-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Filebeat MSSQL ingest pipeline can't parse authentication messages #31933
Comments
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
@r00tu53r could you take a look and confirm if our MSSQL agent integration supported these authentication events? https://github.com/elastic/integrations/tree/main/packages/microsoft_sqlserver |
@leweafan I see you're referring to the MSSQL beats module. There is a Fleet based integration package available for MSSQL that supports all the available event types. Would you be able to use that instead https://docs.elastic.co/en/integrations/microsoft_sqlserver |
@leweafan I tested the authentication messages above and I see the pipeline is able to process those messages successfully. I have pasted a sample event that was ingested from the log sample above.
|
I'll close this issue as I don't see the problem. Please feel free to reopen the issue if you still think this is a problem. |
@r00tu53r There is no parsing at all. The following fields are missing:
These fields should be present according to ECS guide and needed for SIEM rules. P.S. Seems I can't reopen the issue myself. |
@leweafan unfortunately yes the pipeline is very basic and doesn't parse them into useful fields. Sorry I mistook the issue to indicate a broken pipeline. Are you using a standalone |
@r00tu53r thanks for reopening this issue. Yes we are using filebeat cause elastic agent and fleet do not support Kafka. I wonder why ingest pipelines for the same log are different for filebeat and fleet. |
@leweafan The direct output from Elastic Agent to Kafka is still in plan (elastic/elastic-agent#152). Am not sure if it helps your use case. However there might be a way to use elastic agent in standalone mode and send the output to logstash and then to kafka. More information is available
Enhancements to pipelines and addition of new integrations are usually only planned for Elastic Agent based integrations. cc: @jamiehynds |
Also, @leweafan - @andrewkroh has a gist here - https://gist.github.com/andrewkroh/c253717ebe82f2ec47fe003eda99c1dc that illustrates the steps to migrate to standalone Elastic Agent and configure filebeat by hand to use the fleet managed data streams. The difference being that there is no need to set I hope this helps |
@r00tu53r thanks for your concern. I think we can configure filebeat to use the fleet managed data streams using provided instruction but seems current ESC compliance is very poor and we will not benefit much from it. I checked fleet packages and only 34 of 121 have event.category = authentication and seems event.action not standardized. I have a post about my concerns here https://discuss.elastic.co/t/why-filebeat-pipelines-disappoint-or-siem-missing-authentication-patterns/307308. |
@leweafan Thank you for sharing the discuss post. Once you've been able to configure The Microsoft SQL Server integration package available for Elastic Agent supports / identifies authentication messages. At the time of writing support was added for all the available event/class types here and actions here. The package categorises parses SQL Server fields to ECS fields. Authentication events parsed by the integration - I would be happy to make fixes to this package if you're finding something missing / needs fixing. |
Describe the enhancement:
Filebeat MSSQL ingest pipeline can't parse authentication messages.
Describe a specific use case for the enhancement or feature:
Failed Authentication
Successful Authentication
The text was updated successfully, but these errors were encountered: