cbc-syslog


Namecbc-syslog JSON
Version 2.0.3 PyPI version JSON
download
home_pagehttps://github.com/carbonblack/cbc-syslog
SummarySyslog Connector for Carbon Black Cloud
upload_time2024-03-25 19:38:16
maintainerNone
docs_urlNone
authorCarbon Black Developer Network
requires_pythonNone
licenseMIT
keywords carbonblack
VCS
bugtrack_url
requirements carbon-black-cloud-sdk tomli Jinja2 psutil flask cryptography pytest coverage coveralls flake8 flake8-colors flake8-docstrings pre-commit freezegun
Travis-CI No Travis.
coveralls test coverage
            # Carbon Black Cloud Syslog Connector 2.x

## Introduction

The Carbon Black Cloud Syslog connector lets administrators forward alerts and audit logs from their Carbon Black Cloud instance to local, on-premise systems or other cloud applications.

Still need CBC Syslog 1.x? Checkout the `legacy` branch

If you are looking to migrate from CBC Syslog 1.x to 2.x take a look at the [migration doc](https://github.com/carbonblack/cbc-syslog/blob/main/MIGRATION.md).

## Features

* Generates templated messages to support any desired syslog format or send the entire raw JSON message
* Supports multi-tenancy of one or more Carbon Black Cloud organizations into a single syslog stream
* Use local File, HTTP, TCP, encrypted (TCP over TLS), or UDP transport protocols to send data

### Requirements

The following python packages are required to use CBC Syslog

* carbon-black-cloud-sdk
* Jinja2
* psutil
* tomli >= 1.1.0; python_version < '3.11'

**Note:** _`tomli` is only required for python versions before 3.11 as tomlib has been included in the standard python library_

## Installation

You can install the Syslog Connector using either [PyPI](https://pypi.org/project/cbc-syslog) or GitHub.

### PyPI Installation

```
pip install cbc-syslog
```

### GitHub Installation

1. Clone the repository using SSH or HTTPS

        SSH
        git clone git@github.com:carbonblack/cbc-syslog.git

        HTTPS
        git clone https://github.com/carbonblack/cbc-syslog.git


2. Change to the CBC Syslog directory

        cd cbc-syslog

3. Install python package

        pip install .


### Running cbc_syslog_forwarder

The script `cbc_syslog_forwarder` is installed into the OS bin directory for easy access from any directory

```
>>> cbc_syslog_forwarder --help
usage: cbc_syslog_forwarder [-h] [--log-file LOG_FILE] [-d] [-v] {poll,history,convert,setup,check} ...

positional arguments:
  {poll,history,convert,setup,check}
                        The action to be taken
    poll                Fetches data from configured sources and forwards to configured output since last poll attempt
    history             Fetches data from specified source for specified time range and forwards to configured output
    convert             Convert CBC Syslog 1.0 conf to new 2.0 toml
    setup               Setup wizard to walkthrough configuration
    check               Check config for valid API keys with correct permissions

options:
  -h, --help            show this help message and exit
  --log-file LOG_FILE, -l LOG_FILE
                        Log file location
  -d, --debug           Set log level to debug
  -v, --verbose         Set log level to info
```

The `cbc_syslog_forwarder` poll command is designed to be executed in a cronjob or scheduled task for continual syslog forwarding

**Mac/Linux:**

Create a file to save the cronjob such as `syslog-job.txt`. Cronjobs use the [UNIX cron format](https://www.tutorialspoint.com/unix_commands/crontab.htm) for specifying the schedule for the job to be executed

```
5  *  *  *  *  cbc_syslog_forwarder --log-file /some/path/cbc-syslog.log poll /some/path/my-config.toml
```

To start the job once the file is created run the following command

```
crontab syslog-job.txt
```

**Windows:**

Windows uses Task Scheduler for running scheduled applications.

1. Search for **Task Scheduler**
2. Click on **Action** then **Create Task**
3. Name your Scheduled Task
5. Click on the **Actions** Tab and Click **New**
6. Under **Program/script** enter `cbc_syslog_forwarder`.
7. Under **Add arguments** provide the arguments you use to run the poll command with absolute paths to any files
8. Click OK
9. Click on the **Triggers** tab and Click **New**
10. Now is the time to schedule your Task. Fill out the information as needed and Click Ok


Your Task has been created! To test your Scheduled Task, follow these instructions below:

1. Search for Task Scheduler
2. Click on the folder **Task Scheduler Library** on the left hand column
3. Select the Task you want to Test
4. Select **Run** on the Actions column on the right hand column.

For more information on windows task scheduler checkout [how-create-automated-task-using-task-scheduler](https://www.windowscentral.com/how-create-automated-task-using-task-scheduler-windows-10)

### Create a Config file

If you are creating a CBC Syslog toml file for the first time checkout the setup wizard which walks you through the basic configuration steps.

    cbc_syslog_forwarder setup my-config.toml

For more information on each section follow the guide below:

1. Create a CUSTOM API key in at least one Carbon Black Cloud instance with the following permissions `org.alerts READ` and `org.audits READ`

    For more information on creating a CUSTOM API key see the [Carbon Black Cloud User Guide](https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide/GUID-F3816FB5-969F-4113-80FC-03981C65F969.html)

2. Create a toml file - e.g. my-config.toml

    For a detailed breakdown of all the supported configurations see examples/cbc-syslog.toml.example

3. Create the general section

        [general]
        backup_dir = "/some/dir"
        output_type = "file/http/tcp/tcp+tls/udp"
        output_format = "json/template"

    a. Specify an absolute path in `backup_dir` to a directory where unsent messages and previous state can be saved in the case of failure

    b. Decide how you would like to send the messages in `output_type` from `file`, `http`, `tcp`, `tcp+tls` or `udp`

    c. Decide your `output_format` from  `json` or `template`


4. Based on the `output_type` you have choosen you'll need to configure one of the following output destinations

    Examples outputs

        file_path = "/some/dir"

        http_out = "https://example.com"
        http_headers =  "{ \"content-type\": \"application/json\" }"
        https_ssl_verify = true

        tcp_out = "1.2.3.5:514"

        udp_out = "1.2.3.5:514"


    a.  If you selected `tcp+tls` you'll need to configure the `tls` section based on your destination's expected certs

        [tls]
        ca_cert =
        cert =
        key =
        key_password =
        tls_verify =

5. If you choose `json` for `output_format` skip to step 6 otherwise see 4a

    Example CEF template

        [alerts_template]
        template = "{{datetime_utc}} localhost CEF:1|{{vendor}}|{{product}}|{{product_version}}|{{reason_code}}|{{reason}}|{{severity}}|{{extension}}"
        type_field = "type"
        time_format = "%b %d %Y %H:%m:%S"
        time_fields = ["backend_timestamp"]

        [alerts_template.extension]
        default = "cat={{type}}\tact={{sensor_action}}\toutcome={{run_state}}"
        CB_ANALYTICS = "cat={{type}}\tact={{sensor_action}}\toutcome={{run_state}}\tframeworkName=MITRE_ATT&CK\tthreatAttackID={{attack_tactic}}:{{attack_technique}}"

        [audit_logs_template]
        template = "{{datetime_utc}} localhost CEF:1|{{vendor}}|{{product}}|{{product_version}}|Audit Logs|{{description}}|1|{{extension}}"
        time_format = "%b %d %Y %H:%m:%S"
        time_fields = ["eventTime"]

        [audit_logs_template.extension]
        default = "rt={{eventTime}}\tdvchost={{orgName}}\tduser={{loginName}}\tdvc={{clientIp}}\tcs4Label=Event_ID\tcs4={{eventId}}"

    a. You'll need to create a template for each data type you plan to enable

    b. Each data template supports a base `template` along with the option to specify an `extension` which can be used customize each message based on the values of the specified `type_field`

