This pack compliments the greynoise-redis-docker
solution by Blue Cycle to enrich events in Cribl Stream with a malicious disposition. Due to Cribl's ability to process high event volumes, a REST API cannot handle the volume of queries required to enrich events in real time. Enter redis. This solution keeps a redis instance updated with the latest GreyNoise dataset in order to enrich an IP address from Redis in realtime.
This pack is a collaboration between Cribl, Blue Cycle and GreyNoise.
This pack currently supports a single node redis cluster that is already running and populated with GreyNoise data. More info here.
Before you begin, ensure that you have met the following requirements:
- You need a GreyNoise API Key with appropriate license that includes approved FEED support, and the associated software package that can populate redis from the GreyNoise API.
- An event with an IP address to enrich.
- The IP address, port, and admin secret for your redis instance.
- When using Redis functions in a pack, if redis is not available, your pipeline will time out and may affect Cribl performance.
- In order to authenticate to your redis instance as described below, you will need to configure a
user
oradmin
secret as a text secret in Stream, then select that secret in the redis function's authentication section. Info on Secrets here. Info on Redis Authentication in Stream here. Authentication is currently disabled in the sample pipelines.
For each redis function, set up the following:
- filter
** Lookup: Result field:
ex: malicious
(the field to write intel lookup result), Command: get, Key: event field you are looking up, Args (not required) - Redis URL: redis://10.10.10.5:6379 (redis://:) (use
rediss://10.10.10.5:6379
for TLS -> note the two s's inredis
) - Secret: redis admin/user account secret More info on setting up redis functions can be found in the Cribl Stream docs here
- With the redis function configured above, enter the event field with an IPv4 address in the
Key
field for your redis lookup. - In the
PAN-Traffic-Enrich-Src-v1
example pipeline in this pack, we use a PAN firewall event, and are doing a lookup on thesource_ip
field, and returning our result to a field calledmalicious
.
One could use a similar redis function to enrich any IP address in an event and return the result to any field name desired.
- Fix findings for pack approval
- Initial public release for performance and QA testing.
To contribute to the Pack, please do the following:
Reach out to @JP Bourget on Slack to discuss.
Reach out to '@JP Bourget' on Slack To contact us please email [email protected] or [email protected]
This Pack uses the following license: Apache 2.0
.