Change log for SURICATA_IDS

Date Changes
2024-04-08 Enhancement:
- Mapped "dns.query.id" to "network.dns.id".
- Mapped "dns.query.rrtype" to "network.dns.questions.type".
- Mapped "dns.query.rrname" to "network.dns.questions.name".
- Mapped "dns.query.opcode" to "network.dns.opcode".
2024-03-21 Enhancement -
- Added support for logs with "event_type" as "stats" and "proto" as "IPv6-ICMP".
2023-11-23 Enhancement:
- Added a Grok pattern to parse newly ingested unparsed logs.
- Added a null check before mapping "dns.rrname" to "dns_question.name".
- Set "metadata.event_type" to "NETWORK_CONNECTION" for logs where "dns_rrname" is not present.
2023-08-24 Bug-Fix - Removed "TODO" comments from the parser.
2022-07-07 Enhancement -
When "event_type" is equal to "snmp".
- Mapped "in_iface" to "security_result.rule_labels".
- Mapped "community_id" to "security_result.rule_labels".
- Mapped "snmp.pdu_type" to "additional.fields".
- Mapped "snmp.community" to "additional.fields".
- Added for loop for "snmp.vars" and mapped it to "additional.fields".
When "event_type" is equal to "rdp".
- Mapped "sr_action" to "security_result.action".
- Mapped "in_iface" to "security_result.rule_labels".
- Mapped "community_id" to "security_result.rule_labels".
2022-06-13 Bug - Following changes are made to this parser-
1) Fixed unparsed logs of event_type "alert".
2) Mapped missing alert event_type fields.
3) Modified the parser to eliminate old format related to sdm.proto and changed the parser entirely as per udm.proto
2022-05-23 Enhancement - Added mapping for following alert fields:
Mapped 'in_iface' to 'target.resource.attribute.labels'.
Mapped 'vlan' to 'target.resource.attribute.labels'.
Mapped 'src_ip' to 'principal.ip'.
Mapped 'src_port' to 'principal.port'.
Mapped 'dest_ip' to 'target.ip'.
Mapped 'dest_port' to 'target.port'.
Mapped 'proto' to 'network.ip_protocol'.
Mapped 'alert.action' to 'security_result.action'.
Mapped 'alert.gid' to 'target.resource.attribute.labels'.
Mapped 'alert.signature_id' to 'target.resource.attribute.labels'.
Mapped 'alert.rev' to 'target.resource.attribute.labels'.
Mapped 'alert.signature' to 'target.resource.attribute.labels'.
Mapped 'alert.category' to 'security_result.threat_name'.
Mapped 'alert.severity' to 'security_result.severity'.
Mapped 'alert.metadata.affected_product' to 'target.resource.attribute.labels'.
Mapped 'alert.metadata.attack_target' to 'target.resource.attribute.labels'.
Mapped 'alert.metadata.deployment' to 'target.resource.attribute.labels'.
Mapped 'alert.metadata.former_category' to 'target.resource.attribute.labels'.
Mapped 'alert.metadata.signature_severity' to 'target.resource.attribute.labels'.
Mapped 'flow.pkts_toserver' to 'target.resource.attribute.labels'.
Mapped 'flow.pkts_toclient' to 'target.resource.attribute.labels'.
Mapped 'flow.bytes_toserver' to 'network.sent_bytes'.
Mapped 'flow.bytes_toclient' to 'network.received_bytes'.
Mapped 'payload' to 'additional.fields'.
Mapped 'alert.metadata.updated_at' with the format "yyyy-MM-dd" to 'date'(metadata.event_timestamp).