mirror of https://github.com/infosecn1nja/HELK.git
implement catchall index
parent
e6690ba3fb
commit
880bc260e6
|
@ -1,12 +1,12 @@
|
||||||
{
|
{
|
||||||
"order": 11,
|
"order": 11,
|
||||||
"index_patterns": [ "indexme-*" ],
|
"index_patterns": [ "indexme-*" ],
|
||||||
"version": 2019021901,
|
"version": 2019052001,
|
||||||
"settings": {
|
"settings": {
|
||||||
"index": {
|
"index": {
|
||||||
"mapping": {
|
"mapping": {
|
||||||
"ignore_malformed": true,
|
"ignore_malformed": true,
|
||||||
"total_fields.limit": "1000",
|
"total_fields.limit": "5000",
|
||||||
"coerce": true
|
"coerce": true
|
||||||
},
|
},
|
||||||
"store": {
|
"store": {
|
||||||
|
|
|
@ -27,6 +27,7 @@ filter {
|
||||||
"beat_version" => "%{[beat][version]}"
|
"beat_version" => "%{[beat][version]}"
|
||||||
"beat_name" => "%{[beat][name]}"
|
"beat_name" => "%{[beat][name]}"
|
||||||
"z_logstash_pipeline" => "winlogbeat_6-field_nest_cleanup"
|
"z_logstash_pipeline" => "winlogbeat_6-field_nest_cleanup"
|
||||||
|
"[@metadata][helk_parsed]" => "yes"
|
||||||
}
|
}
|
||||||
remove_field => [ "[beat]" ]
|
remove_field => [ "[beat]" ]
|
||||||
}
|
}
|
||||||
|
@ -65,7 +66,10 @@ filter {
|
||||||
event.remove("[winlog][user]")
|
event.remove("[winlog][user]")
|
||||||
'
|
'
|
||||||
tag_on_exception => "ruby_exception_winlogbeat_7-cleanup"
|
tag_on_exception => "ruby_exception_winlogbeat_7-cleanup"
|
||||||
add_field => { "z_logstash_pipeline" => "winlogbeat_7-field_nest_cleanup" }
|
add_field => {
|
||||||
|
"z_logstash_pipeline" => "winlogbeat_7-field_nest_cleanup"
|
||||||
|
"[@metadata][helk_parsed]" => "yes"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
# Also, for continuity copy the new fields for Winlogbeat 7 back to the original field names (Winlogbeat 6.x and before). However, lets keep them - for future or anyone else doing something different.
|
# Also, for continuity copy the new fields for Winlogbeat 7 back to the original field names (Winlogbeat 6.x and before). However, lets keep them - for future or anyone else doing something different.
|
||||||
mutate {
|
mutate {
|
||||||
|
|
|
@ -26,6 +26,7 @@ filter {
|
||||||
add_field => {
|
add_field => {
|
||||||
"type" => "wineventlog"
|
"type" => "wineventlog"
|
||||||
"z_logstash_pipeline" => "mutate-1050-0001"
|
"z_logstash_pipeline" => "mutate-1050-0001"
|
||||||
|
"[@metadata][helk_parsed]" => "yes"
|
||||||
}
|
}
|
||||||
rename => { "Message" => "message" }
|
rename => { "Message" => "message" }
|
||||||
}
|
}
|
||||||
|
|
|
@ -17,6 +17,7 @@ filter {
|
||||||
'remote_support','system_requirements','contributors','url','tactic','platform','data_sources',
|
'remote_support','system_requirements','contributors','url','tactic','platform','data_sources',
|
||||||
'permissions_required','Validation'
|
'permissions_required','Validation'
|
||||||
]
|
]
|
||||||
|
add_field => { "[@metadata][helk_parsed]" => "yes" }
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
|
@ -4,7 +4,7 @@
|
||||||
# License: GPL-3.0
|
# License: GPL-3.0
|
||||||
|
|
||||||
output {
|
output {
|
||||||
if [log_name] == "Microsoft-Windows-Sysmon/Operational"{
|
if [log_name] == "Microsoft-Windows-Sysmon/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-sysmon-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-sysmon-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
# License: GPL-3.0
|
# License: GPL-3.0
|
||||||
|
|
||||||
output {
|
output {
|
||||||
if [log_name] == "Security"{
|
if [log_name] == "Security" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-security-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-security-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
# License: GPL-3.0
|
# License: GPL-3.0
|
||||||
|
|
||||||
output {
|
output {
|
||||||
if [log_name] == "System"{
|
if [log_name] == "System" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-system-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-system-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
# License: GPL-3.0
|
# License: GPL-3.0
|
||||||
|
|
||||||
output {
|
output {
|
||||||
if [log_name] == "Application"{
|
if [log_name] == "Application" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-application-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-application-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
# License: GPL-3.0
|
# License: GPL-3.0
|
||||||
|
|
||||||
output {
|
output {
|
||||||
if [source_name] == "Microsoft-Windows-PowerShell" or [source_name] == "PowerShell"{
|
if [source_name] == "Microsoft-Windows-PowerShell" or [source_name] == "PowerShell" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-powershell-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-powershell-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
# License: GPL-3.0
|
# License: GPL-3.0
|
||||||
|
|
||||||
output {
|
output {
|
||||||
if [log_name] == "Microsoft-Windows-WMI-Activity/Operational"{
|
if [log_name] == "Microsoft-Windows-WMI-Activity/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-wmiactivity-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-wmiactivity-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
# License: GPL-3.0
|
# License: GPL-3.0
|
||||||
|
|
||||||
output {
|
output {
|
||||||
if "attack" in [tags]{
|
if "attack" in [tags] and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "mitre-attack-%{+YYYY.MM.dd}"
|
index => "mitre-attack-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
output {
|
output {
|
||||||
if [log_name] == "Microsoft-Windows-CodeIntegrity/Operational"{
|
if [log_name] == "Microsoft-Windows-CodeIntegrity/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-codeintegrity-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-codeintegrity-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
output {
|
output {
|
||||||
if [log_name] == "Microsoft-Windows-Bits-Client/Operational"{
|
if [log_name] == "Microsoft-Windows-Bits-Client/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-bits-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-bits-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
output {
|
output {
|
||||||
if [log_name] == "Microsoft-Windows-DNS-Client/Operational"{
|
if [log_name] == "Microsoft-Windows-DNS-Client/Operational" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-dns-client-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-dns-client-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
output {
|
output {
|
||||||
if [log_name] == "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall"{
|
if [log_name] == "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall" and [@metadata][helk_parsed] == "yes" {
|
||||||
elasticsearch {
|
elasticsearch {
|
||||||
hosts => ["helk-elasticsearch:9200"]
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
index => "logs-endpoint-winevent-firewall-advanced-%{+YYYY.MM.dd}"
|
index => "logs-endpoint-winevent-firewall-advanced-%{+YYYY.MM.dd}"
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
output {
|
||||||
|
if [@metadata][helk_parsed] != "yes" and [source] != "/var/log/osquery/osqueryd.results.log" and [@metadata][kafka][topic] != "SYSMON_JOIN" {
|
||||||
|
elasticsearch {
|
||||||
|
hosts => ["helk-elasticsearch:9200"]
|
||||||
|
index => "indexme-%{+YYYY.MM.dd}"
|
||||||
|
# document_id => "%{[@metadata][log_hash]}"
|
||||||
|
user => 'elastic'
|
||||||
|
#password => 'elasticpassword'
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue