Skip to content

Commit

Permalink
[Filebeat] Add network direction processor to Zeek and Suricata modul…
Browse files Browse the repository at this point in the history
…es (#24620) (#26568)

* Add network direction processor to zeek and suricata module

* Add Snort & Sonicwall

* update changelog

* use ES network_direction processor

* Revert "use ES network_direction processor"

This reverts commit 1c5722d9f1f6cd5370ef3f3d7a882e49731a4e3d.

* update docs with new variable

* Removed Snort and Sonicwall

* update docs

* missed one

Co-authored-by: Marius Iversen <marius.iversen@elastic.co>
(cherry picked from commit 9e670f7)

Co-authored-by: Alex Resnick <adr8292@gmail.com>
  • Loading branch information
mergify[bot] and legoguy1000 authored Jun 29, 2021
1 parent 4c8c1d0 commit c4d190f
Show file tree
Hide file tree
Showing 110 changed files with 1,930 additions and 2 deletions.
1 change: 1 addition & 0 deletions CHANGELOG.next.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -577,6 +577,7 @@ https://github.com/elastic/beats/compare/v7.0.0-alpha2...master[Check the HEAD d
- Add new grok pattern for iptables module for Ubiquiti UDM {issue}25615[25615] {pull}25616[25616]
- Add multiline support to aws-s3 input. {issue}25249[25249] {pull}25710[25710]
- Add monitoring metrics to the `aws-s3` input. {pull}25711[25711]
- Added `network.direction` fields to Zeek and Suricata modules using the `add_network_direction` processor {pull}24620[24620]
- Add Content-Type override to aws-s3 input. {issue}25697[25697] {pull}25772[25772]
- In Cisco Umbrella fileset add users from cisco.umbrella.identities to related.user. {pull}25776[25776]
- Add fingerprint processor to generate fixed ids for `google_workspace` events. {pull}25841[25841]
Expand Down
9 changes: 9 additions & 0 deletions filebeat/docs/modules/suricata.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,15 @@ A list of tags to include in events. Including `forwarded` indicates that the
events did not originate on this host and causes `host.name` to not be added to
events. Defaults to `[suricata]`.

`var.internal_networks`::

A list of CIDR ranges describing the IP addresses that
you consider internal. This is used in determining the value of
`network.direction`. The values
can be either a CIDR value or one of the named ranges supported by the
<<condition-network, `network`>> condition. The default value is `[private]`
which classifies RFC 1918 (IPv4) and RFC 4193 (IPv6) addresses as internal.

[float]
=== Example dashboard

Expand Down
Loading

0 comments on commit c4d190f

Please sign in to comment.