Skip to content

Commit 7323dde

Browse files
committed
Update Zeek article
1 parent b50db00 commit 7323dde

File tree

8 files changed

+70
-49
lines changed

8 files changed

+70
-49
lines changed

docs/cse/sensors/index.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,12 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1212
In this section, we'll introduce the following concepts:
1313

1414
<div className="box-wrapper" >
15+
<div className="box smallbox card">
16+
<div className="container">
17+
<a href="/docs/cse/sensors/ingest-zeek-logs"><img src={useBaseUrl('img/icons/logs.png')} alt="Document icon" width="40"/><h4>Ingest Zeek Logs</h4></a>
18+
<p>Learn how to collect Zeek (Bro) logs and ingest them to Cloud SIEM.</p>
19+
</div>
20+
</div>
1521
<div className="box smallbox card">
1622
<div className="container">
1723
<a href="/docs/cse/sensors/sensor-download-locations"><img src={useBaseUrl('img/icons/operations/sensor.png')} alt="Database icon" width="40"/><h4>Sensor Download Locations</h4></a>
@@ -36,10 +42,4 @@ In this section, we'll introduce the following concepts:
3642
<p>Learn how to collect Log Sensor status and data to support troubleshooting efforts.</p>
3743
</div>
3844
</div>
39-
<div className="box smallbox card">
40-
<div className="container">
41-
<a href="/docs/cse/sensors/ingest-zeek-logs"><img src={useBaseUrl('img/icons/logs.png')} alt="Document icon" width="40"/><h4>Ingest Zeek Logs</h4></a>
42-
<p>Learn how to collect Zeek (Bro) logs and ingest them to Cloud SIEM.</p>
43-
</div>
44-
</div>
4545
</div>

docs/cse/sensors/ingest-zeek-logs.md

Lines changed: 43 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -12,46 +12,9 @@ This topic has instructions for ingesting Zeek logs into Cloud SIEM. 
1212

1313
Cloud SIEM uses [Zeek](https://zeek.org/) (formerly known as Bro) for network visibility. Zeek is an open source network analysis framework that organizes packets into flows, decodes common protocols, performs file extraction, SSL certificate validation, OS fingerprinting and more. Zeek can be extended through plugins for additional detection capabilities.
1414

15-
## Best collection method: Network Sensor
15+
## Supported collection method: Sumo Logic Source
1616

17-
Sumo Logic recommends using Cloud SIEM’s Network Sensor to collect Zeek logs and upload them to an HTTP Source on a Sumo Logic Hosted Collector. This is far and away the preferred method: it ensures that supported Bro policies are enabled and that the supported Bro output format is configured. It also results in the creation of Cloud SIEM Records from the raw Zeek log messages. For instructions, see [Network Sensor Deployment Guide](/docs/cse/sensors/network-sensor-deployment-guide)
18-
19-
The Network Sensor extracts files observed over cleartext protocols that match selected MIME types. You can configure what types will be extracted using the [extracted_file_types](/docs/cse/sensors/network-sensor-deployment-guide) property in the Network Sensor’s configuration file, `trident-sensor.cfg`. By default the sensor will upload password-protected zip files and the following types of executables:
20-
21-
* `application/x-dosexec`
22-
* `application/x-msdownload`
23-
* `application/x-msdos-program`
24-
25-
:::note
26-
YARA [file analysis](/docs/cse/rules/import-yara-rules) is supported only for files extracted by the Network Sensor. If you use
27-
your own Zeek deployment and ingest logs using a Sumo Logic Source you cannot also upload extracted files. 
28-
:::
29-
30-
### Filtering Zeek logs
31-
32-
This section describes two methods you can use to filter the logs that the Network Sensor sends to Cloud SIEM.
33-
34-
* You can configure a Berkeley Packet Filter (BPF) filter using the [filter](/docs/cse/sensors/network-sensor-deployment-guide) parameter in Network Sensor’s configuration file, `trident-sensor.cfg`. This is the most efficient filtering mechanism as it is performed before Network Sensor processing.
35-
36-
The value of the `filter` parameter is an expression that begins with `not`. This example expression ensures the that the Network Sensor won't process any traffic involving host `a.b.c.com` or host `d.e.f.com`:
37-
38-
`not ( host a.b.c.com ) and not ( host d.e.f.com )`
39-
40-
For information about BPF filter syntax, see https://biot.com/capstats/bpf.html.
41-
 
