Change log for SONIC_FIREWALL
Date | Changes |
---|---|
2024-09-05 | Enhancement:
- If "fw_action" is equal to "NA", then changed the mapping of "security_result.action" from "UNKNOWN_ACTION" to "BLOCK". |
2024-06-06 | Enhancement:
- Mapped the "C" field to "additional.fields". - Mapped the "gcat" field to "additional.fields". - Mapped "note" to "additional.fields". - Mapped "n" to "additional.fields". - Mapped "vpnpolicyDst" to "additional.fields". - Mapped "FileId" to "additional.fields". - Mapped "dur" to "additional.fields". - Mapped "m" to "additional.fields". |
2024-06-04 | Enhancement:
- Removed alignment of "principal.asset.ip" and "target.asset.ip". - If the IP value is in range-format, then "src" and "dst" are mapped to "additional.fields". - Mapped "gw" to "intermediary.ip". |
2024-05-29 | Enhancement:
- Mapped "firewall_hostname" to "intermediary.hostname". - Modified the Grok pattern to parse the field "sn". - Mapped "sn" to "intermediary.asset_id". |
2024-05-29 | Enhancement:
- Mapped "firewall_hostname" to "intermediary.hostname". - Modified the Grok pattern to parse the field "sn". - Mapped "sn" to "intermediary.asset_id". |
2024-04-18 | Enhancement:
- Changed the mapping of "fw" from "observer.ip" to "principal.ip". - Changed the mapping of "id" from "resource.id" to "principal.hostname". |
2023-05-26 | Enhancement -
- Mapped "fw_action" to "security_result.action_details". - Mapped "spkt" to "network.sent_packets". |
2023-03-08 | Enhancement -
- Added a condition check to "User" field to parse the appropriate field (i.e. principal.user.email_addresses or principal.user.user_display_name or principal.user.userid). - Removed "pri" from "security_result.detection_fields" and mapped it to "security_result.severity". - Mapped "usr" to "principal.user.email_addresses". - Mapped "vpnpolicy" field to "security_result.detection_fields". - Mapped "cdur" field to "security_result.detection_fields". - Mapped "sess" field to "security_result.detection_fields". |
2023-03-06 | Enhancement -
- Mapped "fw" to "observer.ip" instead of target.ip. |
2023-02-22 | Enhancement -
- Events are parsing traffic as "NETWORK_HTTP" are mapped to "NETWORK_CONNECTION" instead, when the protocol is not HTTP. - Mapped "msg" to "security_result.summary" where "fw_action" is equal to "drop" Mapped "BLOCK" to "security_result.action". - Mapped "fw" to "observer.ip" and "src" to "principal.ip". |
2022-06-24 | Enhancement -
- Mapped "msg" to "security_result.summary". - Where "fw_action" is equal to "drop" Mapped "BLOCK" to "security_result.action". - Mapped "sent" to "network.sent_bytes". - Mapped "rcvd" to "network.received_bytes". - Mapped "usr" to "principal.user.userid". - Mapped "pri" to "additional.fields". - Mapped "sn" to "additional.fields". - Mapped "id" to "target.resource.id". |
2022-05-26 | Bug fix-
Mapped duration to network.session_duration.seconds. Mapped user to principal.user.userid. Mapped agent to network.http.user_agent. Mapped avgThroughput to target.resource.attribute.labels. Mapped bytesIn to network.sent_bytes. Mapped bytesOut to network.received_bytes. Mapped bytesTotal to target.resource.attribute.labels. Mapped maxThroughput to target.resource.attribute.labels. Mapped dst to target.ip. Mapped fw to principal.ip. Mapped pri to event.idm.read_only_udm.additional.fields. |
2022-05-19 | Enhancement - Converted parser from SDM to UDM (changed mapping from webproxy fields to event fields).
|