Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Packetbeat flows enhancements #3444

Open
17 tasks
urso opened this issue Jan 24, 2017 · 18 comments
Open
17 tasks

Packetbeat flows enhancements #3444

urso opened this issue Jan 24, 2017 · 18 comments
Labels
discuss Issue needs further discussion. enhancement Packetbeat Team:Security-Linux Platform Linux Platform Team in Security Solution

Comments

@urso
Copy link

urso commented Jan 24, 2017

Flows support in 5.0 is quite rudimentary, not really taking any network layers (arbitrary timeout) into account and only counting packets and bytes. Plus, there is a parent-child relation between flows and transactions, not yet represented in packetbeat events being published.

List of flow proposed enhancements:

  • pass active flow to packet analyzer:
    • add protocol specific stats to flows (e.g. number of transactions with success/failure/dropped due to packet loss/timed out)
    • add flow id to protocol transaction events to establish some relationship between flows and transaction
  • add support to tie flow lifetime to connection status:
    • Flows for TCP/SCTP streams do not timeout while TCP connection is active
    • Protocols on top of UDP managing connection state should be able to disable flow timeout
    • Stop flow if connection is closed or connection attempt failed:
      • for TCP stop flow on RST or normal TCP shutdown
      • consider ICMP messages if TCP/UDP port is not reachable
      • timeout flow in case of handshake being incomplete and no data being send in either direction
    • add indicator (string?) to indicate the reason a flow has ended
    • add indicator if connection has been good (established TCP connection), in case it ended forcefully
    • add indicator for flow starting to capture an older TCP connection (not having seen the connection attempt itself, as packetbeat was started after)
  • report TCP level stats:
    • count flags usage (SYN, RST, FIN, PUSH)
    • report bytes lost due to packet-loss
    • report packets fully/partially resend (number of packets and bytes)
@tbragin
Copy link
Contributor

tbragin commented Dec 29, 2017

@urso @adriansr Does this pull also partially address this issue? #5476

@urso
Copy link
Author

urso commented Jan 4, 2018

@tbragin No. Flows support and integrating flows into application protocols is about collecting metrics only.

@ghost
Copy link

ghost commented Jan 22, 2018

If using Packetbeat and not interested in any of the supported protocols can we have a generic "TCP" option where we can specify a list of ports to be able to filter on specific traffic flows before the analysis stage.

@urso
Copy link
Author

urso commented Jan 22, 2018

@london2016 this can already be done by configuring your custom packet filter in the device configs. Please checkout the forums if you need any help.

@q2dg
Copy link

q2dg commented Apr 19, 2019

Well...version 7.0 is here and nothing has been resolved about this issue yet...

@Umarhayat3
Copy link

PB version 7.3.1 has been released but this issue is still there and many are facing problems due to lack of information in debugging mode. This flow enhancement is necessary for troubleshooting.

@faec faec added the Team:Services (Deprecated) Label for the former Integrations-Services team label Mar 17, 2020
@elasticmachine
Copy link
Collaborator

Pinging @elastic/integrations-services (Team:Services)

@faec
Copy link
Contributor

faec commented Mar 17, 2020

Adding this to triage because we're still seeing requests for ways to measure tcp connection drops in particular and it looks like this fell off the radar for a while.

@botelastic
Copy link

botelastic bot commented Feb 15, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@botelastic botelastic bot added the Stalled label Feb 15, 2021
@zez3
Copy link

zez3 commented Feb 16, 2021

would be a nice addition

@botelastic botelastic bot removed the Stalled label Feb 16, 2021
@botelastic
Copy link

botelastic bot commented Jan 17, 2022

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@botelastic botelastic bot added the Stalled label Jan 17, 2022
@zez3
Copy link

zez3 commented Jan 17, 2022

Part of the proposed enhancements would still be useful to have.
@jamiehynds
Would it be possible to take some enhancements on the roadmap?

@botelastic botelastic bot removed the Stalled label Jan 17, 2022
@wangxin688
Copy link

It would be a very nice feature to support translation layer for TCP/UDP, which will help measure network performance, especially for forwording devices(use linux as a gateway, running routing, NAT, and firewall function)

@elasticmachine
Copy link
Collaborator

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

@jlind23 jlind23 removed the Team:Services (Deprecated) Label for the former Integrations-Services team label Mar 31, 2022
@botelastic
Copy link

botelastic bot commented Mar 31, 2023

Hi!
We just realized that we haven't looked into this issue in a while. We're sorry!

We're labeling this issue as Stale to make it hit our filters and make sure we get back to it as soon as possible. In the meantime, it'd be extremely helpful if you could take a look at it as well and confirm its relevance. A simple comment with a nice emoji will be enough :+1.
Thank you for your contribution!

@botelastic botelastic bot added the Stalled label Mar 31, 2023
@willemdh
Copy link

willemdh commented Apr 5, 2023

.

@botelastic botelastic bot removed the Stalled label Apr 5, 2023
@norrietaylor norrietaylor added the Team:Security-Linux Platform Linux Platform Team in Security Solution label Jan 31, 2024
@elasticmachine
Copy link
Collaborator

Pinging @elastic/sec-linux-platform (Team:Security-Linux Platform)

@gaby
Copy link

gaby commented Apr 28, 2024

This issue still work in progress after 7 years?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
discuss Issue needs further discussion. enhancement Packetbeat Team:Security-Linux Platform Linux Platform Team in Security Solution
Projects
None yet
Development

No branches or pull requests