Index in Elastalert rule to send alert mail #14093
-
Hello, I want to create an Elastalert rule that sends an email when a “High” severity alert is detected. As this index no longer seems to exist in Security Onion version 2.4, I see the following indexes which could potentially be those containing Suricata alerts:
I'm not sure I'm looking in the right indexes, I'd like my Elastalert rule to look for alerts generated for both Suricata and Sigma (in short, all alerts generated by Security Onion). Thanks in advance ! |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 1 reply
-
The index you need is logs-suricata.alerts-so Here is an example of some of my rule file:
Change event.severity to 4 to get Critical alerts |
Beta Was this translation helpful? Give feedback.
-
the .ds files are the data streams, which are dynamically created as "sub
components" of the index. If you reference the index
logs-suricata.alerts-so, then it automatically also references the matching
streams. You don't need to reference the streams directly.
Ross
…On Fri, 10 Jan 2025 at 21:44, Dylan Canton ***@***.***> wrote:
Hello,
Thank you very much for your complete answer!
there's one last thing I don't understand: when I do a search for indexes
containing *logs-suricata.alerts-so*, I get the following indexes:
.ds-logs-suricata.alerts-so-2024.10.25-000002
.ds-logs-suricata.alerts-so-2024.12.13-000045
.ds-logs-suricata.alerts-so-2024.10.26-000003
.ds-logs-suricata.alerts-so-2024.12.14-000046
.ds-logs-suricata.alerts-so-2024.10.27-000004
.ds-logs-suricata.alerts-so-2024.12.11-000043
.ds-logs-suricata.alerts-so-2024.10.28-000005
.ds-logs-suricata.alerts-so-2024.12.12-000044
...
Each index starts with “*.ds-*” and ends with a *timestamp*. Do I need to
indicate this in the elastalert rule or is just putting
*logs-suricata.alerts-so* without the “.ds-” and the timestamp enough for
Elastalert to search in Elastisearch ?
I'm having trouble understanding the handling of index names between API
requests made on Elasticsearch and elastalert rules (if the names are to be
exactly similar).
—
Reply to this email directly, view it on GitHub
<#14093 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AFJEGQIDMYRLNDHVGX4767D2J6CAXAVCNFSM6AAAAABU4WCOPWVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTCNZZGU2DSMA>
.
You are receiving this because you commented.Message ID:
<Security-Onion-Solutions/securityonion/repo-discussions/14093/comments/11795490
@github.com>
|
Beta Was this translation helpful? Give feedback.
The index you need is logs-suricata.alerts-so
Here is an example of some of my rule file: