I am using Palo Alto VM version 11.0.1 and forwarding syslogs to Elasticsearch through Filebeat using the panw module. While I can see the logs in Kibana, they are not being parsed properly. All the traffic logs are appearing in the event.original field, and no other fields are being populated. Here's an example log from the event.original field:
Hi,
Elasticsearch & Kibana version 8.16.0, Filebeat version 8.16.1 . I have run filebeat setup -e command. I am getting Fortinet & Sophos parsed logs using the module but not for Paloalto.
I did not use Logstash.
Hi,
I have Fortinet, Sophos, Paloalto VM. I am forwarding log to specific port. I have three different fiIebeat server for each firewalls log. I am getting Fortinet & Sophos parsed logs using module but not for Paloalto.
The example message you shared are not exactliy Palo Alto logs, they are logs for the VM that virtualizes your Firewall.
The logs that the module will parse are the Traffic logs, which are in a CSV format, what you shared is a syslog message from the VM, which will not be parsed by this module.
Are you getting any traffic or threat logs? If not, then your configuration on Palo Alto side is not correctly yet.
I changed the listening port from 514 to 9001, but the output remains the same. It appears that when Palo Alto forwards logs to the Filebeat server, the original log is being stored as a single field named event.original.
As a result, the panw module in Elasticsearch is parsing the entire log message into one field instead of breaking it down into multiple fields like IP, Port, Hostname, Application, etc. In Kibana, I see the complete log message in a single column instead of a structured format.
Any advice on resolving this and ensuring proper parsing would be appreciated.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.