Event Forwarding syntax #13424
-
Version2.4.80 Installation MethodSecurity Onion ISO image Descriptionconfiguration Installation TypeStandalone Locationon-prem with Internet access Hardware SpecsExceeds minimum requirements CPU12 RAM16 Storage for /500GB Storage for /nsm500GB Network Traffic Collectionspan port Network Traffic Speeds1Gbps to 10Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsNo, there are no additional clues DetailI'm trying to use Security Onion as a log ingestion point to forward on network traffic/alerts to our SIEM, but I can't find information on the syntax for the config files anywhere except this single example below. Is there any documentation for this specifically? I want to start by just forwarding everything, and then work on tuning it down if I need to. The syslog plugin below seems like could be an option, but I feel like shouldn't be necessary, just need to know the proper syntax for that config file. Any help would be really appreciated. https://docs.securityonion.net/en/latest/logstash.html output { Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 5 comments 8 replies
-
If you are going to forward all of Zeek, you would just use
|
Beta Was this translation helpful? Give feedback.
-
I never could manage to get the config to work using multiple pipelines, so I was able to get really close using the configs in the attached images. Unfortunately, the first output added what looks like improperly formatted syslog headers, so our SIEM still would not parse them correctly. The only thing I want to send is the Suricate "EVE" formatted message, starting at the "timestamp" field. I also tried filtering the output by the tag, and everything was correct, except for some reason it then appended the "tags" field at the end, again not allowing it to be parsed correctly. I also Thought I could try something like this, but not sure if you can filter from within the syslog/output https:/www.elastic.co/guide/en/logstash/current/plugins-filters-prune.html |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Sorry, honestly I don't know. Unfortunately most of the documentation seems to presuppose a detailed understanding of how to filter and parse all the data so most of it's over my head and I can't seem to find the supporting information I need (and I've spent literally days reading and trying to track it down). I do know that in my /nsm/suricata directory the ONLY logs match the EVE format like such, "{"timestamp":"2024-09-13T18:42:56.767923+0000","flow_id":528852817273834,"in_iface":"bond0","event_type":"alert","vlan":[975],"src_ip": etc...." so I don't understand where the extra logs are coming from or why they're being included. My SIEM has a parser for Suricata/EVE, so at this point, I'm not trying to get into any kind of advanced filtering, so not sure why it's been so difficult, I just want to forward on ONLY the alerts exactly as they are in the nsm directory with nothing else added. https://docs.suricata.io/en/latest/output/eve/eve-json-format.html |
Beta Was this translation helpful? Give feedback.
-
I think I got it! adding the format message in the output looks like it removed those extra headers! Thanks for the help
|
Beta Was this translation helpful? Give feedback.
I think I got it! adding the format message in the output looks like it removed those extra headers! Thanks for the help
filter { if [event][module] == "suricata" { prune { whitelist_names => [ "message" ] add_tag => [ "Msg_filter" ] } } } output { if "Msg_filter" in [tags] { tcp { codec => line { format => "%{message}" } id => "SO_LOG" host => "10.x.x.x" port => 30051 } } }