-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Microsoft ETW (Event Tracing for Windows) Listener. Look for a Beats to deal with Service Fabric Logging! #2073
Comments
I double quote the request, it would be very very very helpful !! |
It would be a great improvement. I really need it and it would be a great functionality for all the people who want to use elastic search functionalities to process the logs coming from service fabric. |
It would be very interesting and helpful! A great help! Thx! |
Thanks for the request. As I'm not familiar with Microsoft ETW it would be nice if you could provide some links to read up the details on how the infrastructure and application logging works and how a beat could hook into this. |
There are two other requests for ETW on the forums. https://discuss.elastic.co/t/windows-dns-diagnostic-logs/53344 |
@ruflin here [https://msdn.microsoft.com/en-us/library/dn775006.aspx] you can find an overall description of the SLAB (Semantic Logging Application Block) "https://msdn.microsoft.com/en-us/library/dn775006.aspx"; it describes 2 scenarios: "In Process" & "Out Of Process", what we are looking for is a Beat to replace the poorly developed "Out-of-process windows service" to intercept the logs at OS level (here it deals with the ETW part of the SLAB) and ship them to the store (Elastic or Logstash in our case). Looking at this [https://technet.microsoft.com/en-us/library/jj714799.aspx] description of ETW, the role we are wondering to have implemented with Beats is the "ETW Consumer" which can be feed live through "real time delivery messages" and/or via bulk reading the "logged events files (.etl)" (the "bulk" way is a nice to have :-)). Here [https://slab.codeplex.com/releases/view/125681] you can find the project used for the ETW Consumer role written in .NET, maybe you could take inspiration from it. |
This could be an inspiration https://azure.microsoft.com/en-us/documentation/articles/service-fabric-diagnostic-how-to-use-elasticsearch/ |
Could someone confirm that this is still unsupported and if there's any hope of seeing it integrated in the near future ? |
@EmFl There is no implementation for this yet, but it would be really great if someone that runs such a system could take a stab at it. By now also the inputs in Filebeat have become much more modular which makes this easier to add in case this would be an input / prospector. |
are there any updates when this enhancement will go ? |
++++++1,001 ETW also gives the ability to provide equal to and a lot of times greater than what many EDR products cost. For example, there was a large "EDR" vendor that used sysmon up until just last 4-6 months. They now heavily rely on ETW. Implementing ETW drastically reduces the cost of relying on third party vendors and code, to provide what is just a built-in capability into windows already. If I am not mistaken, windows powershell (debug) logging (ie: 4103,4104, etc...) started off as an ETW that eventually became supported by Microsoft through GPO's and such. reading material / insights / info:
more elastic reference: |
fwiw, someone has this working / almost ready for Splunk : ) https://twitter.com/vector_sec/status/1170140453603336192 : ) |
Need to collect the DNS Analytical logs for threat hunting, any news on winlogbeat supporting this? Thanks |
+1 |
you can use something like SilkETW, powershell service that collects and stores the ETW into an event log. Here is a blog describing the whole process all the way to sending the logs to ELK. |
+1 |
Thank you for supportt |
+1 |
PacketBeat could also take advantage of ETW for its packet listening on Windows, removing the need to pay for a license for NPCAP. |
Will there be any solutions to ingest ETW logs any time soon? I need PowerShell and DNS .etl logs ingested in my stack. I sold my boss on spinning up an ELK stack a while back. He keeps sending me use cases, and I simply can’t deliver without building crazy pipelines that he won’t give me time to build. I’m a one man ELK show, and I suspect there are many in my position. Paired with a lack of support for FMC logs, I have more losses than wins on the ole’ Elasticsearch scorecard. It’s only a matter of time before our stack is dismantled. I know this is a tall order, but ETW logs aren’t exactly a new technology anymore. I love Elasticsearch, would like continue building our stack! |
@andrewkroh @ruflin |
Any news on this? |
+1 Updates? This functionality would be awesome... |
Hello folks, there is a dirty workaround to read logs from ETW providers in, at least, Winlogbeat.
And, that's it. If you have trouble with the "The template for an event definition cannot be found in the resource." error, I suggest you to include XML of the event like this:
Hope this helps someone. EDIT: Winlogbeat can't read continuously .evtx nor .etl files, so this is only about reading one part of logs by each one launch of winlogbeat. |
Hi @Ruuucker , What settings did you use?
|
Hello @peas100, |
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
Any news? |
Is there any chance that the WMI functionality from Logstash could be moved into metricbeats? Reasons: |
There are some good libraries available for golang these days which allow the reading of events live from ETW, rather than having to export events to a file and then parse. Perhaps these would be a good addition to winlogbeat to enable the real-time pulling of ETW logs from various providers? Links: |
Hi! We're labeling this issue as |
This is still relevant and needed functionality, as far as I'm concerned. |
This is like winlogbeat - You enabled collecting Windows Event Logs, and thus, enabled collecting data from every service that uses the Windows Event Logs. ETW might not be as widely used, but it is the same idea. If you enable collecting this data, you will enable logging from a variety of services that happen to use ETW, which you do not handle today. Definitely still needed IMHO. |
FYI @chemamartinez |
@RamblingCookieMonster @franklymrshankley we are currently working on support to ingest logs via ETW (PR linked above). Our initial focus will be around supporting DNS Analytical events via ETW. Curious if there are other events you're interested in ingesting via ETW? Thanks! |
Pinging @elastic/sec-windows-platform (Team:Security-Windows Platform) |
Closing as we now have added a new ETW reader: #36914 |
The Microsoft Service Fabric platform (a full system from microsoft to develop & run microservices) uses the Microsoft ETW subsystem to manage both Infrastructure and Application Logging, in order to ship those logs into Elastic without implementing esoteric & ad-hoc configuration we are wondering if Beats could implement a ETW message receiver so everything will run according the official architectural idea.
The text was updated successfully, but these errors were encountered: