Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Traffic and Threat Log doens't correctly translate the Source IP / X-Forwarded-For Value #253

Open
paulkilla opened this issue Apr 19, 2022 · 3 comments
Labels
add-on Related to the Splunk Add-On enhancement

Comments

@paulkilla
Copy link

paulkilla commented Apr 19, 2022

Describe the bug

When sending Traffic and Threat Logs (potentially others) with the X-Forwarded-For Header set in the log traffic the Palo Splunk Add-On isn't pulling out that data into client_ip or a new value?

We can see the XFF header value in the _raw log format, so the data is there and we can do our own transforming to pull it out if required, but a set solution as part of the Add-On would be beneficial.

Expected behavior

The XFF header is pulled out as a new value, e.g. xff_ip?

Current behavior

The XFF header isn't pulled out of the _raw log entry, so is not easily searchable or reportable.

Steps to reproduce

  1. Setup a proxy/load balancer and set the XFF header.
  2. Can see XFF header in Monitor Tab on firewalls logs
  3. Can see XFF header value in _raw log entry
  4. XFF value not pulled out as a specified field.

Thanks

@welcome-to-palo-alto-networks

🎉 Thanks for opening your first issue here! Welcome to the community!

@paulkilla
Copy link
Author

As a note, looking at my _raw log and the transforms extract fields my raw logs have an additional 54 fields that aren't mapped in the transforms.conf (Traffic log sourcetype)

@paulkilla
Copy link
Author

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
add-on Related to the Splunk Add-On enhancement
Projects
None yet
Development

No branches or pull requests

2 participants