Back to Beats

Palo Alto Networks module [filebeat-module-panw]

docs/reference/filebeat/filebeat-module-panw.md

9.4.08.2 KB
Original Source

% This file is generated! See filebeat/scripts/mage/docs.go

Palo Alto Networks module [filebeat-module-panw]

:::::{admonition} Prefer to use {{agent}} for this use case? Refer to the Elastic Integrations documentation.

::::{dropdown} Learn more {{agent}} is a single, unified way to add monitoring for logs, metrics, and other types of data to a host. It can also protect hosts from security threats, query data from operating systems, forward data from remote services or hardware, and more. Refer to the documentation for a detailed comparison of {{beats}} and {{agent}}.

::::

:::::

This is a module for Palo Alto Networks PAN-OS firewall monitoring logs received over Syslog or read from a file. It currently supports messages of Traffic and Threat types.

::::{tip} Read the quick start to learn how to configure and run modules. ::::

Compatibility [_compatibility_29]

This module has been tested with logs generated by devices running PAN-OS versions 7.1 to 9.0 but limited compatibility is expected for earlier versions.

The ingest-geoip Elasticsearch plugin is required to run this module.

Configure the module [configuring-panw-module]

You can further refine the behavior of the panw module by specifying variable settings in the modules.d/panw.yml file, or overriding settings at the command line.

You must enable at least one fileset in the module. Filesets are disabled by default.

The module is by default configured to run via syslog on port 9001. However it can also be configured to read logs from a file. See the following example.

yaml
- module: panw
  panos:
    enabled: true
    var.paths: ["/var/log/pan-os.log"]
    var.input: "file"

Variable settings [panw-settings]

Each fileset has separate variable settings for configuring the behavior of the module. If you don’t specify variable settings, the panw module uses the defaults.

For advanced use cases, you can also override input settings. See Override input settings.

::::{tip} When you specify a setting at the command line, remember to prefix the setting with the module name, for example, panw.panos.var.paths instead of panos.var.paths. ::::

panos fileset settings [_panos_fileset_settings]

Example config:

yaml
  panos:
    var.syslog_host: 0.0.0.0
    var.syslog_port: 514

var.paths : An array of glob-based paths that specify where to look for the log files. All patterns supported by Go Glob are also supported here. For example, you can use wildcards to fetch all files from a predefined level of subdirectories: /path/to/log/*/*.log. This fetches all .log files from the subfolders of /path/to/log. It does not fetch log files from the /path/to/log folder itself. If this setting is left empty, Filebeat will choose log paths based on your operating system.

var.syslog_host : The interface to listen to UDP based syslog traffic. Defaults to localhost. Set to 0.0.0.0 to bind to all available interfaces.

var.syslog_port : The UDP port to listen for syslog traffic. Defaults to 9001

::::{note} Ports below 1024 require Filebeat to run as root. ::::

Time zone support [_time_zone_support_12]

This module parses logs that don’t contain time zone information. For these logs, Filebeat reads the local time zone and uses it when parsing to convert the timestamp to UTC. The time zone to be used for parsing is included in the event in the event.timezone field.

To disable this conversion, the event.timezone field can be removed with the drop_fields processor.

If logs are originated from systems or applications with a different time zone to the local one, the event.timezone field can be overwritten with the original time zone using the add_fields processor.

See Processors for information about specifying processors in your config.

ECS field mappings [_ecs_field_mappings]

These are the PAN-OS to ECS field mappings as well as those fields still not in ECS that are added under the panw.panos prefix:

PAN-OS FieldECS FieldNon-standard field
Receive Timeevent.created
Serial Numberobserver.serial_number
Typeevent.category
Subtypeevent.action
Generated Time@timestamp
Source IPclient.ip source.ip
Destination IPserver.ip destination.ip
NAT Source IPpanw.panos.source.nat.ip
NAT Destination IPpanw.panos.destination.nat.ip
Rule Namepanw.panos.ruleset
Source Userclient.user.name source.user.name
Destination Userserver.user.name destination.user.name
Applicationnetwork.application
Source Zonepanw.panos.source.zone
Destination Zonepanw.panos.destination.zone
Ingress Interfacepanw.panos.source.interface
Egress Interfacepanw.panos.destination.interface
Session IDpanw.panos.flow_id
Source Portclient.port source.port
Destination Portdestination.port server.port
NAT Source Portpanw.panos.source.nat.port
NAT Destination Portpanw.panos.destination.nat.port
Flagslabels
Protocolnetwork.transport
Actionevent.outcome
Bytesnetwork.bytes
Bytes Sentclient.bytes source.bytes
Bytes Receivedserver.bytes destination.bytes
Packetsnetwork.packets
Start Timeevent.start
Elapsed Timeevent.duration
Categorypanw.panos.url.category
Sequence Numberpanw.panos.sequence_number
Packets Sentserver.packets destination.packets
Packets Receivedclient.packets source.packets
Device Nameobserver.hostname
PAN-OS FieldECS FieldNon-standard field
Receive Timeevent.created
Serial Numberobserver.serial_number
Typeevent.category
Subtypeevent.action
Generated Time@timestamp
Source IPclient.ip source.ip
Destination IPserver.ip destination.ip
NAT Source IPpanw.panos.source.nat.ip
NAT Destination IPpanw.panos.destination.nat.ip
Rule Namepanw.panos.ruleset
Source Userclient.user.name source.user.name
Destination Userserver.user.name destination.user.name
Applicationnetwork.application
Source Zonepanw.panos.source.zone
Destination Zonepanw.panos.destination.zone
Ingress Interfacepanw.panos.source.interface
Egress Interfacepanw.panos.destination.interface
Session IDpanw.panos.flow_id
Source Portclient.port source.port
Destination Portdestination.port server.port
NAT Source Portpanw.panos.source.nat.port
NAT Destination Portpanw.panos.destination.nat.port
Flagslabels
Protocolnetwork.transport
Actionevent.outcome
Miscellaneousurl.originalpanw.panos.threat.resource
Threat IDpanw.panos.threat.id
Categorypanw.panos.url.category
Severitylog.level
Directionnetwork.direction
Source Locationsource.geo.name
Destination Locationdestination.geo.name
PCAP_idpanw.panos.network.pcap_id
Filedigestpanw.panos.file.hash
User Agentuser_agent.original
File Typefile.type
X-Forwarded-Fornetwork.forwarded_ip
Refererhttp.request.referer
Sendersource.user.email
Subjectpanw.panos.subject
Recipientdestination.user.email
Device Nameobserver.hostname

Example dashboard [_example_dashboard_20]

This module comes with two sample dashboards:

% TO DO: Use :class: screenshot

% TO DO: Use :class: screenshot

Fields [_fields]

For a description of each field in the module, see the exported fields section.