Any clue for my idea from graylog perspective?

Hi Guys,

Not sure how graylog will help me here and need your insights on this. Or if someone has already implemented similar kind of stuff can give me feedback?

I have honeypot setup at perimeter level which has ELK hence wondering if I do output from that Logstash to graylog and
Then set up stream
manage rules
and HTTP call backup action to firewall API to block the hosts on the fly? That is assuming if any of the IP hitting my honeypot more than 5 times it will send HTTP API to the firewall to block the IP.

Can we achieve something similar?

something the other way around is already known to be implemented.

When someone log into the AD and was successfully authenticated the ip of the device is enabled for access to the production network / intranet. If the person logs out the access is removed.

Hmm…what is that? any clue? Or any such software you aware of?

the known implementation is done with a palo alto firewall and plain vanilla Graylog.

Wow…would it be possible to share the codes? I need to try same with other firewalls? Or at least some idea how this was done?

When Graylog 3.0 is out the customer will share the content pack for this.

currently the content pack does not include the processing pipelines. Thats why it is not easy shareable.

Okies…Where can I see the product Roadmap? Just curious to know when 3.0 is going to release?

Kind of Roadmap you have when looking into Github:

But, we do not force a specific date, as that will burn only developers. We have set a feature set and that need to be in a stable working version.

1 Like

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.