Setup Netflow Record integration #12389
-
Version2.4.40 Installation MethodSecurity Onion ISO image Descriptionconfiguration Installation TypeDistributed Locationon-prem with Internet access Hardware SpecsExceeds minimum requirements CPU8 RAM32GB Storage for /300GB Storage for /nsm2T Network Traffic Collectiontap Network Traffic SpeedsLess than 1Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsYes, there are additional clues in /opt/so/log/ (please provide detail below) DetailHi everyone! I am still new to setting up Elastic Fleet, so apologies if this is a simple question. I am trying to setup an Integration to collect Netflow logs from a few network devices. As of right now, I have modified the "FleetServer-$ManagerName" agent policy in Fleet (where $ManagerName is the name of the Manager Node) to add a Netflow integration with default settings, except the UDP listening host is set to "0.0.0.0", and the UDP listening port is 2055. My understanding (based on consulting the documentation) is that if an integration receives logs from another device, then the integration should be added to the appropriate "FleetServer..." policy. Ideally, since the devices that would be sending netflow logs to SO are on my internal network, I'd prefer to send them to the Fleet Server running on the Manager, instead of having to traverse the DMZ. After force-synchronizing the Grid (and waiting an hour), I used nmap to double-check to see if the port (2055/UDP) is open on the Manager, and it was not. I used this nmap command: I also took a look in /opt/so/logs/elasticfleet, and in the most recent logfile, I searched for any failures/errors, and came up with a few results (that are included in the attached .txt file), in case those help to give more clues about what might be going on. Does anyone happen to know what I may have done wrong, or have any recommendations/guidance on how to get the integration working correctly and opening the appropriate port on the Manager? Also, attached is the full output of the Elastic Fleet/Agent output file for today, in case it would be helpful. Bear in mind that it is quite long. Thank you in advance! Full_Ouput_elastic-agent-20240220.txt ElasticFleet_Troubleshooting_Output.txt Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
You need to open firewall. Use this pfsense instruction for reference. Change the port to Netflow port 2055. I use SO Standalone so my firewall path is below: Use #12055 #12245 also for reference.
|
Beta Was this translation helpful? Give feedback.
-
@TotieBash , thanks for the tips! Yesterday evening, I followed the instructions for the pfSense integration, but modified it as appropriate for netflow. (The agent policy was applied to "FleetServer_$ManagerName"). After deploying that policy, I re-synced the grid, and even then, it looked like iptables was letting the port through, but the system was not listening on UDP/2055. Earlier today, I took another look at the agent policies, and applied the same integration to "so-grid-nodes_general", re-synced the grid, and it now looks like the system is both listening on UDP/2055, and iptables is permitting traffic through UDP/2055 as well. I will give this all a try tomorrow on the prod server, and update you all. Thanks again! |
Beta Was this translation helpful? Give feedback.
happy to hear that the info is helping... The only other thing I do is use tcpdump to make sure they are all coming in. For example, like you, I also initially permitted 10.0.0.0/8 for my Cisco_ios logs on port 9002. However after looking at tcpdump I realize the source-ip that cisco was using was a loopback ip which is a 172.16.10.0/24 ip address. What I am saying is, tcpdump is handy to verify that the packets are coming in the wire.. I now I change my firewll port to permit 0.0.0.0/0 for udp:9002 to cover everything. I use the following tcpdump syntax, with ens192 as my management interface.
tcpcump -i ens192 -nnA port 2055