SOLVED

Duplicate logs of CEF with Syslog

Brass Contributor

Hello,

 

Is there a way to remove duplication of CommonSecurity and Syslog when Log collector Server is configured to forward CEF and Syslog.

for example F5 WAF firewall sending Syslog with CEF formate in facility Local0, which result to duplication.

We already configured the Log analytic Agent management to fetch the syslog of Local0, bcz there is different sources send with that facility. 

Is there a way to remove duplication when taken into account that we can't change it from the source system(F5 waf)

 

Thanks.

11 Replies
Thanks, but this need to use Azure Monitor agent, not Log Analytic agent, yes?
Bcz we are using Log analytic agent (OMS agent)

@Qusai_Ismail 

 

I think you can use the data transformation with old Log Analytics agents as well. Because it is done on the Azure level and not on the log forwarder.

Transform or customize data at ingestion time in Microsoft Sentinel (preview) | Microsoft Learn

Thank you, we find a workaround and solve it by edit oms configuration (/etc/rsyslog.d/security-config-omsagent.conf) to

if $rawmsg contains "CEF:" or $rawmsg contains "ASA-" then {
@@127.0.0.1:25226
stop
}

@Qusai_Ismail 

This workaround gets overwritten at some point by the azure sentinel no? 

How does it get overwritten?
Any issue observed after these changes?
Yes it's got overwritten by Sentinel configuration
Unfortunately ,it's got overwritten by Sentinel configuration
best response confirmed by Qusai_Ismail (Brass Contributor)
Solution
i got a solution that worked for me:
i've created a seperate machine used only for CEF logs - on that machine just make an IPTABLES that blocks port 25224.

sudo iptables -A INPUT -p udp --dport 25224 -j DROP
sudo iptables -A OUTPUT -p udp --dport 25224 -j DROP

Thank you, i will try this.
1 best response

Accepted Solutions
best response confirmed by Qusai_Ismail (Brass Contributor)
Solution
i got a solution that worked for me:
i've created a seperate machine used only for CEF logs - on that machine just make an IPTABLES that blocks port 25224.

sudo iptables -A INPUT -p udp --dport 25224 -j DROP
sudo iptables -A OUTPUT -p udp --dport 25224 -j DROP

View solution in original post