Micro Focus ArcSight Logger via Logstash¶
Example overview¶
Webhooks can be used as system log sources. The number of log sources depends on the system complexity: the more components in the system, the greater number of log sources and logs. The most common logging scheme in complex systems consists of the following components:
-
Log collector: accepts logs from several sources and forwards logs to the SIEM system
-
SIEM system: used to analyze logs and monitor the system status
In the provided example, events are sent via webhooks to the Logstash log collector and forwarded to the ArcSight Logger system.
Integration with the Enterprise version of ArcSight ESM
To configure forwarding logs from Logstash to the Enterprise version of ArcSight ESM, it is recommended to configure the Syslog Connector on the ArcSight side and then forward logs from Logstash to the connector port. To get a more detailed description of the connectors, please download the SmartConnector User Guide from the official ArcSight SmartConnector documentation.
Used resources¶
-
ArcSight Logger 7.1 with the WEB URL
https://192.168.1.73:443
installed on CentOS 7.8 -
Logstash 7.7.0 installed on Debian 10.4 (Buster) and available on
https://192.168.1.65:5044
-
Administrator access to Wallarm Console in EU cloud to configure the webhook integration
Wallarm Cloud IP addresses
To provide Wallarm Cloud access to your system, you may need a list of its public IP addresses. To get these addresses, request them from the Wallarm technical support team.
Note that the public IP addresses of Wallarm Cloud can change from time to time. If your experience some problems with the addresses that you currently use, request up-to-date addresses from the Wallarm technical support team.
Since the links to the ArcSight Logger and Logstash services are cited as examples, they do not respond.
ArcSight Logger configuration¶
ArcSight Logger has logs receiver Wallarm Logstash logs
configured as follows:
-
Logs are received via UDP (
Type = UDP Receiver
) -
Listening port is
514
-
Events are parsed with the syslog parser
-
Other default settings
To get a more detailed description of the receiver configuration, please download the Logger Installation Guide of an appropriate version from the official ArcSight Logger documentation.
Logstash configuration¶
Logstash is configured in the logstash-sample.conf
file:
-
Incoming webhook processing is configured in the
input
section:- Traffic is sent to port 5044
- Logstash is configured to accept only HTTPS connections
- Logstash TLS certificate signed by a publicly trusted CA is located within the file
/etc/server.crt
- Private key for TLS certificate is located within the file
/etc/server.key
-
Forwarding logs to ArcSight Logger and log output are configured in the
output
section:- All event logs are forwarded from Logstash to ArcSight Logger at the IP address
https://192.168.1.73:514
- Logs are forwarded from Logstash to ArcSight Logger in the JSON format according to the Syslog standard
- Connection with ArcSight Logger is established via UDP
- Logstash logs are additionally printed on the command line (15th code line). The setting is used to verify that events are logged via Logstash
- All event logs are forwarded from Logstash to ArcSight Logger at the IP address
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 |
|
A more detailed description of the configuration files is available in the official Logstash documentation.
Testing Logstash configuration
To check that Logstash logs are created and forwarded to ArcSight Logger, the POST request can be sent to Logstash.
Request example:
curl -X POST 'https://192.168.1.65:5044' -H "Content-Type: application/json" -d '{"key1":"value1", "key2":"value2"}'
Logstash logs:
Event in ArcSight Logger:
Configuration of webhook integration¶
-
Webhooks are sent to
https://192.168.1.65:5044
-
Webhooks are sent via POST requests
-
Additional authentication parameter
X-Auth-Token
is passed in the request -
Webhooks sent to Webhook URLs are all available events: hits, system events, vulnerabilities, scope changes
Example testing¶
To test the configuration, a new user is added in Wallarm Console:
Logstash will log the event as follows:
The following entry will be displayed in ArcSight Logger events: