Hi Jakes, the first instance should trigger the normal rule, then the rule 70908 should ignore the event during 300 seconds. I didn't test it...
Let me know if it works. Regards. On Thursday, April 6, 2017 at 7:14:01 PM UTC+2, Jake B. wrote: > > Hi Jesus, > > Thanks for the reply. Would this also alert on the first instance of this? > I still do want to alert, but I want to avoid the spam that comes with it > as it typically happens in large batches with little to no difference in > meaning between the different events. > > Thanks! > > On Thursday, April 6, 2017 at 1:24:05 AM UTC-7, Jesus Linares wrote: >> >> Hi Jake, >> >> take a look at rule 511 >> <https://github.com/wazuh/wazuh-ruleset/blob/f1e1e46e51faefbe75c79052d63437cc3c1a02b4/rules/0015-ossec_rules.xml#L63>. >> >> It is the way to ignore a event coming from rule 510. You could do the same >> with a composite rule, it would be something like: >> >> <rule id="70908" level="0" frequency="0" timeframe="45" ignore="300"> >> <if_matched_sid>510</if_matched_sid> >> <match>your_file</match> >> <description>Ignore rule 510 for 'your_file' during 300 seconds. >> </description> >> </rule> >> >> frequency=”0” would mean the rule must be matched 2 times (frequency is >> always +2 than the setting). >> level 0 will not generate an alert (for testing you could increase it). >> >> I hope it help. >> Regards. >> >> >> On Wednesday, April 5, 2017 at 5:11:22 PM UTC+2, Jake B. wrote: >>> >>> Hello, >>> >>> I have alerts coming in huge batches for rule 510. The batches of alerts >>> are essentially all the same event and the file path of the area that's >>> causing this is essentially identical in each batch except for the last >>> file. I'm trying to setup a rule that would look at the ID I setup in my >>> decoder, which is a file path that takes the path except for the last file >>> in order to match the batches of events. I want to alert only on the first >>> one and ignore the rest with that same ID for 5 minutes. First of all, does >>> the rule below look ok for this? Does frequency="0" work as I know the >>> frequency essentially adds 2 to it? Also, I'm having another issue with >>> this in particular is that ossec-logtest does not test this rule correctly >>> at all. Even when I paste the message, it doesn't even show up as something >>> that would trigger rule 510, which is what the alerts are coming as. So >>> that is also making it hard to troubleshoot this. Any ideas? Thanks! >>> >>> <rule id="70908" level="7" frequency="2" timeframe="45" ignore="300"> >>> <if_matched_sid>510</if_matched_sid> <decoded_as>my_decoder</decoded_as> >>> <same_id /> <description>*TEST* - Only alert on the first docker root event >>> for the same host and file path in a 60 second range.</description> >>> <description>*TEST* - This is meant to reduce noise as docker root events >>> typically happen in batches with not much difference in >>> meaning.</description> </rule> >>> >>> >>> -- --- You received this message because you are subscribed to the Google Groups "ossec-list" group. To unsubscribe from this group and stop receiving emails from it, send an email to ossec-list+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.