This repository was archived by the owner on Apr 16, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 522
ThirdPartyIntegration
Doug Burks edited this page Mar 24, 2015
·
10 revisions
Many organizations would like to take data from Security Onion and send it to third party systems.
We don't provide free support for third party systems, so this wiki page will be just a brief introduction to how you would accomplish this. If you need commercial support, please see: http://www.securityonionsolutions.com
Configure /etc/syslog-ng/syslog-ng.conf with a new "destination" to forward to your external syslog collector and then restart syslog-ng.
2 options:
- Edit ALL /etc/nsm/HOSTNAME-INTERFACE/barnyard2
*
.conf files on ALL sensors with a new "output" to send IDS alerts to your external systems and then restart all barnyard2 instances:
sudo nsm_sensor_ps-restart --only-barnyard2
OR
- On your master server (running sguild), configure /etc/syslog-ng/syslog-ng.conf with a new "source" to monitor /var/log/nsm/securityonion/sguild.log for "Alert Received" lines and a new "destination" to send to your external system, and then restart syslog-ng. To do this modify /etc/syslog-ng/syslog-ng.conf and add the following lines:
# This line specifies where the sguild.log file is located, and informs syslog-ng to tail the file, the program_override inserts the string sguil_alert into the string
source s_sguil { file("/var/log/nsm/securityonion/sguild.log" program_override("sguil_alert")); };
# This line filters on the string “Alert Received”
filter f_sguil { match("Alert Received"); };
# This line tells syslog-ng to send the data read to the IP address of 10.80.4.37, via UDP to port 514
destination d_sguil_udp { udp("10.80.4.37" port(514)); };
# This log section tells syslog-ng how to structure the previous ‘source / filter / destination’ and is what actually puts them into play
log {
source(s_sguil);
filter(f_sguil);
destination(d_sguil_udp);
};
- Introduction
- Use Cases
- Hardware Requirements
- Release Notes
- Download/Install
- Booting Issues
- After Installation
- UTC and Time Zones
- Services
- VirtualBox Walkthrough
- VMWare Walkthrough
- Videos
- Architecture
- Cheat Sheet
- Conference
- Elastic Stack
- Elastic Architecture
- Elasticsearch
- Logstash
- Kibana
- ElastAlert
- Curator
- FreqServer
- DomainStats
- Docker
- Redis
- Data Fields
- Beats
- Pre-Releases
- ELSA to Elastic
- Network Configuration
- Proxy Configuration
- Firewall/Hardening
- Email Configuration
- Integrating with other systems
- Changing IP Addresses
- NTP
- Managing Alerts
- Managing Rules
- Adding Local Rules
- Disabling Processes
- Filtering with BPF
- Adjusting PF_RING for traffic
- MySQL Tuning
- Adding a new disk
- High Performance Tuning
- Trimming PCAPs