42-
* You can also filter by Zeek log type using the [skipped_log_types](/docs/cse/sensors/network-sensor-deployment-guide) property in `trident-sensor.cfg`. The default value of `skipped_log_types` is:
43-
44-
```
45-
dpd,weird,syslog,pe,tunnel,communication,conn-summary,known_hosts,software,stdout.stderr,loaded_scripts,ntp
46-
```
47-
48-
You can add additional Zeek log types to the list to exclude them.
49-
50-
The BPF filter is applied before `skipped_log_types`. So, given the example BPF filter above, if you add `dns` to the `skipped_log_types` value, you won't ingest logs related to traffic involving hosts `a.b.c.com` or `d.e.f.com`, and you won't ingest DNS data.
51-
52-
## Alternative collection method: Sumo Logic Source 
53-
54-
Although the Network Sensor is the preferred method for collecting Zeek logs, there is an alternative. If you already have a Zeek deployment, you can collect logs using a Sumo Logic Collector and Source.
17+
If you already have a Zeek deployment, you can collect logs using a Sumo Logic Collector and Source.
5518

5619
:::note
5720
This method requires that your Zeek logs are in JSON format. 
@@ -60,7 +23,6 @@ This method requires that your Zeek logs are in JSON format. 
6023
### Configure a Sumo Logic Source
6124

6225
In this step, you configure a Sumo Logic Source on an Sumo Logic Installed Collector. Choose the appropriate Source type based on:
63-
6426
* If you already have a method of forwarding Zeek logs in JSON format in Syslog format to a collector in your environment, you can use a Syslog Source to ingest the logs.
6527
* If you’re not set up to use Syslog, and have Zeek log files stored on a filesystem, you can use a Local File Source to ingest the logs.
6628

@@ -141,3 +103,44 @@ Perform these steps for each of the FERs.
141103
1. **Scope**. Click **Specific Data**.
142104
1. **Parse Expression**. Enter the parse expression shown in the table above for the field the rule will extract.
143105
1. Click **Save**.<br/><img src={useBaseUrl('img/cse/example-fer.png')} alt="Example FER" style={{border: '1px solid gray'}} width="400"/>
106+
107+
108+
## Unsupported collection method: Network Sensor
109+
110+
:::caution End-of-Life
111+
This section describes using the Cloud SIEM Network Sensor. The Network Sensor has reached end of life and is no longer supported. Instead, use Zeek. For more information, see [Supported collection method: Sumo Logic Source](#supported-collection-method-sumo-logic-source).
112+
:::
113+
114+
You can use Cloud SIEM’s Network Sensor to collect Zeek logs and upload them to an HTTP Source on a Sumo Logic Hosted Collector. This method ensures that supported Bro policies are enabled and that the supported Bro output format is configured. It also results in the creation of Cloud SIEM Records from the raw Zeek log messages. For instructions, see [Network Sensor Deployment Guide](/docs/cse/sensors/network-sensor-deployment-guide).
115+
116+
The Network Sensor extracts files observed over cleartext protocols that match selected MIME types. You can configure what types will be extracted using the [extracted_file_types](/docs/cse/sensors/network-sensor-deployment-guide) property in the Network Sensor’s configuration file, `trident-sensor.cfg`. By default the sensor will upload password-protected zip files and the following types of executables:
117+
118+
* `application/x-dosexec`
119+
* `application/x-msdownload`
120+
* `application/x-msdos-program`
121+
122+
:::note
123+
YARA [file analysis](/docs/cse/rules/import-yara-rules) is supported only for files extracted by the Network Sensor. If you use your own Zeek deployment and ingest logs using a Sumo Logic Source you can't also upload extracted files.
124+
:::
125+
126+
### Filtering Zeek logs
127+
128+
This section describes two methods you can use to filter the logs that the Network Sensor sends to Cloud SIEM.
129+
130+
* You can configure a Berkeley Packet Filter (BPF) filter using the [filter](/docs/cse/sensors/network-sensor-deployment-guide) parameter in Network Sensor’s configuration file, `trident-sensor.cfg`. This is the most efficient filtering mechanism as it is performed before Network Sensor processing.
131+
132+
The value of the `filter` parameter is an expression that begins with `not`. This example expression ensures the that the Network Sensor won't process any traffic involving host `a.b.c.com` or host `d.e.f.com`:
133+
134+
`not ( host a.b.c.com ) and not ( host d.e.f.com )`
135+
136+
For information about BPF filter syntax, see https://biot.com/capstats/bpf.html.
137+
138+
* You can also filter by Zeek log type using the [skipped_log_types](/docs/cse/sensors/network-sensor-deployment-guide) property in `trident-sensor.cfg`. The default value of `skipped_log_types` is:
139+
140+
```
141+
dpd,weird,syslog,pe,tunnel,communication,conn-summary,known_hosts,software,stdout.stderr,loaded_scripts,ntp
142+
```
143+
144+
You can add additional Zeek log types to the list to exclude them.
145+
146+
The BPF filter is applied before `skipped_log_types`. So, given the example BPF filter above, if you add `dns` to the `skipped_log_types` value, you won't ingest logs related to traffic involving hosts `a.b.c.com` or `d.e.f.com`, and you won't ingest DNS data.

