-
Notifications
You must be signed in to change notification settings - Fork 464
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Firewall Integration Input Consistency #1878
Comments
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
Excellent. Is there any estimated timeline for this? I am specifically interested in seeing the Palo Alto TCP + TLS support. Thanks! |
@poochwashere unfortunately I can't share an exact timeframe, but we're about to begin development, so you shouldn't have too long to wait. Will certainly keep you posted as we progress through it. For Palo Alto TCP + TLS, do you know if you can use the BSD message format, or are you limited to IETF when using TCP + TLS? (cc: @taylor-swanson) |
@taylor-swanson as you work through this one, Palo Alto is the priority as we only support UDP currently, and get a large volume of requests for TCP, TCP+TLS, etc. We have a virtual PANW license if you need to avail of it for testing. |
We should be able to use either message format for the Palo Alto integration as long as there's no limitation on the firewall side. It currently uses a loose version of the BSD format (RFC 3164, but it lacks the syslog priority field, at least from what I can see based on our system tests), but the grok pattern should be able to handle either format as long as the message itself doesn't change. |
@jamiehynds, do we have any sample logs in the RFC 5424 (IETF) format for Palo Alto? I mainly want to know what the format of the actual message is, if it's CSV like RFC 3164 or if it uses the structured data fields from RFC 5424. If it's CSV, then we can support IETF with basically zero added effort. EDIT: I think I answered my question based on an SDH linked to the Support RFC 5424 issue mentioned above, and CSV was the format used. |
@jamiehynds, the syslog formats we currently support widely vary depending on the integration. I'm able to add TCP and TLS to every integration with relative ease, but I don't think the same can be said about the syslog formats. We are largely limited on what the device sends us, some may not even support both formats or even just one of them (some use a custom format). For reference, BSD format is RFC 3164, IETF format is RFC 5424.
Depending on the answers, we probably want to split supporting the other formats to separate issues (since there's a larger amount of work and testing that will need to be done on the pipelines). |
I am here if you need a beta tester for the PANW module. |
Thanks for investigating @taylor-swanson. I'll create a new issue for supporting the other formats and remove those items from this issue. Based on some quick research:
|
@poochwashere thanks for the offer. In addition to supporting secure syslog and IETF for Palo Alto, we're also in the process of updating our integration to cover more of their event types, see here: #2988 Will definitely be seeking some beta testers, and will be in touch as soon as we have something to share. |
Hello everyone. I've been closely watching this issue because I've had an open support ticket for proper Palo Alto setup over TLS for quite a while. I'm excited to see the progress! Do you know what level of backward compatibility to expect? I'm currently running a 7.11.1 cluster. If I need to update the cluster, or FileBeat in order to take advantage of your efforts, I'd like to get ahead of the game if possible. |
@rhyguy, we're currently targeting 8.2.1 and 8.3.0 for the Palo Alto integration (it'll support TCP, TCP with TLS, and both syslog formats). The Palo Alto integration package was recently updated and support for 7.x was unfortunately dropped. If you happen to be using the filebeat module, I believe you should be able to edit the module config file using a method similar to the one mentioned in this issue: elastic/beats#26430. To enable TCP, you'd change the |
The work on inputs has been completed and the issue for format consistency can be found here: #3377 |
We currently support several firewall integrations including Cisco, Palo Alto, Check Point and more. However, there are inconsistencies across the ingest options, such as supported protocols and syslog format (UDP/TCP/TCP+TLS) and syslog format (RFC3164 vs RFC5424). We need to ensure each integration is consistent across protocols and syslog format supported. Given how popular the firewall Beats modules are, we should consider enhancement to the modules as part of this effort too.
Cisco ASA/FTD/IOS
Check Point
Fortinet
Juniper SRX
Palo Alto
Sophos XG
The text was updated successfully, but these errors were encountered: