I need some help, i want to generate an alert based on this syslog message:
%ASA-3-713902: IP = 72.55.11.44, Removing peer from peer table failed, no match!
I have tried the following syslog alert, setup, but the alert does not trigger:
Rule is enabled, Source: *, DNS Hostname: *
Message:
Message Type Pattern: *713902*
Syslog Message Pattern: *
(also tried reverse)
Severity/Facility: Everything is checked
Please help!