Skip to content

RLA is a log processing tool designed to streamline the integration of Radware products with Security Information and Event Management (SIEM) systems.

Notifications You must be signed in to change notification settings

Radware/Radware-Logging-Agent

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

68 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Radware Logging Agents (RLA)

RLA is a log processing tool designed to streamline the integration of Radware products with Security Information and Event Management (SIEM) systems. In its first major release, RLA is focuses on robust support of Radware Cloud WAAP logs, utilizing the Cloud WAAP's capability to export security and access logs to an AWS S3 Buckets.

Current Version

Version 1.3.1 - Released on 7th November 2024

Release Notes

Version 1.3.1 - 07/11/2024

  • Improved Enhanced Docker Deployment Options: Improved Docker deployment by avoiding internal logging to agent.log when running inside a Docker container, instead logging to the console for better integration with container logging practices. Added the ability to import rla.yaml from an S3 bucket directly through the Docker entry point script. Also introduced a fully environment variable-driven configuration using rla.yaml.template, providing a flexible way to configure RLA based entirely on environment variables.

Version 1.3.0 - 29/09/2024

  • Added Docker Deployment Added: Introduced Docker deployment with a provided Dockerfile, allowing for easier and more consistent deployment of RLA in containerized environments.

Version 1.2.1 15/04/2024

  • Fixed Certificate Validation fixed issue validating known CA signed certificates.
  • Fixed Conversion Error fixed small issue in one of the unified access log field.
  • Improved Graceful Shutdown improved handling of graceful shutdown to finish remaining tasks.

Version 1.2.0 26/02/2024

  • Added ECS Compatibility Mode for enhanced log structure compatibility with both Elastic Common Schema and Radware custom schema.
  • Improved Configuration Validation on startup, including checks for SQS queue and destination connectivity, for increased application reliability.
  • Introduced Debug Options to selectively disable configuration validation, enhancing flexibility during troubleshooting.
  • Improved Installer: Now offers an option to retain the existing rla.yaml during upgrades, ensuring seamless update experiences.

Version 1.1.1 - 18/02/2024

  • Changed Homogenized fields are now all styled uniformly using camel casing.

Version 1.1.0 - 14/02/2024

  • Added Batch configuration for TCP, TLS, HTTP, and HTTPS.
  • Added Compatibility mode with Splunk HEC Support.

Version 1.0.0 - 10/02/2024

  • Initial Release.

Features

Log Ingestion

  • Multi-Agent Architecture: Supports multiple agents, each with distinct configurations for targeted log processing.
  • Cloud WAAP Integration: Efficiently ingests logs from Radware Cloud WAAP exported to AWS S3.
  • Versatile Log Handling: Capable of processing various log types including Access, WAF, Bot, DDoS, and Web DDoS.

Log Processing and Conversion

  • Dynamic Format Conversion: Converts logs to multiple formats such as JSON, CEF, and LEEF, with customizable options.
  • Selective Log Processing: Provides the ability to filter and process specific log types, enhancing control over log ingestion.

Log Enrichment

  • Enhanced Information: Adds valuable enrichments to logs, improving their utility and integration with SIEM systems.

Customization and Flexibility

  • Configurable Homogenization: Optional normalization of log fields across different log types for consistency.
  • Customizable Timestamp and Severity Formats: Allows specific settings for timestamp and log severity formats in output logs.
  • Adaptable Output Configurations: Supports various output methods and customization for delimiters and other format-specific settings.

Configuration

General Configuration Options

  • log_file: Specify the path for the RLA's log file. This is where RLA will write its operational logs.
  • output_directory: Define the directory to store temporary files during log processing.
  • log_directory: Set the directory for storing RLA's log files.
  • logging_levels: Choose the logging level for RLA's internal logs. Options: INFO, WARNING, DEBUG, ERROR.

AWS Credentials

Configure AWS credentials to allow RLA to interact with AWS services such as SQS and S3.

