You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[sysdig] Add support for security event datastream (elastic#13626)
This security events logs provides an overview of your infrastructure,
and allows you to deep-dive into specific security events, distinguish,
false positives, and configure policies to enhance performance.
Sanitized test case inputs were obtained from live Sysdig Secure instance
using the Sysdig Next Gen API.
Copy file name to clipboardExpand all lines: packages/sysdig/_dev/build/docs/README.md
+37-7Lines changed: 37 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,18 @@
1
1
# Sysdig Integration
2
-
This integration allows for the shipping of [Sysdig](https://sysdig.com/)alerts to Elastic for observability and organizational awareness. Alerts can then be analyzed by using either the dashboard included with the integration or via the creation of custom dashboards within Kibana.
2
+
This integration allows for the shipping of [Sysdig](https://sysdig.com/)logs to Elastic for security, observability and organizational awareness. Logs can then be analyzed by using either the dashboard included with the integration or via the creation of custom dashboards within Kibana.
3
3
4
4
## Data Streams
5
-
The Sysdig integration collects one type of data stream: alerts.
5
+
The Sysdig integration collects two type of logs:
6
6
7
7
**Alerts** The Alerts data stream collected by the Sysdig integration is comprised of Sysdig Alerts. See more details about Sysdig Alerts in [Sysdig's Alerts Documentation](https://docs.sysdig.com/en/docs/sysdig-monitor/alerts/). A complete list of potential fields used by this integration can be found in the [Logs reference](#logs-reference)
8
8
9
+
**Event** The event data stream collected through the Sysdig integration consists of Sysdig Security Events. See more details about Security Events in [Sysdig's Events Feed Documentation](https://docs.sysdig.com/en/docs/sysdig-secure/threats/activity/events-feed/).
10
+
9
11
## Requirements
10
12
11
-
You need Elasticsearch for storing and searching your data and Kibana for visualizing and managing it.
12
-
You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your own hardware.
13
+
### Agent-based installation
14
+
15
+
Elastic Agent must be installed. For more details, check the Elastic Agent [installation instructions](docs-content://reference/fleet/install-elastic-agents.md).
13
16
14
17
Sysdig must be configured to output alerts to a supported output channel as defined in [Setup](#setup). The system will only receive common fields output by Sysdig's rules, meaning that if a rule does not include a desired field the rule must be edited in Sysdig to add the field.
15
18
@@ -25,14 +28,41 @@ The HTTP input allows the Elastic Agent to receive Sysdig Alerts via HTTP webhoo
25
28
26
29
**Required:** To configure Sysdig to output JSON, you must set up as webhook notification channel as outlined in the [Sysdig Documentation](https://docs.sysdig.com/en/docs/administration/administration-settings/outbound-integrations/notifications-management/set-up-notification-channels/configure-a-webhook-channel/).
27
30
31
+
### To collect data from the Sysdig Next Gen API:
32
+
33
+
- Retrieve the API Token by following [Sysdig's API Token Guide](https://docs.sysdig.com/en/retrieve-the-sysdig-api-token).
34
+
35
+
### Enabling the integration in Elastic:
36
+
37
+
1. In Kibana navigate to Management > Integrations.
38
+
2. In "Search for integrations" top bar, search for `Sysdig`.
39
+
3. Select the "Sysdig" integration from the search results.
40
+
4. Select "Add Sysdig" to add the integration.
41
+
5. Add all the required integration configuration parameters, including the URL, API Token, Interval, and Initial Interval, to enable data collection.
42
+
6. Select "Save and continue" to save the integration.
43
+
44
+
**Note**:
45
+
- The URL may vary depending on your region. Please refer to the [Documentation](https://docs.sysdig.com/en/developer-tools/sysdig-api/#access-the-sysdig-api-using-the-regional-endpoints) to find the correct URL for your region.
46
+
- If you see an error saying `exceeded maximum number of CEL executions` during data ingestion, it usually means a large volume of data is being processed for the selected time interval. To fix this, try increasing the `Maximum Pages Per Interval` setting in the configuration.
47
+
28
48
## Logs Reference
29
49
30
-
### alerts
50
+
### Alerts
31
51
32
52
Sysdig alerts can contain a multitude of various fields pertaining to the type of activity on the host machine.
0 commit comments