Skip to content

splunk/TA-osquery

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

58 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TA-osquery

osquery-logo

A Splunk technology add-on for osquery

Join the conversation at Slack Status

branch build status
master master status
  • Sourcetype: osquery:results, osquery:snapshots, osquery:INFO, osquery:WARNING, osquery:ERROR
  • Has index-time ops: false

Features

  • Parses and extracts fields for the following logs:
    • osqueryd.INFO, osqueryd.WARNING, osqueryd.ERROR
    • osqueryd.results.log (from process_events and file_events tables)
    • osqueryd.snapshots.log
  • Provides Datamodel Mapping for:
    • Changes Data Model based on custom splunk query pack
    • Endpoint Data Model based on custom splunk query pack
  • Does correct time extraction
  • Currently documented and tested for macOS only, although parsing logic can be reused for *nix & Windows if desired.
  • Note, logs do not include parent process information other than parent process id

Deploying TA

  1. Copy default/inputs.conf to local/inputs.conf and uncomment all the stanzas
  2. Drop the TA on the Search Head(s), Indexer(s), Heavy Forwarder (if required, or if using AWS), and Universal Forwarder (if required).

Setting up osquery for local logging

This deployment process has been documented and tested based on Mac OS Sequoia. It is important that you thoroughly test this on your environment before rolling out to production. Ref: https://osquery.readthedocs.io

  1. Download and install osquery package following instructions
  2. Copy osquery.conf and osquery.flags files to /var/osquery
  3. Ensure that Full Disk Access (FDA) permission is enabled in macOS Privacy & Security settings for osqueryd (/opt/osquery/lib/osquery.app/Contents/MacOS/osqueryd)

Logging to AWS (preferred - but note, these instructions have not been updated since 2019)

osquery config

This is the preferred collection method as it removes the need for a Universal Forwarder on each endpoint and ensures remote log connection can be achieved whether or not the endpoint is connected to the corporate network. Splunk Cloud is great way of logging from endpoints but would still require a Universal Forwarder to be rolled out.

The install process is the same as above, apart from the osquery.conf needs to be modified to log to AWS. This can be done by following the osquery doc https://osquery.readthedocs.io/en/stable/deployment/aws-logging/

splunk config

  1. Install and configure Splunk Add-On For Amazon Web Services on your Heavy Forwarder to pull your osquery events from your S3 bucket.

To Do's

  • Document a 'Logging locally' method, whereby log rotation is discussed, and running Splunk UF as root to read the log file.

Author

Contributors

  • Jamie Windley

About

A Splunk technology add-on for osquery

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •