Just following up with another option, if you want to consider a message an alert if the syslog_severity field matches one of info, debugging, warning, error, emergencies, alert or critical, you could also adjust that stellar enrichment to be: "is_alert" : "exists(syslog_severity) and syslog_severity in [ 'info', 'debugging', 'warning', 'error', 'emergencies', 'alert', 'critical']"
On Thu, Mar 30, 2017 at 11:26 PM, Casey Stella <ceste...@gmail.com> wrote: > So, one thing about threat triage is that we only triage messages which > have the field 'is_alert' set to true. If you are not seeing triaged > messages, that is the likely culprit. Generally, you often see people > either do a stellar enrichment to selectively choose which messages are > alerts (and set is_alert to true on those messages). > > Judging from your example, perhaps you want a message to be considered an > alert if the syslog_severity field exists. If that is the case, you could > accomplish this via a stellar enrichment and the configs would look as > follows: > > { > "enrichment": { > "fieldMap": { > "geo": [ > "ip_src_addr", > "ip_dst_addr" > ] > }, > "fieldToTypeMap": {}, > "config": {} > }, > "threatIntel": { > "fieldMap": { > "stellar" : { > "config" : { > "is_alert" : "if exists(syslog_severity) then true else > is_alert" > } > } > }, > "fieldToTypeMap": {}, > "config": {}, > "triageConfig": { > "riskLevelRules": [ > { > "name": "Critical severity rule", > "comment": "", > "rule": "syslog_severity== 'emergencies' or > syslog_severity== 'alert' or syslog_severity== 'critical'", > "score": 100, > "reason": null > }, > { > "name": "High severity rule", > "comment": "", > "rule": "syslog_severity== 'error'", > "score": 75, > "reason": null > }, > { > "name": "Medium severity rule", > "comment": "", > "rule": "syslog_severity== 'warning'", > "score": 50, > "reason": null > }, > { > "name": "Low severity rule", > "comment": "", > "rule": "syslog_severity== 'info' or syslog_severity== > 'debugging'", > "score": 25, > "reason": null > } > ], > "aggregator": "MAX", > "aggregationConfig": {} > } > }, > "configuration": {} > } > > > > On Thu, Mar 30, 2017 at 10:27 PM, Ali Nazemian <alinazem...@gmail.com> > wrote: > >> Hi all, >> >> I have got the following Threat Triage rule related to our Metron use >> case. After I have configured the threat triage inside Metron Management >> UI. However, I cannot see any result inside Elasticsearch after this >> configuration. Do I need to do any other configuration related to Threat >> Triage? Is there any issue with the current configuration? I haven't seen >> any error related to Threat Triage inside Storm or Elasticsearch log. I >> cannot see any Storm topology related to threat triage! >> >> { >> "enrichment": { >> "fieldMap": { >> "geo": [ >> "ip_src_addr", >> "ip_dst_addr" >> ] >> }, >> "fieldToTypeMap": {}, >> "config": {} >> }, >> "threatIntel": { >> "fieldMap": {}, >> "fieldToTypeMap": {}, >> "config": {}, >> "triageConfig": { >> "riskLevelRules": [ >> { >> "name": "Critical severity rule", >> "comment": "", >> "rule": "syslog_severity== 'emergencies' or syslog_severity== 'alert' or >> syslog_severity== 'critical'", >> "score": 100, >> "reason": null >> }, >> { >> "name": "High severity rule", >> "comment": "", >> "rule": "syslog_severity== 'error'", >> "score": 75, >> "reason": null >> }, >> { >> "name": "Medium severity rule", >> "comment": "", >> "rule": "syslog_severity== 'warning'", >> "score": 50, >> "reason": null >> }, >> { >> "name": "Low severity rule", >> "comment": "", >> "rule": "syslog_severity== 'info' or syslog_severity== 'debugging'", >> "score": 25, >> "reason": null >> } >> ], >> "aggregator": "MAX", >> "aggregationConfig": {} >> } >> }, >> "configuration": {} >> } >> >> Regards, >> Ali >> > >