Add additional checks for event.original already existing into Azure firewall logs integration ingest pipeline#5334
Conversation
…firewall logs integration ingest pipeline
|
Can we make sure that this processor is the same in all integrations? |
🌐 Coverage report
|
i think it's kinda crazy each integration repeats these processors anyway. is there any reason not to move this into a higher level final pipeline? @ruflin i think we talked about this at one point? |
I see a few problems:
Some sort of tag must be send to the final pipeline, so it actually knows when to set it and when not. Problem: Custom ingest pipelines. what if those heavily modify the message field, or even drop it? Then the final pipeline won't be able to create the event.original, since message is missing, or something else happened. |
|
@philippkahr, the The change in this PR handles an edge case that can happen the pipeline receives an event with both (IIRC) This change was first introduced when Logstash changed its default behavior a few months ago and added |
|
Package azure - 1.5.9 containing this change is available at https://epr.elastic.co/search?package=azure |
|
Also seeing error.message: field [event.original] already exists rename in the azure application gateway logs with preserve original log disabled. |
Yep, this can happen at the beginning of the ingest pipeline execution if the document has both @mbudge, is it still happening with integration version 1.5.9? Can you provide a sample log causing the error if it does happen? |
|
We've upgraded to 8.6.2 but the latest azure firewall/application gateway integration is 1.5.8. As soon as 1.5.9 is available for upgrade we'll test it. |
|
Just upgraded to 1.5.9 and the original event issue is fixed in data_stream.dataset: azure.firewall_logs The firewall integration has a grok parsing error, I'll share with support. We're still getting the error "field [event.original] already exists rename" this dataset in v1.5.9 data_stream.dataset: azure.application_gateway |
Feel free to also open a public GitHub issue with the failing log event. Please redact any PII or account-identifiable information before sharing it.
You're right! Fixing this with #5361 |
We added unsupported message patterns with #5382. Thank you for sharing a sample log. You can upgrade to integration version 1.5.11 when the automation bot confirms. |
…firewall logs integration ingest pipeline (elastic#5334) * Add additional checks for event.original already existing into Azure firewall logs integration ingest pipeline * add changelog entry * fix typo in version number in changelog
…firewall logs integration ingest pipeline (elastic#5334) * Add additional checks for event.original already existing into Azure firewall logs integration ingest pipeline * add changelog entry * fix typo in version number in changelog
What does this PR do?
Add additional checks for event.original already existing into Azure firewall logs integration ingest pipeline
Checklist
changelog.ymlfile.