Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M



Similar documents
Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics

A Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics. Risto Vaarandi Paweł Niziński

The syslog-ng Premium Edition 5F2

The syslog-ng Premium Edition 5LTS

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory

Log management with Logstash and Elasticsearch. Matteo Dessalvi

Scalable Extraction, Aggregation, and Response to Network Intelligence

Reliable log data transfer

How To Set Up Foglight Nms For A Proof Of Concept

Distributed syslog architectures with syslog-ng Premium Edition

Detection of illegal gateways in protected networks

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013

Network Monitoring and Management NetFlow Overview

syslog-ng 3.0 Monitoring logs with Nagios

SolarWinds Log & Event Manager

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon Max Putas

Centralized logging system based on WebSockets protocol

Security Correlation Server Quick Installation Guide

Flow Based Traffic Analysis

Introduction to Netflow

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Cisco PIX vs. Checkpoint Firewall

Introduction to Network Discovery and Identity

Security Correlation Server Quick Installation Guide

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Real-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Log infrastructure & Zabbix. logging tools integration

Performance Guideline for syslog-ng Premium Edition 5 LTS

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

April 8th - 10th, 2014 LUG14 LUG14. Lustre Log Analyzer. Kalpak Shah. DataDirect Networks. ddn.com DataDirect Networks. All Rights Reserved.

An Introduction to Syslog. Rainer Gerhards Adiscon

orrelog SNMP Trap Monitor Software Users Manual

SapphireIMS 4.0 BSM Feature Specification

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

SolarWinds Certified Professional. Exam Preparation Guide

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

Configuring Logging. Information About Logging CHAPTER

Wireshark Developer and User Conference

NETWORK TRAFFIC ANALYSIS: HADOOP PIG VS TYPICAL MAPREDUCE

Network Monitoring & Management Log Management

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Netflow Overview. PacNOG 6 Nadi, Fiji

Processing millions of logs with Logstash

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Intrusion Detection Systems (IDS)

Detecting Botnets with NetFlow

Flow-based detection of RDP brute-force attacks

Logging on a Shoestring Budget

Elasticsearch on Cisco Unified Computing System: Optimizing your UCS infrastructure for Elasticsearch s analytics software stack

Cisco IOS Flexible NetFlow Technology

Network Monitoring & Management Log Management

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

How to configure an Advanced Expert Probe as NetFlow Collector

Barracuda Networks Web Application Firewall

Network Monitoring Comparison

SNARE Agent for Windows v Release Notes

Monitoring Linux and Windows Logs with Graylog Collector. Bernd Ahlers Graylog, Inc.

QRadar SIEM 7.2 Flows Overview

Network Management & Monitoring

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Network Monitoring & Management Log Management

Research on Errors of Utilized Bandwidth Measured by NetFlow

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Adding Indirection Enhances Functionality

PANDORA FMS NETWORK DEVICE MONITORING

RSA Authentication Manager

An overview of traffic analysis using NetFlow

Application Note. Onsight Connect Network Requirements v6.3

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

PANDORA FMS NETWORK DEVICES MONITORING

Network monitoring systems & tools

Gaining Operational Efficiencies with the Enterasys S-Series

Deploying ACLs to Manage Network Security

Management, Logging and Troubleshooting

The syslog-ng Store Box 3 F2

NSC E

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS

EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS

Information Retrieval Elasticsearch

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Using NXLog with Elasticsearch and Kibana. Using NXLog with Elasticsearch and Kibana

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Ranch Networks for Hosted Data Centers

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

Transcription:

Log Management with Open-Source Tools Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Outline Why do we need log collection and management? Why use open source tools? Widely used logging protocols and recently introduced new standards Open-source syslog servers Open-source log management tools

Why collect logs from your IT system and network? Observation logs contain information which is often not available from other sources Real-time monitoring analyze logs in real-time (or near-real-time) fashion, in order to discover important changes in the state of the IT system Post-factum incident analysis leverage collected data for discovering unknown past incidents and getting detailed insights into them

