Skip to content
This repository has been archived by the owner on Apr 19, 2021. It is now read-only.

Commit

Permalink
fix rtt field
Browse files Browse the repository at this point in the history
  • Loading branch information
weslambert committed Mar 1, 2018
1 parent 23c0c35 commit a4706ce
Show file tree
Hide file tree
Showing 57 changed files with 859 additions and 852 deletions.
4 changes: 4 additions & 0 deletions configfiles/1102_preprocess_bro_dns.conf
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ filter {
#answers
rename => { "TTLs" => "ttls" }
#rejected
convert => [ "rtt", "float" ]
}
} else {

Expand All @@ -62,6 +63,9 @@ filter {
mutate {
convert => [ "ttls", "float" ]
}
}
mutate {
convert => [ "rtt", "float" ]
}
mutate {
#add_tag => [ "conf_file_1102"]
Expand Down
5 changes: 4 additions & 1 deletion configfiles/1134_preprocess_bro_dce_rpc.conf
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ filter {
}

mutate {
convert => { "rtt" => "string" }
convert => { "rtt" => "float" }
}
} else {
mutate {
Expand All @@ -39,6 +39,9 @@ filter {
columns => ["timestamp","uid","source_ip","source_port","destination_ip","destination_port","rtt","named_pipe","endpoint","operation"]
separator => " "
}
mutate {
convert => [ "rtt", "float" ]
}
}
}
}
2 changes: 1 addition & 1 deletion etc/logstash/logstash-template.json
Original file line number Diff line number Diff line change
Expand Up @@ -2450,7 +2450,7 @@
}
},
"rtt":{
"type":"text",
"type":"float",
"fields":{
"keyword":{
"type":"keyword"
Expand Down
38 changes: 19 additions & 19 deletions kibana/dashboards/01600fb0-34e4-11e7-9669-7f1d3242b798.json

Large diffs are not rendered by default.

36 changes: 18 additions & 18 deletions kibana/dashboards/022713e0-3ab0-11e7-a83b-b1b4da7d15f4.json

Large diffs are not rendered by default.

30 changes: 15 additions & 15 deletions kibana/dashboards/0de7a390-3644-11e7-a6f7-4f44d7bf1c33.json

Large diffs are not rendered by default.

34 changes: 17 additions & 17 deletions kibana/dashboards/130017f0-46ce-11e7-946f-1bfb1be7c36b.json

Large diffs are not rendered by default.

24 changes: 12 additions & 12 deletions kibana/dashboards/1d98d620-7dce-11e7-846a-150cdcaf3374.json

Large diffs are not rendered by default.

46 changes: 23 additions & 23 deletions kibana/dashboards/230134a0-34c6-11e7-8360-0b86c90983fd.json

Large diffs are not rendered by default.

36 changes: 18 additions & 18 deletions kibana/dashboards/27f3b380-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

32 changes: 16 additions & 16 deletions kibana/dashboards/2d315d80-3582-11e7-98ef-19df58fe538b.json

Large diffs are not rendered by default.

30 changes: 15 additions & 15 deletions kibana/dashboards/2fdf5bf0-3581-11e7-98ef-19df58fe538b.json

Large diffs are not rendered by default.

22 changes: 11 additions & 11 deletions kibana/dashboards/3a457d70-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

26 changes: 13 additions & 13 deletions kibana/dashboards/4323af90-76e5-11e7-ab14-e1a4c1bc11e0.json

Large diffs are not rendered by default.

36 changes: 18 additions & 18 deletions kibana/dashboards/46582d50-3af2-11e7-a83b-b1b4da7d15f4.json

Large diffs are not rendered by default.

38 changes: 19 additions & 19 deletions kibana/dashboards/468022c0-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

18 changes: 9 additions & 9 deletions kibana/dashboards/4e108070-46c7-11e7-946f-1bfb1be7c36b.json

Large diffs are not rendered by default.

4 changes: 2 additions & 2 deletions kibana/dashboards/4f6f3440-6d62-11e7-8ddb-e71eb260f4a3.json
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
{
"version": "6.2.2",
"version": "6.1.3",
"objects": [
{
"id": "4f6f3440-6d62-11e7-8ddb-e71eb260f4a3",
"type": "dashboard",
"updated_at": "2018-02-28T20:09:27.724Z",
"updated_at": "2018-03-01T15:56:06.142Z",
"version": 1,
"attributes": {
"hits": 0,
Expand Down
30 changes: 15 additions & 15 deletions kibana/dashboards/50173bd0-3582-11e7-98ef-19df58fe538b.json

Large diffs are not rendered by default.

