PaloAltoNetworks / Splunk-Apps

Palo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint security with Splunk's extensive investigation and visualization capabilities to deliver an advanced security reporting and analysis tool.
https://pan.dev/splunk/docs/
ISC License
106 stars 48 forks source link

Added PanOS 11 syslog standard fields; repaired broken field extracts & name collisions #294

Open jwiley80 opened 1 year ago

jwiley80 commented 1 year ago

Description

Added PanOS 11 syslog standard fields; repaired broken field extracts & name collisions

How Has This Been Tested?

Tested in Splunk against large-scale existing pan:* data flows

Types of changes

In props.conf

  1. pan:config - field aliases and evals added for CIM mapping and compatibility
  2. pan:globalprotect - field aliases and evals added for CIM mapping and compatibility; aliased "time_generated" to "generated_time" for consistency with other pan sourcetype naming
  3. pan:hipmatch - field aliases and evals added for CIM mapping and compatibility
  4. pan:system - field aliases and evals added for CIM mapping and compatibility, added description extracts
  5. pan:userid - added Field Aliases to match corrected Transforms extracts

In transforms.conf

  1. extract_traffic - updated to PanOS11 syslog fields in TechDocs; used "host_id", "host_serial", "nssai_sd" and "nssai_sst" instead of current "hostid", "serialnumber", "nsdsai_sd" and "nsdsai_sst" in TechDocs
  2. extract_threat - updated to PanOS11 syslog fields in TechDocs; used "host_id" and "host_serial" instead of current "hostid" and "serialnumber" in TechDocs
  3. extract_system - updated to PanOS11 syslog fields in TechDocs (only added "high_res_timestamp")
  4. extract_hipmatch- updated to PanOS11 syslog fields in TechDocs; used "host_id" and "host_serial" instead of current "hostid" and "serialnumber" in TechDocs
  5. extract_globalprotect - updated to PanOS11 syslog fields in TechDocs; used "host_id" and "host_serial" instead of current "hostid" and "serialnumber" in TechDocs. In extract_globalprotect, the old version uses 'serial_number' for this field, which collides with field 3, which is the 'dvc_serial', not the serial of the src/user asset being described in the log

Note:

  1. The fields "host_id" and "host_serial" in extract_threat, extract_traffic, extract_globalprotect, and extract_hipmatch are extremely useful for asset correlation, and needs to be consistently named for analysis.
  2. I changed field names from 'dst...' to 'dest...' for Splunk CIM compatibility. Both can be used with field aliasing if preferred, but dest is more consistent with the existing Splunk CIM.
welcome-to-palo-alto-networks[bot] commented 1 year ago

:tada: Thanks for opening this pull request! We really appreciate contributors like you! :raised_hands:

btorresgil commented 1 year ago

Thanks for the PR! Seeing a lot of good changes here. With the breaking changes we'd have to do a major release with comprehensive release note so give us some time to go through everything and plan.

@jwiley80 Can you remove any lines you commented out and do another commit/push? We'll see the lines are removed in the diff during review but having them still exist commented makes the diff harder to parse.

Thanks again!

jwiley80 commented 1 year ago

Any progress on this? I'm not sure if you're waiting on something from me.