mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 09:12:45 +01:00
Merge pull request #8260 from Security-Onion-Solutions/fix/kratos_dedicated_index_and_filestream_id_additions
Add dedicated index for Kratos and IDs for all filestream inputs
This commit is contained in:
@@ -14,4 +14,5 @@ logstash:
|
||||
- so/9700_output_strelka.conf.jinja
|
||||
- so/9800_output_logscan.conf.jinja
|
||||
- so/9801_output_rita.conf.jinja
|
||||
- so/9802_output_kratos.conf.jinja
|
||||
- so/9900_output_endgame.conf.jinja
|
||||
|
||||
13
salt/elasticsearch/files/ingest/kratos
Normal file
13
salt/elasticsearch/files/ingest/kratos
Normal file
@@ -0,0 +1,13 @@
|
||||
{
|
||||
"description" : "kratos",
|
||||
"processors" : [
|
||||
{
|
||||
"set": {
|
||||
"field": "_index",
|
||||
"value": "so-kratos",
|
||||
"override": true
|
||||
}
|
||||
},
|
||||
{ "pipeline": { "name": "common" } }
|
||||
]
|
||||
}
|
||||
@@ -118,6 +118,7 @@ filebeat.inputs:
|
||||
|
||||
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-manager', 'so-managersearch', 'so-import'] %}
|
||||
- type: filestream
|
||||
id: logscan
|
||||
paths:
|
||||
- /logs/logscan/alerts.log
|
||||
fields:
|
||||
@@ -135,6 +136,7 @@ filebeat.inputs:
|
||||
{%- if ZEEKVER != 'SURICATA' %}
|
||||
{%- for LOGNAME in salt['pillar.get']('zeeklogs:enabled', '') %}
|
||||
- type: filestream
|
||||
id: zeek-{{ LOGNAME }}
|
||||
paths:
|
||||
- /nsm/zeek/logs/current/{{ LOGNAME }}.log
|
||||
fields:
|
||||
@@ -150,6 +152,7 @@ filebeat.inputs:
|
||||
close_removed: false
|
||||
|
||||
- type: filestream
|
||||
id: import-zeek={{ LOGNAME }}
|
||||
paths:
|
||||
- /nsm/import/*/zeek/logs/{{ LOGNAME }}.log
|
||||
fields:
|
||||
@@ -174,6 +177,7 @@ filebeat.inputs:
|
||||
{%- endif %}
|
||||
|
||||
- type: filestream
|
||||
id: suricata-eve
|
||||
paths:
|
||||
- /nsm/suricata/eve*.json
|
||||
fields:
|
||||
@@ -190,6 +194,7 @@ filebeat.inputs:
|
||||
close_removed: false
|
||||
|
||||
- type: filestream
|
||||
id: import-suricata
|
||||
paths:
|
||||
- /nsm/import/*/suricata/eve*.json
|
||||
fields:
|
||||
@@ -212,6 +217,7 @@ filebeat.inputs:
|
||||
close_removed: false
|
||||
{%- if STRELKAENABLED == 1 %}
|
||||
- type: filestream
|
||||
id: strelka
|
||||
paths:
|
||||
- /nsm/strelka/log/strelka.log
|
||||
fields:
|
||||
@@ -233,6 +239,7 @@ filebeat.inputs:
|
||||
{%- if WAZUHENABLED == 1 %}
|
||||
|
||||
- type: filestream
|
||||
id: wazuh
|
||||
paths:
|
||||
- /wazuh/archives/archives.json
|
||||
fields:
|
||||
@@ -251,6 +258,7 @@ filebeat.inputs:
|
||||
{%- if FLEETMANAGER or FLEETNODE %}
|
||||
|
||||
- type: filestream
|
||||
id: osquery
|
||||
paths:
|
||||
- /nsm/osquery/fleet/result.log
|
||||
fields:
|
||||
@@ -321,12 +329,12 @@ filebeat.inputs:
|
||||
|
||||
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-manager', 'so-managersearch', 'so-import'] %}
|
||||
- type: filestream
|
||||
id: kratos
|
||||
paths:
|
||||
- /logs/kratos/kratos.log
|
||||
fields:
|
||||
module: kratos
|
||||
category: host
|
||||
tags: beat-ext
|
||||
processors:
|
||||
- decode_json_fields:
|
||||
fields: ["message"]
|
||||
@@ -344,6 +352,7 @@ filebeat.inputs:
|
||||
target: ''
|
||||
fields:
|
||||
event.dataset: access
|
||||
pipeline: "kratos"
|
||||
fields_under_root: true
|
||||
clean_removed: false
|
||||
close_removed: false
|
||||
@@ -351,6 +360,7 @@ filebeat.inputs:
|
||||
|
||||
{%- if grains.role == 'so-idh' %}
|
||||
- type: filestream
|
||||
id: idh
|
||||
paths:
|
||||
- /nsm/idh/opencanary.log
|
||||
fields:
|
||||
|
||||
@@ -0,0 +1,22 @@
|
||||
{%- if grains['role'] == 'so-eval' -%}
|
||||
{%- set ES = salt['pillar.get']('manager:mainip', '') -%}
|
||||
{%- else %}
|
||||
{%- set ES = salt['pillar.get']('elasticsearch:mainip', '') -%}
|
||||
{%- endif %}
|
||||
{%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
|
||||
{%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
|
||||
output {
|
||||
if [module] =~ "kratos" and "import" not in [tags] {
|
||||
elasticsearch {
|
||||
pipeline => "kratos"
|
||||
hosts => "{{ ES }}"
|
||||
{% if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
|
||||
user => "{{ ES_USER }}"
|
||||
password => "{{ ES_PASS }}"
|
||||
{% endif %}
|
||||
index => "so-kratos"
|
||||
ssl => true
|
||||
ssl_certificate_verification => false
|
||||
}
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user