Hi Wes,
Yes, I'm sending to our corporate Elastic Stack as apposed to the one bundled with Security Onion.
Is there not a grok filter available to parse the logs as bundled with Security Onion?
The squild.log entry looks like this;
2018-06-05 14:03:29 pid(7227) Alert Received: 0 3 unknown SENSORNAME-eth6-31 {2018-06-05 14:03:28} 29 433104 {ETPRO TROJAN Common Downloader Header Pattern H} XX.XX.XX.XX XX.XX.XX.XX 6 58519 80 1 2803305 8 993 993
And the Kibana message look like as follows;
message:<13>Jun 5 14:03:30 MASTERXXX sguil_alert: 14:03:29 pid(7227) Alert Received: 0 3 unknown SENSORNAME-eth6-31 {2018-06-05 14:03:28} 29 433104 {ETPRO TROJAN Common Downloader Header Pattern H} XX.XX.XX.XX XX.XX.XX.XX 6 58519 80 1 2803305 8 993 993 @version:1 @timestamp:June 5th 2018, 15:03:30.021 type:snort-tcp tags:_grokparsefailure _id:AWPQQpE1IsfJPH1tu9UD _type:snort-tcp _index:security-snort-tcp-2018.06.05 _score: -
I replaced the IP addresses with XX. & SENSORNAME.
I can decipher most of the message, however would like to know if there is already a grok filter for logstash or an alert output field map.
Once again all help is appreciated.
Kind Regards
Zishan
> To unsubscribe from this group and stop receiving emails from it, send an email to
security-onio...@googlegroups.com.
>
> To post to this group, send email to
securit...@googlegroups.com.