Configuring the log file protocol

advertisement
Configuring the log file protocol
The log file protocol retrieves event files that are stored from hosts to process events stored in remote locations.
About this task
The log file protocol is intended for systems that write daily event logs. It is not appropriate to use the log file
protocol for devices that appended information to their event files.
Log files are retrieved one at a time to be processed. The log file protocol can manage plain text, compressed
files, or file archives. Archives must contain plain-text files that can be processed one line at a time. When the log
file protocol downloads an event file, the information received in the file updates the Log Activity tab. If more
information is written to the file after the download is complete, the appended information is not processed.
Table 1. Log file protocol parameters
Parameter
Description
Log Source Name
Type a unique name of the log source.
Log Source Description
Optional. Type a description for the log source.
Log Source Type
From the list, select the type of log source to add.
Protocol Configuration
From the list, select Log File.
Log Source Identifier
Type an IPv4 address or host name to identify the log source
that created the events.
If the remote source contains multiple devices, such as a file
repository, administrators must specify the IP address of the
device that created the event.
Unique identifiers ensure that events are associated to the
correct device in the network, instead of identifying the event
for the management console or file repository.
Service Type
From the list box, select the protocol to use when retrieving
log files from a remove server. The options include:
 SFTP - Secure file transfer protocol
 FTP - File transfer protocol
 SCP - Secure copy protocol
The default is SFTP.
The server that is specified in the Remote IP or
Hostname field must have the SFTP subsystem enabled to
retrieve log files with SCP or SFTP.
Remote IP or Hostname
Type the IP address or host name of the device that contains
the event log files.
Table 1. Log file protocol parameters
Parameter
Description
Remote Port
Type the port that is used to communicate with the remote
host. The valid range is 1 - 65535. The options include:



FTP - TCP Port 21
SFTP - TCP Port 22
SCP - TCP Port 22
If the remote host uses a non-standard port number,
administrators must adjust the port value to retrieve events.
Remote User
Type the user name necessary to log in to the host that
contains the event files.
Remote Password
Type the password necessary to log in to the host.
Confirm Password
Confirm the password necessary to log in to the host.
SSH Key File
Type the path to the SSH key, if the system is configured to
use key authentication.
When an SSH key file is used, the Remote Password field is
ignored.
Remote Directory
Type the directory location on the remote host from which
the files are retrieved. The directory path is relative to the
user account that is used to log in.
Note:
For FTP only. If the log files are in the remote user’s home
directory, you can leave the remote directory blank. A blank
remote directory field supports systems where a change in the
working directory (CWD) command is restricted.
Recursive
Select this check box to enable the file pattern to search sub
folders. By default, the check box is clear.
This option is ignored for SCP file transfers.
FTP File Pattern
Type the regular expression (regex) required to identify the
files to download from the remote host. All files that match
the regular expression are included in the download.
This field applies to the SFTP or FTP file transfers.
SCP Remote File
For SCP file transfers, type the name of the file on the remote
host.
Table 1. Log file protocol parameters
Parameter
Description
FTP Transfer Mode
From the list box, select the transfer mode for the log source:

Binary - Select this option for log sources that require
binary data files or compressed archive files.
 ASCII - Select ASCII for log sources that require an
ASCII FTP file transfer.
Administrators must select NONE in the Processor field
and LINEBYLINE in the Event Generator field for ASCII
transfers over FTP.
Start Time
Type the time of day for the log source to start the file
import.
This parameter functions with the Recurrence value to
establish when and how often the Remote Directory is
scanned for files.
Recurrence
Type a time interval to determine how frequently the remote
directory is scanned for new event log files. The minimum
value is 15 minutes.
The time interval can include values in hours (H), minutes
(M), or days (D). For example, a recurrence of 2H scans the
remote directory every 2 hours.
Run On Save
Select this check box to start the log file import immediately
after the administrators saves the log source.
After the first file import, the log file protocol follows the
start time and recurrence schedule that is defined by the
administrator.
When selected, this check box clears the list of previously
downloaded and processed files.
EPS Throttle
Type the number of Events Per Second (EPS) that the
protocol cannot exceed.
The valid range is 100 - 5000.
Processor
If the files on the remote host are stored in an archive format,
select the processor that is required to uncompress the event
log.
Table 1. Log file protocol parameters
Parameter
Ignore Previously Processed
File(s)
Description
Select this check box to track files that were processed by the
log source.
This option prevents duplicate events from files that are
processed a second time.
This check box applies to FTP and SFTP file transfers.
Change Local Directory?
Select this check box to define the local directory on
the Target Event Collector to store event logs before they
are processed.
Administrators can leave this check box clear for more
configurations.
Local Directory
Type the local directory on the Target Event Collector. This
option is used with the Change Local Directory field.
The directory must exist before the log file protocol attempts
to retrieve events.
Event Generator
From the Event Generator list box, select one of the
following options:





