Loading

Sysdig Integration

Version 0.4.0 beta:[] (View all)
Compatible Kibana version(s) 8.14.1 or higher
9.0.0 or higher
Supported Serverless project types
What's this?
Security
Observability
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic

This integration allows for the shipping of Sysdig logs to Elastic for security, observability and organizational awareness. Logs can then be analyzed by using either the dashboard included with the integration or via the creation of custom dashboards within Kibana.

The Sysdig integration collects two type of logs:

Alerts The Alerts data stream collected by the Sysdig integration is comprised of Sysdig Alerts. See more details about Sysdig Alerts in Sysdig's Alerts Documentation. A complete list of potential fields used by this integration can be found in the Logs reference

Event The event data stream collected through the Sysdig integration consists of Sysdig Security Events. See more details about Security Events in Sysdig's Events Feed Documentation.

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions.

Sysdig must be configured to output alerts to a supported output channel as defined in Setup. The system will only receive common fields output by Sysdig's rules, meaning that if a rule does not include a desired field the rule must be edited in Sysdig to add the field.

For step-by-step instructions on how to set up an integration, see the Getting started guide.

In order to capture alerts from Sysdig you must configure Sysdig to output Alerts as JSON via HTTP.

The HTTP input allows the Elastic Agent to receive Sysdig Alerts via HTTP webhook.

Required: To configure Sysdig to output JSON, you must set up as webhook notification channel as outlined in the Sysdig Documentation.

  1. In Kibana navigate to Management > Integrations.
  2. In "Search for integrations" top bar, search for Sysdig.
  3. Select the "Sysdig" integration from the search results.
  4. Select "Add Sysdig" to add the integration.
  5. Add all the required integration configuration parameters, including the URL, API Token, Interval, and Initial Interval, to enable data collection.
  6. Select "Save and continue" to save the integration.

Note:

  • The URL may vary depending on your region. Please refer to the Documentation to find the correct URL for your region.
  • If you see an error saying exceeded maximum number of CEL executions during data ingestion, it usually means a large volume of data is being processed for the selected time interval. To fix this, try increasing the Maximum Pages Per Interval setting in the configuration.

Sysdig alerts can contain a multitude of various fields pertaining to the type of activity on the host machine.

This is the event dataset.