Endpoint Standard Syslog Connector 1.2.3 Released
Posted on June 27, 2017
The latest Syslog Connector can be found here.
The Carbon Black Developer Network is proud to announce the first public release of our syslog connector for Endpoint Standard. This connector allows you to forward alert notifications from your Endpoint Standard cloud instance into local, on-premise SIEM systems that accept industry standard syslog notifications. By default, it will generate pipe-delimited syslog messages containing the key metadata associated with any alert identified by the Endpoint Standard streaming prevention system.
The syslog connector will aggregate data from one or more Endpoint Standard organizations into a single syslog stream. The connector can be configured to use UDP, TCP, or encrypted (TCP over TLS) syslog protocols.
This connector is distributed as a binary RPM package compatible with any Red Hat or CentOS Linux distribution, CentOS/RHEL 6.x and above, running on a 64-bit Intel platform.
Installation
-
Install the software. As root on your Carbon Black or other RPM based 64-bit Linux distribution server:
cd /etc/yum.repos.d
curl -O https://opensource.carbonblack.com/release/x86_64/CbOpenSource.repo
yum install python-cb-defense-syslog
-
Copy the example config file:
cd /etc/cb/integrations/cb-defense-syslog
cp cb-defense-syslog.conf.example cb-defense-syslog.conf
-
Modify the config file
/etc/cb/integrations/cb-defense-syslog/cb-defense-syslog.conf
as needed -
Test the new connector. As root, execute:
/usr/share/cb/integrations/cb-defense-syslog/cb-defense-syslog --config-file /etc/cb/integrations/cb-defense-syslog/cb-defense-syslog.conf --log-file /var/log/cb/integrations/cb-defense-syslog/cb-defense-syslog.log
Then:
cat /var/log/cb/integrations/cb-defense-syslog/cb-defense-syslog.log
A successful run will look like:
2017-06-27 09:24:10,747 - __main__ - INFO - Found 1 Endpoint Standard Servers in config file 2017-06-27 09:24:10,748 - __main__ - INFO - Handling notifications for https://api-eap01.conferdeploy.net 2017-06-27 09:24:10,748 - __main__ - INFO - Attempting to connect to url: https://api-eap01.conferdeploy.net 2017-06-27 09:24:10,748 - __main__ - INFO - connectorID = XXXX 2017-06-27 09:24:10,845 - __main__ - INFO - <Response [200]> 2017-06-27 09:24:10,845 - __main__ - INFO - sessionId = XXXX 2017-06-27 09:24:10,888 - __main__ - INFO - <Response [200]> 2017-06-27 09:24:10,889 - __main__ - INFO - successfully connected, no alerts at this time 2017-06-27 09:24:10,889 - __main__ - INFO - There are no messages to forward to host
-
Start the connector by enabling it in
cron
. Uncomment the Endpoint Standard Connector (remove the beginning#
from the last line) in/etc/cron.d/cb-defense-syslog
. By default, the connector will run once per hour.
Debug Logs
Debug Logs are stored in /var/log/cb/integrations/cb-defense-syslog/
Sample Config File
[general]
#
# Template for syslog output.
# This is a jinja 2 template
# NOTE: The source variable corresponds to the Endpoint Standard Server used to retrieve results
#
template = {{source}}|{{version}}|{{vendor}}|{{product}}|{{dev_version}}|{{signature}}|{{name}}|{{severity}}|{{extension}}
#
# Configure the specific output.
# Valid options are: 'udp', 'tcp', 'tcp+tls'
#
# udp - Have the events sent over a UDP socket
# tcp - Have the events sent over a TCP socket
# tcp+tls - Have the events sent over a TLS+TCP socket
#
output_type=tcp
#
# tcpout=IP:port - ie 1.2.3.5:8080
#
tcp_out=
#
# udpout=IP:port - ie 1.2.3.5:8080
#
udp_out=
[tls]
#
# Specify a file containing PEM-encoded CA certificates for verifying the peer server when using TLS+TCP syslog
#
#ca_cert = /etc/cb/integrations/cb-defense/cert.pem
#
# Uncomment tls_verify and set to "false" in order to disable verification of the peer server certificate
#
#tls_verify = true
[cbdefense1]
#
# Endpoint Standard Connector ID
#
connector_id = F8KF111111
#
# Endpoint Standard API Key
#
api_key = WT9T3QDP4UGCK2NS96111111
#
# Endpoint Standard Server URL
# NOTE: this is not the url to the web ui, but to the url of sensor checkins
#
server_url = https://server.yourcompany.com
#
# For more than one Endpoint Standard Server, add another server using the following template including the stanza
#
#[cbdefenseserver2]
#connector_id = F8KF111111
#api_key = WT9T3QDP4UGCK2NS96111111
#server_url = https://server2.yourcompany.com