  • access_key_id: Your AWS Access Key ID for authentication.
  • secret_access_key: Your AWS Secret Access Key for authentication.
  • region: The AWS region where the SQS queue and S3 bucket are located.

Agent Configuration

Define settings for each log collection agent.

  • name: Assign a unique name for each agent.
  • type: Define the type of log source. Currently, "sqs" is supported.
  • num_worker_threads: Set the number of worker threads for processing messages.
  • product: Specify the product type associated with this agent. Currently supports 'cloud_waap'.
  • sqs_settings:
    • queue_name: The name of the SQS queue to poll for messages.
    • delete_on_failure: Determine whether to delete messages from the queue if processing fails (true/false).
  • logs: Enable or disable specific log types for processing, such as Access, WAF, Bot, DDoS, WebDDoS, and CSP.

Output Configuration

Customize how logs are formatted and where they are sent after processing.

  • output_format: Choose the format for the output logs. Options: json, cef, leef. This determines how logs are structured before being sent.

  • type: Select the transport protocol for sending logs. Options: http, https, tcp, udp, tls. This choice affects the delivery method of the log data.

  • destination: Define the endpoint for log delivery, format dependent on the chosen type. This is where the logs will be sent after processing.

  • batch: Enable or disable batch processing of logs. When enabled, logs are grouped into batches before being sent, which can increase efficiency for certain output types. Note: This setting is particularly relevant for http and https types where batching can reduce the number of outbound requests.

  • compatibility_mode: Configure the log forwarding format to ensure compatibility with various external systems. This setting adjusts how logs are formatted and sent.

    • "Splunk HEC" Option: Optimizes log format for Splunk's HTTP Event Collector, facilitating smoother integration and data analysis.

      • Requirement: type must be configured as either http or https, and output_format as json. This ensures logs meet the format expectations of Splunk HEC.
    • "ECS" Option: Aligns log format with the Elastic Common Schema (ECS) for Elasticsearch, enhancing interoperability across different Elastic Stack applications.

      • Requirement: Must be configured with type as either http, https, tls, or tcp, and output_format as json. Adheres logs to ECS specifications, streamlining their use within the Elastic ecosystem.
    • "none" Option: Applies no special formatting, suitable when there's no requirement for logs to adhere to specific external system formats.

Format-Specific Configurations

Customize output settings for each supported log format.

JSON Format Options

  • time_format: Choose the format for timestamps. Options include 'ISO8601', 'epoch_ms_str', 'epoch_ms_int', 'MM dd yyyy HH:mm:ss'.
  • unify_fields: Optionally normalize log fields across different log types for consistency (true/false).

CEF and LEEF Format Options

  • delimiter: Specify the delimiter used to separate events (commonly "\n").
  • time_format and severity_format: Customize the representation of timestamps and severity levels in the logs.
  • syslog_header: Configure the generation and content of syslog headers, specifying the source of the host field (product, application, tenant).

TLS Configuration

Settings for secure TCP communication using TLS. These settings are crucial for ensuring encrypted and secure data transmission over the network.

  • verify: Whether to verify the server's SSL certificate. Options: true (verify the certificate) or false (do not verify).
  • ca_cert: Path to the CA (Certificate Authority) certificate file. This is used to authenticate the certificate of the server.
  • client_cert: Path to the client's SSL certificate file. This certificate is presented to the server during the TLS handshake.
  • client_key: Path to the client's SSL key file. This key is associated with the client's certificate.

HTTP/HTTPS Configuration

Customize settings for log transmission over HTTP or HTTPS. When using HTTPS, the options available in the TLS Configuration can also be applied to ensure secure communication. This includes specifying certificates for SSL verification and encryption.

  • authentication: Specify authentication method for secure endpoint access. Supported methods include none (no authentication), basic (username and password), and bearer (bearer token).
  • custom_headers: Define additional HTTP headers to be included in each request. Useful for specifying content types, API keys, or other custom header values required by the receiving server. When deploying via the Docker image or AWS Fargate task definition, headers can be provided entirely through environment variables (for example: HTTPS_AUTHORIZATION_HEADER, HTTPS_HEADER_X_CUSTOM_HEADER=MyValue, or HTTPS_CUSTOM_HEADERS="Header-One=Value;Header-Two=Other"). The container entrypoint automatically injects these values into the generated rla.yaml.

HTTPS Specific Options

For HTTPS connections, the following TLS-related settings can be utilized to enhance security:

  • verify: Controls whether the server's SSL certificate should be verified. A critical setting for preventing man-in-the-middle attacks.
  • ca_cert: Specify the path to the trusted CA certificate file. This ensures the server's certificate is issued by a trusted authority.
  • client_cert and client_key: Provide paths to the client's SSL certificate and key files, respectively. These are used for client authentication by the server.

Debug Configuration

Enhance troubleshooting with optional debug settings, ensuring connectivity and configuration are verified at startup.

  • verify_destination_connectivity: Checks connectivity to the specified destination. Default: true. Disable for debugging or if the destination does not return a 200 OK response.
  • config_verification: Performs initial checks to verify configuration and connectivity. Default: true. Disable to bypass these verifications.

Environment Variables for Docker-based Deployment

These variables are used to control deployment behavior, and are not configured through rla.yaml. Instead, they are specified as environment variables for Docker-based deployments.

  • CONFIGURATION_SOURCE: Defines the configuration source for RLA when running in Docker or ECS. Available options:
    • S3: Use S3 as the source to fetch the rla.yaml configuration. If any other value is provided (or not set), the default is to use environment variables based on rla.yaml.template.
  • S3_BUCKET: The name of the S3 bucket where the rla.yaml configuration file is stored. This is required if CONFIGURATION_SOURCE is set to S3.
  • S3_KEY: The S3 key (path and file name) where the rla.yaml configuration is stored. This is also required if CONFIGURATION_SOURCE is set to S3.

For detailed explanations and additional configuration options, refer to the official RLA documentation or support resources.

Sample Configuration

aws_credentials:
  access_key_id: 'your_access_key'
  secret_access_key: 'your_secret_key'
  region: 'your_region'

agents:
  - name: "cloud_waap"
    type: "sqs"
    num_worker_threads: 5
    product: "cloud_waap"
    sqs_settings:
      queue_name: 'your_sqs_queue_name'
      delete_on_failure: false
    logs:
      Access: true
      WAF: true
      Bot: true
      DDoS: true
      WebDDoS: true
      CSP: false

output:
  output_format: 'json'  # Supports 'json', 'cef', 'leef'
  type: 'tcp'
  destination: 'your_destination_address'

Deployment on Linux

To install the Radware Logging Agent on a Linux system, follow these steps:

  1. Clone the Repository: Download the latest release package from the Releases section of the Radware Logging Agent GitHub repository. Look for the package named like rla_{latest_release}.tar.gz, where {latest_release} indicates the version number.

  2. Run the Installation Script: Once you have downloaded the latest release package, extract it and run the included installation script. Remember to replace {latest_release} with the actual version number you downloaded. This script automates the setup process, installing all necessary components.

    tar -zxvf rla_{latest_release}.tar.gz
    cd rla
    chmod +x install_rla.sh
    sudo ./install_rla.sh
  3. Configure rla.yaml: After installation, you'll need to configure the rla.yaml file to suit your specific environment and requirements. Use the following command to edit the configuration file:

    sudo vi /etc/rla/rla.yaml

    Ensure that you correctly set all necessary configuration options according to your deployment needs.

  4. Using Certificates: If your setup requires certificates, ensure they are correctly placed in the desired directory and have the appropriate ownership settings. Use the following command to change the ownership of the certificate files to the rla user and group, replacing <your_certificate_file> with the actual file name of your certificate:

    sudo chown rla:rla <your_certificate_file>

    Repeat this command for each certificate file you need to use with the Radware Logging Agent.

  5. Start the Service: Once configured, you can start the Radware Logging Agent using the systemd service:

    sudo systemctl start rla.service

Deployment Using Docker

The Radware Logging Agent (RLA) can be deployed using the included Dockerfile. Below are several deployment options that cater to different environments and configurations.

Local or Private Cloud-based Deployment

For local deployments or those within private cloud environments, you can use the provided rla.yaml.template to configure the RLA instance.

  • Environment Variables: The environment variables specified within rla.yaml.template are used to set the necessary configuration parameters for RLA. Simply provide the appropriate values in your Docker environment.
  • Custom Sections: If the provided rla.yaml.template contains commented sections, uncomment them as needed and ensure you supply the required environment variable values.

AWS ECS Deployment Using S3 to Store rla.yaml

When running RLA on AWS ECS and you prefer to store your configuration in S3:

  • Environment Variables:
    • Set CONFIGURATION_SOURCE to S3.
    • Add S3_BUCKET (the bucket name) and S3_KEY (the path and file name).
  • Permissions: Ensure that the ECS task role has the appropriate permissions to access the S3 bucket and key. This allows RLA to download the configuration file (rla.yaml) whenever a new container starts. This method provides centralized configuration management, especially useful in scalable environments.

AWS ECS Deployment Using Parameter Store and Secret Manager

You can also use the environment variable-based configuration option in conjunction with AWS Systems Manager Parameter Store and AWS Secrets Manager. By mapping Parameters and Secrets to environment variables in the ECS task definition, you can manage the configuration without embedding sensitive information directly into your Docker environment. This provides an additional layer of security and flexibility for deploying RLA.

Roadmap / Future Plans

The Radware Logging Agent is continually evolving, with plans to expand its capabilities and support a wider range of functionalities. Here's what's on the horizon:

Near-Term Goals

  • Cloud WAAP Local File Integration: In addition to the current support for AWS S3, we plan to introduce local file ingestion to supplement the upcoming SFTP export feature from Cloud WAAP. This feature will enable an end-to-end pipeline from Cloud WAAP to SFTP and eventually to SIEM using various protocols and formats.

Long-Term Vision

  • Expanding Input Options: Future updates aim to incorporate additional input methods such as SCP, TCP, and HTTP. This expansion will facilitate the support of a broader range of Radware products.
  • Support for Additional Radware Products: Our goal is to extend RLA's capabilities to include more Radware products, enriching and customizing their logs for optimal SIEM integration.
  • Versatile Protocol Support: We're committed to enabling easy log transmission through various protocols, ensuring seamless integration with diverse SIEM systems.

Log Format Examples

This section provides examples of logs processed by the Radware Logging Agent, showcasing the original JSON format, enriched JSON, CEF (Common Event Format), and LEEF (Log Event Extended Format) versions for different log types.

Cloud WAAP - Access Log

Original JSON

{
    "accept_language": "en-US,en;q=0.9",
    "action": "Allowed",
    "application_id": "cb696959b-2f53-41f2-87ad-9c5810313a74",
    "application_name": "MyApp",
    "cookie": "-",
    "country_code": "US",
    "destination_ip": "10.22.79.113",
    "destination_port": 443,
    "directory": "/user",
    "host": "myapp.radware.net",
    "http_bytes_in": 535,
    "http_bytes_out": 7607,
    "http_method": "POST",
    "protocol": "https",
    "referrer": "-",
    "request": "POST /user/login HTTP/1.1",
    "request_time": "0.114",
    "response_code": 200,
    "source_ip": "10.1.154.77",
    "source_port": 43834,
    "tenant_name": "MyAccount",
    "time": "27/Jan/2024:00:49:40 +0000",
    "user_agent": "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko",
    "x-forwarded-for": "-"
}

