Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Elastic Common Schema (ECS) #97

Open
kevinkeeneyjr opened this issue Sep 25, 2018 · 6 comments
Open

Elastic Common Schema (ECS) #97

kevinkeeneyjr opened this issue Sep 25, 2018 · 6 comments
Assignees

Comments

@kevinkeeneyjr
Copy link

I would suggest migrating to the Elastic Common Schema (ECS) for your output so this data can be integrated with output of other projects like RockNSM that have begun to adopt ECS. I believe ECS begins to solve the Babylon problem, by enabling a common language to talk about things like 'host.name' or 'os.version'

https://github.com/elastic/ecs/

@qmontal
Copy link
Contributor

qmontal commented Sep 26, 2018

Hi @kevinkeeneyjr ,

This is a really great idea! I am not sure that we could apply it immediately, as it is still work in progress, but working with them we could make sure that all of our needed fields are included in the schema.

I will close #81 in pro of this issue, as its objective was the same but this already has a defined structure to work with.

Cheers!

@qmontal
Copy link
Contributor

qmontal commented Oct 16, 2018

Hey Kevin,

I have given some thoughts to this, and I think the best would be to first come up with a standard vulnerability template for VulnWhisperer, using that template for saving the data from all the scanners locally following the same structure, and use ECS only for elasticsearch, changing the fields on the logstash config file from the VulnWhisperer structure to the ECS one.

This would mean also that ECS would be postponed until we have this VulnWhisperer vulnerability template that all scanners will follow.

What thoughts do you have on that?

Cheers!

@elvarb
Copy link

elvarb commented Oct 23, 2018

Since #86 is still a work in progress it might be smart to include this change in the 6.0 update. That way it could be a part of a migration process, new dashboards and more. The re index api could also be used to re index old VulnWhisperer data to the ECS format.

@qmontal
Copy link
Contributor

qmontal commented Oct 23, 2018

Hi @elvarb,

We are actually implementing that separately: on one side we are doing the upgrade to ELK6; on the other side, as mentioned in #113, we are implementing a new Vulnerability standard in VulnWhisperer.

The ECS would actually be implemented in the second, as with the changes that the new standard imply, it will be needed to create a new logstash configuration file that works with the template (and thus, with all the scanners), as well as adapt the Kibana dashboards to ECS.

Update all the current logstash to the ECS would be extra work that would end trashed when adapting the Vulnerability standard.

Cheers!

@nicpenning
Copy link

nicpenning commented Dec 8, 2019

FYI, Elastic has added the Vulnerability schema to ECS: https://github.com/elastic/ecs/blob/master/schemas/vulnerability.yml

@qmontal
Copy link
Contributor

qmontal commented Dec 8, 2019

Hi @nicpenning,
Thank your for making us aware, another VulnWhisperer user also notified us about it through the Slack channel. We need to gather resources to develop the change from 1.8 to 2.0, as even with the standard part solved, there's a big refactoring change that needs to be done.
Cheers!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants