Parsing winlogbeat data #11358
Replies: 5 comments 3 replies
-
Did you follow the Winlogbeat steps at https://docs.securityonion.net/en/2.3/beats.html#winlogbeat? Have you reviewed the Winlogbeat video at https://youtu.be/Xz-7oDrZdQY? |
Beta Was this translation helpful? Give feedback.
-
Thank you very much for your help. We would like to understand how we can create the parsers for Winlogbeat in Security Onion. According to this article, for Winlogbeat the ingest pipelines must be carried out with the installation of the Winlogbeats Agent. https://www.elastic.co/guide/en/beats/winlogbeat/current/load-ingest-pipelines.html For us, however, this leads to the errors already mentioned. Is there another way to import the parsers for Winlogbeat into Security Onion? Our current Security Onion version is 2.3.260. Thanks in advance. |
Beta Was this translation helpful? Give feedback.
-
Security Onion 2.3.260 already has ingest parsers for Windows event logs coming from Winlogbeat: This is why there are only a few steps at https://docs.securityonion.net/en/2.3/beats.html#winlogbeat and it shouldn't require the manual steps that you mentioned from https://www.elastic.co/guide/en/beats/winlogbeat/current/load-ingest-pipelines.html. Can you provide more information about where the process at https://docs.securityonion.net/en/2.3/beats.html#winlogbeat isn't working for you? Are you using the correct version of the Winlogbeat agent downloaded from SOC Downloads? Are you making any other changes to winlogbeat.yml other than what's shown at https://docs.securityonion.net/en/2.3/beats.html#winlogbeat? Finally, before we spend too much time troubleshooting 2.3 and Winlogbeat, please keep in mind that 2.4 is now available with Elastic Agent and we will announce 2.3 End Of Life date soon. So it may be a better use of time to switch to 2.4 and Elastic Agent. |
Beta Was this translation helpful? Give feedback.
-
Thanks for your help Doug. We definitely switch to 2.4 in the future. How do we get the PowerShell field into our Security Onion environment? As an example. The following Elasticsearch query does not work for us because the fields “process.command_line.security” do not exist . |
Beta Was this translation helpful? Give feedback.
-
@martin8615 Do the systems that you are shipping the logs from have Sysmon installed on them? If they don't, then you wont have logs with For the powershell logs - have you configured Winglogbeat to send them? Also, which Powershell logs are you referring to, there are a few different ones. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello Security Onion Community,
we have an issue parsing Winlogbeat data. In Kibana, we have´nt found any parser for Winlogbeat under Ingest Pipeline. Unfortunately, the data we receive from our Windows systems is not parsed correctly.
Therefore we installed Winlogbeat on a Windows Event Collector Server and tried to create the parsers in Security Onion with the command .\winlogbeat.exe setup –pipelines. But unfortunately we get the following error message:
.\winlogbeat.exe : Exiting: couldn't connect to any of the configured Elasticsearch hosts. Errors: [error connecting to Elasticsearch at http://x.x.x.x:5044/: Get
http://x.x.x.x:5044/: read tcp [Source_IP]:49791->[Destination_IP]:5044: wsarecv: An existing connection was forcibly closed by the remote host.]
At line:1 char:1
We send the events from our Windows Event Collector (on which Winlogbeat is installed in the version the SOC Download tab provides) to a Receiver Node that forwards the logs to our Search Nodes. This whole process itself works fine and the data is displayed in Kibana.
In Ingest Pipeliens there are currently more than 50 parsers that appear to be created automatically when Security Onion is installed.
e.g. Common, Common.nids, ecs, filebeat-7.17.3-xxxx, etc.
How does Security Onion regulate when which parser is used and how can we deploy new ones?
Thank you all in advance and best regards.
Beta Was this translation helpful? Give feedback.
All reactions