address=00.00.000.000, 
Class=CACS:0A3D720400016DBFE530A22E:lzpqrst/323409315/14578982, 
Called-Station-ID=00-CA-E5-B1-21-AA, Calling-Station-ID=54-E1-AD-A1-27-72, 
Acct-Status-Type=Interim-Update, Acct-Delay-Time=10, Acct-Input-Octets=379294, 
Acct-Output-Octets=1053336, Acct-Session-Id=00025EB8, Acct-Input-Packets=1657, 
Acct-Output-Packets=2018, Event-Timestamp=1536886439, NAS-Port-Type=Ethernet, 
NAS-Port-Id=GigabitEthernet7/0/42, 
cisco-av-pair=dc-profile-name=Microsoft-Workstation, 
cisco-av-pair=dc-device-name=MSFT 5.0, 
cisco-av-pair=dc-device-class-tag=Workstation:Microsoft-Workstation, 
cisco-av-pair=dc-certainty-metric=10, 
cisco-av-pair=dc-opaque=\\000\\000\\000\\002\\000\\000\\000\\001\\000\\000\\000\\000,
 cisco-av-pair=dc-protocol-map=9, 
cisco-av-pair=dhcp-option=pad=1b:2e:01:08:ff:2e:01:08:ff:0a:90:84:51:0a:2c:08:0a:d0:52:31:0a:d0:5a:1b:2e:01:08:ff:2e:01:08:ff:79:f9:2b:ff:43:17:73:6d:73:62:6f:6f:74:5c:78:38:36:5c:77:64:73:6e:62:70:2e:63:6f:6d:00:ff:6f:6d:00:ff:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:22:23:54:00:00,
 cisco-av-pair=dhcp-option=00:ff:00:00, 
cisco-av-pair=dhcp-option=dhcp-parameter-request-list=1\\\\, 15\\\\, 3\\\\, 
6\\\\, 44\\\\, 46\\\\, 47\\\\, 31\\\\, 33\\\\, 121\\\\, 249\\\\, 43\\\\, 252, 
cisco-av-pair=dhcp-option=dhcp-class-identifier=MSFT 5.0, 
cisco-av-pair=dhcp-option=host-name=W00000PC0R1JC3, 
cisco-av-pair=dhcp-option=dhcp-client-identifier=01:54:e1:ad:a1:27:72, 
cisco-av-pair=dhcp-option=dhcp-message-type=8, 
cisco-av-pair=audit-session-id=0A3D720400016DBFE530A22E, 
cisco-av-pair=method=dot1x, AcsSessionID=lzpqrst/323409315/14579377, 
SelectedAccessService=PEAP_MAB, Step=11004, Step=11017, Step=15049, Step=15008, 
Step=22094, Step=11005, NetworkDeviceGroups=Stage#Deployment Type#Secure Mode 
D2, NetworkDeviceGroups=Location#All Locations#Placename#500 Exhibition St 
CompanyPlace#Level 18, NetworkDeviceGroups=Device Type#All Device Types#Access 
Switch#Catalyst 3850, NetworkDeviceGroups=Location Type#Location Type#Office, 
CPMSessionID=0A3D720400016DBFE530A22E, Stage=Stage#Deployment Type#Secure Mode 
D2, Location=Location#All Locations#Placename#500 Exhibition St 
CompanyPlace#Level 18, Device Type=Device Type#All Device Types#Access 
Switch#Catalyst 3850, Network Device Profile=Cisco, Location Type=Location 
Type#Location Type#Office";
+  private static final String SYSLOG_LINE_MISSING = "2018-09-14T00:54:09+00:00 
lzpqrst-admin.in.mycompany.com.lg CISE_RADIUS_Accounting 0018032501 1 0 
2018-09-14 10:54:09.095 +10:00 0221114759 3002 NOTICE Radius-Accounting: RADIUS 
Accounting watchdog update, ConfigVersionId=73, Device IP Address=00.00.000.0, 
RequestLatency=2, NetworkDeviceName=foo, User-Name=ACCOUNT-01\\\\\\\\D622322, 
NAS-IP-Address=00.00.000.0, NAS-Port=50742, Framed-IP-Address=00.00.000.000, 
Class=CACS:0A3D720400016DBFE530A22E:lzpqrst/323409315/14578982, 
Called-Station-ID=00-CA-E5-B1-21-AA, Calling-Station-ID=54-E1-AD-A1-27-72, 
Acct-Status-Type=Interim-Update, Acct-Delay-Time=10, Acct-Input-Octets=379294, 
Acct-Output-Octets=1053336, Acct-Session-Id=00025EB8, Acct-Input-Packets=1657, 
