Sophos XG syslog based elastic integration not working... #12032
-
I dumped my fully functional SO 2.3 based setup and took the plunge with a fresh start using SO 2.4.30. I have a standalone configuration but have one IDH host that I added.
I however noticed that in IPTables, I found nothing listed in any chains for port 9005.
Hrmm. Let's check for drops.
Yep, so the host firewall is killing the syslog traffic on UDP 9005. Fixing this using the old method was to use SO-ALLOW, but I am going with the new 2.4 SOC configuration steps as much as possible here to learn the new methods. So I went into the SO configuration settings via SOC, enabled advanced config under options, and then under Firewall->Portgroups->Syslog->udp, I added port 9005 to the default and deployed config to the standalone node.
I still see nothing in the elastic logs. I also don't see an easy way to see what is being received on port 9005, or why the sophos integration is not matching/triggering a pipeline to process the logs. I know the logs are flowing though, and I sent them to another host to capture some raw logs to ensure the device_id in the log matches the ID I used for "serial_number" in the integration. Should this field name match the raw log? I ran a wireshark capture and the XG is firehosing the SO node on UDP 9005 with log data. Something is clearly wrong with my configuration or I missed a step somewhere. I searched sophos related integration issues and all the posts I am finding are old, or for earlier versions of SO. What am I missing? |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 6 replies
-
What is the output of the following?
Also, if you run the following command and look for each of your 9005 entries, what
|
Beta Was this translation helpful? Give feedback.
-
Doug, thanks for taking the time to respond.
Slight revision might make it more understandable to some.
*If the integration is designed to listen on a port to receive data, it
will most likely default to listening on localhost only. Depending on how
you are sending data to the integration, you may need to change that to
0.0.0.0 because a process bound to the loopback address can't receive
events from other network hosts.*
…On Tue, Dec 19, 2023, 9:43 AM Doug Burks ***@***.***> wrote:
I guess I should have seen this issue sooner, however it doesn't make
sense to have the sophos integration bind to localhost only and only
receive syslog data from the securityonion node itself since the SO node is
not an XG firewall.
Elastic defaults to localhost most likely for security reasons.
I've added the following to
https://docs.securityonion.net/en/2.4/elastic-fleet.html#adding-an-integration
:
*If the integration is designed to listen on a port to receive data, it
will most likely default to listening on localhost only. Depending on how
you are sending data to the integration, you may need to change that to
0.0.0.0.*
—
Reply to this email directly, view it on GitHub
<#12032 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/A5H3BOA2G3MNOKEIM2UUBLDYKGR2JAVCNFSM6AAAAABAYOK4I2VHI2DSMVQWIX3LMV43SRDJONRXK43TNFXW4Q3PNVWWK3TUHM3TQOJYGI2TG>
.
You are receiving this because you authored the thread.Message ID:
<Security-Onion-Solutions/securityonion/repo-discussions/12032/comments/7898253
@github.com>
|
Beta Was this translation helpful? Give feedback.
Ha, okay. So I did a fresh install, ran all the steps I did last time and it still didn't work at first.
Even though the IPtables chain looks good, I think I might have discovered the issue. I'll know shortly if this is the case and will update for sure if this was cause.
What I did different was with the sophos integration, by default it said it would listen on "localhost". I changed this to 0.0.0.0.
Okay, this appears to be the issue. I guess I should have seen this issue sooner, however it doesn't make sense to have the sophos integration bind to localhost only and only receive syslog data from the securityonion node itself since the SO node is not an XG firewall. Also, the netstat out…