[Citrix ADC] Add parsing for APPFW native messages with IP-based format #17367
+201
−5
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes: https://github.com/elastic/sdh-beats/issues/6878
Proposed commit message
Add parsing for APPFW native messages with IP-based format
Fixes parsing issues with Citrix ADC Application Firewall (APPFW) logs from Netscaler ADC 14.1 in two scenarios:
RFC5424 Native APPFW Messages
Problem:
APPFW_POLICY_HITmessages with IP-based format not fully parsed. Fields likesource.ip,profile names, and URLs are unparsed incitrix_adc.log.message.Fix: Updated grok patterns in
appfw_feature.ymlto correctly extract missing fields from IP-based APPFW messages.CEF Messages in RFC5424 Syslog
Problem: CEF messages wrapped in RFC5424 syslog headers routed to the CEF pipeline, leaving them unparsed in
citrix.extended.message.Fix: Update
default.ymlto detect CEF content after native RFC5424 parsing and route it to the CEF pipeline. This adds support for CEF over syslog (not just file-based CEF).Checklist
changelog.ymlfile.Screenshots