Acct-Output-Packets=2018, Event-Timestamp=1536886439, NAS-Port-Type=Ethernet, 
NAS-Port-Id=GigabitEthernet7/0/42, 
cisco-av-pair=dc-profile-name=Microsoft-Workstation, 
cisco-av-pair=dc-device-name=MSFT 5.0, 
cisco-av-pair=dc-device-class-tag=Workstation:Microsoft-Workstation, 
cisco-av-pair=dc-certainty-metric=10, 
cisco-av-pair=dc-opaque=\\000\\000\\000\\002\\000\\000\\000\\001\\000\\000\\000\\000,
 cisco-av-pair=dc-protocol-map=9, 
cisco-av-pair=dhcp-option=pad=1b:2e:01:08:ff:2e:01:08:ff:0a:90:84:51:0a:2c:08:0a:d0:52:31:0a:d0:5a:1b:2e:01:08:ff:2e:01:08:ff:79:f9:2b:ff:43:17:73:6d:73:62:6f:6f:74:5c:78:38:36:5c:77:64:73:6e:62:70:2e:63:6f:6d:00:ff:6f:6d:00:ff:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:22:23:54:00:00,
 cisco-av-pair=dhcp-option=00:ff:00:00, 
cisco-av-pair=dhcp-option=dhcp-parameter-request-list=1\\\\, 15\\\\, 3\\\\, 
6\\\\, 44\\\\, 46\\\\, 47\\\\, 31\\\\, 33\\\\, 121\\\\, 249\\\\, 43\\\\, 252, 
cisco-av-pair=dhcp-option=dhcp-class-identifier=MSFT 5.0, 
cisco-av-pair=dhcp-option=host-name=W00000PC0R1JC3, 
cisco-av-pair=dhcp-option=dhcp-client-identifier=01:54:e1:ad:a1:27:72, 
cisco-av-pair=dhcp-option=dhcp-message-type=8, 
cisco-av-pair=audit-session-id=0A3D720400016DBFE530A22E, 
cisco-av-pair=method=dot1x, AcsSessionID=lzpqrst/323409315/14579377, 
SelectedAccessService=PEAP_MAB, Step=11004, Step=11017, Step=15049, Step=15008, 
Step=22094, Step=11005, NetworkDeviceGroups=Stage#Deployment Type#Secure Mode 
D2, NetworkDeviceGroups=Location#All Locations#Placename#500 Exhibition St 
CompanyPlace#Level 18, NetworkDeviceGroups=Device Type#All Device Types#Access 
Switch#Catalyst 3850, NetworkDeviceGroups=Location Type#Location Type#Office, 
CPMSessionID=0A3D720400016DBFE530A22E, Stage=Stage#Deployment Type#Secure Mode 
D2, Location=Location#All Locations#Placename#500 Exhibition St 
CompanyPlace#Level 18, Device Type=Device Type#All Device Types#Access 
Switch#Catalyst 3850, Network Device Profile=Cisco, Location Type=Location 
Type#Location Type#Office";
+  private static final String expectedMessage1 = "CISE_RADIUS_Accounting 
0018032501 1 0 2018-09-14 10:54:09.095"
+          + " +10:00 0221114759 3002 NOTICE Radius-Accounting: RADIUS 
Accounting watchdog update, ConfigVersionId=73, "
+          + "Device IP Address=00.00.000.0, RequestLatency=2, 
NetworkDeviceName=foo, "
+          + "User-Name=ACCOUNT-01\\\\\\\\D622322, NAS-IP-Address=00.00.000.0, 
NAS-Port=50742, "
+          + "Framed-IP-Address=00.00.000.000, 
Class=CACS:0A3D720400016DBFE530A22E:lzpqrst/323409315/14578982, "
+          + "Called-Station-ID=00-CA-E5-B1-21-AA, 
Calling-Station-ID=54-E1-AD-A1-27-72, Acct-Status-Type=Interim-Update, "
+          + "Acct-Delay-Time=10, Acct-Input-Octets=379294, 
Acct-Output-Octets=1053336, Acct-Session-Id=00025EB8, "
+          + "Acct-Input-Packets=1657, Acct-Output-Packets=2018, 
Event-Timestamp=1536886439, NAS-Port-Type=Ethernet, "
+          + "NAS-Port-Id=GigabitEthernet7/0/42, 
cisco-av-pair=dc-profile-name=Microsoft-Workstation, "
+          + "cisco-av-pair=dc-device-name=MSFT 5.0, 
