sm-biz / paloalto-elasticstack-viz

PANW Firewall Visualisations using Elastic Stack
90 stars 39 forks source link

Palo Alto Networks Firewall Visualization using Elastic Stack

Dashboards

The projects includes nine dashboards, that have been pre-built from the included visualisations.

Overview Dashboard Threat Dashboard Traffic Dashboard
Dashboard - Overview Dashboard - Threats Dashboard - Traffic

In addition to the above, there are dashboards for;

By default, the dashboards are configured for the dark theme. Once installed, you can change them to the light theme, add/delete/rearrange individual visualisations or create your own dashboards The dashboards can also be configured to run full-screen and auto-refresh, perfect for office screenboards

Background

This project aims to provide a simple way to extract and visualise syslog data from Palo Alto Networks firewalls. It utilises the free Elastic Stack from www.elastic.co as the base platform data & viz platform, and provides a pipeline configuration and index templates for the following logs;

A full suite of visualisations and dashboards is included

Elastic Stack

(from the site): What is ELK? "ELK" is the acronym for three open source projects: Elasticsearch, Logstash, and Kibana. Elasticsearch is a search and analytics engine. Logstash is a server-side data processing pipeline that ingests data from multiple sources simultaneously, transforms it, and then sends it to a "stash" like Elasticsearch. Kibana lets users visualize data with charts and graphs in Elasticsearch.

In short, the Elastic Stack provides a simple, scalable & robust platform ingesting syslog entries from a PANW Firewall and displaying the output. The required configuration for LogStash & ElasticSearch is provided here, along with a number of pre-built visualisations for Kibana. You can build your own, additional visualisations using the Kibana interface quite easily. All of the base visualisatons in this project were built in a single day.

Elastic Stack also includes a built-in syslog server, which greatly simplifies the deployment of the solution as a whole. Using only the Elastic Stack pipeline configuration file, we have everything required for an all-in-one solution

Credit

Much of this project was created based on the following pages from awesome people, who should be given much applause;

Tutorial

This project was built on Ubuntu 16.04 LTS, using the latest Elastic Stack 6.1 (with integrated syslog server) and a PA-220 Firewall. nginx was used to secure authentication to Kibana via reverse-proxy

For those unfamilar with any part of this technology stack, I have created a full tutorial on installing & configuring Elastic Stack, including security the platform & installing the visualisations. :blue_book: The tutorial is available here

Existing Install

Otherwise, if you're comfortable with the technology stack mentioned above, then all you need to do is;

And that's it! Once you have some logs in the system, you should see the dashboards start to fill up

References