    In the example above the `type_field` for alerts is set to `type` which enables a different extension to be selected based on the alert field `type`

    **Note:** _If a value is not specified in the extension then the default option will be used. The values are CASE_SENSITIVE_

    c. If you need to modify the format of a timestamp then you can specify a python strftime format in `time_format` as well as the `time_fields` that need to be modified

    For more information on strftime formats see https://strftime.org/

    d. See [Search Fields - Alert](https://developer.carbonblack.com/reference/carbon-black-cloud/platform/latest/alert-search-fields/) for the full list of Alert fields

6. Configure one or more Carbon Black Cloud Organizations

    Example Organization

        [SourceName1]
        server_url = defense.conferdeploy.net
        org_key = ABCD1234
        custom_api_id = ABCDE12345
        custom_api_key = ABCDEFGHIKLMNO1234567890
        alerts_enabled = true
        audit_logs_enabled = true

    a. The `server_url` should match the hostname of your Carbon Black Cloud environment

    b. The `org_key` can be found on the API Access page in the Carbon Black Cloud console from step 1

    c. Use the CUSTOM API key from step 1

    d. Enable the desired data you would like to send for the organization

7. If you set `alerts_enabled` to `true` then you will need to configure one or more `alert_rules`

    Each `alert_rules` is a separate request for alerts such that you can configure custom criteria for a desired usecase. See [Search Fields - Alert](https://developer.carbonblack.com/reference/carbon-black-cloud/platform/latest/alert-search-fields/) for the fields marked **Searchable**.

    Example Alert Rules

        [[SourceName1.alert_rules]]
        type = [ "WATCHLIST", "DEVICE_CONTROL" ]
        minimum_severity = 7

        [[SourceName1.alert_rules]]
        type = [ "CB_ANALYTICS" ]
        minimum_severity = 3

    The key is the alert field you want to filter by and the value is a list of values you want to filter except `minimum_severity` which is a single integer. Each value is OR'd for a key and values are AND'd across keys e.g. `type:( WATCHLIST OR DEVICE_CONTROL) AND minimum_severity: 7`

    If you want to fetch `ALL` alerts then use the following `alert_rules`

        [[SourceName1.alert_rules]]
        minimum_severity = 1


### Creating a custom message with templates

The configuration file provides the ability to define a template for each data type as well as the ability to create a custom extension which can be defined based on a configurable field to make a unique message for a data's sub type

The templates use jinja2 for rendering customizable messages. You can provide the text to be included as well as variable data by wrapping the field name in double curly braces e.g. `{{field_name}}`.

#### Template Configuration Properties

* `template` defines the base syslog header which will be included for all messages of the data type

    **Note:** _Make sure to include `{{extension}}` inside the `template` value in order for the extension template to be rendered as part of the message_

* `type_field` defines the field in the data that should be used to define which extension should be rendered. The value in the extensions are case sensistive

* `time_format` and `time_fields` provides you the ability to customize the way the timestamps are formatte and which fields to modify. This utilizes python strftime formatting, for more information on strftime formats see https://strftime.org/

Example:
```
[alerts_template]
template = "{{datetime_utc}} localhost CEF:1|{{vendor}}|{{product}}|{{product_version}}|{{reason_code}}|{{reason}}|{{severity}}|{{extension}}"
type_field = "type"
time_format = "%b %d %Y %H:%m:%S"
time_fields = ["backend_timestamp"]
```

#### Extension

* `default` defines the extension which will be utilized if no field is specified for `type_field` or a value was not specified in the extension
* Any other key in the extension dictionary will be interpretted as a possible value to be matched for the `type_field`. The values are case sensistive

Example:
```
[alerts_template.extension]
default = "cat={{type}}\tact={{sensor_action}}\toutcome={{run_state}}"
CB_ANALYTICS = "cat={{type}}\tact={{sensor_action}}\toutcome={{run_state}}\tframeworkName=MITRE_ATT&CK\tthreatAttackID={{attack_tactic}}:{{attack_technique}}"
```

#### Fields

The following fields are available for building the Syslog header

* `{{datetime_utc}}` - Uses current time with format e.g. 1985-04-12T23:20:50.52Z
* `{{datetime_legacy}}` - Uses current time with format e.g. Jan 18 11:07:53
* `{{vendor}}` - CarbonBlack
* `{{product}}` - CBCSyslog
* `{{product_version}}` - Current CBC Syslog version e.g. 2.0.2


For the available Alert fields see [Search Fields - Alerts](https://developer.carbonblack.com/reference/carbon-black-cloud/platform/latest/alert-search-fields)

For the available Audit Log fields see [Audit Log Events](https://developer.carbonblack.com/reference/carbon-black-cloud/cb-defense/latest/rest-api#audit-log-events)

### Customer Support

If you want to report an issue or request a new feature please open an issue on [GitHub](https://github.com/carbonblack/cbc-syslog/issues)

If you are struggling to setup the tool and your an existing Carbon Black Cloud customer reach out to [Support](https://www.vmware.com/support/services.html) from your product console or your sales contact. Support tickets can also be submitted through our [User Exchange community](https://community.carbonblack.com/community/resources/developer-relations).

For other helpful resources check out our contact us page https://developer.carbonblack.com/contact

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/carbonblack/cbc-syslog",
    "name": "cbc-syslog",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": "carbonblack",
    "author": "Carbon Black Developer Network",
    "author_email": "cb-developer-network@vmware.com",
    "download_url": "https://files.pythonhosted.org/packages/62/6b/fac2d365e451ab8814bfa028faf4605c3535edfe3a9b6236322f6a09b1da/cbc_syslog-2.0.3.tar.gz",
    "platform": null,
    "description": "# Carbon Black Cloud Syslog Connector 2.x\n\n## Introduction\n\nThe Carbon Black Cloud Syslog connector lets administrators forward alerts and audit logs from their Carbon Black Cloud instance to local, on-premise systems or other cloud applications.\n\nStill need CBC Syslog 1.x? Checkout the `legacy` branch\n\nIf you are looking to migrate from CBC Syslog 1.x to 2.x take a look at the [migration doc](https://github.com/carbonblack/cbc-syslog/blob/main/MIGRATION.md).\n\n## Features\n\n* Generates templated messages to support any desired syslog format or send the entire raw JSON message\n* Supports multi-tenancy of one or more Carbon Black Cloud organizations into a single syslog stream\n* Use local File, HTTP, TCP, encrypted (TCP over TLS), or UDP transport protocols to send data\n\n### Requirements\n\nThe following python packages are required to use CBC Syslog\n\n* carbon-black-cloud-sdk\n* Jinja2\n* psutil\n* tomli >= 1.1.0; python_version < '3.11'\n\n**Note:** _`tomli` is only required for python versions before 3.11 as tomlib has been included in the standard python library_\n\n## Installation\n\nYou can install the Syslog Connector using either [PyPI](https://pypi.org/project/cbc-syslog) or GitHub.\n\n### PyPI Installation\n\n```\npip install cbc-syslog\n```\n\n### GitHub Installation\n\n1. Clone the repository using SSH or HTTPS\n\n        SSH\n        git clone git@github.com:carbonblack/cbc-syslog.git\n\n        HTTPS\n        git clone https://github.com/carbonblack/cbc-syslog.git\n\n\n2. Change to the CBC Syslog directory\n\n        cd cbc-syslog\n\n3. Install python package\n\n        pip install .\n\n\n### Running cbc_syslog_forwarder\n\nThe script `cbc_syslog_forwarder` is installed into the OS bin directory for easy access from any directory\n\n```\n>>> cbc_syslog_forwarder --help\nusage: cbc_syslog_forwarder [-h] [--log-file LOG_FILE] [-d] [-v] {poll,history,convert,setup,check} ...\n\npositional arguments:\n  {poll,history,convert,setup,check}\n                        The action to be taken\n    poll                Fetches data from configured sources and forwards to configured output since last poll attempt\n    history             Fetches data from specified source for specified time range and forwards to configured output\n    convert             Convert CBC Syslog 1.0 conf to new 2.0 toml\n    setup               Setup wizard to walkthrough configuration\n    check               Check config for valid API keys with correct permissions\n\noptions:\n  -h, --help            show this help message and exit\n  --log-file LOG_FILE, -l LOG_FILE\n                        Log file location\n  -d, --debug           Set log level to debug\n  -v, --verbose         Set log level to info\n```\n\nThe `cbc_syslog_forwarder` poll command is designed to be executed in a cronjob or scheduled task for continual syslog forwarding\n\n**Mac/Linux:**\n\nCreate a file to save the cronjob such as `syslog-job.txt`. Cronjobs use the [UNIX cron format](https://www.tutorialspoint.com/unix_commands/crontab.htm) for specifying the schedule for the job to be executed\n\n```\n5  *  *  *  *  cbc_syslog_forwarder --log-file /some/path/cbc-syslog.log poll /some/path/my-config.toml\n```\n\nTo start the job once the file is created run the following command\n\n```\ncrontab syslog-job.txt\n```\n\n**Windows:**\n\nWindows uses Task Scheduler for running scheduled applications.\n\n1. Search for **Task Scheduler**\n2. Click on **Action** then **Create Task**\n3. Name your Scheduled Task\n5. Click on the **Actions** Tab and Click **New**\n6. Under **Program/script** enter `cbc_syslog_forwarder`.\n7. Under **Add arguments** provide the arguments you use to run the poll command with absolute paths to any files\n8. Click OK\n9. Click on the **Triggers** tab and Click **New**\n10. Now is the time to schedule your Task. Fill out the information as needed and Click Ok\n\n\nYour Task has been created! To test your Scheduled Task, follow these instructions below:\n\n1. Search for Task Scheduler\n2. Click on the folder **Task Scheduler Library** on the left hand column\n3. Select the Task you want to Test\n4. Select **Run** on the Actions column on the right hand column.\n\nFor more information on windows task scheduler checkout [how-create-automated-task-using-task-scheduler](https://www.windowscentral.com/how-create-automated-task-using-task-scheduler-windows-10)\n\n### Create a Config file\n\nIf you are creating a CBC Syslog toml file for the first time checkout the setup wizard which walks you through the basic configuration steps.\n\n    cbc_syslog_forwarder setup my-config.toml\n\nFor more information on each section follow the guide below:\n\n1. Create a CUSTOM API key in at least one Carbon Black Cloud instance with the following permissions `org.alerts READ` and `org.audits READ`\n\n    For more information on creating a CUSTOM API key see the [Carbon Black Cloud User Guide](https://docs.vmware.com/en/VMware-Carbon-Black-Cloud/services/carbon-black-cloud-user-guide/GUID-F3816FB5-969F-4113-80FC-03981C65F969.html)\n\n2. Create a toml file - e.g. my-config.toml\n\n    For a detailed breakdown of all the supported configurations see examples/cbc-syslog.toml.example\n\n3. Create the general section\n\n        [general]\n        backup_dir = \"/some/dir\"\n        output_type = \"file/http/tcp/tcp+tls/udp\"\n        output_format = \"json/template\"\n\n    a. Specify an absolute path in `backup_dir` to a directory where unsent messages and previous state can be saved in the case of failure\n\n    b. Decide how you would like to send the messages in `output_type` from `file`, `http`, `tcp`, `tcp+tls` or `udp`\n\n    c. Decide your `output_format` from  `json` or `template`\n\n\n4. Based on the `output_type` you have choosen you'll need to configure one of the following output destinations\n\n    Examples outputs\n\n        file_path = \"/some/dir\"\n\n        http_out = \"https://example.com\"\n        http_headers =  \"{ \\\"content-type\\\": \\\"application/json\\\" }\"\n        https_ssl_verify = true\n\n        tcp_out = \"1.2.3.5:514\"\n\n        udp_out = \"1.2.3.5:514\"\n\n\n    a.  