cisco-av-pair=dc-device-class-tag=Workstation:Microsoft-Workstation, "
+          + "cisco-av-pair=dc-certainty-metric=10, "
+          + 
"cisco-av-pair=dc-opaque=\\000\\000\\000\\002\\000\\000\\000\\001\\000\\000\\000\\000,
 "
+          + "cisco-av-pair=dc-protocol-map=9, "
+          + "cisco-av-pair=dhcp-option=pad="
+          + 
"1b:2e:01:08:ff:2e:01:08:ff:0a:90:84:51:0a:2c:08:0a:d0:52:31:0a:d0:5a:1b:2e:01:08:ff:2e:01:08:ff:79:f9:2b:"
+          + 
"ff:43:17:73:6d:73:62:6f:6f:74:5c:78:38:36:5c:77:64:73:6e:62:70:2e:63:6f:6d:00:ff:6f:6d:00:ff:00:00:00:00:00:"
+          + "00:00:00:00:00:00:00:00:00:00:00:00:00:00:22:23:54:00:00, 
cisco-av-pair=dhcp-option=00:ff:00:00, "
+          + "cisco-av-pair=dhcp-option=dhcp-parameter-request-list="
+          + "1\\\\, 15\\\\, 3\\\\, 6\\\\, 44\\\\, 46\\\\, 47\\\\, 31\\\\, 
33\\\\, 121\\\\, 249\\\\, 43\\\\, 252,"
+          + " cisco-av-pair=dhcp-option=dhcp-class-identifier=MSFT 5.0, 
cisco-av-pair=dhcp-option=host-name=W00000PC0R1JC3,"
+          + " 
cisco-av-pair=dhcp-option=dhcp-client-identifier=01:54:e1:ad:a1:27:72,"
+          + " cisco-av-pair=dhcp-option=dhcp-message-type=8, 
cisco-av-pair=audit-session-id=0A3D720400016DBFE530A22E,"
+          + " cisco-av-pair=method=dot1x, 
AcsSessionID=lzpqrst/323409315/14579377, SelectedAccessService=PEAP_MAB,"
+          + " Step=11004, Step=11017, Step=15049, Step=15008, Step=22094, 
Step=11005, NetworkDeviceGroups=Stage#Deployment"
+          + " Type#Secure Mode D2, NetworkDeviceGroups=Location#All 
Locations#Placename#500 Exhibition St"
+          + " CompanyPlace#Level 18, NetworkDeviceGroups=Device Type#All 
Device Types#Access Switch#Catalyst 3850,"
+          + " NetworkDeviceGroups=Location Type#Location Type#Office, 
CPMSessionID=0A3D720400016DBFE530A22E,"
+          + " Stage=Stage#Deployment Type#Secure Mode D2, 
Location=Location#All Locations#Placename#500 Exhibition St"
+          + " CompanyPlace#Level 18, Device Type=Device Type#All Device 
Types#Access Switch#Catalyst 3850, Network Device"
+          + " Profile=Cisco, Location Type=Location Type#Location Type#Office";
+
+  private static final String expectedHostNameOne = 
"lzpqrst-admin.in.mycompany.com.lg";
+  private static final String expectedPriOne = "181";
+  private static final String expectedTimestampOne = 
"2018-09-14T00:54:09+00:00";
+  private static final String expectedFacilityOne = "22";
+  private static final String expectedSeverityOne = "5";
+
+  private static final String expectedHostNameTwo = "10.34.84.145";
+  private static final String expectedMessage2 = "Aug  7 00:45:43 stage-pdp01 
CISE_Profiler 0000024855 1 0 "
+          + "2014-08-07 00:45:43.741 -07:00 0000288542 80002 INFO  Profiler: 
Profiler EndPoint profiling event occurred, "
+          + "ConfigVersionId=113, EndpointCertainityMetric=10, 
EndpointIPAddress=10.56.111.14, "
+          + "EndpointMacAddress=3C:97:0E:C3:F8:F1, 
EndpointMatchedPolicy=Nortel-Device, EndpointNADAddress=10.56.72.127, "
+          + "EndpointOUI=Wistron InfoComm(Kunshan)Co.\\,Ltd., 
EndpointPolicy=Nortel-Device, "
+          + 
