Merge pull request #8260 from Security-Onion-Solutions/fix/kratos_dedicated_index_and_filestream_id_additions

Add dedicated index for Kratos and IDs for all filestream inputs
This commit is contained in:
weslambert
2022-07-08 12:04:40 -04:00
committed by GitHub
4 changed files with 47 additions and 1 deletions

View File

@@ -14,4 +14,5 @@ logstash:
- so/9700_output_strelka.conf.jinja
- so/9800_output_logscan.conf.jinja
- so/9801_output_rita.conf.jinja
- so/9802_output_kratos.conf.jinja
- so/9900_output_endgame.conf.jinja

View File

@@ -0,0 +1,13 @@
{
"description" : "kratos",
"processors" : [
{
"set": {
"field": "_index",
"value": "so-kratos",
"override": true
}
},
{ "pipeline": { "name": "common" } }
]
}

View File

@@ -118,6 +118,7 @@ filebeat.inputs:
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-manager', 'so-managersearch', 'so-import'] %}
- type: filestream
id: logscan
paths:
- /logs/logscan/alerts.log
fields:
@@ -135,6 +136,7 @@ filebeat.inputs:
{%- if ZEEKVER != 'SURICATA' %}
{%- for LOGNAME in salt['pillar.get']('zeeklogs:enabled', '') %}
- type: filestream
id: zeek-{{ LOGNAME }}
paths:
- /nsm/zeek/logs/current/{{ LOGNAME }}.log
fields:
@@ -150,6 +152,7 @@ filebeat.inputs:
close_removed: false
- type: filestream
id: import-zeek={{ LOGNAME }}
paths:
- /nsm/import/*/zeek/logs/{{ LOGNAME }}.log
fields:
@@ -174,6 +177,7 @@ filebeat.inputs:
{%- endif %}
- type: filestream
id: suricata-eve
paths:
- /nsm/suricata/eve*.json
fields:
@@ -190,6 +194,7 @@ filebeat.inputs:
close_removed: false
- type: filestream
id: import-suricata
paths:
- /nsm/import/*/suricata/eve*.json
fields:
@@ -212,6 +217,7 @@ filebeat.inputs:
close_removed: false
{%- if STRELKAENABLED == 1 %}
- type: filestream
id: strelka
paths:
- /nsm/strelka/log/strelka.log
fields:
@@ -233,6 +239,7 @@ filebeat.inputs:
{%- if WAZUHENABLED == 1 %}
- type: filestream
id: wazuh
paths:
- /wazuh/archives/archives.json
fields:
@@ -251,6 +258,7 @@ filebeat.inputs:
{%- if FLEETMANAGER or FLEETNODE %}
- type: filestream
id: osquery
paths:
- /nsm/osquery/fleet/result.log
fields:
@@ -321,12 +329,12 @@ filebeat.inputs:
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-manager', 'so-managersearch', 'so-import'] %}
- type: filestream
id: kratos
paths:
- /logs/kratos/kratos.log
fields:
module: kratos
category: host
tags: beat-ext
processors:
- decode_json_fields:
fields: ["message"]
@@ -344,6 +352,7 @@ filebeat.inputs:
target: ''
fields:
event.dataset: access
pipeline: "kratos"
fields_under_root: true
clean_removed: false
close_removed: false
@@ -351,6 +360,7 @@ filebeat.inputs:
{%- if grains.role == 'so-idh' %}
- type: filestream
id: idh
paths:
- /nsm/idh/opencanary.log
fields:

View File

@@ -0,0 +1,22 @@
{%- if grains['role'] == 'so-eval' -%}
{%- set ES = salt['pillar.get']('manager:mainip', '') -%}
{%- else %}
{%- set ES = salt['pillar.get']('elasticsearch:mainip', '') -%}
{%- endif %}
{%- set ES_USER = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:user', '') %}
{%- set ES_PASS = salt['pillar.get']('elasticsearch:auth:users:so_elastic_user:pass', '') %}
output {
if [module] =~ "kratos" and "import" not in [tags] {
elasticsearch {
pipeline => "kratos"
hosts => "{{ ES }}"
{% if salt['pillar.get']('elasticsearch:auth:enabled') is sameas true %}
user => "{{ ES_USER }}"
password => "{{ ES_PASS }}"
{% endif %}
index => "so-kratos"
ssl => true
ssl_certificate_verification => false
}
}
}