Hi Bhuvanesh,

I would advice to actually use OSSEC agents as log collectors as, for PCI
DSS, you will also be using them to perform File Integrity Monitoring and
Configuration checking. Meaning that you already will have an authenticated
and encrypted channel to deliver your logs to a centralized platform (the
OSSEC manager), where logs can be analyzed to alert on PCI related issues.
Then you can complete it with the integration with ELK for indexing,
searching and long term storage.

OSSEC for PCI DSS:
http://documentation.wazuh.com/en/latest/ossec_pci_dss.html
OSSEC and ELK: http://documentation.wazuh.com/en/latest/ossec_elk.html
(this one requires Wazuh fork).

I hope it helps,

Santiago.


On Fri, May 6, 2016 at 1:37 AM, David Lang <[email protected]> wrote:

> On Fri, 6 May 2016, Bhuvanesh Bhuvanachandran wrote:
>
> Date: Fri, 6 May 2016 01:19:36 -0700 (PDT)
>> From: Bhuvanesh Bhuvanachandran <[email protected]>
>> Reply-To: [email protected]
>> To: ossec-list <[email protected]>
>> Subject: [ossec-list] Syslog Server Help
>>
>>
>> Hi Guys,
>>
>> I have a problem which I need some expert advise.
>>
>> I have a number of systems with the following softwares.
>>
>> 1. Apache proxy server
>> 2. Apache Tomcat
>> 3. Oracle DB
>>
>> I want to create a central syslog server, where all logs from the above
>> and
>> other system logs get ported and is analyzed at the central server and a
>> dash board is required at the end.
>>
>> I could see a few combination to achieve this possibly.
>>
>> 1. Ossec agents monitor log files and port all log to OSSEC server (/var/
>> ossec/logs/archives/archives.log) + logstash +elastic search + Kibana
>>
>> 2. Ossec agent port all log files + Ossec server syslog output +  logstash
>> +elastic search + Kibana
>>
>> 3. rsyslog on client machines write logs to central syslog server + Ossec
>> monitor central syslog server output +  logstash +elastic search + Kibana
>>
>> What is expected on the dashboard is
>>
>> 1. PCI DSS compliance dash board. (This is possible with Ossec alerts
>> visualization I understand).
>>
>> 2. All access data in graphs, say from apache logs top hit hosts, top urls
>> , error counts etc.(This is possible only if archives log is active)
>>
>> I want to happen both ossec alert log and archive log porting at the same
>> time. Is this possible with Ossec?
>>
>> Or if this is a better way ? porting all logs with some syslog programs (I
>> am not sure what to use for this.) and ossec will process the central
>> server syslog and make alerts from that.
>>
>> Also is it possible to pass multiple inputs to logstash (archive log input
>> and ossec syslog input) ?
>>
>> How to parse the actual messages and categorize (since it can contain
>> messages from apache logs, messages , oracle logs etc) at logstash, is
>> there someone can provide a filter example?
>>
>> Please advise how to go ahead with this requirements.
>>
>
> OSSEC is not a great syslog delivery system, so if you are wanting a
> central logging system, you would be best off doing something like
>
> rsyslog -> central logging system
>               |        /
>               |- osssec
>               |
>               |- archive
>               |
>               |- alerting
>               |
>               |- ElasticSearch <- Kibana
>
>
>
> https://www.usenix.org/conference/lisa12/technical-sessions/presentation/lang_david
>
> https://www.usenix.org/publications/login/august-2013-volume-38-number-4/enterprise-logging
>
> https://www.usenix.org/publications/login/october-2013-volume-38-number-5/log-filtering-rsyslog
>
> https://www.usenix.org/publications/login/december-2013-volume-38-number-6/using-sec
> https://www.usenix.org/publications/login/feb14/logging-reports-dashboards
> https://www.usenix.org/publications/login/april14/lang
>
> while I talk about Splunk in these articles, ElasticSearch + Kibana work
> very similarly (including the tuning issues)
>
> Rsyslog is great at transporting, parsing, filtering, and delivering logs.
>
> ElasticSearch is great at giving you free-form search capabilities for
> your logs.
>
> Kibana is great as a search front-end to ElasticSearch, and creating
> graphs. It will also create graphs from summary data, not just the raw
> logs. Use summary data for your dashboards, not raw logs.
>
> the latest version of rsyslog has gained some significant summarizing
> capabilities, but you can also feed your logs to other tools (like sec) to
> do the summary work for you
>
>
> Adding logstash to the mix doesn't help much and can be quite
> 'interesting' to manage at high volumes.
>
> David Lang
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to