"EndpointProperty=StaticAssignment=false\\,PostureApplicable=Yes\\,PolicyVersion=402\\,"
+          + "IdentityGroupID=0c1d9270-68a6-11e1-bc72-0050568e013c\\,Total 
Certainty Factor=10\\,"
+          + 
"BYODRegistration=Unknown\\,FeedService=false\\,EndPointPolicyID=49054ed0-68a6-11e1-bc72-0050568e013c\\,"
+          + 
"FirstCollection=1407397543718\\,MatchedPolicyID=49054ed0-68a6-11e1-bc72-0050568e013c\\,TimeToProfile=19\\,"
+          + 
"StaticGroupAssignment=false\\,NmapSubnetScanID=0\\,DeviceRegistrationStatus=NotRegistered\\,PortalUser=,
 "
+          + "EndpointSourceEvent=SNMPQuery Probe, 
EndpointIdentityGroup=Profiled, ProfilerServer=stage-pdp01.cisco.com,";
+  private static final String expectedPriTwo = "181";
+  private static final String expectedTimestampTwo = "Aug  6 17:26:31";
+  private static final String expectedFacilityTwo = "22";
+  private static final String expectedSeverityTwo = "5";
+
+
+  @Test
+  public void testConfigureDefault() {
+    Map<String, Object> parserConfig = new HashMap<>();
+    Syslog3164Parser testParser = new Syslog3164Parser();
+    testParser.configure(parserConfig);
+    testParser.init();
+    assertTrue(testParser.deviceClock.getZone().equals(ZoneOffset.UTC));
+  }
+
+  @Test
+  public void testConfigureTimeZoneOffset() {
+    Map<String, Object> parserConfig = new HashMap<>();
+    parserConfig.put("deviceTimeZone", "UTC-05:00");
+    Syslog3164Parser testParser = new Syslog3164Parser();
+    testParser.configure(parserConfig);
+    testParser.init();
+    ZonedDateTime deviceTime = 
ZonedDateTime.ofInstant(Instant.ofEpochSecond(1475323200), 
testParser.deviceClock.getZone());
+    ZonedDateTime referenceTime = 
ZonedDateTime.ofInstant(Instant.ofEpochSecond(1475323200), 
ZoneOffset.ofHours(-5));
+    assertTrue(deviceTime.isEqual(referenceTime));
+  }
+
+  @Test
+  public void testConfigureTimeZoneText() {
+    Map<String, Object> parserConfig = new HashMap<>();
+    parserConfig.put("deviceTimeZone", "America/New_York");
+    Syslog3164Parser testParser = new Syslog3164Parser();
+    testParser.configure(parserConfig);
+    testParser.init();
+    ZonedDateTime deviceTime = 
ZonedDateTime.ofInstant(Instant.ofEpochSecond(1475323200), 
testParser.deviceClock.getZone());
+    ZonedDateTime referenceTime = 
ZonedDateTime.ofInstant(Instant.ofEpochSecond(1475323200), 
ZoneOffset.ofHours(-5));
+    assertTrue(deviceTime.isEqual(referenceTime));
+  }
+
+  @Test
+  public void testHappyPath() {
+    test(expectedMessage1, (message) -> 
Assert.assertEquals(expectedHostNameOne, 
message.get(SyslogFieldKeys.HEADER_HOSTNAME.getField())));
+  }
+
+
+  @Test()
+  public void testNotValid() {
+    test( "not valid", (message) -> Assert.assertTrue(false));
+  }
+
+  public void test( String line, Consumer<JSONObject> msgIdChecker) {
+    Syslog3164Parser parser = new Syslog3164Parser();
+    Map<String, Object> config = new HashMap<>();
+    parser.configure(config);
+    parser.parseOptionalResult(line.getBytes());
+  }
+
+  @Test
+  public void testReadMultiLine() throws Exception {
+    Syslog3164Parser parser = new Syslog3164Parser();
