splunk / splunk-connect-for-syslog

Splunk Connect for Syslog
Apache License 2.0
152 stars 107 forks source link

Problem parsing Netscaler log #2594

Open thrunter opened 4 weeks ago

thrunter commented 4 weeks ago

What is the sc4s version ?

3.30.0

Which runtime (Docker, Podman, Docker Swarm, BYOE, MicroK8s) are you using for SC4S?

Podman

Last chance index/Fallback index?

Yes, fallback of APPFW from Netscaler

Is the issue related to local customization?

No

Do we have all the default indexes created?

Yes

Describe the bug I've ingesting Netscaler logs sent to the SC4S. Everything works except for some of the Netscaler logs. There are a few log rows that has a newline charachters. See the log row below:

<134> 09/20/2024:12:37:48 GMT VPX1 0-PPE-3 : default APPFW Message 54353 0 : "IP-REP recorded IP as malicious. CS VSERVER NAME: domain | LB VSERVER NAME: domain | Date & Time: Fri, 20 Sep 2024 12:37:48 GMT | Client IP: 1.1.1.1 | Requst URL: 1.2.4.3 | Request Full Header: GET / HTTP/1.1 Host: 1.2.4.3 User-Agent: Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com Accept-Encoding: gzip " This makes the SC4S produce a fallback except the first row. So the last row only gets the " as ingested. Is there a solution to this problem?
cwadhwani-splunk commented 2 weeks ago

Hi @thrunter Multiline logs are currently not handled in Netscaler. Also, the header is only added in the first line and not in the others, so writing an apt postfilter parser for this could be a bit tricky and unreliable.

Can we check in the PCAP and confirm the format, just wanted to confirm that the multiline logs are not having headers in all the lines. If this would be the case, I think this should be fixed from the vendor side. We can take further steps after confirming this format.