Skip to content

ASIM Authentication Parser for VMware ESXi#13989

Open
SpeedyFireCyclone wants to merge 13 commits intoAzure:masterfrom
SpeedyFireCyclone:ASIM/AuthenticationVMwareESXi
Open

ASIM Authentication Parser for VMware ESXi#13989
SpeedyFireCyclone wants to merge 13 commits intoAzure:masterfrom
SpeedyFireCyclone:ASIM/AuthenticationVMwareESXi

Conversation

@SpeedyFireCyclone
Copy link
Copy Markdown
Contributor

Required items, please complete

Change(s):

  • ASIM Authentication Parsers for VMware

Reason for Change(s):

  • Support for local & SSH-based logons to VMware ESXi hosts

Version Updated:

  • Yes

Testing Completed:

  • Yes

Checked that the validations are passing and have addressed any issues that are present:

  • Yes

@SpeedyFireCyclone SpeedyFireCyclone requested review from a team as code owners April 3, 2026 12:01
@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 3, 2026

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2026-04-03T12:06:10.060Z
Learn more: GitHub Security Lab - Preventing PWN Requests

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 3, 2026

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2026-04-03T13:25:45.667Z
Learn more: GitHub Security Lab - Preventing PWN Requests

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 6, 2026

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2026-04-06T08:01:42.341Z
Learn more: GitHub Security Lab - Preventing PWN Requests

@v-atulyadav v-atulyadav added SafeToRun This is used only for ASim parsers Fork PR Pipeline run. and removed SafeToRun This is used only for ASim parsers Fork PR Pipeline run. labels Apr 6, 2026
@v-atulyadav
Copy link
Copy Markdown
Collaborator

Hi @SpeedyFireCyclone,
Please resolve the branch conflicts and rename the sample data file as indicated in the validation error. Thanks

image

Comment thread Parsers/ASimAuthentication/Parsers/ASimAuthenticationVMwareESXi.yaml Outdated
Comment thread Parsers/ASimAuthentication/Parsers/ASimAuthenticationVMwareESXi.yaml Outdated
Comment thread Parsers/ASimAuthentication/Parsers/imAuthentication.yaml Outdated
Comment thread Parsers/ASimAuthentication/Parsers/ASimAuthentication.yaml Outdated
Comment thread Parsers/ASimAuthentication/Parsers/vimAuthenticationVMwareESXi.yaml Outdated
@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Apr 9, 2026

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2026-04-09T16:10:29.684Z
Learn more: GitHub Security Lab - Preventing PWN Requests

Comment thread Parsers/ASimAuthentication/Parsers/ASimAuthenticationVMwareESXi.yaml Outdated
Comment thread Parsers/ASimAuthentication/Parsers/ASimAuthenticationVMwareESXi.yaml Outdated
@github-actions
Copy link
Copy Markdown
Contributor

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2026-04-13T09:00:18.390Z
Learn more: GitHub Security Lab - Preventing PWN Requests

@yummyblabla yummyblabla added the SafeToRun This is used only for ASim parsers Fork PR Pipeline run. label Apr 13, 2026
@yummyblabla
Copy link
Copy Markdown
Collaborator

It looks like KQL validation is failing because AVSSyslog and AVSEsxiSyslog are not recognized as tables.

You will need to add those tables in .script/tests/KqlvalidationsTests/CustomTables/ similar to what I did here: https://github.com/Azure/Azure-Sentinel/blob/master/.script/tests/KqlvalidationsTests/CustomTables/AVSVcSyslog.json

@v-atulyadav v-atulyadav removed the SafeToRun This is used only for ASim parsers Fork PR Pipeline run. label Apr 14, 2026
@github-actions
Copy link
Copy Markdown
Contributor

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2026-04-14T09:38:34.789Z
Learn more: GitHub Security Lab - Preventing PWN Requests

),
EventType = "Logon",
EventSubType = "Remote",
EventResultDetails = extract(@"@[\d.]+: (.+)$", 1, SyslogMessage),
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Another customer previewed this parser and found that this should be mapped to EventOriginalResultDetails. Then EventOriginalResultDetails should be mapped to one of the enums provided in this link for EventResultDetails: https://learn.microsoft.com/en-us/azure/sentinel/normalization-schema-authentication#common-fields-with-specific-guidelines

OperationId = extract(@"opID=([^\s\]]+)", 1, SyslogMessage),
SessionIdShort = extract(@"sid=([a-f0-9]+)", 1, SyslogMessage)
| where isnotempty(TargetUsername)
// Hostd double-logs each auth failure: once as "Rejected password" (PAM) and once as "Cannot login" (Event Manager), typically within 35-300ms of each other.
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A further issue concerns the deduplication logic that causes an inconsistency in event count.
The parser applies a 1-second deduplication window to all Hostd events, but the comment in the code itself specifies that this logic is intended exclusively for failures.

By applying the same window to Successes as well, the parser collapses legitimate events such as consecutive API calls by the same user within the same second. Verifying against real logs over a 24-hour time window, out of 57 raw "Accepted password" events, the parser only produces 33, with 24 confirmed lost events verified through direct analysis queries.

Perhaps it may be best to apply this dudupe to only failure events or to remove the dedupe logic.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants