mirror of https://github.com/infosecn1nja/HELK.git
implement catchall index
parent
e6690ba3fb
commit
880bc260e6
|
@ -1,12 +1,12 @@
|
|||
{
|
||||
"order": 11,
|
||||
"index_patterns": [ "indexme-*" ],
|
||||
"version": 2019021901,
|
||||
"version": 2019052001,
|
||||
"settings": {
|
||||
"index": {
|
||||
"mapping": {
|
||||
"ignore_malformed": true,
|
||||
"total_fields.limit": "1000",
|
||||
"total_fields.limit": "5000",
|
||||
"coerce": true
|
||||
},
|
||||
"store": {
|
||||
|
|
|
@ -27,6 +27,7 @@ filter {
|
|||
"beat_version" => "%{[beat][version]}"
|
||||
"beat_name" => "%{[beat][name]}"
|
||||
"z_logstash_pipeline" => "winlogbeat_6-field_nest_cleanup"
|
||||
"[@metadata][helk_parsed]" => "yes"
|
||||
}
|
||||
remove_field => [ "[beat]" ]
|
||||
}
|
||||
|
@ -65,7 +66,10 @@ filter {
|
|||
event.remove("[winlog][user]")
|
||||
'
|
||||
tag_on_exception => "ruby_exception_winlogbeat_7-cleanup"
|
||||
add_field => { "z_logstash_pipeline" => "winlogbeat_7-field_nest_cleanup" }
|
||||
add_field => {
|
||||
"z_logstash_pipeline" => "winlogbeat_7-field_nest_cleanup"
|
||||
"[@metadata][helk_parsed]" => "yes"
|
||||
}
|
||||
}
|
||||
# Also, for continuity copy the new fields for Winlogbeat 7 back to the original field names (Winlogbeat 6.x and before). However, lets keep them - for future or anyone else doing something different.
|
||||
mutate {
|
||||
|
|
|
@ -26,6 +26,7 @@ filter {
|
|||
add_field => {
|
||||
"type" => "wineventlog"
|
||||
"z_logstash_pipeline" => "mutate-1050-0001"
|
||||
"[@metadata][helk_parsed]" => "yes"
|
||||
}
|
||||
rename => { "Message" => "message" }
|
||||
}
|
||||
|
|
|
@ -17,6 +17,7 @@ filter {
|
|||
'remote_support','system_requirements','contributors','url','tactic','platform','data_sources',
|
||||
'permissions_required','Validation'
|
||||
]
|
||||
add_field => { "[@metadata][helk_parsed]" => "yes" }
|
||||
}
|
||||
}
|
||||
}
|
|
@ -4,7 +4,7 @@
|
|||
# License: GPL-3.0
|
||||
|
||||
output {
|
||||
if [log_name] == "Microsoft-Windows-Sysmon/Operational"{
|
||||
if [log_name] == "Microsoft-Windows-Sysmon/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-sysmon-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
# License: GPL-3.0
|
||||
|
||||
output {
|
||||
if [log_name] == "Security"{
|
||||
if [log_name] == "Security" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-security-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
# License: GPL-3.0
|
||||
|
||||
output {
|
||||
if [log_name] == "System"{
|
||||
if [log_name] == "System" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-system-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
# License: GPL-3.0
|
||||
|
||||
output {
|
||||
if [log_name] == "Application"{
|
||||
if [log_name] == "Application" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-application-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
# License: GPL-3.0
|
||||
|
||||
output {
|
||||
if [source_name] == "Microsoft-Windows-PowerShell" or [source_name] == "PowerShell"{
|
||||
if [source_name] == "Microsoft-Windows-PowerShell" or [source_name] == "PowerShell" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-powershell-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
# License: GPL-3.0
|
||||
|
||||
output {
|
||||
if [log_name] == "Microsoft-Windows-WMI-Activity/Operational"{
|
||||
if [log_name] == "Microsoft-Windows-WMI-Activity/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-wmiactivity-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
# License: GPL-3.0
|
||||
|
||||
output {
|
||||
if "attack" in [tags]{
|
||||
if "attack" in [tags] and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "mitre-attack-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
output {
|
||||
if [log_name] == "Microsoft-Windows-CodeIntegrity/Operational"{
|
||||
if [log_name] == "Microsoft-Windows-CodeIntegrity/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-codeintegrity-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
output {
|
||||
if [log_name] == "Microsoft-Windows-Bits-Client/Operational"{
|
||||
if [log_name] == "Microsoft-Windows-Bits-Client/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-bits-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
output {
|
||||
if [log_name] == "Microsoft-Windows-DNS-Client/Operational"{
|
||||
if [log_name] == "Microsoft-Windows-DNS-Client/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-dns-client-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
output {
|
||||
if [log_name] == "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall"{
|
||||
if [log_name] == "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall" and [@metadata][helk_parsed] == "yes" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "logs-endpoint-winevent-firewall-advanced-%{+YYYY.MM.dd}"
|
||||
|
|
|
@ -0,0 +1,11 @@
|
|||
output {
|
||||
if [@metadata][helk_parsed] != "yes" and [source] != "/var/log/osquery/osqueryd.results.log" and [@metadata][kafka][topic] != "SYSMON_JOIN" {
|
||||
elasticsearch {
|
||||
hosts => ["helk-elasticsearch:9200"]
|
||||
index => "indexme-%{+YYYY.MM.dd}"
|
||||
# document_id => "%{[@metadata][log_hash]}"
|
||||
user => 'elastic'
|
||||
#password => 'elasticpassword'
|
||||
}
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue