Hello,

I use ELK for all my system/firewall logs.
It gathers linux, windows, ASA, pflog and all appliances syslogs very well,
despite the high number of messages (actually more than 1 000 000 000/week).

You can configure logstah filtering to suit your needs.
Kibana interface is very efficient, and even gives you graphics.

I am very happy with it.

--
Cordialement,
Pierre BARDOU


-----Message d'origine-----
De : trondd [mailto:[email protected]]
Envoyé : samedi 7 mai 2016 18:02
À : Predrag Punosevac <[email protected]>
Cc : [email protected]
Objet : Re: syslog-ng+ELK

On Sat, May 7, 2016 12:29 am, Predrag Punosevac wrote:
> Michael Shirk wrote:
>
>> On May 23, 2015 10:42, "Predrag Punosevac" <[email protected]>
>> wrote:
>> >
>> > 5. Finally I am open for simpler ideas. Any opinions on
>> sysutils/logfmon
>> > Is it possible to visualize on the web output from logfmon?
>> >
>> > Best,
>> > Predrag Punosevac
>> >
>>
>> There is another aspect to log analysis tools that bothers me the
>> most, why must we risk system security to review log files?
>>
>> Any of the tools that "work well" open you up to web vulnerabilities,
>> or cost money in the case of Splunk. I have not had time to work on
>> it, but I would like to create a tool that avoids all of the issues
>> of running a web service or requiring java.
>>
>> My interest is in UNIX system logs and IDS/IPS events, with full
>> packet captures. The simplest form I have used is with automated
>> processing of IDS events, firewall logs, and full pcap data as static
>> files shared on a webserver. I would be interested in a CLI log
>> viewer with ncurses, or scripted output (maybe using pipecut to
>> process data as you search for what you want in the simplest UNIX
>> way).
>>
>> --
>> Michael Shirk
>> Daemon Security, Inc.
>> http://www.daemon-security.com
>
>
> I am resurrecting this old thread I started almost a year ago in an
> attempt to learn how other OpenBSD users are managing their
> centralized logging servers. I also wanted to revisit the issues
> raised by Mr. Shirk.
>
> Namely the problem I am trying to solve seems very common. I am
> running centralized logging server (syslog-ng) an OpenBSD host. This
> server receives log files from my heterogeneous network consisting of
> OpenBSD machines (running syslogd) Red Hat machines (rsyslog), and
> FreeBSD machines running FreeBSD version of syslogd. I noticed that
> sending log files generates lots of traffic on my monitoring server in
> part due to the fact that I am recording lots of noise like
>
> last message repeated 10 times
>
> Next problem is properly rotating, archiving, and deleting monthly
> directories containing log files of all my servers. For example
> directory
>
> /var/log/syslog-ng/HOSTS/2016-05
>
> contains log files of all my servers for this month. That is not too
> useful. Storing them per day would be probably better but having fewer
> log files just for important things would be even better.
>
> Log files are useless unless some kind analytics is run on them.
> I would like to be able to do real time monitoring for anomalies using
> a daemon for. The following seems obvious anomalies:
>
> 1 . SMART errors (I am big data/machine learning guy so I want to
> replace failed HDD in timely fashion) even though SMART deamon is
> sending separate e-mail
>
> 2. failing hardware (sensors, IPMI, mcelog)
>
> 3. firewall logs
>
> 4. IDS/IPS events
>
>
>
> A daemon should be able to send me an e-mail every couple of hours
> containing as little noise as possible.
>
> So far I have found in ports the following daemons:
>
> 1. security/logsurfer (package exists only for i386 and I use amd64)
>
> 2. sysutils/logfmon (From looking at /etc/logfmon.conf it looks like
> it is written to monitor log files on the single OpenBSD machine
> running syslogd. I don't see how I could monitor entire syslog-ng
> directories)
>
> 3. I noticed that syslog daemons do not work very well as SQL
> databases as a storage backends. For example LibreNMS has the
> interface for displaying and searching (manually which makes it useless)
syslog files.
> But MariaDB has to be restarted quite frequently and on the top of it.
>
> 4. I am not sure what to think of ELK anymore. The more I learn the
> less i like it.
>
> 5. Finally I stumbled upon echofish
>
> https://echothrust.github.io/echofish/
>
> which seems to be repeating old pattern. Using SQL database as a
> backend and providing UI for searching messages (I can do that using
> grep) but no e-mail notification when troubles are found.
>
>
> What am I missing here? How do people monitor their log files in the
> real time. That would seems such an obvious topic for people who care
> about security.
>
> Predrag
>

Note: I don't centralize my logs, and don't do realtime monitoring.  I don't
have a NOC, and I'm not on call 24x7.  So most of the time, there is no one to
respond anyway.  I run a couple dozen servers hosting a handful of internal
tools.  Maybe there is something you can learn from my experiance anyway.

I looked into ELK and found you had to teach it how to parse the logs to
extract useful information.  A coworker set it up for another serice and did
none of that so it was no different than just 'cat'ing everything into one big
log file.  I also tried fluentd and it was the same.  I figured if I have to
teach the tool how to read a log, I could just write my own thing to read the
logs.  So I rolled my own.  I use a perl script to mask out the stuff I don't
care about, keeping track of how many times they were seen.  I get a rpeort of
new log lines not in the ignore list and how many times they were seen (there
is some scrubbing of unique data like PIDs and session IDs so I get a useful
count), and any ignored lines that didn't fall into the expected range of
counts.  Pushing that into a database for historic info and visualization
wouldn't be too hard.

I followed the ideas found here:
http://undeadly.org/cgi?action=article&sid=20091215120606
http://www.ranum.com/security/computer_security/papers/ai/
And much more info:
http://www.ranum.com/security/computer_security/archives/logging-notes.pdf

Tim.

Reply via email to