-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: allow for tcp instead of udp for panos #29054
feat: allow for tcp instead of udp for panos #29054
Conversation
Signed-off-by: Hans Knecht <[email protected]>
💚 CLA has been signed |
This pull request does not have a backport label. Could you fix it @knechtionscoding? 🙏
NOTE: |
The only thing I'm not sure of is where to update the default values. |
❕ Build Aborted
Expand to view the summary
Build stats
🤖 GitHub commentsTo re-run your PR in the CI, just comment with:
|
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
Thanks for the PR @knechtionscoding - we'll review shortly. Worth noting we plan to update all our firewall integrations to get consistently around inputs, supported formats, etc: elastic/integrations#1878 |
This pull request is now in conflicts. Could you fix it? 🙏
|
Hi! We're labeling this issue as |
Hi! |
This PR would still be very useful. For us, being able to support TLS for log streams is considered a hard requirement in most cases. |
I came here to state the same. We need to support TCP connections with TLS |
Hi @poochwashere. We are about to align the input across all of our firewall integrations, to ensure consistency. TCP + TLS for Palo Alto will be included in this effort. Please follow this issue for updates: elastic/integrations#1878 |
Signed-off-by: Hans Knecht [email protected]
What does this PR do?
In order to support cortex datalake from palo alto (which has the same format) as panos TCP is required instead of UDP.
See #13533 for more information
Closes #13533
Why is it important?
Supporting all of palo alto log sources is vital, especially as cortex datalake is part of their cloud offering
Checklist
CHANGELOG.next.asciidoc
orCHANGELOG-developer.next.asciidoc
.Author's Checklist
How to test this PR locally
Create a filebeat.yml with the following:
and desired output. Tested that tcp is a drop in replacement
Related issues
Use cases
Screenshots
Logs