docs/cse/sensors/log-sensor-troubleshooting.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,9 @@ title: Log Sensor Troubleshooting
44
description: Learn how to collect Log Sensor status and data to support troubleshooting efforts.
55
---
66

7-
7+
:::caution end-of-life
88
The Cloud SIEM Log Sensor has reached end of life and is no longer supported. Please migrate to a Sumo Logic Hosted Collector or Installed Collector. For more information, see the [end of life notice](https://app.getbeamer.com/cloudsiementerprise/en/end-of-life-notice-_-cloud-siem-enterprise-sensors)
9+
:::
910

1011
The Cloud SIEM Log Sensor collects log data and sends it to the legacy Cloud SIEM server. (The Log Sensor does not send log data to the Sumo Logic platform. Sumo Logic collectors serve that purpose.)
1112

docs/cse/sensors/network-sensor-deployment-guide.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,11 @@ description: Learn about Network Sensor deployment planning, standard sensor pla
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
import SensorEOL from '../../reuse/cloud-siem-network-sensor-eol.md';
10+
11+
:::caution end-of-life
12+
<SensorEOL/>
13+
:::
914

1015
This section has instructions for deploying the Cloud SIEM Network Sensor. It covers deployment planning, standard sensor placement, sensor requirements, installation, general configuration, and helpful commands. 
1116

docs/cse/sensors/network-sensor-troubleshooting.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,11 @@ description: Learn how to troubleshoot problems with the Cloud SIEM Network Sens
55
---
66

77
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
import SensorEOL from '../../reuse/cloud-siem-network-sensor-eol.md';
9+
10+
:::caution end-of-life
11+
<SensorEOL/>
12+
:::
813

914
The Cloud SIEM Network Sensor is a flexible network security monitor that monitors IP networks and collects flow and protocol session data, building audit records of network communications. As with all network sensors, performance is a key consideration for proper operation and comprehensive data collection. The installation of the Cloud SIEM network sensor configures the sensor with reasonable defaults for many environments. For other environments, such as high throughput deployments, Sumo Logic advises the use of a supported 3rd party Bro/Zeek sensor offering or a custom Zeek cluster deployment.
1015

docs/cse/sensors/sensor-download-locations.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,14 @@ title: Sensor Download Locations
44
description: The Cloud SIEM Network sensor can be downloaded from a static URL that is specific to your Cloud SIEM deployment.
55
---
66

7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
import SensorEOL from '../../reuse/cloud-siem-network-sensor-eol.md';
79

8-
The Cloud SIEM Network sensor can be downloaded from a static URL that is specific to your Cloud SIEM deployment. Each Sumo Logic deployment has URLs used to download sensor software. If you are not sure which endpoint to use, see How can I determine which endpoint I should use?
10+
:::caution end-of-life
11+
<SensorEOL/>
12+
:::
13+
14+
The Cloud SIEM Network Sensor can be downloaded from a static URL that is specific to your Cloud SIEM deployment. Each Sumo Logic deployment has URLs used to download sensor software. If you are not sure which endpoint to use, see How can I determine which endpoint I should use?
915

1016
## Installing the Network sensor
1117

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
This article describes using the Cloud SIEM Network Sensor. The Network Sensor has reached end of life and is no longer supported. Instead, use Zeek. For more information, see [Ingest Zeek Logs](/docs/cse/sensors/ingest-zeek-logs/).

sidebars.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2799,11 +2799,11 @@ integrations: [
27992799
collapsed: true,
28002800
link: {type: 'doc', id: 'cse/sensors/index'},
28012801
items: [
2802+
'cse/sensors/ingest-zeek-logs',
28022803
'cse/sensors/sensor-download-locations',
28032804
'cse/sensors/network-sensor-deployment-guide',
28042805
'cse/sensors/network-sensor-troubleshooting',
28052806
'cse/sensors/log-sensor-troubleshooting',
2806-
'cse/sensors/ingest-zeek-logs',
28072807
],
28082808
},
28092809
{

0 commit comments

Comments
 (0)