Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

nfs: enforce unique ILLEGAL opname when failed to match operation #11503

Merged
merged 2 commits into from
Apr 30, 2019
Merged

nfs: enforce unique ILLEGAL opname when failed to match operation #11503

merged 2 commits into from
Apr 30, 2019

Conversation

kofemann
Copy link
Contributor

When we fail to map packet to a valid NFS4 operation, then opname
ILLEGAL with opcode it used, like ILLEGAL (4294967295). While
this points to a bug in packet detection, such 'random' illegal
opnames create multiple new operations that confuse kibana.

Do not include opcode into opname ILLEGAL.

Signed-off-by: Tigran Mkrtchyan [email protected]

@kofemann kofemann requested a review from a team as a code owner March 28, 2019 08:51
@elasticmachine
Copy link
Collaborator

Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually?

@kofemann
Copy link
Contributor Author

If accepted, please backport to 6.7 and 6.6 branches.

@kofemann
Copy link
Contributor Author

kofemann commented Apr 9, 2019

Do you wait for any action on my side?

@andrewkroh andrewkroh changed the title nfs: enforce unique ILLEGEL opname when failed to match operation nfs: enforce unique ILLEGAL opname when failed to match operation Apr 9, 2019
@andrewkroh
Copy link
Member

jenkins, test this

Copy link
Member

@andrewkroh andrewkroh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The change LGTM, but can you also put an entry into the CHANGELOG.next.asciidoc.

kofemann and others added 2 commits April 10, 2019 08:17
When we fail to map packet to a valid NFS4 operation, then opname
ILLEGAL with opcode it used, like `ILLEGAL (4294967295)`. While
this points to a bug in packet detection, such 'random' illegal
opnames create multiple new operations that confuse kibana.

Do not include opcode into opname ILLEGAL.

Signed-off-by: Tigran Mkrtchyan <[email protected]>
@adriansr adriansr merged commit f457715 into elastic:master Apr 30, 2019
adriansr pushed a commit to adriansr/beats that referenced this pull request May 2, 2019
…astic#11503)

When we fail to map packet to a valid NFS4 operation, then opname
ILLEGAL with opcode it used, like `ILLEGAL (4294967295)`. While
this points to a bug in packet detection, such 'random' illegal
opnames create multiple new operations that confuse kibana.

Do not include opcode into opname ILLEGAL.

Signed-off-by: Tigran Mkrtchyan <[email protected]>
(cherry picked from commit f457715)
@adriansr
Copy link
Contributor

adriansr commented May 2, 2019

@kofemann unfortunately at this time we are only backporting serious bug fixes and this fix doesn't qualify. Expect this to be released in 7.2.0. Sorry we took so long to review.

In the meantime, you can avoid having to build a custom package for a previous version by just defining a processor like this:

processors:
  add_fields:
    target: ''
    fields:
      nfs.opcode: ILLEGAL
    when:
      contains:
        nfs.opcode: ILLEGAL

@kofemann
Copy link
Contributor Author

kofemann commented May 2, 2019

@adriansr Thanks!

@kofemann kofemann deleted the make-unique-illegal branch May 2, 2019 12:16
adriansr added a commit that referenced this pull request May 8, 2019
…1503) (#12025)

When we fail to map packet to a valid NFS4 operation, then opname
ILLEGAL with opcode it used, like `ILLEGAL (4294967295)`. While
this points to a bug in packet detection, such 'random' illegal
opnames create multiple new operations that confuse kibana.

Do not include opcode into opname ILLEGAL.

Signed-off-by: Tigran Mkrtchyan <[email protected]>
(cherry picked from commit f457715)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants