-
Notifications
You must be signed in to change notification settings - Fork 110
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Using sc4s alternate destination config to forward syslog to a thirdparty SIEM do not retain the source IP after being being received by a SIEM #2488
Comments
Hi @rjha-splunk any update on this? Thanks |
Hi @aalisher-tmx unfortunately syslog-ng under the hood retains the last relays ip as IP of the source, in this case it is SC4S https://syslog-ng.github.io/admin-guide/110_Template_and_rewrite/000_Customize_message_format/004_Macros_of_syslog-ng#sourceip I can still send this information using templates and reset the soft MACRO host with source ip here Example env_config: Example conf file:
|
No, it didn't work @rjha-splunk As per your config, host is being changed to IP in the sample message content shown below (see 10.152.208.98), but we don't want that Sample Packet Header: Sample Message: |
We need to look for a solution and possible enhancement, we will keep you posted |
I investigated and checked, right now i have following for the case:
|
Closing this issue as per above comment, SC4S today cant spoof tcp packets intial origin source. |
was this tested? above config doesn't update the header source ip. |
Yes it is tested with ASA sample, it will just add sourceip to the message , i will share the screenshot tomorrow |
Oh, adding sourceip to the message not to the header. This doesn't resolve our issue. |
documentation also needs to be updated appropriately as this is not working as expected - https://splunk.github.io/splunk-connect-for-syslog/main/destinations/#example-5-cisco-asa-send-to-a-third-party-siem |
As mentioned in my previous comment, right now syslog-ng under the hood doesn't provide this capability, we are working with them to get a work around. For now alternate destinations can be explored using edge processor( splunk) SC4S can be used to send data to third party but it will be written as source because Syslog does not include this information. We do embed it into otlp as shown but the source is lost as soon as it hops |
Thanks @rjha-splunk |
Just to confirm, splunk edge processor can be used to ingest UF/hec/sc4s based logs to splunkcloud or splunk enterprise indexes or AWS S3, but cannot ingest to any alternate destination (for e.g SIEM). Its NOT supported https://docs.splunk.com/Documentation/SplunkCloud/9.2.2403/EdgeProcessor/ManageDestination |
Was the issue replicated by support?
Yes. Case #3475996
What is the sc4s version ?
3.16.0
Which operating system (including its version) are you using for hosting SC4S?
Rhel 8
Which runtime (Docker, Podman, Docker Swarm, BYOE, MicroK8s) are you using for SC4S?
podman
Is there a pcap available? If so, would you prefer to attach it to this issue or send it to Splunk support?
Yes, will send seperately once the issue is assigned
Is the issue related to the environment of the customer or Software related issue?
Software related
Is it related to Data loss, please explain ?
Protocol? Hardware specs?
Last chance index/Fallback index?
Is the issue related to local customization?
Do we have all the default indexes created?
Describe the bug
A clear and concise description of what the bug is.
All our syslog devices are ingesting syslog to Splunk Cloud via sc4s app using HEC. No issues. All good. Also, using alternate destinations config (https://splunk.github.io/splunk-connect-for-syslog/main/destinations/#example-5-cisco-asa-send-to-a-third-party-siem), we want to forward to the third-party SIEM (QRADAR) appliance. I followed the documentation and logs are showing in qradar, but with the following issue:
env_file:
SC4S_DEST_SYSLOG_QRADARSIEM_HOST=x.x.x.x
SC4S_DEST_SYSLOG_QRADARSIEM_PORT=514
SC4S_DEST_SYSLOG_QRADARSIEM_MODE=SELECT
set to #yes for ietf frames
SC4S_DEST_SYSLOG_QRADARSIEM_IETF=yes
To Reproduce
Steps to reproduce the behavior:
The text was updated successfully, but these errors were encountered: