Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Low throughput rates for Cisco ASA module's Ingest Node pipeline #25768

Open
andrewkroh opened this issue May 18, 2021 · 7 comments
Open

Low throughput rates for Cisco ASA module's Ingest Node pipeline #25768

andrewkroh opened this issue May 18, 2021 · 7 comments
Labels
Filebeat Filebeat Team:Security-Deployment and Devices Deployment and Devices Team in Security Solution

Comments

@andrewkroh
Copy link
Member

andrewkroh commented May 18, 2021

There have been multiple reports of low event rates when using the Cisco ASA Filebeat module. In two independent analyses came to the conclusion was that one processor in the pipeline was taking a significant amount of time compared to the others. This was the date processor with timezone option.

- date:
if: "ctx.event.timezone != null"
timezone: "{{ event.timezone }}"
field: "_temp_.raw_date"
target_field: "@timestamp"
formats:
- "ISO8601"
- "MMM d HH:mm:ss"
- "MMM dd HH:mm:ss"
- "EEE MMM d HH:mm:ss"
- "EEE MMM dd HH:mm:ss"
- "MMM d HH:mm:ss z"
- "MMM dd HH:mm:ss z"
- "EEE MMM d HH:mm:ss z"
- "EEE MMM dd HH:mm:ss z"
- "MMM d yyyy HH:mm:ss"
- "MMM dd yyyy HH:mm:ss"
- "EEE MMM d yyyy HH:mm:ss"
- "EEE MMM dd yyyy HH:mm:ss"
- "MMM d yyyy HH:mm:ss z"
- "MMM dd yyyy HH:mm:ss z"
- "EEE MMM d yyyy HH:mm:ss z"
- "EEE MMM dd yyyy HH:mm:ss z"

_nodes/stats metrics in one case showed that about a quarter of the processing time was spent in this processor (analyzed with https://github.com/andrewkroh/go-ingest-node-metrics). We need to investigate why this one processor takes more time and see if we can improve the overall throughput.

109562145-04e4d000-7aac-11eb-98e0-2b0f76629d36

For confirmed bugs, please report:

@elasticmachine
Copy link
Collaborator

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

@andrewkroh
Copy link
Member Author

I think we need to setup a benchmark to replicate the issue. Then test a few changes and measure the results.

One change I'd like to see tested is what happens if the number of date patterns is reduced. And other whether including the timezone option affects the date processor's execution time.

@leehinman
Copy link
Contributor

relates elastic/elasticsearch#73918

@botelastic
Copy link

botelastic bot commented Jun 8, 2022

Hi!
We just realized that we haven't looked into this issue in a while. We're sorry!

We're labeling this issue as Stale to make it hit our filters and make sure we get back to it as soon as possible. In the meantime, it'd be extremely helpful if you could take a look at it as well and confirm its relevance. A simple comment with a nice emoji will be enough :+1.
Thank you for your contribution!

@botelastic botelastic bot added the Stalled label Jun 8, 2022
@andrewkroh
Copy link
Member Author

This date processor change probably affected performance under ES 7.17 and 8.x. We should retest.

elastic/elasticsearch#83764

@botelastic botelastic bot removed the Stalled label Nov 7, 2022
@joegallo
Copy link

joegallo commented Mar 1, 2023

I'd expect elastic/elasticsearch#92880 to make a difference here, too.

@norrietaylor norrietaylor added Team:Security-Deployment and Devices Deployment and Devices Team in Security Solution and removed Team:Security-External Integrations labels Jan 31, 2024
@elasticmachine
Copy link
Collaborator

Pinging @elastic/sec-deployment-and-devices (Team:Security-Deployment and Devices)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Filebeat Filebeat Team:Security-Deployment and Devices Deployment and Devices Team in Security Solution
Projects
None yet
Development

No branches or pull requests

5 participants