Open daixque opened 1 year ago
Pinging @elastic/security-external-integrations (Team:Security-External Integrations)
Could you provide some more samples, but captured from the event.original
field so that we can get the complete raw data. In the integration settings you would need to toggle on the "preserve original event" setting.
Also would it be possible to share some screenshots of the available configuration settings. I did not get a lot information from the docs about what is configurable (like can you choose tcp, tcp+tls, udp; are there tcp framing options?, can you pick and choose logs types, etc.). This will also help us in writing the setup documentation in the README.
How can these be retrieved using the agent today? I have gathered some logs using the Custom TCP logs and Syslog Parsing enabled. Is that close enough to the raw event?
Looks like I found the log messages source :) https://techdocs.f5.com/kb/en-us/products/big-ip_ltm/releasenotes/related/log-messages.html
Sample RFC5424 message. This could take a awhile to implement.
<134>1 2023-12-28T16:06:44-06:00 InternalF5a tmm 10564 - - Rule /Common/apinodogov_2pool <HTTP_REQUEST>: API.nodo.gov allowed from IP: 192.168.226.128 - TCPClientPayload: - TCPClientPort: 55304
Overview
We are using F5 and trying to onboard the logs to Elasticsearch via Elastic Agent. We realized there are (at least) 2 types of logs:
My understanding is our integration supports only 1st one. But we need to onboard 2nd one as well. So it will be super helpful for us if integration team introduces new input for 2nd usual syslog parsing.
Sample logs
Currently we are using Custom TCP Logs integration to collect the syslog. Below are just example of the syslog messages which are taken from
message
field. Note that these are not complete list of the message type.