Thanks!
Agreed.. Glad to hear...perfect timing.
Looking forward to testing as well! One thing I noticed -- the blog entry references:
'https://github.com/SMAPPER/elk-test' for Justin Henderson's Logstash configs.
Should it not be 'https://github.com/SMAPPER/Logstash-Configs' ?
Thanks,
Wes
Super excited about this.
I did notice a sequence error in the install script.
apt-get is used on line 146 to ensure git is installed, but 'git clone' was already executed on line 137.
JM
Thanks for all you do with this project, was hoping to see this headed our way after seeing the video from the SecOnion conference videos this past summer.
Is it possible that Martin's new work with fed, galaxy, pulsar are included with this preview or it that coming down the road?
I'll be testing for sure and will let you know.
This is an extremely good move for Security Onion. I read on one of your posts that this is in testing phase. Do you have any idea when this change to ELK will be usable within live environments? Thanks!
Awesome.
Doug,
Roger that. I plan on performing a series of tests on VMware ASAP.
Doug,
I took my home Optiplex 755(Intel(R) Core(TM)2 Quad CPU Q6600 @ 2.40GHz) with 8 GIG of RAM that has been running SO for quite some time... system has been shut down for a few months as I've been distracted with other stuff.
I performed "sudo soup", reboot then ran sosetup followed by running the securityonion_elsa2elk.sh and things look to be just fine. I'll let it run for a while and patch on a regular basis.
I'll be spinning this up at work over the next few weeks once I find some real hardware to run it on :)
Nice clean scripting BTW .... thanks to all the other folks that worked on this as well.
Works flawlessly on a HPdl380G7 with 8GB of ram.
What do you think?
-I absolutely love it. Its everything I wanted and more.
What works well?
-Dashboard presentations, drilling down while hunting, pivoting between capme interface and squert.
What needs to be improved?
-Not so much what needs to be improved, but looking forward to future enhancements/capabilities in relation to the stable master/sensor setup. Would love to see how this works with ELK vs ELSA.
Thank you so much for this Doug! Let me know if there is any way I can help with testing or development.
-Marcus
Kurrus? Saw your video :) We had a brief exchange about surricata and snort a few months back. I am as excited as you are with ELK :)
Are you looking into including any event correlation engine into Security Onion?
GREAT WORK bro!
It's exciting...
I noticed when I tried to run NetworkMiner that it looked like it was the windows version and would not run. I am I missing something?
It's amazing work Doug. :-).
This sounds rather exciting. Can't help but wonder what is the main motivation behind this? I have noticed there is little activity on upstream ELSA...
Will have a play as soon as I can and feedback here.
--Marcelo
I see that you can edit and increase the limit in order to see the bottom.
Brandon, thank you for your comments. You are spot on about having both ELK and ELSA being a resource issue. On top of that maintaining both would be problematic.
ELK is being looked at as a transition from ELSA as it is becoming a more common platform within the community. It also introduces some interesting components for log enrichment and dealing with alert data and Bro data. Also, switching to it would allow Security Onion to transition from a network security monitoring platform to a network security monitoring platform with full logging and analysis capabilities similar to commercial SIEMs.
Should this change from ELSA to ELK happen I will try and publish some blogs and documentation on some of the ELK components to speed up their transition. Expect that if it happens it will take some time. This is a fairly significant change.
Thanks for the reply, and more importantly thank you for the work you have done with this integration of ELK. I am a novice when it comes to ELK so yes any documentation would be useful. For now, I am just learning on the fly. I'm working on standing up a separate ELK server for host logs so that it will force me to learn the ins and outs. Thanks again.
Love the dashboards, will help greatly with aggregate data hunts and general daily posturing.
Only thing I miss so far with my limited testing is having multiple sub tabs open in one browser tab as ELSA does.
Is any help needed as far as log import parsers. I haven't worked with ELK much at all besides testing it a couple times quickly but would be willing to help bring parity between what ELSA can parse and what may be missing with SO ELK. Pretty busy right now, but can try to carve out time if the help would be beneficial. Thanks
Just wanted to share my experience with testing the ELK installation script, and its functionality afterwards. Very good stuff. Here's a short video depicting the results:
Good stuff Jesse!
I just wanted to say thank you for all the hard work, testing and integration performed to bring this new platform to life.
I apologize for having not replied sooner as I have been testing the new platform in a cloud environment that was previously deployed as a "master server". I reran "sosetup" to switch to a "stand-alone" deployment scheme.
As a result of running the ELK script upgrade, the system as a whole ran perfectly fine using the SO image 14.04.5. Also, the Kibana integration is a great addition to an already great security tool. The dashboards are also very useful by providing aggregated datasets for the analysts in one place.
Further, I have also deployed the SO-ELK on a physical server in my lab and it's been running with no issues since deployment.
Thank you Doug and everyone in the SO team. I can't wait for the final production version of the SO-ELK because it will just be awesome mates.
Good Day mate!
BelleCrosse
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
lmenezes elasticsearch failed to download from all possible locations
warning couldnt locate pandoc
warning no previous inclusion file match *.pyo, *.pyc (and a bunch of other .py?)
but like I said it seems to be running ok all the same.
I'm running ELK preview now on a Dell 720xd , 2 procs, 128GIG of Ram and 11 3TB drives in a RAID6 config.
I'm averaging over 9 million records in a 24 hours period based on the Overview dashboard number.
I can't seem to get through an entire day without Kibana timing out on a refresh or even clicking on say Bro notices. I'm not using Kibana for a lot of the day but checking in on it once in a while. Today I stopped Kibana, restarted elasticsearch and then started Kibana and that seem to bring Kibana back to life ;)
I'll try and dig in soon to see if logs reveal any problems. I know a brief stint with ELK prior memory settings were key for performance :) so I'll be looking at that for sure.
Thanks again for all your efforts.
I manage to figure out, at first i was not paying attention to the install, when i looked I saw "restart apache2" after I did that everything worked perfectly.
FOLLOWUP: I un-commented and set ES_HEAP_SIZE=28g in /etc/init.d/elasticsearch and boy what a difference and performance. Kibana was still responding at the end of the day as well. You can only give a maximum of 31 GIG to Elasticsearch according to the comments section and I also remember that from my prior brief experience.
So in summary, it's java under the hood so give as much memory as you can afford to ELK ;)
You received this message because you are subscribed to a topic in the Google Groups "security-onion" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/security-onion/ReAPgPn746M/unsubscribe.
To unsubscribe from this group and all its topics, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
To unsubscribe from this group and all its topics, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
> > > security-onion+unsubscribe@googlegroups.com.
> > > To post to this group, send email to security-onion@googlegroups.com.
> > > Visit this group at https://groups.google.com/group/security-onion.
> > > For more options, visit https://groups.google.com/d/optout.
> > >
> >
> >
> > --
> >
> >
> > Sincerely,
> >
> > Justin Henderson
> > (312) 857-5755
> > Systems and Security Architect
> > GSE # 108, Cyber Guardian Red / Blue
> > http://www.linkedin.com/in/justinhenderson2014/
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to a topic in the Google Groups "security-onion" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/security-onion/ReAPgPn746M/unsubscribe.
To unsubscribe from this group and all its topics, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Question, so regarding current SO enterprise production deployments what is the goal to update them to ELK once the official release comes out? I am assuming the only changes made by such a script would be to the master server only? Any changes needed to the sensors?
Sorry I know this is thinking a little forward but just curious on what the idea would be. Not sure If I should build out my deployment now or wait for the official SO/ELK release. I have my budget now :)