paloalto日志转发到elk1
在内网想构建个日志分析系统,便于分析蜜罐、paloalto、VPN、赛门铁克的告警日志。针对paloalto的日志采集是通过以下架构: paloalto -> syslog -> logstash -> elastic search -> kibana
配置 paloalto
进入 paloalto 在 Device 中配置 syslog,如图:
之后在 Objects 内配置 Log Forwarding Profile,如下:
注意 Syslog,通信日志和威胁日志为不同端口。
最后在 Policies Security 上配置上log Forwarding

配置 rsyslog
安装略,主要是配置文件。 配置文件配置方式分新旧两种方式,旧式(不影响使用):
$ModLoad imtcp
$InputTCPServerRun 515
$AllowedSender TCP, 192.168.136.0/24
$template Remote2,"/var/log/rsyslog/%fromhost-ip%/traffic_%fromhost-ip%_%$YEAR%-%$MONTH%-%$DAY%.log"
# The above code is old-fashioned
新格式为:
# /etc/rsyslog.d/pa_traffic.conf
module(load="imtcp")
template (name="DynFile1" type="string" string="/var/log/rsyslog/%fromhost-ip%/traffic_%fromhost-ip%_%$YEAR%-%$MONTH%-%$DAY%.log")
input(type="imtcp"
port="515"
ruleset="pa_traffic")
ruleset(name="pa_traffic"){
action(type="omfile" dynaFile="DynFile1")
}
# end file
# /etc/rsyslog.d/pa_threat.conf
module(load="imtcp")
template (name="DynFile2" type="string" string="/var/log/rsyslog/%fromhost-ip%/threat_%fromhost-ip%_%$YEAR%-%$MONTH%-%$DAY%.log")
input(type="imtcp"
port="513"
ruleset="pa_threat")
ruleset(name="pa_threat"){
action(type="omfile" dynaFile="DynFile2")
}
# end file
# cat /etc/rsyslog.conf|grep -i include
$IncludeConfig /etc/rsyslog.d/*.conf
日志生成如下:

参考文档
- http://rsyslog-doc.readthedocs.io