Skip to content

Commit 32de5fe

Browse files
committed
Refine SFTPGo log parsing and update bruteforce detection parameters
1 parent 2595bac commit 32de5fe

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

parsers/s01-parse/Azlaroc/sftpgo-logs.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@ onsuccess: next_stage
22
pattern_syntax:
33
SFTPGO_TIME: '%{YEAR}-%{MONTHNUM}-%{MONTHDAY}T%{HOUR}:%{MINUTE}:%{SECOND}\.%{NUMBER}'
44
SFTPGO_FAILED: '\{"level":"%{WORD:log_level}","time":"%{SFTPGO_TIME:evt_time}","sender":"connection_failed","client_ip":"%{IPV4:client_ip}","username":"%{DATA:username}","login_type":"%{DATA:login_type}","protocol":"%{WORD:protocol}","error":"%{GREEDYDATA:error}"\}'
5-
filter: evt.Line.Labels.type == 'sftpgo'
5+
filter: evt.Parsed.program == 'sftpgo'
66
nodes:
77
- grok:
88
name: SFTPGO_FAILED
9-
apply_on: Line.Raw
9+
apply_on: message
1010
statics:
1111
- meta: log_type
1212
value: sftpgo_auth

scenarios/Azlaroc/sftpgo-bf.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ name: Azlaroc/sftpgo-bf
33
description: "Detect SFTPGo bruteforce attacks on FTP/SSH"
44
filter: "evt.Meta.log_type == 'sftpgo_auth' && evt.Meta.is_failed_login == 'true'"
55
groupby: evt.Meta.source_ip
6-
capacity: 5
7-
leakspeed: "2m"
6+
capacity: 3
7+
leakspeed: "30s"
88
blackhole: 4h
99
labels:
1010
service: sftpgo

0 commit comments

Comments
 (0)