Collect Dell switch logs
This parser extracts Dell switch logs, normalizes timestamps, and uses grok patterns to structure the log message into key-value pairs. It then maps these extracted fields to the Unified Data Model (UDM), handling various log formats and enriching the data with contextual information such as asset details and security severity.
Before you begin
- Ensure that you have a Google Security Operations instance.
- Ensure that you are using Windows 2016 or later, or a Linux host with
systemd
. - If running behind a proxy, ensure firewall ports are open.
- Ensure that you have an active connection and administrative credentials for a Dell switch.
Get Google SecOps ingestion authentication file
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Collection Agents.
- Download the Ingestion Authentication File. Save the file securely on the system where BindPlane will be installed.
Get Google SecOps customer ID
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Profile.
- Copy and save the Customer ID from the Organization Details section.
Install BindPlane Agent
Windows Installation
- Open the Command Prompt or PowerShell as an administrator.
Run the following command:
msiexec /i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" /quiet
Linux Installation
- Open a terminal with root or sudo privileges.
Run the following command:
sudo sh -c "$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)" install_unix.sh
Additional Installation Resources
- For additional installation options, consult this installation guide.
Configure BindPlane Agent to ingest Syslog and send to Google SecOps
Access the configuration file:
- Locate the
config.yaml
file. Typically, it's in the/etc/bindplane-agent/
directory on Linux or in the installation directory on Windows. - Open the file using a text editor (for example,
nano
,vi
, or Notepad).
- Locate the
Edit the
config.yaml
file as follows:receivers: tcplog: # Replace the below port <54525> and IP <0.0.0.0> with your specific values listen_address: "0.0.0.0:54525" exporters: chronicle/chronicle_w_labels: compression: gzip # Adjust the creds location below according the placement of the credentials file you downloaded creds: '{ json file for creds }' # Replace <customer_id> below with your actual ID that you copied customer_id: <customer_id> endpoint: malachiteingestion-pa.googleapis.com # You can apply ingestion labels below as preferred ingestion_labels: log_type: SYSLOG namespace: sell_switch raw_log_field: body service: pipelines: logs/source0__chronicle_w_labels-0: receivers: - tcplog exporters: - chronicle/chronicle_w_labels
Replace the port and IP address as required in your infrastructure.
Replace
<customer_id>
with the actual customer ID.Update
/path/to/ingestion-authentication-file.json
to the path where the authentication file was saved in the Get Google SecOps ingestion authentication file section.
Restart BindPlane Agent to apply the changes
In Linux, to restart the BindPlane Agent, run the following command:
sudo systemctl restart bindplane-agent
In Windows, to restart the BindPlane Agent, you can either use the Services console or enter the following command:
net stop BindPlaneAgent && net start BindPlaneAgent
Configure Syslog export from a Dell switch
- Connect to the Dell switch using SSH or the console port.
- Sign in with administrative credentials.
Use the following command to specify the IP address or hostname of the syslog server (replace
<syslog_server_ip>
,<udp|tcp>
and<syslog-port-number>
with the actual details):logging host <syslog-server-ip> transport <udp|tcp> port <syslog-port-number>
Optional: Define the minimum severity level for messages to be sent to the syslog server. For example, to log informational messages and above:
logging level informational
Save the running configuration to the startup configuration to ensure changes persist across reboots:
copy running-config startup-config
Save the configuration:
write memory
UDM Mapping Table
Log Field | UDM Mapping | Logic |
---|---|---|
acct |
principal.user.userid |
Used as the userid if the user field is not present. |
addr |
principal.asset.ip , principal.ip |
Parsed as an IP address and used for the principal's IP and asset IP if it is a valid IP and different from the hostname. |
application |
principal.application |
Directly mapped. |
asset |
principal.asset.attribute.labels.value |
Directly mapped to the asset label value, with the key hardcoded as "Asset Name". If the asset field is empty and the message contains "Dell", the asset is set to "Dell". |
auid |
principal.resource.attribute.labels.value |
Directly mapped to a label with key auid within principal.resource.attribute.labels . |
datetime |
metadata.event_timestamp |
Parsed from various formats in the message field and converted to a timestamp. |
dest_ip |
target.asset.ip , target.ip |
Mapped to target IP and target asset IP. |
enterpriseId |
principal.resource.attribute.labels.value |
Mapped to a label with key enterpriseId within principal.resource.attribute.labels . |
exe |
sec_result.detection_fields.value |
Mapped to a detection field with key exe . |
File |
target.file.full_path |
Directly mapped. |
grantors |
principal.resource.attribute.labels.value |
Mapped to a label with key grantors within principal.resource.attribute.labels . |
host |
principal.hostname , principal.asset.hostname , metadata.event_type |
Used as principal hostname and asset hostname. If host is present, metadata.event_type is set to STATUS_UPDATE . If hostname is present but host is not, hostname is used as host. |
hostname |
principal.asset.ip , principal.ip , host |
If it is a valid IP, used for principal IP and asset IP. If host is empty, it is used as host . |
ID |
principal.resource.attribute.labels.value |
Mapped to a label with key ID within principal.resource.attribute.labels . |
