Skip to content
This repository has been archived by the owner on Dec 14, 2024. It is now read-only.

Traffic and Threat Log doens't correctly translate the Source IP / X-Forwarded-For Value #253

Open
paulkilla opened this issue Apr 19, 2022 · 3 comments
Labels
add-on Related to the Splunk Add-On enhancement

Comments

@paulkilla
Copy link

paulkilla commented Apr 19, 2022

Describe the bug

When sending Traffic and Threat Logs (potentially others) with the X-Forwarded-For Header set in the log traffic the Palo Splunk Add-On isn't pulling out that data into client_ip or a new value?

We can see the XFF header value in the _raw log format, so the data is there and we can do our own transforming to pull it out if required, but a set solution as part of the Add-On would be beneficial.

Expected behavior

The XFF header is pulled out as a new value, e.g. xff_ip?

Current behavior

The XFF header isn't pulled out of the _raw log entry, so is not easily searchable or reportable.

Steps to reproduce

  1. Setup a proxy/load balancer and set the XFF header.
  2. Can see XFF header in Monitor Tab on firewalls logs
  3. Can see XFF header value in _raw log entry
  4. XFF value not pulled out as a specified field.

Thanks

@welcome-to-palo-alto-networks

🎉 Thanks for opening your first issue here! Welcome to the community!

@paulkilla
Copy link
Author

As a note, looking at my _raw log and the transforms extract fields my raw logs have an additional 54 fields that aren't mapped in the transforms.conf (Traffic log sourcetype)

@paulkilla
Copy link
Author

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
add-on Related to the Splunk Add-On enhancement
Projects
None yet
Development

No branches or pull requests

2 participants