+    Map<String, Object> config = new HashMap<>();
+    parser.configure(config);
+    StringBuilder builder = new StringBuilder();
+    builder
+            .append(SYSLOG_LINE_ALL)
+            .append("\n")
+            .append(SYSLOG_LINE_MISSING)
+            .append("\n")
+            .append(SYSLOG_LINE_ALL);
+    Optional<MessageParserResult<JSONObject>> resultOptional = 
parser.parseOptionalResult(builder.toString().getBytes());
+    Assert.assertNotNull(resultOptional);
+    Assert.assertTrue(resultOptional.isPresent());
+    List<JSONObject> parsedList = resultOptional.get().getMessages();
+    Assert.assertEquals(3,parsedList.size());
+  }
+
+  @Test
+  public void testReadMultiLineWithErrors() throws Exception {
+    Syslog3164Parser parser = new Syslog3164Parser();
+    Map<String, Object> config = new HashMap<>();
+    parser.configure(config);
+    StringBuilder builder = new StringBuilder();
+    builder
+            .append("HEREWEGO!!!!\n")
+            .append(SYSLOG_LINE_ALL)
+            .append("\n")
+            .append(SYSLOG_LINE_MISSING)
+            .append("\n")
+            .append("BOOM!\n")
+            .append(SYSLOG_LINE_ALL)
+            .append("\nOHMY!");
+    Optional<MessageParserResult<JSONObject>> output = 
parser.parseOptionalResult(builder.toString().getBytes());
+    Assert.assertTrue(output.isPresent());
+    Assert.assertEquals(3,output.get().getMessages().size());
+    Assert.assertEquals(3,output.get().getMessageThrowables().size());
+  }
+}
\ No newline at end of file
diff --git 
a/metron-platform/metron-parsing/metron-parsers/src/test/java/org/apache/metron/parsers/syslog/Syslog5424ParserTest.java
 
b/metron-platform/metron-parsing/metron-parsers-common/src/test/java/org/apache/metron/parsers/syslog/Syslog5424ParserTest.java
similarity index 80%
rename from 
metron-platform/metron-parsing/metron-parsers/src/test/java/org/apache/metron/parsers/syslog/Syslog5424ParserTest.java
rename to 
metron-platform/metron-parsing/metron-parsers-common/src/test/java/org/apache/metron/parsers/syslog/Syslog5424ParserTest.java
index b3e4507fc1..3c6c72f72b 100644
--- 
a/metron-platform/metron-parsing/metron-parsers/src/test/java/org/apache/metron/parsers/syslog/Syslog5424ParserTest.java
+++ 
b/metron-platform/metron-parsing/metron-parsers-common/src/test/java/org/apache/metron/parsers/syslog/Syslog5424ParserTest.java
@@ -25,6 +25,9 @@
 import org.junit.Assert;
 import org.junit.Test;
 
+import java.time.Instant;
+import java.time.ZoneOffset;
+import java.time.ZonedDateTime;
 import java.time.format.DateTimeFormatter;
 import java.util.HashMap;
 import java.util.List;
@@ -32,6 +35,8 @@
 import java.util.Optional;
 import java.util.function.Consumer;
 
+import static org.junit.Assert.assertTrue;
+
 public class Syslog5424ParserTest {
   private static final String SYSLOG_LINE_ALL = "<14>1 
2014-06-20T09:14:07+00:00 loggregator"
           + " d0602076-b14a-4c55-852a-981e7afeed38 DEA MSG-01"
@@ -66,6 +71,40 @@
   private static final String expectedEventID1 = "1011";
   private static final String expectedEventID2 = "2022";
 
+
