I am trying to convert SPLUNK correlation rules to ELK using watchers, anyone has any knowledgebase which can help me take references of X-Pack (watches), any blog or any website, any repository, which contains similar watches, which can help to build a SOC or build SIEM capabilities.
Please share some examples/blog or any article of chain inputs, the documentation has some but i am not able to understand how to take inputs from two different indexes.
When you define an input, you need to specify the index/indices that the query will apply to, just like in a regular watch input.
Below is an example of one I use. This compares the sha256 hash of a new/updated file (picked up by auditbeat) to a sha256 hash in another index which is storing hashes from a different source.
As per watch notation, these inputs will be followed by conditions and actions.
Thanks a lot. it is really helpful, i will try this,
i notice that in Dev-tools, when i try to put watcher, it does not give me any autofill/autocomplete or suggestions as it is usually available when i try to put any simple query, why auto-suggestions in watcher do not work, is their any other option which i can use to write watcher more efficiently.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.