I am trying to configure AlienVault OTX to my Syslog servers for threat intel and I was wondering if you could provide me with some info regarding the pipeline rules.
I have already created a Data Adapter (AlienVault OTX) by adding the API key, created a Cache and a lookup table.
I went over the doc’s on Github, so looks like you installed the plugin, then restart Graylog service.
The Pipeline rule something liek this?
rule "alien vault "
when
has_field("message")
then
let intel = otx_lookup_ip(to_string($message.src_addr));
// let intel = otx_lookup_domain(to_string($message.dns_question))
set_field("threat_indicated", intel.otx_threat_indicated);
set_field("threat_ids", intel.otx_threat_ids);
set_field("threat_names", intel.otx_threat_names);
end
Add a second pipeline step that adds the field threat_indicated:tru
rule "inflate threat intel results"
when
to_bool($message.src_threat_indicated) || to_bool($message.dst_threat_indicated)
then
set_field("threat_indicated", true);
end
I woud suggest before making the pipeline rule you have the correct fields generated to ensure the pipline rule/s will work.
For something like this, perhaps use one pipeline with two different stages.
Yes, the pipeline is as you described and I have filled up the correct fields so it can index the source address and DNS. I have also tried to restart Graylog service but no luck
I don’t know what else I am missing and it cannot start generating OTX reports. Any thoughts?