+  @Test
+  public void testConfigureDefault() {
+    Map<String, Object> parserConfig = new HashMap<>();
+    Syslog5424Parser testParser = new Syslog5424Parser();
+    testParser.configure(parserConfig);
+    testParser.init();
+    assertTrue(testParser.deviceClock.getZone().equals(ZoneOffset.UTC));
+  }
+
+  @Test
+  public void testConfigureTimeZoneOffset() {
+    Map<String, Object> parserConfig = new HashMap<>();
+    parserConfig.put("deviceTimeZone", "UTC-05:00");
+    Syslog5424Parser testParser = new Syslog5424Parser();
+    testParser.configure(parserConfig);
+    testParser.init();
+    ZonedDateTime deviceTime = 
ZonedDateTime.ofInstant(Instant.ofEpochSecond(1475323200), 
testParser.deviceClock.getZone());
+    ZonedDateTime referenceTime = 
ZonedDateTime.ofInstant(Instant.ofEpochSecond(1475323200), 
ZoneOffset.ofHours(-5));
+    assertTrue(deviceTime.isEqual(referenceTime));
+  }
+
+  @Test
+  public void testConfigureTimeZoneText() {
+    Map<String, Object> parserConfig = new HashMap<>();
+    parserConfig.put("deviceTimeZone", "America/New_York");
+    Syslog5424Parser testParser = new Syslog5424Parser();
+    testParser.configure(parserConfig);
+    testParser.init();
+    ZonedDateTime deviceTime = 
ZonedDateTime.ofInstant(Instant.ofEpochSecond(1475323200), 
testParser.deviceClock.getZone());
+    ZonedDateTime referenceTime = 
ZonedDateTime.ofInstant(Instant.ofEpochSecond(1475323200), 
ZoneOffset.ofHours(-5));
+    assertTrue(deviceTime.isEqual(referenceTime));
+  }
+
   @Test
   public void testHappyPath() {
     test(null, SYSLOG_LINE_ALL, (message) -> 
Assert.assertEquals(expectedMessageId, 
message.get(SyslogFieldKeys.HEADER_MSGID.getField())));
@@ -151,13 +190,13 @@ public void testReadMultiLineWithErrors() throws 
Exception {
   public void testMissingTimestamp() {
     Syslog5424Parser parser = new Syslog5424Parser();
     Map<String, Object> config = new HashMap<>();
+    String timeStampString = null;
     config.put(Syslog5424Parser.NIL_POLICY_CONFIG, NilPolicy.DASH.name());
     parser.configure(config);
     Optional<MessageParserResult<JSONObject>> output  = 
parser.parseOptionalResult(SYSLOG_LINE_MISSING_DATE.getBytes());
     Assert.assertNotNull(output);
     Assert.assertTrue(output.isPresent());
-    String timeStampString = 
output.get().getMessages().get(0).get("timestamp").toString();
-    DateTimeFormatter.ISO_DATE_TIME.parse(timeStampString);
+    
Assert.assertNotNull(output.get().getMessages().get(0).get("timestamp").toString());
     config.clear();
     config.put(Syslog5424Parser.NIL_POLICY_CONFIG, NilPolicy.NULL.name());
     parser.configure(config);
@@ -165,8 +204,7 @@ public void testMissingTimestamp() {
     Assert.assertNotNull(output);
     Assert.assertTrue(output.isPresent());
     timeStampString = 
output.get().getMessages().get(0).get("timestamp").toString();
-    DateTimeFormatter.ISO_DATE_TIME.parse(timeStampString);
-
+    Assert.assertNotNull(timeStampString);
     config.clear();
     config.put(Syslog5424Parser.NIL_POLICY_CONFIG, NilPolicy.OMIT.name());
     parser.configure(config);
@@ -174,8 +212,5 @@ public void testMissingTimestamp() {
     output = parser.parseOptionalResult(SYSLOG_LINE_MISSING_DATE.getBytes());
     Assert.assertNotNull(output);
     Assert.assertTrue(output.isPresent());
-
-    timeStampString = 
output.get().getMessages().get(0).get("timestamp").toString();
-    DateTimeFormatter.ISO_DATE_TIME.parse(timeStampString);
   }
 }
\ No newline at end of file
diff --git a/metron-platform/metron-parsing/metron-parsers/README.md 
b/metron-platform/metron-parsing/metron-parsers/README.md
index 98e009455f..aac66b0f56 100644
--- a/metron-platform/metron-parsing/metron-parsers/README.md
+++ b/metron-platform/metron-parsing/metron-parsers/README.md
@@ -29,7 +29,6 @@ The included parsers are:
 * PaloAlto
 * Snort
 * Sourcefire
-* Syslog
 * Websphere
 
 The basic parsers and their details can be found at 
[README](../metron-parsers-common#README.md).
diff --git a/metron-platform/metron-parsing/metron-parsers/pom.xml 
b/metron-platform/metron-parsing/metron-parsers/pom.xml
index d8b68256b0..c3f5d30abf 100644
--- a/metron-platform/metron-parsing/metron-parsers/pom.xml
+++ b/metron-platform/metron-parsing/metron-parsers/pom.xml
@@ -63,11 +63,6 @@
         </exclusion>
       </exclusions>
     </dependency>
-    <dependency>
-      <groupId>com.github.palindromicity</groupId>
-      <artifactId>simple-syslog-5424</artifactId>
-      <version>${global_simple_syslog_version}</version>
-    </dependency>
     <dependency>
       <groupId>org.apache.metron</groupId>
       <artifactId>metron-parsers-common</artifactId>
diff --git 
a/metron-platform/metron-parsing/metron-parsing-storm/src/main/resources/META-INF/NOTICE
 
b/metron-platform/metron-parsing/metron-parsing-storm/src/main/resources/META-INF/NOTICE
index c773ab721f..767d1aca9a 100644
--- 
a/metron-platform/metron-parsing/metron-parsing-storm/src/main/resources/META-INF/NOTICE
+++ 
b/metron-platform/metron-parsing/metron-parsing-storm/src/main/resources/META-INF/NOTICE
@@ -37,4 +37,10 @@ Copyright 2006-2011 Google, Inc.
        Apache Software Foundation that were originally developed at iClick, 
Inc.,
        software copyright (c) 1999.
 
+ (ASLv2) simple-syslog
+    The following NOTICE information applies:
 
+        simple-syslog
+        https://github.com/palindromicity/simple-syslog
+
+        Copyright 2018 simple-syslog authors.
diff --git a/pom.xml b/pom.xml
index c3528134e8..ab9dfa4e66 100644
--- a/pom.xml
+++ b/pom.xml
@@ -121,7 +121,7 @@
         <global_reflections_version>0.9.10</global_reflections_version>
         <global_checkstyle_version>8.0</global_checkstyle_version>
         <global_log4j_core_version>2.1</global_log4j_core_version>
-        <global_simple_syslog_version>0.0.9</global_simple_syslog_version>
+        <global_simple_syslog_version>0.0.1</global_simple_syslog_version>
         <global_spark_version>2.3.1</global_spark_version>
         <global_httpclient_version>4.3.2</global_httpclient_version>
         <global_aesh_version>0.66.19</global_aesh_version>


 

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

Reply via email to