Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Filebeat] Update Fortinet Ingest Pipeline #24816

Merged
merged 14 commits into from
Jun 29, 2021

Conversation

legoguy1000
Copy link
Contributor

@legoguy1000 legoguy1000 commented Mar 29, 2021

What does this PR do?

Updates the Ingest pipeline for the Fortinet firewall module.

  • Consolidated some of the duplicate processors across the sub-pipelines
  • Add uri_parts , user_agent, community_id processors
  • Set observer.serial_number
  • Added event.kind: alert for certain UTM events

BREAKING CHANGE:

  • Removed the rename of fortinet.firewall.eventtype -> event.action and instead set event.action to fortinet.firewall.action for the UTM events to match the other events.

Why is it important?

Added additional log samples, updated certain fields, removed duplicate actions.

Checklist

  • My code follows the style guidelines of this project
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have made corresponding change to the default configuration files
  • I have added tests that prove my fix is effective or that my feature works
  • I have added an entry in CHANGELOG.next.asciidoc or CHANGELOG-developer.next.asciidoc.

Author's Checklist

How to test this PR locally

Related issues

Use cases

Screenshots

Logs

@botelastic botelastic bot added the needs_team Indicates that the issue/PR needs a Team:* label label Mar 29, 2021
@elasticmachine
Copy link
Collaborator

elasticmachine commented Mar 29, 2021

💚 Build Succeeded

the below badges are clickable and redirect to their specific view in the CI or DOCS
Pipeline View Test View Changes Artifacts preview

Expand to view the summary

Build stats

  • Build Cause: P1llus commented: /test

  • Start Time: 2021-06-29T12:37:38.776+0000

  • Duration: 109 min 30 sec

  • Commit: f026be2

Test stats 🧪

Test Results
Failed 0
Passed 14231
Skipped 2311
Total 16542

Trends 🧪

Image of Build Times

Image of Tests

💚 Flaky test report

Tests succeeded.

Expand to view the summary

Test stats 🧪

Test Results
Failed 0
Passed 14231
Skipped 2311
Total 16542

@botelastic botelastic bot removed the needs_team Indicates that the issue/PR needs a Team:* label label Mar 29, 2021
@legoguy1000
Copy link
Contributor Author

Still working this. Need a 2nd opinion on the 3rd change in the description. Make sure that people think thats the right choice. @ijokarumawak You opened the original issue, what do you think? Also all the documents have event.outcome: success even when the firewall is reporting blocked/denied. Per the ECS spec it should be from the point of view of who generated the event (aka the client) so anything that is denied should have event.outcome: failure . I plan to update that tomorrow. If anyone thinks that wrong, let me know. Then i will take PR out of draft.

Copy link

@ijokarumawak ijokarumawak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @legoguy1000 . Thanks for preparing PR! I've looked at the change and found what I requested. So, I am +1 on that aspect. However, I found some not user friendly Kibana UI behavior in Security app. Please check my review comments.

@legoguy1000
Copy link
Contributor Author

@ijokarumawak did you have any concerns about

Removed the rename of fortinet.firewall.eventtype -> event.action and instead set event.action to fortinet.firewall.action for the UTM events to match the other events.

or the event.outcome changes. If not then I will take this PR out of draft.

@ijokarumawak
Copy link

@legoguy1000 I personally don't have any concern about that. I recommend to go ahead and let others review this PR, too.

@legoguy1000 legoguy1000 marked this pull request as ready for review April 1, 2021 03:16
@elasticmachine
Copy link
Collaborator

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

@mergify
Copy link
Contributor

mergify bot commented Apr 19, 2021

This pull request is now in conflicts. Could you fix it? 🙏
To fixup this pull request, you can check out it locally. See documentation: https://help.github.com/articles/checking-out-pull-requests-locally/

git fetch upstream
git checkout -b 22136-fortinet-module upstream/22136-fortinet-module
git merge upstream/master
git push upstream 22136-fortinet-module

@mergify
Copy link
Contributor

mergify bot commented Apr 28, 2021

This pull request is now in conflicts. Could you fix it? 🙏
To fixup this pull request, you can check out it locally. See documentation: https://help.github.com/articles/checking-out-pull-requests-locally/

git fetch upstream
git checkout -b 22136-fortinet-module upstream/22136-fortinet-module
git merge upstream/master
git push upstream 22136-fortinet-module

@mergify
Copy link
Contributor

mergify bot commented May 3, 2021

This pull request is now in conflicts. Could you fix it? 🙏
To fixup this pull request, you can check out it locally. See documentation: https://help.github.com/articles/checking-out-pull-requests-locally/

git fetch upstream
git checkout -b 22136-fortinet-module upstream/22136-fortinet-module
git merge upstream/master
git push upstream 22136-fortinet-module

@andrewkroh andrewkroh added the needs_integration_sync Changes in this PR need synced to elastic/integrations. label May 3, 2021
@andrewkroh andrewkroh self-assigned this May 3, 2021
@mergify
Copy link
Contributor

mergify bot commented May 6, 2021

This pull request is now in conflicts. Could you fix it? 🙏
To fixup this pull request, you can check out it locally. See documentation: https://help.github.com/articles/checking-out-pull-requests-locally/

git fetch upstream
git checkout -b 22136-fortinet-module upstream/22136-fortinet-module
git merge upstream/master
git push upstream 22136-fortinet-module

@legoguy1000 legoguy1000 force-pushed the 22136-fortinet-module branch 2 times, most recently from 3ddc7e0 to 3ad2b14 Compare May 6, 2021 23:20
@mergify
Copy link
Contributor

mergify bot commented Jun 28, 2021

This pull request is now in conflicts. Could you fix it? 🙏
To fixup this pull request, you can check out it locally. See documentation: https://help.github.com/articles/checking-out-pull-requests-locally/

git fetch upstream
git checkout -b 22136-fortinet-module upstream/22136-fortinet-module
git merge upstream/master
git push upstream 22136-fortinet-module

@P1llus P1llus assigned P1llus and unassigned andrewkroh Jun 29, 2021
@P1llus P1llus self-requested a review June 29, 2021 12:37
@P1llus
Copy link
Member

P1llus commented Jun 29, 2021

/test

Copy link
Member

@P1llus P1llus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Small comment, the rest looks good!

@P1llus P1llus merged commit 890e473 into elastic:master Jun 29, 2021
@P1llus P1llus added the backport-v7.14.0 Automated backport with mergify label Jun 29, 2021
mergify bot pushed a commit that referenced this pull request Jun 29, 2021
* 22136: Update Fortinet Ingest Pipeline

* Update Pipelines

* Additional updates

* Set virus/ips subtypes to event.kind: alert

* update fields

* Consolidate processors to script

* Update event.outcome logic

* replace hashmap

* update event.outcome

* cleanup

* Added Changes for #25254

* regenerate data

* update changelog

* remove extra items in changelog

(cherry picked from commit 890e473)
v1v added a commit to v1v/beats that referenced this pull request Jun 29, 2021
…arwin-arm64

* upstream/master: (295 commits)
  Update urllib to 1.26.5. (elastic#26380)
  Update golang.org/x/crypto (elastic#26448)
  [Filebeat] Update Fortinet Ingest Pipeline (elastic#24816)
  Move parsers outside of filestream input so others can use them as well (elastic#26541)
  [Filebeat] Fix `threatintel.indicator.url.full` field not populating (elastic#26508)
  [Filebeat] Add network direction processor to Zeek and Suricata modules (elastic#24620)
  Logging code cleanup related to Nomad auto-discovery (elastic#26498)
  [Metricbeat] Add Couchbase's Sync Gateway module (elastic#25599)
  Refactor add_cloud_metadata to handle ECS fields easier (elastic#26438)
  [Elastic Agent] Improper casting of int64 (elastic#26520)
  [Elastic Agent] Enable configuring monitoring namespace (elastic#26439)
  [Heartbeat] configure permissions for synthetics config (elastic#26393)
  Osquerybeat: set the raw index name to supress the timestamp suffix (elastic#26545)
  [Heartbeat] add screenshots config to synthetics (elastic#26455)
  [Elastic Agent] Use http2 to connect to Fleet Server. (elastic#26474)
  Remove all docs about  Beats central management (elastic#26399)
  update data.json for gcp billing (elastic#26506)
  Skip x-pack metricbeat tests (elastic#26537)
  [Elastic Agent] Fix issue with FLEET_CA not being used with Fleet Server in container (elastic#26529)
  Add changelog entry for  elastic#26224 (elastic#26531)
  ...
P1llus pushed a commit that referenced this pull request Jun 29, 2021
* 22136: Update Fortinet Ingest Pipeline

* Update Pipelines

* Additional updates

* Set virus/ips subtypes to event.kind: alert

* update fields

* Consolidate processors to script

* Update event.outcome logic

* replace hashmap

* update event.outcome

* cleanup

* Added Changes for #25254

* regenerate data

* update changelog

* remove extra items in changelog

(cherry picked from commit 890e473)

Co-authored-by: Alex Resnick <adr8292@gmail.com>
mdelapenya added a commit to mdelapenya/beats that referenced this pull request Jun 30, 2021
* master: (25 commits)
  fix: Force PLATFORMS environment variable when we build Elastic Agent dependencies on arm64 (elastic#26415)
  macos for metricbeat to run in the extended meta-stage (elastic#26573)
  Packaging: add arm7 platform in the main pipeline (elastic#26575)
  [Heartbeat] Skip flakey timer queue test (elastic#26592)
  Update to "read_pipeline" permission (elastic#26465) (elastic#26580)
  API keys do not reflect the need for read_pipeline (elastic#26466) (elastic#26582)
  Add Fleet agent.id to Agent monitoring data (elastic#26548)
  Add kinesis metricset (elastic#25989)
  Refactor of system/memory metricset (elastic#26334)
  Introduce httpcommon package in libbeat (add support for Proxy) (elastic#25219)
  [Filebeat] change multiline configuration in awss3 input to parsers (elastic#25873)
  docs: Hint for the error "Error extracting container id" (elastic#25824)
  [Docs] Fixed metricbeat redis exported field CPU descriptions (elastic#25846) (elastic#26496)
  Update urllib to 1.26.5. (elastic#26380)
  Update golang.org/x/crypto (elastic#26448)
  [Filebeat] Update Fortinet Ingest Pipeline (elastic#24816)
  Move parsers outside of filestream input so others can use them as well (elastic#26541)
  [Filebeat] Fix `threatintel.indicator.url.full` field not populating (elastic#26508)
  [Filebeat] Add network direction processor to Zeek and Suricata modules (elastic#24620)
  Logging code cleanup related to Nomad auto-discovery (elastic#26498)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport-v7.14.0 Automated backport with mergify enhancement needs_integration_sync Changes in this PR need synced to elastic/integrations.
Projects
None yet
7 participants