mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-07 09:42:46 +01:00
Merge pull request #8260 from Security-Onion-Solutions/fix/kratos_dedicated_index_and_filestream_id_additions
Add dedicated index for Kratos and IDs for all filestream inputs
This commit is contained in:
@@ -14,4 +14,5 @@ logstash:
|
|||||||
- so/9700_output_strelka.conf.jinja
|
- so/9700_output_strelka.conf.jinja
|
||||||
- so/9800_output_logscan.conf.jinja
|
- so/9800_output_logscan.conf.jinja
|
||||||
- so/9801_output_rita.conf.jinja
|
- so/9801_output_rita.conf.jinja
|
||||||
|
- so/9802_output_kratos.conf.jinja
|
||||||
- so/9900_output_endgame.conf.jinja
|
- so/9900_output_endgame.conf.jinja
|
||||||
|
|||||||
13
salt/elasticsearch/files/ingest/kratos
Normal file
13
salt/elasticsearch/files/ingest/kratos
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
{
|
||||||
|
"description" : "kratos",
|
||||||
|
"processors" : [
|
||||||
|
{
|
||||||
|
"set": {
|
||||||
|
"field": "_index",
|
||||||
|
"value": "so-kratos",
|
||||||
|
"override": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{ "pipeline": { "name": "common" } }
|
||||||
|
]
|
||||||
|
}
|
||||||
@@ -118,6 +118,7 @@ filebeat.inputs:
|
|||||||
|
|
||||||
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-manager', 'so-managersearch', 'so-import'] %}
|
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-manager', 'so-managersearch', 'so-import'] %}
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: logscan
|
||||||
paths:
|
paths:
|
||||||
- /logs/logscan/alerts.log
|
- /logs/logscan/alerts.log
|
||||||
fields:
|
fields:
|
||||||
@@ -135,6 +136,7 @@ filebeat.inputs:
|
|||||||
{%- if ZEEKVER != 'SURICATA' %}
|
{%- if ZEEKVER != 'SURICATA' %}
|
||||||
{%- for LOGNAME in salt['pillar.get']('zeeklogs:enabled', '') %}
|
{%- for LOGNAME in salt['pillar.get']('zeeklogs:enabled', '') %}
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: zeek-{{ LOGNAME }}
|
||||||
paths:
|
paths:
|
||||||
- /nsm/zeek/logs/current/{{ LOGNAME }}.log
|
- /nsm/zeek/logs/current/{{ LOGNAME }}.log
|
||||||
fields:
|
fields:
|
||||||
@@ -150,6 +152,7 @@ filebeat.inputs:
|
|||||||
close_removed: false
|
close_removed: false
|
||||||
|
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: import-zeek={{ LOGNAME }}
|
||||||
paths:
|
paths:
|
||||||
- /nsm/import/*/zeek/logs/{{ LOGNAME }}.log
|
- /nsm/import/*/zeek/logs/{{ LOGNAME }}.log
|
||||||
fields:
|
fields:
|
||||||
@@ -174,6 +177,7 @@ filebeat.inputs:
|
|||||||
{%- endif %}
|
{%- endif %}
|
||||||
|
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: suricata-eve
|
||||||
paths:
|
paths:
|
||||||
- /nsm/suricata/eve*.json
|
- /nsm/suricata/eve*.json
|
||||||
fields:
|
fields:
|
||||||
@@ -190,6 +194,7 @@ filebeat.inputs:
|
|||||||
close_removed: false
|
close_removed: false
|
||||||
|
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: import-suricata
|
||||||
paths:
|
paths:
|
||||||
- /nsm/import/*/suricata/eve*.json
|
- /nsm/import/*/suricata/eve*.json
|
||||||
fields:
|
fields:
|
||||||
@@ -212,6 +217,7 @@ filebeat.inputs:
|
|||||||
close_removed: false
|
close_removed: false
|
||||||
{%- if STRELKAENABLED == 1 %}
