Files
securityonion/salt/filebeat/securityoniondefaults.yaml
2021-05-13 13:07:16 -04:00

32 lines
900 B
YAML

securityonion_filebeat:
modules:
elasticsearch:
server:
enabled: true
var.paths: ["/logs/elasticsearch/*.log"]
kibana:
log:
enabled: true
var.paths: ["/logs/kibana/kibana.log"]
logstash:
log:
enabled: true
var.paths: ["/logs/logstash.log"]
redis:
log:
enabled: true
var.paths: ["/logs/redis.log"]
suricata:
eve:
enabled: true
var.paths: ["/nsm/suricata/eve*.json"]
{%- if grains['role'] in ['so-eval', 'so-standalone', 'so-sensor', 'so-helix', 'so-heavynode', 'so-import'] %}
{%- if ZEEKVER != 'SURICATA' %}
zeek:
{%- for LOGNAME in salt['pillar.get']('zeeklogs:enabled', '') %}
{{ LOGNAME }}:
enabled: false
var.paths: ["/nsm/zeek/logs/current/{{ LOGNAME }}.log"]
{%- endfor %}
{%- endif %}
{%- endif %}