ip |
principal.asset.ip , principal.ip |
Mapped to principal IP and asset IP. |
is_synced |
sec_result.detection_fields.value |
Mapped to a detection field with key is_synced . |
local |
target.asset.ip , target.ip , target.port |
Parsed to extract local IP and port, mapped to target IP, target asset IP, and target port. |
local_ip |
target.asset.ip , target.ip |
Extracted from the local field and mapped to target IP and target asset IP. |
local_port |
target.port |
Extracted from the local field and mapped to target port. |
mac |
principal.mac |
If it is a valid MAC address, mapped to principal MAC address. |
msg |
metadata.description |
Used as the event description if present. Also parsed for additional fields. |
msg1 |
metadata.description |
Used as event description if msg2 is not present. |
msg2 |
sec_result.description , metadata.event_type , extensions.auth.type |
Used as security result description. If it contains "opened for user", event type is set to USER_LOGIN and auth type to MACHINE . If it contains "closed for user", event type is set to USER_LOGOUT and auth type to MACHINE . |
op |
metadata.product_event_type |
Used as product event type if present. |
pid |
principal.process.pid |
Directly mapped. |
port |
principal.port |
Directly mapped. |
prod_event_type |
metadata.product_event_type |
Used as product event type if present. |
res |
sec_result.summary |
Directly mapped. |
sec_description |
sec_result.description , target.url , target.ip , target.asset.ip , sec_result.action_details |
Parsed for target URL, IP, action details, and used as security result description. |
Server_ID |
target.resource.product_object_id |
Directly mapped. |
server |
principal.asset.ip , principal.ip , principal.port |
Parsed to extract server IP and port, mapped to principal IP, principal asset IP, and principal port. |
server_ip |
principal.asset.ip , principal.ip |
Extracted from the server field and mapped to principal IP and principal asset IP. |
server_port |
principal.port |
Extracted from the server field and mapped to principal port. |
ses |
network.session_id |
Directly mapped. |
severity |
sec_result.severity , metadata.product_event_type |
Used to determine security result severity and product event type based on specific values. |
software |
principal.asset.software |
Directly mapped. |
softwareName |
software.name |
Directly mapped. |
Status |
sec_result.summary |
Used as the security result summary if res is not present. |
subj |
principal.resource.attribute.labels.value |
Mapped to a label with key subj within principal.resource.attribute.labels . |
swVersion |
software.version |
Directly mapped. |
target_host |
target.hostname , target.asset.hostname |
Directly mapped to target hostname and target asset hostname. |
target_ip |
target.asset.ip , target.ip |
Directly mapped to target IP and target asset IP. |
target_url |
target.url |
Directly mapped. |
target_user_id |
target.user.userid |
Directly mapped. |
terminal |
principal.resource.attribute.labels.value |
Mapped to a label with key terminal within principal.resource.attribute.labels . |
tzknown |
sec_result.detection_fields.value |
Mapped to a detection field with key tzknown . |
uid |
principal.resource.attribute.labels.value |
Mapped to a label with key uid within principal.resource.attribute.labels . |
user |
principal.user.userid , metadata.event_type |
Used as principal user ID. If user is present, metadata.event_type is set to USER_UNCATEGORIZED . |
username |
target.user.userid |
Directly mapped to target user ID. |
N/A | metadata.vendor_name |
Hardcoded to "Dell". |
N/A | metadata.product_name |
Hardcoded to "Dell Switch". |
N/A | extensions.auth.type |
Set to MACHINE for specific login/logout events. |
N/A | metadata.event_type |
Determined by a complex logic based on various fields and conditions, defaults to GENERIC_EVENT if not set otherwise. Can be USER_LOGIN , USER_LOGOUT , USER_UNCATEGORIZED , NETWORK_CONNECTION , NETWORK_UNCATEGORIZED , STATUS_UPDATE , or GENERIC_EVENT . |
Changes
2024-04-25
- Added Grok patterns to parse a new log type.
- Mapped
op
tometadata.product_event_type
. - Mapped
mac
toprincipal.mac
. - Mapped
addr
toprincipal.ip
. - Mapped
hostname
toprincipal.ip
. - Mapped
server_ip
toprincipal.ip
. - Mapped
server_port
toprincipal.port
. - Mapped
acct
toprincipal.user.userid
. - Mapped
target_ip
totarget.ip
. - Mapped
local_ip
totarget.ip
. - Mapped
local_port
totarget.port
. - Mapped
File
totarget.file.full_path
. - Mapped
target_host
totarget.hostname
. - Mapped
target_user_id
totarget.user.userid
. - Mapped
Server_ID
totarget.resource.product_object_id
. - Mapped
tzknown
,is_synced
andexe
tosecurity_result.detection_fields
. - Mapped
res
tosecurity_result.summary
. - If value of the field
res
is "", then mappedstatus
tosecurity_result.summary
. - Mapped
uid
,enterpriseId
,auid
,terminal
,subj
,grantors
, andID
toprincipal.resource.attribute.labels
.
2024-04-04
- Added Grok patterns to parse new log type.
- Mapped
prod_event_type
tometadata.product_event_type
. - Mapped
ip
toprincipal.ip
. - Mapped
dest_ip
totarget.ip
. - Mapped
target_url
totarget.url
. - Mapped
sec_description
tosecurity_result.description
. - Mapped
action_details
tosecurity_result.action_details
.
2024-01-04
- Added Grok patterns for newly ingested logs.
- Added date block when
datetime
is inSYSLOGTIMESTAMP
format. - Mapped
softwareName
toprincipal.asset.software.name
. - Mapped
swVersion
toprincipal.asset.software.version
. - Mapped
port
toprincipal_port
. - Mapped
user
toprincipal.user.userid
and setmetadata.event_type
toUSER_UNCATEGORIZED
whenuser
is present. - Mapped
application
toprincipal.application
. - Mapped
ip
toprincipal.ip
. - Set
sec_result.severity
toINFORMATIONAL
whenseverity
isIFMGR-5-OSTATE_DN
. - Mapped
msg
tometadata.description
.
2023-11-02
- Newly created parser.