-
Notifications
You must be signed in to change notification settings - Fork 458
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Checkpoint]: Processing and mapping of Checkpoint Firewall session logs #11894
Labels
Integration:checkpoint
Check Point
needs:triage
Team:Security-Deployment and Devices
Deployment and Devices Security team [elastic/sec-deployment-and-devices]
Comments
andrewkroh
added
Integration:checkpoint
Check Point
Team:Security-Deployment and Devices
Deployment and Devices Security team [elastic/sec-deployment-and-devices]
labels
Nov 27, 2024
Pinging @elastic/sec-deployment-and-devices (Team:Security-Deployment and Devices) |
srilumpa
added a commit
to srilumpa/integrations
that referenced
this issue
Dec 19, 2024
srilumpa
added a commit
to srilumpa/integrations
that referenced
this issue
Dec 19, 2024
impacted fields: - checkpoint.last_hit_time - checkpoint.creation_time - checkpoint.duration
srilumpa
added a commit
to srilumpa/integrations
that referenced
this issue
Dec 19, 2024
…te readme file
srilumpa
added a commit
to srilumpa/integrations
that referenced
this issue
Dec 19, 2024
srilumpa
added a commit
to srilumpa/integrations
that referenced
this issue
Dec 19, 2024
5 tasks
srilumpa
added a commit
to srilumpa/integrations
that referenced
this issue
Dec 19, 2024
srilumpa
added a commit
to srilumpa/integrations
that referenced
this issue
Dec 19, 2024
…possible dynamic mapping changes - `checkpoint.aggregated_log_count`: keyword (dynamic) to integer - `checkpoint.connection_count`: keyword (dynamic) to integer - `checkpoint.update_count`: keyword (dynamic) to integer
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Integration:checkpoint
Check Point
needs:triage
Team:Security-Deployment and Devices
Deployment and Devices Security team [elastic/sec-deployment-and-devices]
Integration Name
Check Point [checkpoint]
Dataset Name
checkpoint.firewall
Integration Version
1.34.2
Agent Version
N/A
Agent Output Type
elasticsearch
Elasticsearch Version
8.15.4
OS Version and Architecture
Debian
Software/API Version
No response
Error Message
No error per say, bet enhancements to be made on additional fields.
Event Original
<134>1 2024-11-27T11:36:45Z MY-CONSOLE CheckPoint 9482 - [action:"Accept"; flags:"16384"; ifdir:"inbound"; ifname:"eth4"; logid:"352"; loguid:"{0x00112233,0x44556677,0x889900aa,0xbbccddee}"; origin:"1.2.3.4"; originsicname:"CN=MY-FW,O=MY-CLUSTER"; sequencenum:"5"; time:"1732707405"; version:"5"; __policy_id_tag:"product=VPN-1 & FireWall-1[db_tag={9EEC9326-58F9-48C5-8A7A-564C4BB33B34};mgmt=MY-CLUSTER;date=1732294260;policy_name=POLICY]"; aggregated_log_count:"5"; connection_count:"5"; creation_time:"1732696605"; dst:"4.3.2.1"; duration:"10800"; hll_key:"3099159939289077744"; https_inspection_action:"Bypass"; inzone:"Internal"; last_hit_time:"1732704732"; layer_name:"POLICY Layer"; layer_uuid:"346ca329-396a-44b6-b7d6-a65b1f363fe6"; match_id:"37"; parent_rule:"0"; rule_action:"Accept"; rule_name:"Rule name"; rule_uid:"168b0622-335f-4ad3-8c56-0d9d2226399c"; outzone:"External"; product:"VPN-1 & FireWall-1"; proto:"6"; service:"443"; service_id:"https"; src:"192.168.0.10"; update_count:"6"]
What did you do?
The Check Point integration is installed as-is, no agent were configured as I am using direct API POSTs to ingest data into my Elasticsearch cluster. The raw event isn't touched in anyway.
We configured our Check Point firewalls to send session logs instead of connection logs to optimize bandwidth and storage usage for our logs. Consequently, some fields were added to the raw logs and their processing by Elasticsearch need enhancements.
What did you see?
The following
checkpoint
specific fields were created:As for the mappings:
checkpoint.creation_time
is mapped as a keywordcheckpoint.last_hit_time
is mapped as a numbercheckpoint.duration
is mapped as a keywordcheckpoint.aggregated_log_count
is mapped as a keywordcheckpoint.update_count
is mapped as a keywordcheckpoint.connection_count
is mapped as a keywordWhat did you expect to see?
checkpoint.creation_time
should be parsed as a date and stored intoevent.start
checkpoint.last_hit_time
should be parsed as a date and stored intoevent.end
checkpoint.duration
should be converted from seconds to nanoseconds (as per theevent.duration
documentation) and stored intoevent.duration
checkpoint.aggregated_log_count
is mapped as a numbercheckpoint.update_count
is mapped as a numbercheckpoint.connection_count
is mapped as a numberAnything else?
This is not an error in itself leading to an event being identified as a pipeline_error document, but more an enhancement in the Check Point log normalization process to map more closely to the ECS.
The text was updated successfully, but these errors were encountered: