Change log for F5_ASM
Date | Changes |
---|---|
2024-10-10 | Enhancement:
- Mapped "form_data" to "additional.fields". |
2024-09-30 | Enhancement:
- Mapped "link" to "target.url" - When the message contains "DROP" then set "security_result.action" to "BLOCK". - When the message contains "allowed" then set "security_result.action" to "ALLOW". |
2024-08-07 | Enhancement:
- Modified existing Grok pattern to handle CEF logs. - Mapped "suid" to "principal.user.userid". - Mapped "suser" to "principal.user.user_display_name". - Mapped "device_version" to "metadata.product_version". - Mapped "severity" to "security_result.severity". |
2024-07-15 | Enhancement:
- Added support to handle the SYSLOG + KV logs. |
2024-06-17 | Enhancement:
- Added support for a new pattern of CSV logs. |
2024-06-11 | Enhancement:
- Added KV block to handle unparsed KV logs. - Formatted CSV logs using "gsub" to parse CSV logs. |
2024-05-13 | Enhancement:
- Added KV block to parse KV logs. - Added "gsub" to remove unwanted characters. |
2024-04-19 | Enhancement:
- Handled CSV unparsed logs. - Added a Grok pattern to map "resp_code". - Mapped "errdefs_msgno", "support_id_array", "audit_component" to "additional.fields". - Mapped "descrip" to "metadata.description". |
2024-04-08 | Enhancement:
- Added support to parse newly ingested unparsed logs. |
2024-04-05 | Bug-Fix:
- Added condition to parse dropped ASF CEM logs. |
2024-02-27 | Bug-Fix:
- When "cs5" field has a valid IP address, then mapped to "principal.ip". - Aligned "principal.ip" and "principal.asset.ip" mappings. - Aligned "principal.hostname" and "principal.asset.hostname" mappings. - Aligned "target.ip" and "target.asset.ip" mappings. - Aligned "target.hostname" and "target.asset.hostname" mappings. |
2024-01-12 | Enhancement:
- Mapped "severity" to "security_result.severity_details". - Mapped "resp_code" to "http.response_code". - Mapped "virus_name" to "security_result.threat_name". - Mapped "ip_route_domain" to "principal.ip". - Mapped "geo_info", "resp", "req_status", "violate_rate", and "ip_addr_intelli" to "security_result.detection_fields". |
2023-12-15 | Enhancement:
- Handled newly ingested set of logs where "metadata.event_type" is "GENERIC_EVENT" and "network.application_protocol" is "HTTP". - Set "network.ip_protocol" to "UDP" if message contains "UDP". - Removed hardcoding value of "network.application_protocol". - Set "network.application_protocol" to "HTTP" and "HTTPS" if "message" has "HTTP" and "HTTPS, respectively. - Set "network.application_protocol" to "HTTP" if "metadata.event_type" is "NETWORK_HTTP". - Added two Grok patterns to parse "principal_ip" and "src_port" from newly ingested logs. - Mapped "message_body" to "metadata.description". - Mapped "tmm_msg" to "metadata.description" |
2023-12-07 | Enhancement:
- Added a new Grok pattern to parse new KV+XML logs. - Added KV filters to parse unparsed KV logs. - Added XML filters to parse unparsed XML logs. - Mapped "policy_name" to "security_result.about.resource.name". - Mapped "viol_name" to "security_result.detection_fields". - Mapped "response_code" to "network.http.response_code". - Modified Grok pattern to map complete "Referer" field to "network.http.referral_url". - Mapped "parseduseragent" to "network.http.parsed_user_agent. |
2023-11-08 | Enhancement:
- Added a new Grok pattern to parse new KV logs. - Added a KV filter to parse uparsed KV logs. - Mapped "bigip_mgmt_ip", "client_ip_geo_location", "client_port", "client_request_uri", "device_version", "http_method", "route_domain" and "virtual_server_name" to "principal.ip", "principal.location.country_or_region", "principal.port", "principal.url", "metadata.product_version", "network.http.method", "additional.fields", "network.tls.client.server_name", respectively. - Added "legal" to "request_status" condition to map "security_result.action_details" as "ALLOW". - Mapped "profile_name", "action", "previous_action", "bot_signature", "bot_signature_category", "bot_name", "class", "anomaly_categories", "anomalies", "micro_services_name", "micro_services_type", "micro_services_matched_wildcard_url", "micro_services_hostname", "browser_configured_verification_action", "browser_actual_verification_action", "new_request_status", "mobile_is_app", "enforced_by", "application_display_name", "client_type", and "challenge_failure_reason" to "additional.fields". |
