Skip to main content

I have installed the BindPlane agent on a Windows server to ingest Windows logs and listen on port 514 for firewall logs, then ingest them into Google SecOps SIEM.

The Windows log ingestion is working correctly, but the firewall log ingestion is not.

Can someone check my configuration file?

 

receivers:
windowseventlog/source0__security:
attributes:
log_type: windows_event.security
channel: security
max_reads: 100
poll_interval: 1s
raw: true
start_at: end
udplog/source0_firewall:
add_attributes: true
async:
max_queue_length: 100
processors: 3
readers: 1
listen_address: 0.0.0.0:514
operators:
- field: attributes.log_type
type: add
value: udp


exporters:
chronicle/chronicle_w0_labels:
compression: gzip
creds: ''
customer_id: xyz
endpoint: asia-south1-malachiteingestion-pa.googleapis.com
ingestion_labels:
env: dev
log_type: FORTINET_FIREWALL
namespace: TEST_FORTINET_FIREWALL
raw_log_field: body


chronicle/chronicle_w1_labels:
compression: gzip
creds: ''
customer_id: xyz
endpoint: asia-south1-malachiteingestion-pa.googleapis.com
ingestion_labels:
env: dev
log_type: WINEVTLOG
namespace: TEST_WINDOWS
raw_log_field: body

service:
pipelines:
logs/source0__chronicle_w_labels-0:
receivers:
- windowseventlog/source0__security
exporters:
- chronicle/chronicle_w1_labels
logs/source0_firewall__chronicle_w_labels-0:
receivers:
- udplog/source0_firewall
exporters:
- chronicle/chronicle_w0_labels

Also note, I have checked the listening port using netstat -ano, which shows that port 514 is being listened to by a service related to ObserverIQ.

Take a look at this previous post to see if it is a similar issue: BindPlane agent for Windows event logs - Invalid Argument error


Take a look at this previous post to see if it is a similar issue: BindPlane agent for Windows event logs - Invalid Argument error



@kentphelps wrote:

Take a look at this previous post to see if it is a similar issue: BindPlane agent for Windows event logs - Invalid Argument error


No, These are different issues.


Looks like you're going to maybe need to do a custom source? or find the source associated with the FW. 

https://bindplane.com/docs/resources/sources/windows-events

I did a get-winevent -listlog *fire* and found 3 firewall logs, one with logs on my system. 
Microsoft-windows-windows firewall with advanced security/firewall

This is traversed in windows event viewer as:
Applications/Microsoft/Windows/Windows Firewall....

You'll have to translate that into the source. 


Looks like you're going to maybe need to do a custom source? or find the source associated with the FW. 

https://bindplane.com/docs/resources/sources/windows-events

I did a get-winevent -listlog *fire* and found 3 firewall logs, one with logs on my system. 
Microsoft-windows-windows firewall with advanced security/firewall

This is traversed in windows event viewer as:
Applications/Microsoft/Windows/Windows Firewall....

You'll have to translate that into the source. 


This may help: 

receivers:
tcplog:
listen_address: "0.0.0.0:54525"
windowseventlog/source0__application:
attributes:
log_type: windows_event.application
channel: application
max_reads: 100
poll_interval: 1s
raw: true
start_at: end

 


Hi @Mustache 
The receiver should be for type udp, for the firewall.


Reply