Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] Threat Intelligence scanners can't use index patterns? #1417

Open
Grumpyfish1200 opened this issue Nov 12, 2024 · 2 comments
Open
Labels
enhancement New feature or request

Comments

@Grumpyfish1200
Copy link

Grumpyfish1200 commented Nov 12, 2024

I am ingesting VPC Flowlogs into my OpenSearch domain. I even made sure to use a copy_values processor in my Data Prepper pipeline to the source IP, Destination IP, and Timestamp in an ECS format:
" - copy_values:
entries:
- from_key: srcaddr
to_key: source.ip
- from_key: dstaddr
to_key: destination.ip
- from_key: "@timestamp"
to_key: timestamp"

But even after doing this it is not compatible with Threat Intelligence.

When I try to make a general detector, no field mappings pop up, period:
Screenshot 2024-11-12 at 1 42 07 PM

And nothing populates for Threat Intelligence either:
Screenshot 2024-11-12 at 1 41 21 PM

I do not know if this is a problem caused by me or if it just doesn't work.

EDIT:
For the Threat Intelligence scanner, I can do it by individual indices but not for an index pattern? Why is this? Is there anyway I can select an index pattern?

@Grumpyfish1200 Grumpyfish1200 added enhancement New feature or request untriaged labels Nov 12, 2024
@Grumpyfish1200 Grumpyfish1200 changed the title [FEATURE] Make VPC Flow Logs compatible with Security Analytics Threat Intelligence [FEATURE] Threat Intelligence scanners can't use index patterns? Nov 12, 2024
@dblock dblock removed the untriaged label Dec 2, 2024
@dblock
Copy link
Member

dblock commented Dec 2, 2024

[Catch All Triage - 1, 2, 3]

@eirsep
Copy link
Member

eirsep commented Dec 6, 2024

@Grumpyfish1200 we do not recommend usage of index patterns for detectors at all.

Security analytics detectors are optimized to work better with aliases and data streams

In 2.16 we have added a revamped experience for threat intelligence: https://opensearch.org/docs/2.16/security-analytics/threat-intelligence/api/threat-intel-api/
do check it out. it's more performant, intuitive and supports uploading custom threat intelligence

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants