-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Filebeat] panos config option to set internal/external zones #22998
[Filebeat] panos config option to set internal/external zones #22998
Conversation
- default internal zone is "trust" - default external zone is "untrust" - allows for user to define zones for determining network.direction Relates elastic#21674
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
CHANGELOG.next.asciidoc
Outdated
@@ -738,6 +738,7 @@ https://github.com/elastic/beats/compare/v7.0.0-alpha2...master[Check the HEAD d | |||
- Add support for UNIX datagram sockets in `unix` input. {issues}18632[18632] {pull}22699[22699] | |||
- Add new httpjson input features and mark old config ones for deprecation {pull}22320[22320] | |||
- Add logic for external network.direction in sophos xg fileset {pull}22973[22973] | |||
- Add configuration option to set external and internal networks for panw panos fileset {pull}XXXXX[XXXXX] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- Add configuration option to set external and internal networks for panw panos fileset {pull}XXXXX[XXXXX] | |
- Add configuration option to set external and internal networks for panw panos fileset {pull}22998[22998] |
@@ -134,24 +134,23 @@ processors: | |||
- set: | |||
field: network.direction | |||
value: inbound | |||
if: 'ctx?.panw?.panos?.type == "TRAFFIC" && ctx?.panw?.panos?.source?.zone == "untrust" && ctx?.panw?.panos?.destination?.zone == "trust"' | |||
if: 'ctx?.panw?.panos?.type == "TRAFFIC" && ctx?._temp_?.external_zones != null && ctx?._temp_?.internal_zones != null && ctx?.observer?.ingress?.zone != null && ctx?.observer?.egress?.zone != null && ctx._temp_.external_zones.contains(ctx.observer.ingress.zone) && ctx._temp_.internal_zones.contains(ctx.observer.egress.zone)' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's a lot to take in, but it looks right. I found it easier to read like this since I can see all the logic at once.
if: 'ctx?.panw?.panos?.type == "TRAFFIC" && ctx?._temp_?.external_zones != null && ctx?._temp_?.internal_zones != null && ctx?.observer?.ingress?.zone != null && ctx?.observer?.egress?.zone != null && ctx._temp_.external_zones.contains(ctx.observer.ingress.zone) && ctx._temp_.internal_zones.contains(ctx.observer.egress.zone)' | |
if: > | |
ctx?.panw?.panos?.type == "TRAFFIC" && | |
ctx?._temp_?.external_zones != null && | |
ctx?._temp_?.internal_zones != null && | |
ctx?.observer?.ingress?.zone != null && | |
ctx?.observer?.egress?.zone != null && | |
ctx._temp_.external_zones.contains(ctx.observer.ingress.zone) && | |
ctx._temp_.internal_zones.contains(ctx.observer.egress.zone) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah those were awful, see if the new formatting is easier on the eyes.
…c#22998) * panos config option to set internal/external zones - default internal zone is "trust" - default external zone is "untrust" - allows for user to define zones for determining network.direction Relates elastic#21674 (cherry picked from commit 7b7bbe9)
What does this PR do?
adds configuration option to set internal and external zones.
Why is it important?
internal and external zones are used to determine network.direction.
Previously static values of "trust" and "untrust" were used, but the
zone names can be controlled by the user.
Checklist
- [ ] I have commented my code, particularly in hard-to-understand areasCHANGELOG.next.asciidoc
orCHANGELOG-developer.next.asciidoc
.How to test this PR locally
Related issues