Version-1.1
cr.yandex/sol/s3-opensearch-importer:1.1
The solution allows you to collect, monitor and analyze Yandex.Cloud audit logs (Audit Trails) in Opensearch from the following sources:
The solution is constantly updated and maintained by the Yandex.Cloud Security team.
Important! By default, this construct suggests deleting files after being subtracted from the bucket, but you can simultaneously store Audit Trails audit logs in S3 on a long-term basis and send them to Elastic. To do this, you need to create two Audit Trails in different S3 buckets:. The first bucket will be used for storage only. The second bucket will be used for integration with Opensearch
cr.yandex/sol/s3-opensearch-importer:latest
)Security Content - Opensearch objects that are automatically loaded by the solution. All content is developed taking into account the experience of the Yandex.Cloud Security team and based on the experience of Cloud Clients.
Contains the following Security Content:
Detailed description in the file ECS-mapping.docx
Coming soon..to the next version
To install using terraform, go to the terraform
Based on the results of executing the tf script and the manual actions indicated below, audit trails events from the cloud will be loaded into the opensearch specified by you and security content (dashboard, filters, mapping etc.) will be loaded to work with them
As a result of the installation, you will have a tenant "at-tenant", in which all objects are located
Alerting and response rules in Opensearch is done using the Alerting mechanism
Our solution already loads the monitor example, you can take it as an example to start and make alerts by analogy. Go to the Alerting - Monitors tab and find "test" there. Press the edit button, scroll down and expand the triggers tab and enter an action in it. Select a pre-created [notification] channel there (https://opensearch.org/docs/latest/notifications-plugin/index/) (for example, slack)
To install opensearch, you can use the official documentation. For example install with docker
To set up TLS in opensearch dashboard, use instruction
To generate a self-signed SSL certificate, use instruction Or upload your own certificate
Here are test files for installing opensearch in the [deploy-of-opensearch] section(https://github.com/yandex-cloud/yc-solution-library-for-security/tree/add-opensearch-solution/auditlogs/ export-auditlogs-to-opensearch/deploy-of-opensearch)
p.s: don't forget to give the necessary file permissions with the certificate and key
Recommendations for configuring retention, rollover and snapshots