If you selected `tcp+tls` you'll need to configure the `tls` section based on your destination's expected certs\n\n        [tls]\n        ca_cert =\n        cert =\n        key =\n        key_password =\n        tls_verify =\n\n5. If you choose `json` for `output_format` skip to step 6 otherwise see 4a\n\n    Example CEF template\n\n        [alerts_template]\n        template = \"{{datetime_utc}} localhost CEF:1|{{vendor}}|{{product}}|{{product_version}}|{{reason_code}}|{{reason}}|{{severity}}|{{extension}}\"\n        type_field = \"type\"\n        time_format = \"%b %d %Y %H:%m:%S\"\n        time_fields = [\"backend_timestamp\"]\n\n        [alerts_template.extension]\n        default = \"cat={{type}}\\tact={{sensor_action}}\\toutcome={{run_state}}\"\n        CB_ANALYTICS = \"cat={{type}}\\tact={{sensor_action}}\\toutcome={{run_state}}\\tframeworkName=MITRE_ATT&CK\\tthreatAttackID={{attack_tactic}}:{{attack_technique}}\"\n\n        [audit_logs_template]\n        template = \"{{datetime_utc}} localhost CEF:1|{{vendor}}|{{product}}|{{product_version}}|Audit Logs|{{description}}|1|{{extension}}\"\n        time_format = \"%b %d %Y %H:%m:%S\"\n        time_fields = [\"eventTime\"]\n\n        [audit_logs_template.extension]\n        default = \"rt={{eventTime}}\\tdvchost={{orgName}}\\tduser={{loginName}}\\tdvc={{clientIp}}\\tcs4Label=Event_ID\\tcs4={{eventId}}\"\n\n    a. You'll need to create a template for each data type you plan to enable\n\n    b. Each data template supports a base `template` along with the option to specify an `extension` which can be used customize each message based on the values of the specified `type_field`\n\n    In the example above the `type_field` for alerts is set to `type` which enables a different extension to be selected based on the alert field `type`\n\n    **Note:** _If a value is not specified in the extension then the default option will be used. The values are CASE_SENSITIVE_\n\n    c. If you need to modify the format of a timestamp then you can specify a python strftime format in `time_format` as well as the `time_fields` that need to be modified\n\n    For more information on strftime formats see https://strftime.org/\n\n    d. See [Search Fields - Alert](https://developer.carbonblack.com/reference/carbon-black-cloud/platform/latest/alert-search-fields/) for the full list of Alert fields\n\n6. Configure one or more Carbon Black Cloud Organizations\n\n    Example Organization\n\n        [SourceName1]\n        server_url = defense.conferdeploy.net\n        org_key = ABCD1234\n        custom_api_id = ABCDE12345\n        custom_api_key = ABCDEFGHIKLMNO1234567890\n        alerts_enabled = true\n        audit_logs_enabled = true\n\n    a. The `server_url` should match the hostname of your Carbon Black Cloud environment\n\n    b. The `org_key` can be found on the API Access page in the Carbon Black Cloud console from step 1\n\n    c. Use the CUSTOM API key from step 1\n\n    d. Enable the desired data you would like to send for the organization\n\n7. If you set `alerts_enabled` to `true` then you will need to configure one or more `alert_rules`\n\n    Each `alert_rules` is a separate request for alerts such that you can configure custom criteria for a desired usecase. See [Search Fields - Alert](https://developer.carbonblack.com/reference/carbon-black-cloud/platform/latest/alert-search-fields/) for the fields marked **Searchable**.