custom output to external destination referencing event fields #12596
Replies: 1 comment 4 replies
-
Are you using Suricata as metadata too? If not |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Version
2.4.50
Installation Method
Security Onion ISO image
Description
configuration
Installation Type
Standalone
Location
on-prem with Internet access
Hardware Specs
Exceeds minimum requirements
CPU
26
RAM
134gb
Storage for /
200GB
Storage for /nsm
200TB
Network Traffic Collection
span port
Network Traffic Speeds
1Gbps to 10Gbps
Status
Yes, all services on all nodes are running OK
Salt Status
No, there are no failures
Logs
No, there are no additional clues
Detail
I installed Security Onion 2.4.50 from scratch, and trying to get my custom pipeline output to an external destination (syslog) working properly again. I've written a custom pipeline as shown below and it works.
output {
if [event][module] =~ "suricata" {
syslog {
id => "cloned_events_out"
host => "10.1.10.144"
port => 10008
codec => "json"
}
}
}
However, I'm only interested in outputting alerts to syslog, and I cannot figure out how to reference fields within the event. For instance, [event][tags] =~ "alert" will not work. [event][dataset] =~ "suricata.alert" In version Security Onion 2.3, if [module] =~ "suricata" seemed to work fine. I see these fields when I look at the event in Kibana. I guess what it boils down to is I don't know how to correctly reference fields to use in if statements like above. Wondering if anyone can provide guidance on this? Yes I have referenced https://docs.securityonion.net/en/2.4/logstash.html#original-event-forwarding
Guidelines
Beta Was this translation helpful? Give feedback.
All reactions