Crowdstrike
Crowdstrike is a SaaS (software as a service) system security solution. Deploy this integration to ship Crowdstrike events from your Crowdstrike account to Logz.io using FluentD.
Fluentd will fetch all existing logs, as it is not able to ignore older logs.
This integration includes:
- Establishing communication between the Crowdstrike connector and your Crowdstrike account
- Configuring a FluentD agent on your device
- Establishing communication between the FluentD agent and your Logz.io account
Upon deployment, the Crowdstrike connector connects to your Crowdstrike account to collect events. This data is written into a file on your device. The FluentD agent collects the data from this file, connects to your Logz.io account and sends the events to Logz.io.
Before you begin, you'll need:
- an active account with Crowdstrike
- An active Logz.io account
- FluentD agent on your machine
- Crowdstrike connector installed on your machine
Configure Crowdstrike connector
- Open the configuration file located at
/opt/crowdstrike/etc/cs.falconhoseclient.cfg
. - Enter the Client ID value into the
client_id
value field. - Enter the Client Secret value into the
client_secret
value field. - Make sure that the base URL in
api_url
andrequest_token_url
corresponds to the base URL for your account. - Save the changes.
Install Ruby gems for FluentD
- Install the fluent-plugin-concat gem. This gem concatenates multiline logs.
- Install the fluent-plugin-logzio gem. This gem enables communication between your FluentD agent and Logz.io.
Configure FluentD
- Write down your Logz.io listener URL and logs shipping token by navigating to your Logz.io account and selecting Settings > Tools > Manage Tokens. The Listener URL for your account is displayed above the token table.
- Create a new configuration file for your FluentD. For example,
fluentdconfig.conf
. - Copy and paste the code block below into the configuration file. The log_level setting defines which events are recorded in the log. In order of verbosity, the log level can be defined as fatal, error, warn, info, debug or trace. The default for the log level is info: The info level records all events categorized as info and higher in verbosity. To learn more about the settings used in the configuration file, see Logz.io plugin for Fluentd.
<system>
log_level info
</system>
# Tailing the default path Crowdstrike's SIEM Connector
<source>
@type tail
path /var/log/crowdstrike/falconhoseclient/output
pos_file /var/log/td-agent/falconhoseclient.log.pos
tag crowdstrike-fluentd
<parse>
@type none
</parse>
</source>
# Concatenating the event as one log
<filter crowdstrike-fluentd>
@type concat
key message
multiline_start_regexp /^{/
multiline_end_regexp /^}/
</filter>
# This adds type to the log && removes key log & message. If you change the type in this code section, the data is not parsed into the relevant fields for the Crowdstrike integration.
<filter crowdstrike-fluentd>
@type record_transformer
<record>
type crowdstrike
</record>
</filter>
# Sending to Logz.io
<match crowdstrike-fluentd>
@type logzio_buffered
endpoint_url https://<<LISTENER-HOST>>:8071?token=<<LOG-SHIPPING-TOKEN>>
output_include_time true
output_include_tags true
http_idle_timeout 10
<buffer>
@type memory
flush_thread_count 4
flush_interval 3s
chunk_limit_size 16m # Logz.io bulk limit is decoupled from chunk_limit_size. Set whatever you want.
queue_limit_length 4096
</buffer>
</match>
# Exclude fluentd logs
<label @FLUENT_LOG>
<match **>
@type null
</match>
</label>
If you change type
in the @type record_transformer
section, the data is not parsed into the relevant fields for the Crowdstrike integration.
Replace <<LISTENER-HOST>>
with the host for your region.
Replace <<LOG-SHIPPING-TOKEN>>
with the token of the account you want to ship to.
- Save the changes.
Start the Crowdstrike connector
Run the following command:
- For Ubuntu 14.x:
sudo start cs.falconhoseclientd
- For Ubuntu 16.04 and later:
sudo systemctl start cs.falconhoseclientd.service
- For CentOS:
sudo service cs.falconhoseclientd start
Start FluentD
Start your FluentD agent with the configuration file created for this integration.
For example, run fluentd -c <<PATH-TO-YOUR-FLUENTD-CONFIG-FILE>>
.
Check Logz.io for your events
Give your events some time to get from your system to ours, and then open Open Search Dashboards. You can filter for data of type crowdstrike
to see the incoming Crowdstrike events.
If you still don't see your logs, see Filebeat troubleshooting.