Ultimately, it goes to ELSA's local database on the sensor (I think it's syslog_data).
Thanks,
Wes
Thanks Wes. I have been watching the local syslog file and I only see CRON syslog entries showing all the hourly purge commands being run. I'm starting to believe my idea of using sub-interfaces to collect syslog is not working? How can I make sure syslog-ng/Security Onion is actually listening to the sub interfaces I created and parsing and archiving the incoming syslog.
SO-Server:/var/log# netstat -inv
Kernel Interface table
Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg
eth0 1500 0 97614 0 0 0 0 0 0 0 BMPORU
eth1 1500 0 19405650 0 0 0 3733616 0 0 0 BMRU
eth1:1 1500 0 - no statistics available - BMRU
eth1:2 1500 0 - no statistics available - BMRU
eth1:3 1500 0 - no statistics available - BMRU
eth1:4 1500 0 - no statistics available - BMRU
eth2 1500 0 2545 0 0 0 0 0 0 0 BMPORU
eth3 1500 0 2545 0 0 0 0 0 0 0 BMPORU
lo 65536 0 185452 0 0 0 185452 0 0 0 LRU
Try having a look here:
http://truica-victor.com/security-onion-elsa/
It states "Syslog-NG writes raw files to /nsm/elsa/data/elsa/tmp/buffers/ and loads them into the index and archive tables"
I'm sorry if I misspoke before, as I am still learning all the time :)
I hope this helps.
Thanks,
Wes
destination d_elsa { program("perl /opt/elsa/node/elsa.pl -c /etc/elsa_node.conf" template(t_db_parsed)); };
destination d_network_syslog { file("/var/log/network_syslog.log"); };log { source(s_network); destination(d_syslog_network); };
<localfile><log_format>syslog</log_format><location>/var/log/mail.log</location></localfile>
service syslog-ng restartservice ossec-hids-server restart
--
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onio...@googlegroups.com.
To post to this group, send email to securit...@googlegroups.com.
Visit this group at http://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.
destination d_network_syslog { file("/var/log/network_syslog.log"); };
log { source(s_network); destination(d_network_syslog); };
<localfile><log_format>syslog</log_format><location>/var/log/network_syslog.log</location></localfile>
You also mentioned the OSSEC agent does not work on other deivces like switches. I thought OSSEC had the ability to SSH into many different types of network devices and provide some additional levels of security that syslog collection alone does not provide?
Thanks again for the response.
>If I want to skip creating the flat file is it still possible to have OSSEC >watch all the incoming syslog messages and alert me? I really liked some of >the rules I created back when I had ArcSight which emailed me when someone su >to root on a server where that shouldn't have been allowed.
You can configure OSSEC to send emails via /var/ossec/etc/ossec.conf.
(See: https://github.com/Security-Onion-Solutions/security-onion/wiki/Email)
> You also mentioned the OSSEC agent does not work on other deivces like >switches. I thought OSSEC had the ability to SSH into many different types of >network devices and provide some additional levels of security that syslog >collection alone does not provide?
I believe you can accomplish this with agentless monitoring.
(http://ossec-docs.readthedocs.org/en/latest/manual/agent/agentless-monitoring.html)
Thanks,
Wes
mkfifo /var/log/ossec_in
destination d_ossec_fifo { pipe("/var/log/ossec_in"); };log { source(s_network); destination(d_ossec_fifo); };
<localfile><log_format>syslog</log_format><location>/var/log/ossec_in</location></localfile>
Wouldn't it still make into elsa, just the ossec-archived bucket instead of the syslog one?