Situation:
After installing Cisco FTD Integration with Fleet Manager, it seems that the Dataset is not created.
Looking in Fleet -> Data streams, searching for cisco* and nothing is shown.
Any thoughts in how to fix this issue?
Background:
The Elastic Agent gets installed on the Ingestion server. Purpose of this ingestion server is to receive logs from a CISCO FTD firewall device via UDP protocol Port say 9003 or 514 and then send it to Elasticsearch.
Done so far:
Attempted the Integration on two different Windows server without success.
Assessment:
The Ingestion server is a Windows server and its Firewall settings have the ports open for inbound/outbound UDP port 514 (also tried 9003).
The Elastic Agent installation gets installed on the ingestion server during the Integration and enrolling to Fleet Manager with an Enrollment Token without errors.
The Fleet manager got enrolled to Elasticsearch Cluster with CA certificates (We have a valid CA); this got completed without any errors.
Fleet shows a healthy Integration with Agent policy in good standing nonetheless.
The Fleet Manager server is managed with Kibana on same version level as Elasticsearch.
Therefore can not get to the point to try Discovering data since No Dataset is created for such Data streams (Cisco FTD). In addition, checking on Index Management, No Data Stream Nor Indices for Cisco* (enabled hidden) are shown.
Even so other integrations have been installed on this Fleet Manager Server such as Crowdstrike, AbuseCH and WindowsOS and are working well; Datasets are visible in these cases.
Elasticsearch environment here:
ELK version: 8.13.2
The account used in Kibana is a super user with all rights to the cluster.
Next Steps:
Thank you very much for your inputs in trying to fix this issue.
So there is a sequence of 8 files (1 to 8) for that, listing here the more relevant for this particular integration. I hope that is Ok. If at all needed the rest of them let me know. Thanks.
I did a Wireshark analysis from the target server. No UDP traffic is observed coming from the FTD device. So, I don’t know if is just such device not sending udp traffic at all or what else.
If you do a wireshark analysis on your target host, do you see the udp traffic coming from the Cisco FTD device?
I used tcpdump on port that supposed to be receiving udp packets from FTD. Traffic was incoming non stop. But the agent is still not creating data on elastic.
Thank you
In my case, using Kibana, Fleet menu option, I installed Fleet manager on a separate server and got it enrolled to elasticsearch using our CA certificates. Agent policies were created in such process; default settings. The Settings Tab here show Elasticsearch connections settings and trusted fingerprints stuff.
Then as part of that process, installed the Elastic Agent on another sever and got it enrolled to the Fleet manager with its enrollment token.
Then, In Kibana, Created integrations such as Crowdstrike which are ingesting logs to elasticsearch.
In your case, Are other integrations sending logs to Elasticsearch?
Check firewall ports on the Fleet manager to have ports open inbound/outbound #8220 (windows) or the port number in your case. Not sure if you are using Windows or Linux.
In the Elasticagent server open ports 514 or your port number inbound outbound Cisco FTD.
I have around 20 agents running collecting logs and sending them to the Fleet server. The only issue is with FTD logs at the moment. The same agent has more than 3 integrations running, and all of them are providing logs at elk. Firewall and ports are configured (as mentioned tcpdump successfully captured UDP traffic incoming from FTD at agent). I dont see the integration to be working at all.
I would recommend that you open a different topic and share how your integration is configured, if you are using standalone or fleet managed, and some logs you may have.
Your issue may be completely different from this one.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.