Integration outputting unparsed logs #10942
-
DISCLAIMER: if this is not the correct area to ask this as it could be an issue with the integration itself, please let me know. Okay, I am using the Fortinet Forti manager elastic integration to receive logs from my Forti analyzer. I am sending it syslog and it is outputting. But all the output looks unparsed. It looks like it's just not calling the ingest pipeline at all. As when I run a test document against the pipeline it parses as expected. Looking into the settings I can see it is configured to use its default pipeline. Possibly it could be working as expected, just not indexing the parsed version? I don't see any Fortinet indices created unless I am missing them. I wanted to bring it to your guy's attention as I feel it could be affecting these types of integrations as a whole rather than just an isolated incident. But if not, I am happy to get it worked out and possibly post in the show and tell area for others if I am fruitful. |
Beta Was this translation helpful? Give feedback.
Replies: 10 comments 34 replies
-
Could you tell us a little more about the integration configuration? Running "sudo so-elastic-agent-inspect" will print the configuration information to the terminal, if you want to cut and paste the part related to the Fortinet data stream. |
Beta Was this translation helpful? Give feedback.
-
Absolutely! Please find that below. All that has changed from default is the listen address and port. I am sending syslog over port 8765 through a custom host/port group. I also flipped the "Preserve Original Event" switch just in testing, but it seems to have no effect. id: tcp-fortinet_fortimanager-ad4ab7d7-ae06-49b9-ac2d-3b4d54706904
|
Beta Was this translation helpful? Give feedback.
-
They are fortinet_fortimanager.log and fortinet_fortimanager respectively. I just spun up a new RC2 grid just to remove any variables as well. |
Beta Was this translation helpful? Give feedback.
-
This isn't the greatest solution, but I had a similar problem and my solution was just going into Kibana -> Management -> Integrations -> Installed Integrations -> {integration name} -> Settings then uninstalling and reinstalling until it worked and got mapped properly. |
Beta Was this translation helpful? Give feedback.
-
I have noticed this issue as well with the Alienvault OTX integration. It looks like the logs are not parsed but the pipeline works when ran manually. (This integration has had some shard failure as well but not sure if that's related) |
Beta Was this translation helpful? Give feedback.
-
Same for Palo Alto Firewall Logs |
Beta Was this translation helpful? Give feedback.
-
This was my solution that seems to work: Now we need to create our own index template to map our integrations, so check out Now in the SOC Administration configuration web console, enable advanced settings (there's a warning there, so understand there is some risk for doing this manual fix around that worked for me), and then go to elasticsearch -> advanced and put your template there. Double check the spelling of the managed installed component template of the integration you installed in Kibana, as you'll need to route this newly created index template to those mappings.
Now apply the changes to elasticsearch (manually call or wait for highstate) Go back to Kibana and check the data stream for your integration and confirmed the index template has changed to your newly created one. Now you need to create a new shard for the mappings to take effect to newly ingested logs (I wasn't able to find a way to fix the unmapped logs). I did this by reinstalling the integration. #10942 (comment) Results may vary, but worked for me. |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
What is the output of the following?
|
Beta Was this translation helpful? Give feedback.
-
Same issue with sonicwall logs, data stream pointing at the so-logs index template, not the template that the integration should've installed, pipeline not being used. |
Beta Was this translation helpful? Give feedback.
Out-of-the-box support for additional integrations will be added in the next release. Initially we only supported a handful of the integrations.
https://github.com/Security-Onion-Solutions/securityonion/blob/2.4/main/salt/elasticfleet/defaults.yaml#L28-L44
There are some things that we have to do behind the scenes to manage these that doesn't happen by default with a traditional Elastic installation.