New fileset for googlecloud firewall logs#14553
Conversation
864113e to
6b3ef3c
Compare
|
Pinging @elastic/siem (Team:SIEM) |
andrewkroh
left a comment
There was a problem hiding this comment.
I like the addition of log.name and the keep_original_message. Either here or in a separate PR, can you please add those to vpcflow to keep them consistent?
9a8ac3b to
9c724fc
Compare
| ALLOWED: "allow", | ||
| DENIED: "deny" | ||
| }, | ||
| default: "unknown" |
There was a problem hiding this comment.
Please note that event.outcome is still reserved.
The current thinking is that expected values in this field (when present) should be: "success" or "failure". Finer grained information such as "allow" or "deny" should be in another place, perhaps in event.action or a custom field.
As usual, populating a reserved field signs you up to having to do a breaking change later.
| "destination.domain": "local-adrian-test", | ||
| "destination.ip": "10.128.0.16", | ||
| "destination.port": 80, | ||
| "event.category": "firewall-rule", |
There was a problem hiding this comment.
event.category is still reserved, and at this time, there is no plan to have a category named "firewall-rule".
Leaving this here signs you up to have to do a breaking change, once the expected values are published for event.category. The name of the category that will encapsulate firewall rule events is still very much in flux.
| "related.ip": [ | ||
| "10.128.0.16", | ||
| "8.8.8.8" | ||
| ], |
There was a problem hiding this comment.
OMG thanks for filling that ❤️ 🙂
|
Other than me harping on the reserved fields, I'm really excited about this! Good work, as usual :-) |
|
Thanks @webmat Regarding |
This PR adds a new fileset, firewall, to the googlecloud module in Filebeat. It helps parsing firewall logs generated by rules under VPC Network -> Firewall Rules. Note that GCP only logs firewall events under the following conditions: - Logging needs to be enabled for each individual rule in order to log. - Only TCP and UDP rules can be logged. (cherry picked from commit 4a66f0b)
This PR adds a new fileset, firewall, to the googlecloud module in Filebeat. It helps parsing firewall logs generated by rules under VPC Network -> Firewall Rules. Note that GCP only logs firewall events under the following conditions: - Logging needs to be enabled for each individual rule in order to log. - Only TCP and UDP rules can be logged. (cherry picked from commit 4a66f0b)
…15621) * New fileset for googlecloud firewall logs (#14553) This PR adds a new fileset, firewall, to the googlecloud module in Filebeat. It helps parsing firewall logs generated by rules under VPC Network -> Firewall Rules. Note that GCP only logs firewall events under the following conditions: - Logging needs to be enabled for each individual rule in order to log. - Only TCP and UDP rules can be logged. (cherry picked from commit 4a66f0b) * googlecloud/vpcflow fileset: Populate additional log fields (#14608) To keep the vpcflow fileset of the googlecloud module aligned with the new firewall fileset, a `var.keep_original_message` option is added. Also the log.logger ECS field is now filled.
…l logs (elastic#15621) * New fileset for googlecloud firewall logs (elastic#14553) This PR adds a new fileset, firewall, to the googlecloud module in Filebeat. It helps parsing firewall logs generated by rules under VPC Network -> Firewall Rules. Note that GCP only logs firewall events under the following conditions: - Logging needs to be enabled for each individual rule in order to log. - Only TCP and UDP rules can be logged. (cherry picked from commit 4a66f0b) * googlecloud/vpcflow fileset: Populate additional log fields (elastic#14608) To keep the vpcflow fileset of the googlecloud module aligned with the new firewall fileset, a `var.keep_original_message` option is added. Also the log.logger ECS field is now filled. (cherry picked from commit 22fb66d)
…15621) (#15625) * New fileset for googlecloud firewall logs (#14553) This PR adds a new fileset, firewall, to the googlecloud module in Filebeat. It helps parsing firewall logs generated by rules under VPC Network -> Firewall Rules. Note that GCP only logs firewall events under the following conditions: - Logging needs to be enabled for each individual rule in order to log. - Only TCP and UDP rules can be logged. (cherry picked from commit 4a66f0b) * googlecloud/vpcflow fileset: Populate additional log fields (#14608) To keep the vpcflow fileset of the googlecloud module aligned with the new firewall fileset, a `var.keep_original_message` option is added. Also the log.logger ECS field is now filled. (cherry picked from commit 22fb66d)
This PR adds a new fileset,
firewall, to thegooglecloudmodule in Filebeat. It helps parsing firewall logs generated by rules under VPC Network -> Firewall Rules.Note that GCP only logs firewall events under the following conditions:
See https://cloud.google.com/vpc/docs/using-firewall-rules-logging.