\n\n    Example Alert Rules\n\n        [[SourceName1.alert_rules]]\n        type = [ \"WATCHLIST\", \"DEVICE_CONTROL\" ]\n        minimum_severity = 7\n\n        [[SourceName1.alert_rules]]\n        type = [ \"CB_ANALYTICS\" ]\n        minimum_severity = 3\n\n    The key is the alert field you want to filter by and the value is a list of values you want to filter except `minimum_severity` which is a single integer. Each value is OR'd for a key and values are AND'd across keys e.g. `type:( WATCHLIST OR DEVICE_CONTROL) AND minimum_severity: 7`\n\n    If you want to fetch `ALL` alerts then use the following `alert_rules`\n\n        [[SourceName1.alert_rules]]\n        minimum_severity = 1\n\n\n### Creating a custom message with templates\n\nThe configuration file provides the ability to define a template for each data type as well as the ability to create a custom extension which can be defined based on a configurable field to make a unique message for a data's sub type\n\nThe templates use jinja2 for rendering customizable messages. You can provide the text to be included as well as variable data by wrapping the field name in double curly braces e.g. `{{field_name}}`.\n\n#### Template Configuration Properties\n\n* `template` defines the base syslog header which will be included for all messages of the data type\n\n    **Note:** _Make sure to include `{{extension}}` inside the `template` value in order for the extension template to be rendered as part of the message_\n\n* `type_field` defines the field in the data that should be used to define which extension should be rendered. The value in the extensions are case sensistive\n\n* `time_format` and `time_fields` provides you the ability to customize the way the timestamps are formatte and which fields to modify. This utilizes python strftime formatting, for more information on strftime formats see https://strftime.org/\n\nExample:\n```\n[alerts_template]\ntemplate = \"{{datetime_utc}} localhost CEF:1|{{vendor}}|{{product}}|{{product_version}}|{{reason_code}}|{{reason}}|{{severity}}|{{extension}}\"\ntype_field = \"type\"\ntime_format = \"%b %d %Y %H:%m:%S\"\ntime_fields = [\"backend_timestamp\"]\n```\n\n#### Extension\n\n* `default` defines the extension which will be utilized if no field is specified for `type_field` or a value was not specified in the extension\n* Any other key in the extension dictionary will be interpretted as a possible value to be matched for the `type_field`. The values are case sensistive\n\nExample:\n```\n[alerts_template.extension]\ndefault = \"cat={{type}}\\tact={{sensor_action}}\\toutcome={{run_state}}\"\nCB_ANALYTICS = \"cat={{type}}\\tact={{sensor_action}}\\toutcome={{run_state}}\\tframeworkName=MITRE_ATT&CK\\tthreatAttackID={{attack_tactic}}:{{attack_technique}}\"\n```\n\n#### Fields\n\nThe following fields are available for building the Syslog header\n\n* `{{datetime_utc}}` - Uses current time with format e.g. 1985-04-12T23:20:50.52Z\n* `{{datetime_legacy}}` - Uses current time with format e.g. Jan 18 11:07:53\n* `{{vendor}}` - CarbonBlack\n* `{{product}}` - CBCSyslog\n* `{{product_version}}` - Current CBC Syslog version e.g. 2.0.2\n\n\nFor the available Alert fields see [Search Fields - Alerts](https://developer.carbonblack.com/reference/carbon-black-cloud/platform/latest/alert-search-fields)\n\nFor the available Audit Log fields see [Audit Log Events](https://developer.carbonblack.com/reference/carbon-black-cloud/cb-defense/latest/rest-api#audit-log-events)\n\n### Customer Support\n\nIf you want to report an issue or request a new feature please open an issue on [GitHub](https://github.com/carbonblack/cbc-syslog/issues)\n\nIf you are struggling to setup the tool and your an existing Carbon Black Cloud customer reach out to [Support](https://www.vmware.com/support/services.html) from your product console or your sales contact. Support tickets can also be submitted through our [User Exchange community](https://community.carbonblack.com/community/resources/developer-relations).\n\nFor other helpful resources check out our contact us page https://developer.carbonblack.com/contact\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Syslog Connector for Carbon Black Cloud",
    "version": "2.0.3",
    "project_urls": {
        "Homepage": "https://github.com/carbonblack/cbc-syslog"
    },
    "split_keywords": [
        "carbonblack"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "116a920c91317f6a242e52a4031523d6ff006400cb7113d749515801a56172cd",
                "md5": "3b54fb536ff1c7c39388a1f282fd2891",
                "sha256": "afaf7e3062593f77fff303298f1941b24c5f7613bea074699242a852cc20a95f"
            },
            "downloads": -1,
            "filename": "cbc_syslog-2.0.3-py2.py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "3b54fb536ff1c7c39388a1f282fd2891",
            "packagetype": "bdist_wheel",
            "python_version": "py2.py3",
            "requires_python": null,
            "size": 26754,
            "upload_time": "2024-03-25T19:38:14",
            "upload_time_iso_8601": "2024-03-25T19:38:14.904555Z",
            "url": "https://files.pythonhosted.org/packages/11/6a/920c91317f6a242e52a4031523d6ff006400cb7113d749515801a56172cd/cbc_syslog-2.0.3-py2.py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "626bfac2d365e451ab8814bfa028faf4605c3535edfe3a9b6236322f6a09b1da",
                "md5": "002218c62db41a8846f6c64cc7388f77",
                "sha256": "adc19557f237a8f5a9b0d0dedd63805fdc6f96ee07ef957660b8110e3ef1abfc"
            },
            "downloads": -1,
            "filename": "cbc_syslog-2.0.3.tar.gz",
            "has_sig": false,
            "md5_digest": "002218c62db41a8846f6c64cc7388f77",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 26875,
            "upload_time": "2024-03-25T19:38:16",
            "upload_time_iso_8601": "2024-03-25T19:38:16.179678Z",
            "url": "https://files.pythonhosted.org/packages/62/6b/fac2d365e451ab8814bfa028faf4605c3535edfe3a9b6236322f6a09b1da/cbc_syslog-2.0.3.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-03-25 19:38:16",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "carbonblack",
    "github_project": "cbc-syslog",
    "travis_ci": false,
    "coveralls": true,
    "github_actions": false,
    "requirements": [
        {
            "name": "carbon-black-cloud-sdk",
            "specs": [
                [
                    ">=",
                    "1.5.0"
                ]
            ]
        },
        {
            "name": "tomli",
            "specs": [
                [
                    ">=",
                    "1.1.0"
                ]
            ]
        },
        {
            "name": "Jinja2",
            "specs": []
        },
        {
            "name": "psutil",
            "specs": []
        },
        {
            "name": "flask",
            "specs": []
        },
        {
            "name": "cryptography",
            "specs": []
        },
        {
            "name": "pytest",
            "specs": [
                [
                    "==",
                    "7.2.1"
                ]
            ]
        },
        {
            "name": "coverage",
            "specs": [
                [
                    "==",
                    "6.5.0"
                ]
            ]
        },
        {
            "name": "coveralls",
            "specs": [
                [
                    "==",
                    "3.3.1"
                ]
            ]
        },
        {
            "name": "flake8",
            "specs": [
                [
                    "==",
                    "5.0.4"
                ]
            ]
        },
        {
            "name": "flake8-colors",
            "specs": [
                [
                    "==",
                    "0.1.9"
                ]
            ]
        },
        {
            "name": "flake8-docstrings",
            "specs": [
                [
                    "==",
                    "1.7.0"
                ]
            ]
        },
        {
            "name": "pre-commit",
            "specs": [
                [
                    ">=",
                    "2.15.0"
                ]
            ]
        },
        {
            "name": "freezegun",
            "specs": [
                [
                    "==",
                    "1.4.0"
                ]
            ]
        }
    ],
    "lcname": "cbc-syslog"
}
        
Elapsed time: 0.21101s