tmclaugh / threatstack-to-sumologic

Send Threat Stack alerts to Sumo Logic

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

threatstack-to-sumologic Build Status

Takes a Threat Stack web hook request and add an event to sumologic.

NOTE: This code is provided as an example and without support for creating services that use Threat Stack webhooks to perform actions within an environment.

Deployment

This service can be deployed to AWS running on Lambda behind AWS API gateway by clicking "Launch Stack". Launch CloudFormation Stack

API

POST https://{host}/threatstack-to-sumologic/api/v1/sumologic/alert

Post a JSON doc from Threat Stack and record an event in Sumo Logic. JSON doc will be in the following format. NOTE: A webhook may contain multiple alerts but this service will store each one individually.

{
  "alerts": [
    {
      "id": "<alert ID>",
      "title": "<alert title / description>",
      "created_at": <time in milliseconds from epoch UTC>,
      "severity": <severity value>,
      "organization_id": "<alphanumeric organization ID>",
      "server_or_region": "<name of host in Threat Stack platform>",
      "source": "<source type>"
    }
  [
}

Standalone Setup / Build / Deployment

Setup

Setup will need to be performed for both this service and in Threat Stack.

Set the following environmental variables:

$ export SUMOLOGIC_ACCESS_ID='<access ID>'
$ export SUMOLOGIC_ACCESS_KEY='<access key>'
$ export THREATSTACK_API_KEY=<Threat Stack API key>

Create and initialize Python virtualenv using virtualenvwrapper

mkvirtualenv threatstack-to-sumologic
pip install -r requirements.txt

NOTE: If Running on OS X you will need extra packages to work around issues with Python and SSL. OS X usage should be for development only.

pip install -r requirements.osx.txt

To launch the service:

gunicorn -c gunicorn.conf.py threatstack-to-sumologic

If performing debugging you may wish to run the app directly instead of via Gunicorn:

python threatstack-to-sumologic.py

Build

This service uses Chef Habitat to build deployable packages. Habitat supports the following package formats natively:

  • Habitat package (.hart)
  • tar
  • docker
  • aci
  • mesos

See the following resources for getting started with Habitat.

Building packages:

# Builds Habitat .hart package
$ hab pkg build build/

# Export a Docker container
$ hab pkg export docker <your_docker_org>/threatstack-to-sumologic

# Export a tarball with habitat runtime. (optional)
$ hab pkg export tar tmclaugh/threatstack-to-sumologic

Building in Hab studio (OS X):

$ hab studio enter
[1][default:/src:0]# cd build/

# Builds Habitat .hart package
[2][default:/src/build:0]# build

# Export a Docker container. (optional)
[3][default:/src/build:0]# hab pkg export docker <your_docker_org>/threatstack-to-sumologic

# Export a tarball with habitat runtime. (optional)
[3][default:/src/build:0]# hab pkg export tar tmclaugh/threatstack-to-sumologic

Starting service.

If you’re using Docker then follow your typical Docker container deployment steps. If you’re using a native Habitat package or Habitat tarball then do the following.

  • Habitat native package. (Requires installing Habitat on host.)
$ sudo hab start tmclaugh-threatstack-to-sumologic-{version}-x86_64-linux.hart
  • Habitat tarball. (Contains Habitat with it.)
$ sudo tar zxvf {package}.tar.gz -C /
$ sudo /hab/bin/hab tmclaugh/threatstack-to-sumologic

About

Send Threat Stack alerts to Sumo Logic


Languages

Language:Python 90.2%Language:Shell 9.8%