# modsecurity-parser **Repository Path**: mirrors_devzero2000/modsecurity-parser ## Basic Information - **Project Name**: modsecurity-parser - **Description**: modsecurity audit log analyser and parser - **Primary Language**: Unknown - **License**: Apache-2.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2022-02-10 - **Last Updated**: 2026-05-17 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # modsecurity audit log parser, analyser and chart maker      # TL;DR Get the overview of security incidents reported by modsecurity module from modsec_audit.log file. # 2020.09.20 update - added support for logs from timezone "UTC-..." - updated plotting to matplotlib.3.1 - added dockerhub autobuild - added requirements.txt # 2019.04.17 update - added support for Modsecurity3 log (Nginx/Apache) - added feature to read Modsecurity log in JSON format # Description modsecurity parser is a python program to read modsecurity.org modsec_audit.log, transform read events into more human and machine readable formats (xlsx/json) and make basic charts.
Functionality list:
``` python3 modsecurity-parser.py -h ``` Filters INCLUDE and EXCLUDE are available for IP source addresses.
--exclude option ( e.g. "--exclude 192.168.0.1 10.0.0.1") just skips events with given IP source addresses
--include (e.g. "--include 10.0.5.6") take precedence over EXCLUDE. INCLUDE process only events with given IP source addresses.
--jsononeperline - option recommended for big number of events where e.g. produced JSON is supposed to be read by other SIEM tool. Uses the very same format as modsecurity software when type of logging is set to "JSON". Processing Modsecurity3 log
--version3 (e.g. "modsecurity-parser.py -f modsec_audit.log --version3"
Processing Modsecurity log in JSON format:
--jsonaudit (e.g. "modsecurity-parser.py -f modsec_audit.log --jsonaudit" # Limitations: