I'm attempting to filter the azure.cloudIPs miner based on a subset of specific regions. I've customized IPv4 aggregators to specify individual regions (as shown below), and this works correctly. However what would the syntax be to filter on multiple regions?
ie, effectively something like azure_region == ['useast' or 'useast2']? I've tried a number of variations, but can't quite seem to make it work.
This is the syntax I have for a single region, and this does work:
__method == 'withdraw'
type == 'IPv4'
azure_region == 'usnorth'
... View more
I have a environment that is currently using rDNS to identify host security policies, and it has older Checkpoint firewalls use this data dynamically via CP Domain Objects to tie rDNS lookups to security policies. This obviously has some challenges and scaling limitations, but fundamentally allows system owners to classify common devices into pre-existing security policies by tying those hosts to certain rDNS names (i.e., 188.8.131.52 = service-a.company.com). From a change control perspective, it eliminates much of the low level firewall policy change work.
I’m looking to try to mimic this behavior on PAN-OS devices, as ideally this would allow for similar policies & workflow regardless of CP or PANW policy enforcement. Because the data is already stored in rDNS zone files today, it’s the ideal source, though would need to be processed a bit before it could be ingested as an EDL, and the thought occurred to me that Minemeld might be a good candidate to do that.
I've only begun digging into Minemeld, though I believe some logic would need to be written to piece together the IP/Host information from the zone file, given that the rDNS zone format is no the most straight forward in the world. Any thoughts on how feasible this might be? Alternatively, might there be an easier way with the existing Minemeld miners/prototypes to accomplish this?
... View more