2023-10-19 | Enhancement:
- Added a Grok pattern to extract the value of "Referer" field as "referer" from CEF logs. - Mapped "referer" to "network.http.referral_url". |
2023-09-27 | Bug-Fix:
- Set "security_result.action" to "BLOCK" and "security_result.action_details" to "blocked" for logs having "request_status = blocked". - Set "security_result.action" to "ALLOW" and "security_result.action_details" to "passed" for logs having "request_status = passed". - Set "security_result.action" to "QUARANTINE" and "security_result.action_details" to "alerted" for logs having "request_status = alerted". |
2023-08-07 | Enhancement:
- Mapped "management_ip_address" to "metadata.intermediary.ip". - Mapped "request_status" to "security_result.action". - Mapped "query_string" to "additional.fields". - Mapped "sig_ids" to "security_result.rule_id". - Mapped "sig_names" to "security_result.rule_name". - Mapped "username" to "principal.user.userid". - Mapped "policy_name" to "security_result.about.resource.name". - Mapped "sub_violations" to "security_result.about.resource.attribute.labels". - Mapped "violation_rating" to "security_result.about.resource.attribute.labels". - Mapped "websocket_direction" to "network.direction". - Mapped "websocket_message_type" to "security_result.detection_fields". |
2023-07-27 | Bug-Fix:
- Added a new field "target_app" to contain value corresponding to "target.application". - Mapped the field "process" to "target.application" only when value of the field "target_app" is null. - Converted the field "process" to "string" if it's already not a string. |
2023-07-03 | Enhancement:
- Mapped "externalId" to ""additional.fields". - Mapped the event time to ""metadata.event_timestamp". |
2023-05-12 | Enhancement - For CEF format logs, mapped the information about the attack to "security_result.description".
|
2023-04-06 | Enhancement:
- Login event parsed as 'USER_LOGIN' instead of 'STATUS UPDATE'. - Parsed the username value in 'firstname.lastname' and mapped to 'principal.user.userid'. |
2023-02-09 | Enhancement- Parsed the logs containing "type=irule" by adding new grok pattern and mapped the following fields:
- Mapped "type" to "metadata.product_event_type". - Mapped "data.sessionid" to "network.session_id". - Mapped "data.bits" to "network.sent_bytes". - Mapped "data.version" to "network.tls.version". - Mapped "client_ip" to "principal.ip". - Mapped "client_port" to "principal.port". - Mapped "snat_ip" to "principal.nat_ip". - Mapped "snat_port" to "principal.nat_port". - Mapped "server_ip" to "target.ip". - Mapped "server_port" to "target.port". - Mapped "irule" to "security_result.rule_name". - Mapped "irule-version" to "security_result.rule_version". - Mapped "proxy_id" to "security_result.rule_id". - Mapped "virtualserver" to "network.tls.client.server_name". |
2022-11-03 | Enhancement:
- Added a condition for unparsed CEF format logs. - Added a condition to check for sshd and httpd user_login logs. - Added grok patterns to parse httpd and sshd user_login success/failure logs. - Mapped "event_id" to "metadata.product_log_id". - Mapped "application" to "target.application". - Mapped "prin_ip" to "principal.ip". - Mapped "SSH" to "app_protocol" when "tty" is "ssh" or "applicaition" is "sshd". - Mapped "user_id" "principal.user.user_id". - Mapped "USER_LOGIN" to "metadata.event_type" for httpd/sshd user_login logs. - Mapped "auth_level" to "principal.user.attribute.roles". - Mapped "addr" from log to "target.ip" - Mapped "port" from log to "target.port" |
2022-09-21 | Enhancement:
- Migrated customer specific to default parser. |
2022-05-17 | Enhancement: Enhanced the parser to parse the header of the HTTP request.
|
2022-04-27 | Bug - Fix:
- Enhanced the parser to parse logs with the "ASM:" format. |
2022-04-26 | Enhanced the parser to handle unparsed raw logs |