External Integration
Forensics alerts can be sent to external monitoring tools such as syslog. The forensics alert is sent in JSON format. The JSON field definitions are defined in the section “Fields Displayed in Forensic Events” above.
A sample JSON Kafka output is shown below:
{
"severity": "HIGH",
"tenant_id": 0,
"alert_time": 1595573847156,
"alert_text": "Tetration - Anomalous Unseen Command on collectorDatamover-1",
"key_id": "d89f926cddc7577553eb8954e492528433b2d08e:5efcfdf5497d4f474f1707c2:5efcfdf6497d4f474f1707d6:20196:CMD_NOT_SEEN",
"alert_id": "/Alerts/5efcfdf5497d4f474f1707c2/DataSource{location_type='TETRATION', location_name='forensics', location_grain='MIN', root_scope_id='5efcfdf5497d4f474f1707c2'}/db10d21631eebefc3b8d3aeaba5a0b1b45f4259e85b591763d7eaee9161ca076",
"root_scope_id": "5efcfdf5497d4f474f1707c2",
"type": "FORENSICS",
"event_time": 1595573795135,
"alert_details": "{\"Sensor Id\":\"d89f926cddc7577553eb8954e492528433b2d08e\",\"Hostname\":\"collectorDatamover-1\",\"Process Id\":20196,\"scope_id\":\"5efcfdf5497d4f474f1707c2\",\"forensic\":{\"Unseen Command\":\"true\",\"Unseen Command - Sensor Uptime (microseconds)\":\"34441125356\",\"Unseen Command - Parent Uptime (microseconds)\":\"35968418683\",\"Unseen Command - Parent Username\":\"root\",\"Unseen Command - Parent Command Line\":\"svlogd -tt /local/logs/tetration/efe/ \",\"Unseen Command - Parent Exec Path\":\"/sbin/svlogd\",\"Unseen Command - Anomaly - Score\":\"0\",\"Unseen Command - Anomaly - Similarity - Unique\":\"true\",\"Process Info - Command String\":\"gzip \",\"Process Info - Exec Path\":\"/bin/gzip\"},\"profile\":{\"id\":\"5efcfdf6497d4f474f1707e4\",\"name\":\"Tetration Profile\",\"created_at\":1593638390,\"updated_at\":1593638390,\"root_app_scope_id\":\"5efcfdf5497d4f474f1707c2\"},\"rule\":{\"id\":\"5efcfdf6497d4f474f1707d6\",\"name\":\"Tetration - Anomalous Unseen Command\",\"clause_chips\":\"[{\\\"type\\\":\\\"filter\\\",\\\"facet\\\":{\\\"field\\\":\\\"event_type\\\",\\\"title\\\":\\\"Event type\\\",\\\"type\\\":\\\"STRING\\\"},\\\"operator\\\":{\\\"label\\\":\\\"\\u003d\\\",\\\"type\\\":\\\"eq\\\"},\\\"displayValue\\\":\\\"Unseen Command\\\",\\\"value\\\":\\\"Unseen Command\\\"},{\\\"type\\\":\\\"filter\\\",\\\"facet\\\":{\\\"field\\\":\\\"forensic_event__cmd_not_seen_data__cmdline_anomaly_info__score\\\",\\\"title\\\":\\\"Unseen Command - Anomaly - Score\\\",\\\"type\\\":\\\"NUMBER\\\"},\\\"operator\\\":{\\\"label\\\":\\\"\\u003c\\\",\\\"type\\\":\\\"lt\\\"},\\\"displayValue\\\":\\\"0.6\\\",\\\"value\\\":\\\"0.6\\\"}]\",\"created_at\":1593638390,\"updated_at\":1595539498,\"root_app_scope_id\":\"5efcfdf5497d4f474f1707c2\"}}"
}
The value in alert_details is itself an escaped JSON string whose content for the above alert can be seen below:
{
"Sensor Id": "d89f926cddc7577553eb8954e492528433b2d08e",
"Hostname": "collectorDatamover-1",
"Process Id": 20196,
"scope_id": "5efcfdf5497d4f474f1707c2",
"forensic": {
"Unseen Command": "true",
"Unseen Command - Sensor Uptime (microseconds)": "34441125356",
"Unseen Command - Parent Uptime (microseconds)": "35968418683",
"Unseen Command - Parent Username": "root",
"Unseen Command - Parent Command Line": "svlogd -tt /local/logs/tetration/efe/ ",
"Unseen Command - Parent Exec Path": "/sbin/svlogd",
"Unseen Command - Anomaly - Score": "0",
"Unseen Command - Anomaly - Similarity - Unique": "true",
"Process Info - Command String": "gzip ",
"Process Info - Exec Path": "/bin/gzip"
},
"profile": {
"id": "5efcfdf6497d4f474f1707e4",
"name": "Tetration Profile",
"created_at": 1593638390,
"updated_at": 1593638390,
"root_app_scope_id": "5efcfdf5497d4f474f1707c2"
},
"rule": {
"id": "5efcfdf6497d4f474f1707d6",
"name": "Tetration - Anomalous Unseen Command",
"clause_chips": "[{\"type\":\"filter\",\"facet\":{\"field\":\"event_type\",\"title\":\"Event type\",\"type\":\"STRING\"},\"operator\":{\"label\":\"=\",\"type\":\"eq\"},\"displayValue\":\"Unseen Command\",\"value\":\"Unseen Command\"},{\"type\":\"filter\",\"facet\":{\"field\":\"forensic_event__cmd_not_seen_data__cmdline_anomaly_info__score\",\"title\":\"Unseen Command - Anomaly - Score\",\"type\":\"NUMBER\"},\"operator\":{\"label\":\"<\",\"type\":\"lt\"},\"displayValue\":\"0.6\",\"value\":\"0.6\"}]",
"created_at": 1593638390,
"updated_at": 1595539498,
"root_app_scope_id": "5efcfdf5497d4f474f1707c2"
}
}
The details of the forensic events are included in the field forensic. For the list of attributes of the forensic events, see Forensic event fields. These attributes are also shown in the alert details in the UI.