Has anyone been able to get x-pack working with RC1? I had it going with Beta 3, by adding "xpack.security.enabled: false" to /etc/elasticsearch/elasticsearch.yaml but now when I enable it it just crashes and reloads the docker without the module.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
I'd be interested to know if you get this to work. I know I had tried in past beta releases and was unsuccessful.
vi /etc/elasticsearch/elasticsearch.yml
Add "xpack.security.enabled: false"
Add "xpack.license.self_generated.type: basic"
vi /etc/kibana/kibana.yml
Add "xpack.security.enabled: false"
sudo docker ps
docker exec -it ELASTICSEARCHCONTAINERID /bin/bash
bin/elasticsearch-plugin install x-pack
bin/elasticsearch-plugin list (and it should respond "x-pack")
exit
sudo docker ps
docker exec -it KIBANACONTAINERID /bin/bash
cd /usr/share/kibana
bin/kibana-plugin install x-pack
(This takes a while, its a large file and the Optimizing and caching thing takes forever)when done you should get "Plugin installation complete""
bash-4.2$ bin/kibana-plugin list (and it should respond "x-p...@6.1.2")
docker restart so-elasticsearch
(wait 60 seconds)
docker restart so-kibana
Done!
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to a topic in the Google Groups "security-onion" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/security-onion/UCep_oQ6pjo/unsubscribe.
To unsubscribe from this group and all its topics, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
If you email them at Elastic and explain it's for test/development they will give you a trial license that you can run ML on.
What kind of ML Jobs are you thinking about? I was trying to build a job that looked at bytes transfer, pr packets sent by src IP or the classic number of DNS requests to look for individual anomalies or anomolies vs. the fleet. but I apparently suck at ML and can't get it working.
I use a top talkers (Bytes, Packets, firewall rejects, IDS/AV events) to manually find trouble so an ML job that did the same would be really interesting.
I.E john is a top talker but he is three or 4 times a week so no flag, Paul has never been before and he is now so raise a flag, or dest A is spotify always a top talker so ignore etc..
I have been using elastalert and have about 20 alerts at this point. I'm only fascinated with the ML for some additional insight and the fact I see quite a few "cookbooks" out there that I can't seem to get to work for elastalert.
https://www.elastic.co/blog/elasticsearch-and-siem-implementing-host-portscan-detection
*snippet from my yaml*
type: cardinality
timeframe:
minutes: 10
cardinality_field: "destination_port"
max_cardinality: 20
query_key: "destination_ip"
filter:
- term:
event_type: "bro_conn"
Not sure what I need to change.
@Josh - can you give us some insight into what alerts you came up with?
Is there a good learning source for Elastialert? I searched and found the same link @Josh posted and had the same reaction he did, it looked like the most convoluted way of detecting a port scan I have ever seen. anyone know if there is something more practical out there with the standard stuff? 5 failed logons followed by a success, hits against threat intel list, AV/IPS hits, etc..
@Josh - can you give us some insight into what alerts you came up with?
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
http://elastalert.readthedocs.io/en/latest/recipes/writing_filters.html
http://elastalert.readthedocs.io/en/latest/ruletypes.html
I understand the filtering and exclusion of IPs, but in this case I'd like to also detect internal hosts. Had a client host get infected a few months back and it was scanning the network slowly and wasn't really picked up by any alerting. Reviewing logs you could tell, but again they were smart and didn't trigger an alert.
I just rebooted my RC1 server and X-pack did not survive the reboot. Is that expected behavior that plugins would get wiped by a reboot? Josh have you rebooted since you loaded x-pack?
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to a topic in the Google Groups "security-onion" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/security-onion/UCep_oQ6pjo/unsubscribe.
To unsubscribe from this group and all its topics, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
Hello Peter and All,
I try to follow the steps by peter for x-pack installation. But, when I try to install the x-pack through docker, I have come across "x-pack is not available with the oss distribution to use x-pack features use the default distribution." I would appreciate if you can suggest me how to resolve this.
Thanks and Best regards,
Gelli
I am also having the same issue when attempting to install x-packs with the basic license in security onion. See attached file.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.