enriched(homogenized) JSON

{
    "acceptLanguage": "en-US,en;q=0.9",
    "action": "Allowed",
    "applicationId": "cb69699b-2f53-41f2-87ad-9c5810313a74",
    "applicationName": "MyApp",
    "countryCode": "US",
    "destinationIp": "66.22.79.113",
    "destinationPort": 443,
    "directory": "/user",
    "host": "myapp.radware.net",
    "httpBytesIn": 535,
    "httpBytesOut": 7607,
    "httpMethod": "POST",
    "httpVersion": "HTTP/1.1",
    "logType": "Access",
    "protocol": "https",
    "product": "Cloud WAAP",
    "request": "https://myapp.radware.net/user/login",
    "requestTime": "0.114",
    "responseCode": 200,
    "sourceIp": "10.1.154.77",
    "sourcePort": 43834,
    "tenantName": "MyAccount",
    "time": "2024-27-02T00:49:40.000Z",
    "uri": "/user/login",
    "user_agent": "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
}

CEF

2024-12-02T08:50:40.100Z  Cloud WAAP CEF:0|Radware|Cloud WAAP|1.0|Access|Access Log|Info| rt=2024-27-01T00:49:40.000Z act=Allowed dhost=myapp.radware.net src=10.1.154.77 dst=10.22.79.113 spt=43834 dpt=443 app=https request=https://myapp.radware.net/user/login uri=/user/login method=POST in=535 out=7607 requestClientApplication=Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko rdwrCldDirectory=/user rdwrCldAcceptLanguage=en-US,en;q\=0.9 rdwrCldRequestTime=0.114 rdwrCldResponseCode=200 rdwrCldCountryCode=US rdwrCldApplicationId=cb69699b-2f53-41f2-87ad-9c5810313a74 rdwrCldApplicationName=MyApp rdwrCldTenantName=MyAccount rdwrCldHttpVersion=HTTP/1.1

LEEF

2024-12-02T08:50:40.100Z  Cloud WAAP LEEF:2.0|Radware|Cloud WAAP|1.0|Access|eventTime=2024-27-01T00:49:40.000Z	action=Allowed	dhost=myapp.radware.net	src=10.1.154.77	dst=10.22.79.113	srcPort=43834	dstPort=443	proto=https	url=https://myapp.radware.net/user/login	uri=/user/login	method=POST	bytesIn=535	bytesOut=7607	userAgent=Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko	responseCode=200	rdwrCldDirectory=/user	rdwrCldAcceptLanguage=en-US,en;q\=0.9	rdwrCldRequestTime=0.114	rdwrCldCountryCode=US	rdwrCldApplicationId=cb69699b-2f53-41f2-87ad-9c5810313a74	rdwrCldApplicationName=MyApp	rdwrCldTenantName=MyAccount	rdwrCldHttpVersion=HTTP/1.1

Cloud WAAP - WAF Log

WAF - Original JSON

{
    "action": "Blocked",
    "applicationName": "MyApp",
    "appPath": "/api/auth",
    "destinationIp": "10.35.101.159",
    "destinationPort": "54009",
    "directory": "/api",
    "enrichmentContainer": {
        "applicationId": "cb69699b-2f53-41f2-87ad-9c5810313a74",
        "contractId": "63qwe674-e83d-4fae-909d-84b309ba0cd9",
        "geoLocation.countryCode": "US",
        "tenant": "75292c55-9212-4714-babe-851b29de7cab"
    },
    "externalIp": "10.160.218.10",
    "host": "myapp.radware.net",
    "method": "POST",
    "protocol": "HTTP",
    "receivedTimeStamp": "1706313459865",
    "request": "POST /api/auth HTTP/1.1\r\nAccept-Encoding: gzip\r\nHost: myapp.radware.net\r\nContent-Length: 0\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0\r\naccept: application/json\r\nx-remote-ip: 128.160.218.10\r\ncontent-type: application/json\r\nNotBot: True\r\nAuthorization: Basic dGVzdF91c2VyOjEyMzQ1Ng==\r\nCookie: uzmx=17063028541647068335-3f843db00cc4acfa31; AWSALB=5CC+YSlWg; AWSALBCORS=5CC\r\nShieldSquare-Response: 0\r\n\r\n",
    "role": "public",
    "security": true,
    "severity": "High",
    "sourceIp": "10.160.218.10",
    "sourcePort": "59289",
    "targetModule": "API Security Module",
    "title": "API request method not allowed",
    "transId": "2669954742",
    "URI": "/api/auth",
    "user": "public",
    "vhost": "myapp.radware.net",
    "violationCategory": "API Security Violation",
    "violationDetails": "A user attempted to access an API endpoint using an HTTP Method that is not allowed.\n\r\nDescription:\r\nAPI Security Violation Detected.\nEndpoint:  /api/auth\nMethod: POST\nViolation: Invalid Method.\nInvalid method\n\r\nSuggestion: Revise API Security settings if needed\r\nModule: API Security\r\nError Number: -216\r\n\nAuthenticated as Public\n",
    "violationType": "API Security Violation",
    "webApp": "App_MyAccount_MyApp"
}

WAF - enriched(homogenized) JSON

{
    "action": "Blocked",
    "applicationId": "cb69699b-2f53-41f2-87ad-9c5810313a74",
    "applicationName": "MyApp",
    "appPath": "/api/auth",
    "category": "API Security Violation",
    "contractId": "63qwe674-e83d-4fae-909d-84b309ba0cd9",
    "cookie": "uzmx=17063028541647068335-3f843db00cc4acfa31; AWSALB=5CC+YSlWg; AWSALBCORS=5CC",
    "countryCode": "US",
    "destinationIp": "10.160.218.10",
    "destinationPort": "54009",
    "directory": "/api",
    "headers": "Accept-Encoding: gzip; Host: myapp.radware.net; Content-Length: 0; User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0; accept: application/json; x-remote-ip: 10.160.218.10; content-type: application/json; ShieldSquare-Response: 0",
    "host": "myapp.radware.net",
    "httpMethod": "POST",
    "httpVersion": "HTTP/1.1", 
    "logType": "WAF",
    "name": "API request method not allowed",
    "protocol": "HTTP",
    "product": "Cloud WAAP",
    "reason": "A user attempted to access an API endpoint using an HTTP Method that is not allowed.\n\r\nDescription:\r\nAPI Security Violation Detected.\nEndpoint:  /api/auth\nMethod: POST\nViolation: Invalid Method.\nInvalid method\n\r\nSuggestion: Revise API Security settings if needed\r\nModule: API Security\r\nError Number: -216\r\n\nAuthenticated as Public\n",
    "referrer": "",
    "request": "http://myapp.radware.net/api/auth",
    "role": "public",
    "security": true,
    "severity": "High",
    "sourceIp": "10.160.218.10",
    "source_port": "59289",
    "targetModule": "API Security Module",
    "tenantId": "75292c55-9212-4714-babe-851b29de7cab",
    "tenantName": "MyAccount",
    "time": "2024-26-01T00:49:40.000Z",
    "trans_id": "2669954742",
    "uri": "/api/auth",
    "user": "public",
    "userAgent": "Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0",
    "vhost": "myapp75292c55-9212.radware.net",
    "violationType": "API Security Violation",
    "webApp": "App_MyAccount_MyApp"
}

WAF - CEF

2024-12-02T08:48:40.000Z Cloud WAAP CEF:0|Radware|Cloud WAAP|1.0|WAF|API request method not allowed|High| rt=2024-26-01T00:49:40.000Z act=Blocked dhost=myapp.radware.net src=10.160.218.10 dst=10.160.218.10 spt=59289 dpt=54009 app=HTTP requestMethod=POST request=http://myapp.radware.net/api/auth uri=/api/auth reason=A user attempted to access an API endpoint using an HTTP Method that is not allowed.\\n\\r\\nDescription:\\r\\nAPI Security Violation Detected.\\nEndpoint:  /api/auth\\nMethod: POST\\nViolation: Invalid Method.\\nInvalid method\\n\\r\\nSuggestion: Revise API Security settings if needed\\r\\nModule: API Security\\r\\nError Number: -216\\r\\n\\nAuthenticated as Public\\n cat=API Security Violation requestClientApplication=Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0 requestCookies=uzmx\=17063028541647068335-3f843db00cc4acfa31; AWSALB\=5CC+YSlWg; AWSALBCORS\=5CC rdwrCldAppPath=/api/auth rdwrCldDestinationIp=10.35.101.159 rdwrCldDirectory=/api rdwrCldRole=public rdwrCldSecurity=True rdwrCldSeverity=High rdwrCldTargetModule=API Security Module rdwrCldUser=public rdwrCldVhost=myapp.radware.net rdwrCldViolationType=API Security Violation rdwrCldWebApp=App_MyAccount_MyApp rdwrCldTenantName=MyAccount rdwrCldApplicationName=MyApp rdwrCldTransId=2669954742 rdwrCldCountryCode=US rdwrCldApplicationId=cb69699b-2f53-41f2-87ad-9c5810313a74 rdwrCldContractId=63qwe674-e83d-4fae-909d-84b309ba0cd9 rdwrCldTenantId=75292c55-9212-4714-babe-851b29de7cab rdwrCldHttpVersion=HTTP/1.1 rdwrCldHeaders=Accept-Encoding: gzip; Host: myapp.radware.net; Content-Length: 0; User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0; accept: application/json; x-remote-ip: 10.160.218.10; content-type: application/json; ShieldSquare-Response: 0

WAF - LEEF

2024-12-02T08:48:40.000Z Cloud WAAP LEEF:2.0|Radware|Cloud WAAP|1.0|WAF|eventTime=2024-26-01T00:49:40.000Z	action=Blocked	dhost=myapp.radware.net	src=10.160.218.10	dst=10.160.218.10	srcPort=59289	dstPort=54009	proto=HTTP	method=POST	request=http://myapp.radware.net/api/auth	uri=/api/auth	name=API request method not allowed	reason=A user attempted to access an API endpoint using an HTTP Method that is not allowed.\\n\\r\\nDescription:\\r\\nAPI Security Violation Detected.\\nEndpoint:  /api/auth\\nMethod: POST\\nViolation: Invalid Method.\\nInvalid method\\n\\r\\nSuggestion: Revise API Security settings if needed\\r\\nModule: API Security\\r\\nError Number: -216\\r\\n\\nAuthenticated as Public\\n	cat=API Security Violation	cookie=uzmx\=17063028541647068335-3f843db00cc4acfa31; AWSALB\=5CC+YSlWg; AWSALBCORS\=5CC	userAgent=Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0	sev=High	rdwrCldAppPath=/api/auth	rdwrCldDirectory=/api	rdwrCldRole=public	rdwrCldSecurity=True	rdwrCldTargetModule=API Security Module	rdwrCldUser=public	rdwrCldVhost=myapp.radware.net	rdwrCldViolationType=API Security Violation	rdwrCldWebApp=App_MyAccount_MyApp	rdwrCldTenantName=MyAccount	rdwrCldApplicationName=MyApp	rdwrCldTransId=2669954742	rdwrCldCountryCode=US	rdwrCldApplicationId=cb69699b-2f53-41f2-87ad-9c5810313a74	rdwrCldContractId=63qwe674-e83d-4fae-909d-84b309ba0cd9	rdwrCldTenantId=75292c55-9212-4714-babe-851b29de7cab	rdwrCldHttpVersion=HTTP/1.1	rdwrCldHeaders=Accept-Encoding: gzip; Host: myapp.radware.net; Content-Length: 0; User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0; accept: application/json; x-remote-ip: 10.160.218.10; content-type: application/json; ShieldSquare-Response: 0

About

RLA is a log processing tool designed to streamline the integration of Radware products with Security Information and Event Management (SIEM) systems.

Resources

Stars

Watchers

Forks

Packages

No packages published

Contributors 2

  •  
  •