darioajr / ELKLinks
NOC ELK + FORTINET LOG
☆22Updated 9 years ago
Alternatives and similar repositories for ELK
Users that are interested in ELK are comparing it to the libraries listed below
Sorting:
- Fortinet products logs to Elasticsearch☆98Updated 8 months ago
- Kibana dashboards, visualizations and searches for Postfix☆42Updated last year
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- Alert notification plugin for Graylog to generate log messages from alerts☆25Updated last month
- Example configuration files for Logstash☆44Updated 5 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆114Updated 6 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Experimental DNS logs pipeline based on Pi-hole dnsmasq logs, ELK stack, and Filebeat. Sample configs included.☆30Updated last year
- Meraki MX Logstash configurations☆16Updated 2 years ago
- Configuration for a Palo Alto Networks fed ELK Stack with Visualizations☆73Updated 6 years ago
- Zabbix Templates and scripts to monitor OSSEC or Wazuh Manager Intrusion Detection☆13Updated 5 years ago
- Useful scripts for those administering Wazuh☆83Updated this week
- Translate an ECS mapping CSV to starter pipelines for Beats, Elasticsearch or Logstash☆54Updated 3 years ago
- Alert Wizard plugin for Graylog to manage the alert rules☆48Updated this week
- Zeek (formerly Bro) Network Security Monitor package for pfSense router/firewall☆45Updated 3 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 3 years ago
- ☆38Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Logstash Configuration for Linux Logs (Authentication, Apache, Mail)☆93Updated 5 years ago
- Wazuh - Puppet module☆48Updated this week
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- Log examples of vCenter Server Authentication & Authorization activities☆16Updated 6 years ago
- ☆36Updated last year
- ioc2rpz is a place where threat intelligence meets DNS.☆109Updated 4 months ago
- Alert condition plugin for Graylog to perform aggregation☆20Updated 2 years ago
- LogStash Grok patterns☆14Updated 8 years ago
- A solution for using the ElastiFlow Unified Collector with the Elastic Stack (Elasticsearch and Kibana).☆23Updated 3 months ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- How to send syslog from Linux systems into Graylog☆80Updated 6 years ago
- Graylog Content Pack for Watchguard Fireware Logging☆37Updated 5 years ago