Why use open source tools for log management? Commercial SIEM and log management frameworks: many frameworks are consultant-oriented have complex design and insufficient documentation prohibitive deployment and licensing costs many frameworks repeat a number of design mistakes of network management solutions (made almost two decades ago!) Past experience with network management solutions: Phase 1: initial marketing hype, followed by a number of success stories in the context of large and wealthy institutions Phase2: disappointment among many potential customers (failed deployments, prohibitive pricing, etc.) and search for alternatives Phase3: appearance of well-designed open-source solutions which become widely used and acknowledged, especially by small- and midsize enterprises

Traditional log collection protocols The scene of log collection protocols was relatively stable for two decades BSD syslog the only cross-vendor protocol designed specifically for logging UDP based plaintext, thus resource-efficient, but unreliable and not secure Simple message layout in the UDP frame priority, simple timestamp, host name, program name, unstructured message text

New log collection protocols IETF syslog (2009) support for including structured data in messages, UDP and TCP based transport, encryption and authentication, detailed timestamps CEE (Common Event Expression) logging standard (2012) use JSON format inside originally unstructured BSD/IETF syslog message fields Other protocols non-rfc flavors of BSD and IETF syslog (e.g., BSD syslog over TCP), GELF, SNMP trap messages, etc.

Examples # Traditional BSD syslog priority value 28 encapsulates facility value 3 # (daemon) and severity value 4 (warning): 3*8 + 4 = 28 <28>Nov 17 12:33:59 myhost2 ids[1299]: port scan from 192.168.1.102 # IETF syslog note high granularity timestamps with timezone information # and two blocks of structured data <28>1 2012-11-17T12:33:59.223+02:00 myhost2 ids 1299 - [timequality tzknown="1" issynced="1"][origin ip="10.1.1.2"] port scan from 192.168.1.102 # CEE message format use standard BSD syslog message for transporting # structured data in JSON format <28>Nov 17 12:33:59 myhost2 ids[1299]: @cee:{"pname":"ids","pid":1299,"msg":"port scan from 192.168.1.102", "originip":"10.1.1.2","action":"portscan","src":"192.168.1.102"}

Why pass structured data in log messages? Unstructured message fields often contain additional information about event which needs to be highlighted It is much easier to parse structured data (keywordvalue pairs) than unstructured free-format strings Some structured data can be used without extra parsing JSON format is supported by several log management frameworks and databases (e.g., Elasticsearch)

Log collection on Linux platform db GUI local programs openlog(3) syslog(3)... /dev/log network port incoming messages kernel /proc/kmsg syslog server configuration to local logfiles /var/log/... /etc/syslog-server.conf messages to remote syslog servers messages from other nodes 9

Syslog servers rsyslog http://www.rsyslog.com + fast message processing, efficient multithreading, designed to handle at least 150-200K messages per second (see the paper Rsyslog: going up from 40K messages per second to 250K by Rainer Gerhards from Linux Kongress 2010) + backwards compatible with UNIX syslogd configuration directives + has a number of unique features and advantages over competitors (disk based buffers, support for Elasticsearch database, etc.) - documentation could be better - configuration language has a non-intuitive syntax - filtering conditions can not be named which prevents their reuse

Syslog servers syslog-ng http://www.balabit.com/network-security/syslog-ng/ + a flexible and readable configuration language which allows for specifying complex configurations + single-threaded until the 3.2 version, but multi-threading has been introduced into recent versions which considerably improves scalability and performance + well documented - open-source edition does not support disk based buffers - no support for Elasticsearch (although could be configured through a self-developed output plugin)

Syslog servers nxlog http://nxlog-ce.sourceforge.net/ + native support for Windows platform and Windows Event Log + supports the use of embedded Perl constructs for message processing + supports a number of input and output types not supported by competitors (e.g., accepting input events from SQL databases, producing output events in GELF format, etc.) - poor message filtering performance

Elasticsearch DB for log management http://www.elasticsearch.org/ Apache Lucene based nosql database technology that is frequently used for storing log data native support for distributed operations and building clusters allows for splitting indexes into parts (shards) and distributing shards over several nodes (e.g., split an index into 2 shards and distribute them over 2 nodes, turning disks at individual nodes into a single logical storage space) indexes can be configured to have one or more replicas which increases fault tolerance (e.g., split an index into 2 shards and configure the index to have 1 replica, and distribute resulting 4 shards across 4 nodes) builtin support for data compression (important when storing large volumes of log data) supported by several log management tools (Kibana, Graylog2, logstash, rsyslog)

Log management tools Kibana http://kibana.org/ Kibana is a GUI for searching log data stored into Elasticsearch DB Kibana is designed to work with logstash log preprocessing tool, but can accept data from any other tool which is able to store it to Elasticsearch in a recognizable way (e.g., rsyslog) Kibana is lightweight, written in Ruby, accessible over HTTP, and contains only searching and reporting functionality (e.g., user authentication and SSL connectivity has to be accomplished with external tools like Apache reverse proxy) When building a Kibana based log management solution, you are creating the system from well-documented and well-established building blocks, and thus having the opportunity for many customizations during initial installation and later maintenance

Kibana web interface

Log management tools Graylog2 http://graylog2.org/ A full log management solution consisting of a server for log message reception (syslog, GELF) and a GUI The GUI is user-friendly with builtin help, and is intuitive to use Many configuration tasks (such as setting log data retention intervals, etc.) can be accomplished through a web interface Graylog2 supports users with different roles and password authentication Earlier versions of Graylog2 employed single-server approach which limited the system scalability, while most recent versions allow to run several servers in parallel

Graylog2 web interface

Other log management tools Logstash (http://www.logstash.net/) - has a web interface for searching logs stored to Elasticsearch database, but since it supports large number of input and output types, it is mostly used as a log parsing and conversion tool ELSA (http://code.google.com/p/enterprise-log-search-andarchive/) - a log management system which is built on top of syslog-ng, MySQL and Sphinx

Netflow protocol Proposed by Cisco in 1990s, nowadays supported by many major vendors A Netflow-enabled network device (e.g., router, switch, dedicated probe) collects network traffic statistics and exports it to collector over UDP Traffic statistics consists of flow records, where each record describes some network flow Network flow unidirectional sequence of packets which share transport protocol, source and destination IP, source and destination port, and few other parameters (e.g., type of service)

Example of collected Netflow data The following two records represent a successfully negotiated and completed TCP connection from client 10.3.1.1 port 48896 to the HTTP service (port 80) running at the server 10.2.1.1: Start = 2013-02-18 00:04:05.733 Duration = 0.014 TCP 10.3.1.1:48896 -> 10.2.1.1:80 TCPflags =.AP.SF Packets = 5 Bytes = 513 Start = 2013-02-18 00:04:05.734 Duration = 0.010 TCP 10.2.1.1:80 -> 10.3.1.1:48896 TCPflags =.AP.SF Packets = 4 Bytes = 375

How to collect/use netflow data Enable Netflow collection at your network device or use dedicated probes (e.g., fprobe) Open-source software packages for collecting Netflow NfSen (http://nfsen.sourceforge.net/) SiLK (http://tools.netsa.cert.org/silk/) Flow-tools (http://www.splintered.net/sw/flow-tools/) - unmaintained What you might be interested in finding in Netflow data Flows with unusual combinations of TCP flags (e.g., FIN without ACK) Flows which represent connections to/from known bad IP addresses Unexpected spikes in traffic volumes (measured in number of bytes, packets, flows) associated with certain sources (e.g., foreign IP addresses or bad IP addresses)