|
{%- if STRELKAENABLED == 1 %}
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: strelka
|
||||||
paths:
|
paths:
|
||||||
- /nsm/strelka/log/strelka.log
|
- /nsm/strelka/log/strelka.log
|
||||||
fields:
|
fields:
|
||||||
@@ -233,6 +239,7 @@ filebeat.inputs:
|
|||||||
{%- if WAZUHENABLED == 1 %}
|
{%- if WAZUHENABLED == 1 %}
|
||||||
|
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: wazuh
|
||||||
paths:
|
paths:
|
||||||
- /wazuh/archives/archives.json
|
- /wazuh/archives/archives.json
|
||||||
fields:
|
fields:
|
||||||
@@ -251,6 +258,7 @@ filebeat.inputs:
|
|||||||
{%- if FLEETMANAGER or FLEETNODE %}
|
{%- if FLEETMANAGER or FLEETNODE %}
|
||||||
|
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: osquery
|
||||||
paths:
|
paths:
|
||||||
- /nsm/osquery/fleet/result.log
|
- /nsm/osquery/fleet/result.log
|
||||||
fields:
|
fields:
|
||||||
@@ -321,12 +329,12 @@ filebeat.inputs:
|
|||||||
|
|
||||||
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-manager', 'so-managersearch', 'so-import'] %}
|
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-manager', 'so-managersearch', 'so-import'] %}
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: kratos
|
||||||
paths:
|
paths:
|
||||||
- /logs/kratos/kratos.log
|
- /logs/kratos/kratos.log
|
||||||
fields:
|
fields:
|
||||||
module: kratos
|
module: kratos
|
||||||
category: host
|
category: host
|
||||||
tags: beat-ext
|
|
||||||
processors:
|
processors:
|
||||||
- decode_json_fields:
|
- decode_json_fields:
|
||||||
fields: ["message"]
|
fields: ["message"]
|
||||||
@@ -344,6 +352,7 @@ filebeat.inputs:
|
|||||||
target: ''
|
target: ''
|
||||||
fields:
|
fields:
|
||||||
event.dataset: access
|
event.dataset: access
|
||||||
|
pipeline: "kratos"
|
||||||
fields_under_root: true
|
fields_under_root: true
|
||||||
clean_removed: false
|
clean_removed: false
|
||||||
close_removed: false
|
close_removed: false
|
||||||
@@ -351,6 +360,7 @@ filebeat.inputs:
|
|||||||
|
|
||||||
{%- if grains.role == 'so-idh' %}
|
{%- if grains.role == 'so-idh' %}
|
||||||
- type: filestream
|
- type: filestream
|
||||||
|
id: idh
|
||||||
paths:
|
paths:
|
||||||
- /nsm/idh/opencanary.log
|
- /nsm/idh/opencanary.log
|
||||||
fields:
|
fields:
|
||||||
|
|||||||
@@ -0,0 +1,22 @@
|
|||||||
|
{%- if grains['role'] == 'so-eval' -%}
|
||||||
|
{%- set ES = salt['pillar.get']('manager:mainip', '') -%}
|
||||||
|
{%- else %}
|
||||||
|
{%- set ES = salt['pillar.get']('elasticsearch:mainip', '') -%}
|
||||||
|
{%- endif %}
|
||||||
|
{%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
|
||||||
|
{%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
|
||||||
|
output {
|
||||||
|
if [module] =~ "kratos" and "import" not in [tags] {
|
||||||
|
elasticsearch {
|
||||||
|
pipeline => "kratos"
|
||||||
|
hosts => "{{ ES }}"
|
||||||
|
{% if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
|
||||||
|
user => "{{ ES_USER }}"
|
||||||
|
password => "{{ ES_PASS }}"
|
||||||
|
{% endif %}
|
||||||
|
index => "so-kratos"
|
||||||
|
ssl => true
|
||||||
|
ssl_certificate_verification => false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user