Syslog results not showing up with event.dataset:syslog #9930
Replies: 7 comments 11 replies
-
Have you checked |
Beta Was this translation helpful? Give feedback.
-
Some other checks for the pipeline if you see the traffic making it to the interface (in addition to the Elasticsearch pipeline command). Check to see if events are flowing through a Logstash pipeline: Check Logstash log on search node(s) to see if there is an issue with indexing: Verify your local |
Beta Was this translation helpful? Give feedback.
-
I think I am making some progress. I noticed that the ingest pipeline section of Kibana has older pipelines that have not been removed. For example, we are on Filebeat-8.4.3 but we have multiple pipelines still from Filebeat-7.X. I removed older pipelines and added an on_failure component to all syslog pipelines left. For example:
I am starting to see more syslog entries now. |
Beta Was this translation helpful? Give feedback.
-
Where is the configuration setting that tells security onion to apply syslog to incoming traffic? |
Beta Was this translation helpful? Give feedback.
-
https://github.com/Security-Onion-Solutions/securityonion/blob/master/salt/logstash/pipelines/config/so/1001_preprocess_syslogng.conf This will determine what gets the |
Beta Was this translation helpful? Give feedback.
-
Thank you @cm-ops. I am still sooo confused. When I run tcpdump I see 100+ syslog messages being sent to Security Onion per second. When I check I even reverted back to the original syslog ingest pipeline and added a "catch-all" to my grok processors with the thought it could be a pattern issue, but that did not catch any additional messages:
Even just a port that could catch this data and place it unparsed into ElasticSearch would be better than silently losing it. Is there some way to get the raw syslog data indexed? |
Beta Was this translation helpful? Give feedback.
-
This is looking like a firewall issue. I added my source IP (192.168.1.3) to the allow list for syslog and I can see the rule in iptables:
However, there are blocks in
Anywhere I should check for this filter rule to be coming from? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I have had success in the past sending syslog to Security Onion. Specifically, by:
/opt/so/saltstack/default/salt/elasticsearch/files/ingest/syslog
to include a custom grok.Fwiw, before even updating the pipeline I was still able to see unparsed syslog traffic in Kibana with the search "event.dataset:syslog". This isn't working for a new service I am trying to add.
I properly updated the remote service and I can see the traffic being sent to the manager in tcpdump. I updated so-allow to include the source ip and when I search in Kibana I don't see any IPTables drops for that ip. However, I don't see any syslog messages parsed by ES for this service.
How can I troubleshoot this?
Beta Was this translation helpful? Give feedback.
All reactions