34 changes: 17 additions & 17 deletions kibana/dashboards/56a34ce0-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

36 changes: 18 additions & 18 deletions kibana/dashboards/61d43810-6d62-11e7-8ddb-e71eb260f4a3.json

Large diffs are not rendered by default.

56 changes: 28 additions & 28 deletions kibana/dashboards/68563ed0-34bf-11e7-9b32-bb903919ead9.json

Large diffs are not rendered by default.

18 changes: 9 additions & 9 deletions kibana/dashboards/68f738e0-46ca-11e7-946f-1bfb1be7c36b.json

Large diffs are not rendered by default.

40 changes: 20 additions & 20 deletions kibana/dashboards/6b0d4870-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

36 changes: 18 additions & 18 deletions kibana/dashboards/6d189680-6d62-11e7-8ddb-e71eb260f4a3.json

Large diffs are not rendered by default.

30 changes: 15 additions & 15 deletions kibana/dashboards/70c005f0-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

26 changes: 13 additions & 13 deletions kibana/dashboards/7929f430-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

40 changes: 20 additions & 20 deletions kibana/dashboards/7f27a830-34e5-11e7-9669-7f1d3242b798.json

Large diffs are not rendered by default.

28 changes: 14 additions & 14 deletions kibana/dashboards/85348270-357b-11e7-ac34-8965f6420c51.json

Large diffs are not rendered by default.

30 changes: 15 additions & 15 deletions kibana/dashboards/8a10e380-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

34 changes: 17 additions & 17 deletions kibana/dashboards/90b246c0-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

56 changes: 28 additions & 28 deletions kibana/dashboards/94b52620-342a-11e7-9d52-4f090484f59e.json

Large diffs are not rendered by default.

42 changes: 21 additions & 21 deletions kibana/dashboards/97f8c3a0-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

42 changes: 21 additions & 21 deletions kibana/dashboards/9ef20ae0-3583-11e7-a588-05992195c551.json

Large diffs are not rendered by default.

12 changes: 6 additions & 6 deletions kibana/dashboards/AV6-POJSDwoBUzALqKAg.json
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
{
"version": "6.2.2",
"version": "6.1.3",
"objects": [
{
"id": "AV6-PHKnDwoBUzALqJ_c",
"type": "visualization",
"updated_at": "2018-03-01T13:49:41.362Z",
"version": 4,
"updated_at": "2018-03-01T15:56:06.764Z",
"version": 1,
"attributes": {
"title": "Help",
"visState": "{\"title\":\"Help\",\"type\":\"markdown\",\"params\":{\"fontSize\":12,\"markdown\":\"## Introduction\\nWelcome to the Security Onion Elastic Stack! This is our implementation of the Elastic Stack on Security Onion. The Elastic Stack consists of three primary components:\\n- `Elasticsearch` - stores logs\\n- `Logstash` - collects and enriches logs before storing them in Elasticsearch\\n- `Kibana` - web interface for visualizing logs\\n\\n## Sidebar\\nStarting on the far left side of the page, you see the Sidebar. This contains links such as:\\n- `Discover` - search data\\n- `Visualize` - create visualizations based on searches\\n- `Dashboard` - view or create dashboards based on visualizations\\n- `Timelion` - timeline analysis\\n- `Dev Tools` - query Elasticsearch directly\\n- `Management` - view or modify Kibana settings\\n- `Squert` - separate web interface for viewing NIDS and HIDS alerts\\n- `Logout` - log out of your session\\n\\nThe first six of those links are within Kibana itself. If you click one of those and then want to get back to the Dashboards area where you started, simply click the `Dashboard` link.\\n\\nClicking the `Squert` link will take you out of Kibana and into Squert. You will not be required to authenticate to Squert since you already have an active Single Sign On (SSO) session.\\n\\nClicking the `Logout` link in either Squert or Kibana will log you out of your SSO session and take you back to the logon screen.\\n\\n## Navigation Panel\\nWhen you are in the Kibana Dashboard area, the panel to the immediate right of the sidebar is the Navigation Panel and it includes links to our dashboards such as Home, Help (this page), Bro Notices, ElastAlert, HIDS, NIDS, etc. Clicking one of the links in the Navigation Panel will take you to a dashboard dedicated to that particular log type. \\n\\n## Dashboards\\nAll dashboards are designed to work at 1024x768 screen resolution in order to maximize compatibility.\\n\\n### Dashboard Hyperlinks\\n\\nThe `source_ip` and `destination_ip` fields are hyperlinked. These hyperlinks will take you to the Indicator dashboard which will help you analyze the traffic relating to that particular IP address.\\n\\n`UID` fields are also hyperlinked. This hyperlink will start a new Kibana search for that particular UID. In the case of Bro UIDs this will show you all Bro logs related to that particular connection.\\n\\nEach log entry also has an `_id` field that is hyperlinked. This hyperlink will take you to CapMe, allowing you to request full packet capture for any arbitrary log type. This assumes that the log is for tcp or udp traffic that was seen by Bro and Bro recorded it correctly in its conn.log. \\n\\n### Overview Dashboard\\nWhen you first go to the Kibana Dashboard area, you are automatically placed into the Overview dashboard, where you will see overview information, such as total number of logs and sensors. Use the information on the Overview dashboard to determine which of the other dashboards on the Navigation Panel you might want to visit next.\\n\\n### Dashboard Categories\\nOur remaining dashboards are grouped into a few categories:\\n- `Alert Data` - dashboards that display alerts created by rules or signatures\\n- `Bro Hunting` - dashboards that allow you to slice and dice network metadata for hunting\\n- `Host Hunting` - dashboards that allow you to hunt via host telemetry\\n- `Other` - dashboards that don't fit into the categories above\\n\\n### Bro Notices\\nBro sniffs network traffic and generates notices such as `SSL::Invalid Server Cert` and `TeamCymruMalwareHashRegistry::Match`.\\n\\n### ElastAlert\\nElastAlert queries Elasticsearch on a regular basis and then generates alerts based on your desired criteria. Security Onion includes two example rules that alert on new IDS events and new connection logs. You can add your own ElastAlert rules in `/etc/elastalert/rules/`.\\n\\n### HIDS\\nOSSEC analyzes log files and generates Host Intrusion Detection System alerts based on its ruleset at `/var/ossec/rules/`. You can add your own rules in `/var/ossec/rules/local_rules.xml`.\\n\\n### NIDS\\nSecurity Onion can use either Snort or Suricata to sniff network traffic and generate Network Intrusion Detection System alerts. \\n\\n### Connections\\nBro sniffs network traffic and logs connection metadata including source IP/port, destination IP/port, protocol, and number of bytes.\\n\\n### DCE/RPC\\nBro sniffs network traffic and logs DCE/RPC metadata including source IP/port, destination IP/port, operation, endpoint, and named pipe.\\n\\n### DHCP\\nBro sniffs network traffic and logs DHCP requests and responses including source IP/port, destination IP/port, and MAC addresses.\\n\\n### DNP3\\nBro sniffs network traffic and logs DNP3 metadata including source IP/port, destination IP/port, function request, function reply.\\n\\n### DNS\\nBro sniffs network traffic and logs DNS queries and answers. Bro also includes other name lookups such as Windows NetBIOS name service requests and Bonjour.\\n\\n### Files\\nBro sniffs network traffic and logs metadata related to files being transferred over the network including IP addresses, MIME type, source, and checksums.\\n\\n### FTP\\nBro sniffs network traffic and logs FTP metadata including source IP/port, destination IP/port, command, reply code, argument, and username.\\n\\n### HTTP\\nBro sniffs network traffic and logs HTTP metadata including source IP/port, destination IP/port, method, status message, MIME type, site name, referer, and user agent.\\n\\n### Intel\\nBro sniffs network traffic and watches for indicators using the Intel framework. You can add your own indicators to `/opt/bro/share/bro/intel/intel.dat`.\\n\\n### IRC\\nBro sniffs network traffic and logs IRC metadata including source IP/port, destination IP/port, command, and username.\\n\\n### Kerberos\\nBro sniffs network traffic and logs Kerberos metadata including source IP/port, destination IP/port, cipher, client, server, service, request type, and success status.\\n\\n### Modbus\\nBro sniffs network traffic and logs Modbus metadata including source IP/port, destination IP/port, and function.\\n\\n### MySQL\\nBro sniffs network traffic and logs MySQL metadata including source IP/port, destination IP/port, command/argument, status, and response.\\n\\n### NTLM\\nBro sniffs network traffic and logs NTLM metadata including source IP/port, destination IP/port, hostname, username, and status.\\n\\n### PE\\nBro sniffs network traffic and logs PE metadata including OS, subsystem, machine, and section name.\\n\\n### RADIUS\\nBro sniffs network traffic and logs RADIUS metadata including source IP/port, destination IP/port, username, and result.\\n\\n### RDP\\nBro sniffs network traffic and logs RDP metadata including source IP/port, destination IP/port, client build, keyboard layout, encryption level, and result.\\n\\n### RFB\\nBro sniffs network traffic and logs RFB metadata including source IP/port, destination IP/port, authentication method, authentication status, client version, server version, and desktop name.\\n\\n### SIP\\nBro sniffs network traffic and logs SIP metadata including source IP/port, destination IP/port, method, content type, status, uri, and user agent.\\n\\n### SMB\\nBro sniffs network traffic and logs SMB metadata including source IP/port, destination IP/port, file name, and action.\\n\\n### SMTP\\nBro sniffs network traffic and logs SMTP metadata including source IP/port, destination IP/port, from, to, subject, and user agent.\\n\\n### SNMP\\nBro sniffs network traffic and logs SNMP metadata including source IP/port, destination IP/port, version, community, and duration.\\n\\n### Software\\nBro sniffs network traffic and logs metadata relating to the kinds of software that generated that traffic including name, type, and version.\\n\\n### SSH\\nBro sniffs network traffic and logs SSH metadata including source IP/port, destination IP/port, client version, server version, and success.\\n\\n### SSL\\nBro sniffs network traffic and logs SSL metadata including source IP/port, destination IP/port, server name, certificate subject, cipher, and validation status.\\n\\n### Syslog\\nBro sniffs network traffic and logs Syslog metadata including source IP/port, destination IP/port, severity, and protocol.\\n\\n### Tunnels\\nBro sniffs network traffic and detects IP, GRE, SOCKS, TEREDO, and AVAYA tunnels. It logs metadata including source IP/port, destination IP/port, type, and action.\\n\\n### Weird\\nBro sniffs network traffic and logs protocol anomalies metadata including source IP/port, destination IP/port, and the type of anomaly.\\n\\n### X.509\\nBro sniffs network traffic and logs X.509 metadata including certificate subject, issuer, key algorithm, key length, and signing algorithm.\\n\\n### Autoruns\\nSysinternals Autoruns can identify the processes which Windows is configured to automatically run. Autoruns data can then be ingested via [Autoruns To WinEventLog](https://github.com/palantir/windows-event-forwarding/tree/master/AutorunsToWinEventLog).\\n\\n### Beats\\nElastic Beats can be deployed on endpoints to collect host telemetry and send to Logstash for storage in Elasticsearch.\\n\\n### OSSEC\\nOSSEC agents can be deployed on endpoints to collect host telemetry and send to the OSSEC Server included in Security Onion. OSSEC Alerts can be found in the Alert Data category at the top of the Navigation Panel. This OSSEC hunting dashboard will allow you to hunt through all OSSEC logs, not just alerts.\\n\\n### Sysmon\\nSysinternal Sysmon provides comprehensive telemetry for Windows hosts. Its logs can be consumed using Beats, OSSEC, or other transport mechanism.\\n\\n### Domain Stats\\nSecurity Onion includes a tool called domain_stats which will do a whois lookup on a domain name to determine the age of the domain. If enabled, this dashboard looks for baby domains that have been recently registered. Please note that domain_stats is only enabled when running in Evaluation Mode.\\n\\n### Firewall\\nFirewall logs can be consumed via syslog or other transport mechanism. Once consumed, this dashboard allows you to slice and dice those firewall logs based on source IP/port, destination IP/port, protocol, and action.\\n\\n### Frequency\\nSecurity Onion includes a tool called freq_server which can perform frequency analysis of hostnames. If enabled, this dashboard will show hostnames with a frequency analysis score that indicates that they could have been randomly generated. Please note that freq_server is only enabled when running in Evaluation Mode.\\n\\n### Stats\\nThis dashboard shows statistics for Logstash including processing times for different log types and any errors that may have occurred.\\n\\n## More Information\\nFor additional information, please refer to our documentation at:\\n\\nhttps://securityonion.net/wiki/Elastic\",\"type\":\"markdown\"},\"aggs\":[]}",
Expand All @@ -20,7 +20,7 @@
{
"id": "b3b449d0-3429-11e7-9d52-4f090484f59e",
"type": "visualization",
"updated_at": "2018-02-28T20:09:28.006Z",
"updated_at": "2018-03-01T15:56:07.194Z",
"version": 53,
"attributes": {
"title": "Navigation",
Expand All @@ -36,8 +36,8 @@
{
"id": "AV6-POJSDwoBUzALqKAg",
"type": "dashboard",
"updated_at": "2018-03-01T13:47:46.098Z",
"version": 2,
"updated_at": "2018-03-01T15:56:06.764Z",
"version": 1,
"attributes": {
"title": "Help",
"hits": 0,
Expand Down
Loading

0 comments on commit a4706ce

Please sign in to comment.