LineByLine - Each line of the file is processed as a
single event. For example, if a file has 10 lines of
text, 10 separate events are created.
HPTandem - The file is processed as a HPTandem
NonStop binary audit log. Each record in the log file
(whether primary or secondary) is converted into text
and processed as a single event. HPTandem audit logs
use the following file name pattern: [aA]\d{7}.
WebSphere Application Server - Processes event logs
for WebSphere Application Server. The remote
directory must define the file path that is configured
in the DSM.
W3C - Processes log files from sources that use the
w3c format. The header of the log file identifies the
order and data that is contained in each line of the file.
Fair Warning - Processes log files from Fair Warning
devices that protect patient identity and medical
information. The remote directory must define the file
path to the event logs that are generated by the Fair
Warning device.
Table 1. Log file protocol parameters
Parameter
Description





File Encoding
DPI Subscriber Data - The file is processed as a DPI
statistic log produced by a Juniper Networks MX
router. The header of the file identifies the order and
data that is contained in each line of the file. Each line
in the file after the header is formatted to a tabdelimited name=value pair event.
SAP Audit Logs - Process files for SAP Audit Logs
to keep a record of security-related events in SAP
systems. Each line of the file is formatted to be
processed.
Oracle BEA WebLogic - Processes files for Oracle
BEA WebLogic application log files. Each line of the
file is formatted to be processed.
Juniper SBR - Processes event log files from Juniper
Steel-belted RADIUS. Each line of the file is
formatted to be processed.
ID-Linked Multiline - Processes multiline event logs
that contain a common value at the start of each line
in a multiline event message. This option uses regular
expressions to identify and reassemble the multiline
event in to single event payload.
From the list box, select the character encoding that is used
by the events in your log file.
Folder Separator
Type the character that is used to separate folders for your
operating system. The default value is /.
Most configurations can use the default value in Folder
Separator field.
This field is intended for operating systems that use a
different character to define separate folders. For example,
periods that separate folders on mainframe systems.
Enabled
Select this check box to enable the log source.
When this check box is clear, the log source does not collect
events and the log source is not counted in the license limit.
Credibility
Select the credibility of the log source. The range is 0
(lowest) - 10 (highest). The default credibility is 5.
Credibility is a representation of the integrity or validity of
events created by a log source. The credibility value assigned
to a log source can increase or decrease based on incoming
Table 1. Log file protocol parameters
Parameter
Description
events or adjusted as a response to user created event rules.
The credibility of events from log sources contributes to the
calculation of the offense magnitude and can increase or
decrease the magnitude value of an offense.
Target Event Collector
Select the Event Collector to use as the target for the log
source. When a log source actively collects events from a
remote source, this field defines which appliance polls for the
events.
This enables administrators to poll and process events on the
target event collector, instead of the Console appliance. This
can improve performance in distributed deployments.
When an administrator verifies firewall ports
between QRadar® and the remote database, the firewall must
allow communication between the target event collector and
the remote database.
Coalescing Events
Select this check box to enable the log source to coalesce
(bundle) events.
Coalescing events increase the event count when the same
event occurs multiple times within a short time interval.
Coalesced events provide administrators a way to view and
determine the frequency with which a single event type
occurs on the Log Activity tab.
When this check box is clear, the events are displayed
individually and the information is not bundled.
New and automatically discovered log sources inherit the
value of this check box from the System
Settingsconfiguration on the Admin tab. Administrators can
use this check box to override the default behavior of the
system settings for an individual log source.
Store Event Payload
Select this check box to enable the log source to store the
payload information from an event.
New and automatically discovered log sources inherit the
value of this check box from the System
Settingsconfiguration on the Admin tab. Administrators can
use this check box to override the default behavior of the
system settings for an individual log source.
Table 1. Log file protocol parameters
Parameter
Description
Log Source Language
Select the language of the events generated by the log source.
The log source language helps the system parse events from
external appliances or operating systems that can create
events in multiple languages.
Log Source Extension
Optional. Select the name of the extension to apply to the log
source.
This parameter is only available after a log source extension
is uploaded. Log source extensions are XML files that
contain regular expressions, which can override or repair the
event parsing patterns defined by a device support module
(DSM).
Extension Use Condition
From the list box, select the use condition for the log source
extension. The options include:


Groups
Parsing enhancement - Select this option when most
fields parse correctly for the log source.
Parsing override - Select this option when the log
source is unable to correctly parse events.
Select one or more groups for the log source.
Procedure
1.
Click the Admin tab.
2.
Click the Log Sources icon.
3.
Click Add.
4.
Configure the parameters for your log source. The DSM Configuration Guide provides step-by-step
instructions to configure each log source.
5.
Click Save.
6.
On the Admin tab, click Deploy Changes.
Download