-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Filebeat] Module for Palo Alto Logs #9199
Comments
Here are some WIP logical mappings (no config files) of PAN log fields to ECS fields Traffic Logs - Google Sheet Also, there are some sample log snippets in this Google Team Drive folder. However, most of these are in CEF or LEEF format. I have requested samples of pan_traffic and pan_threat in syslog format and PAN has agreed to find or create some additional samples for us after Thanksgiving. These samples appear to use only RFC 1918 addresses and public addresses from entities like Google and Akamai, so we can use these as samples. |
Pinging @elastic/secops |
Hello, We're interested in this as well. Has there been any movement on this? |
Sorry for the trouble with those Google Docs. |
Just wondering why a Filebeat module is preferred over a Logstash module? @andrewkroh? It seems so much more work to do this with Filebeat? A kv filter for traffic, threat, userid, system and correlation and you are set.. Just another small note, the syslog looks different depending on the Panos version. Recently upgraded to 8.1 and we had some mapping issues, as some new fields were added, check https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/use-syslog-for-monitoring/syslog-field-descriptions/threat-log-fields.html and compare fields between versions. |
In reviewing the code for the panw filebeat module I noticed that certain fields are duplicated, such as client.ip, source.ip, client.address. Is there a reason why duplicating the data is preferred instead of using an alias? |
I'm not sure if this answers your question @davidhowell-tx, but I don't believe those fields are meant to be exact duplicates in the purest sense. From the ECS client field schema:
It's my understanding that if you added aliases for client.ip and client.domain that pointed to client.address, all data placed into the client.address field could then technically be interpreted as both an ip and a domain. By only duplicating the data to the appropriate field when needed, the interpretation of the data becomes clearer, as I don't think you can set aliases per-event. I think this same line of reasoning applies when talking about the difference between client/source and server/destination. |
Also I'd like to add that I think it might be a good idea to explore the ability to specify the Panos version in the Beats config, and then add support for a wide range of Panos versions. This way regardless of the version of Panos a user has they can still use the module with full compatibility. Plus we'd have a defined way to update the module in the future when a new version of Panos comes out that uses an altered schema. |
We would very much like to see support added for the remainder of palo alto logs |
Closed by #11999. Module docs: https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-module-panw.html |
@strawgate For the other logs types that you are have interest in being parsed by the module please open a new issue. |
As a user I want to be able to ingest logs from Palo Alto PAN-OS. Of the available log types I'm thinking to start with:
We'll need to map the fields in these logs to ECS.
The text was updated successfully, but these errors were encountered: