Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Filebeat] AWS CloudTrail Processor parses incorrect AWS region from logs #32703

Closed
sypste opened this issue Aug 16, 2022 · 2 comments · Fixed by #32763
Closed

[Filebeat] AWS CloudTrail Processor parses incorrect AWS region from logs #32703

sypste opened this issue Aug 16, 2022 · 2 comments · Fixed by #32763
Labels
bug Team:Cloud-Monitoring Label for the Cloud Monitoring team

Comments

@sypste
Copy link

sypste commented Aug 16, 2022

Please post all questions and issues on https://discuss.elastic.co/c/beats
before opening a Github Issue. Your questions will reach a wider audience there,
and if we confirm that there is a bug, then you can open a new issue.

For security vulnerabilities please only send reports to security@elastic.co.
See https://www.elastic.co/community/security for more information.

Please include configurations and logs if available.

For confirmed bugs, please report:

Filebeat.yml

filebeat.config:
  modules:
    path: ${path.config}/modules.d/*.yml
    reload.enabled: true

# processors:
#   - add_cloud_metadata: ~
#   - add_docker_metadata: ~

output.elasticsearch:
  hosts: '${ELASTICSEARCH_HOSTS:elasticsearch:9200}'
  username: '${ELASTICSEARCH_USERNAME:xxxxx}'
  password: '${ELASTICSEARCH_PASSWORD:xxxxx}'

logging.level: debug

aws.yml

- module: aws
  cloudtrail:
    enabled: true

    # AWS SQS queue url
    var.queue_url: https://sqs.eu-central-1.amazonaws.com/xxxxx/MyS3Queue

    # Use access_key_id, secret_access_key and/or session_token instead of shared credential file
    var.access_key_id: xxxxx
    var.secret_access_key: xxxxx

Sample CloudTrail log which is rendered to cloud.region eu-central-1

{
  "eventVersion": "1.08",
  "userIdentity": {...},
  "eventTime": "2022-08-16T08:35:40Z",
  "eventSource": "health.amazonaws.com",
  "eventName": "DescribeEventAggregates",
  "awsRegion": "us-east-1",
  "sourceIPAddress": "AWS Internal",
  "userAgent": "AWS Internal",
  "requestParameters": {
    "aggregateField": "eventTypeCategory",
    "filter": {
      "eventStatusCodes": [
        "open",
        "upcoming"
      ],
      "startTimes": [
        {
          "from": "Aug 9, 2022 8:35:40 AM"
        }
      ]
    }
  },
  "responseElements": null,
  "requestID": "xxxx",
  "eventID": "xxxx",
  "readOnly": true,
  "eventType": "AwsApiCall",
  "managementEvent": true,
  "recipientAccountId": "xxxx",
  "eventCategory": "Management",
  "sessionCredentialFromConsole": "true"
}
@botelastic botelastic bot added the needs_team Indicates that the issue/PR needs a Team:* label label Aug 16, 2022
@sypste
Copy link
Author

sypste commented Aug 18, 2022

Addressed by elastic/integrations#4024

@kaiyan-sheng kaiyan-sheng added the Team:Cloud-Monitoring Label for the Cloud Monitoring team label Aug 18, 2022
@botelastic botelastic bot removed the needs_team Indicates that the issue/PR needs a Team:* label label Aug 18, 2022
@kaiyan-sheng kaiyan-sheng added bug needs_team Indicates that the issue/PR needs a Team:* label labels Aug 18, 2022
@botelastic botelastic bot removed the needs_team Indicates that the issue/PR needs a Team:* label label Aug 18, 2022
@botelastic
Copy link

botelastic bot commented Aug 18, 2022

This issue doesn't have a Team:<team> label.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Team:Cloud-Monitoring Label for the Cloud Monitoring team
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants