Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix the Grok parser for 113005 messages #9473

Merged
merged 1 commit into from
Mar 29, 2024

Conversation

pkoutsovasilis
Copy link
Contributor

@pkoutsovasilis pkoutsovasilis commented Mar 29, 2024

Proposed commit message

This PR handles properly cisco_ftd messages with id 113005 that the username is hidden
Ref https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide/syslogs1.html#con_8293726 (credits @taylor-swanson )

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

Author's Checklist

N/A

How to test this PR locally

inside the cisco_ftd package run:
elastic-package test

Related issues

Screenshots

N/A

@pkoutsovasilis pkoutsovasilis force-pushed the pkoutsovasilis/cisco_ftd_hidden_username branch from 1148c82 to 36f1c25 Compare March 29, 2024 13:29
@pkoutsovasilis pkoutsovasilis marked this pull request as ready for review March 29, 2024 13:32
@pkoutsovasilis pkoutsovasilis requested a review from a team as a code owner March 29, 2024 13:32
@elasticmachine
Copy link

💚 Build Succeeded

History

Copy link

Copy link
Contributor

@taylor-swanson taylor-swanson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@@ -357,7 +357,7 @@ processors:
description: "113005"
field: "message"
patterns:
- "AAA user authentication Rejected(%{SPACE})?: reason = %{REASON}(%{SPACE})?: server = %{IP:destination.address}(%{SPACE})?: user = ?%{CISCO_USER:source.user.name}(%{SPACE})?: user IP = %{IP:source.address}"
- "AAA user authentication Rejected(%{SPACE})?: reason = %{REASON}(%{SPACE})?: server = %{IP:destination.address}(%{SPACE})?: user = ?(%{CISCO_USER:source.user.name}|\\*+)(%{SPACE})?: user IP = %{IP:source.address}"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Other groks handling ***** actually extract it to source.user.name. We can either be consistent and extract it as well, or we can not extract it.

This is one of those situations where I don't know what the intended behavior behind this is supposed to be. These are very old pipelines with, at times, questionable practices. To me, ***** is equivalent to no value at all, it does nothing more than describe "I don't know what this user is".

I'm fine with not extracting it.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was thinking the same to be honest that ***** means no username defined

@pkoutsovasilis pkoutsovasilis merged commit 26aa0ad into main Mar 29, 2024
5 checks passed
@pkoutsovasilis pkoutsovasilis deleted the pkoutsovasilis/cisco_ftd_hidden_username branch March 29, 2024 14:05
@elasticmachine
Copy link

Package cisco_ftd - 3.2.1 containing this change is available at https://epr.elastic.co/search?package=cisco_ftd

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants