Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Idea: Extract TLS metadata, similar to beats input #109

Open
rwaweber opened this issue May 3, 2019 · 1 comment
Open

Feature Idea: Extract TLS metadata, similar to beats input #109

rwaweber opened this issue May 3, 2019 · 1 comment

Comments

@rwaweber
Copy link

rwaweber commented May 3, 2019

Would it be possible to extract TLS metadata from clients? Something along the lines of this section in the beats input plugin would be spectacular.

https://github.com/logstash-plugins/logstash-input-beats/blob/master/lib/logstash/inputs/beats/message_listener.rb#L125-L155

The theory would be to pass along a TLS-wrapped message to a translate filter so that I could route certain applications to different endpoints based simply on the certificate principal they are identifying with.

@narthollis
Copy link

I would also like to see this feature.

We are currently using beats inputs from a number of environments and coping the peer subject into the output to identify the source of the information,

This is working great for environments where the beats have direct access to our ingest logstash.

However some of our environments are behind firewalls and other such items and so I am needing to run a something to collect the traffic from behind the firewall and forward it to out ingress setup from a centralised location.

The HTTP plugin looked like a winner until i realised I did not have access to the peer certificate in the processing pipeline.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants