integration-docs
Loading

Sysdig Integration

Stack 9.0.0 Serverless Observability Serverless Security

Version 2.2.0 (View all)
Subscription level
What's this?
Basic
Level of support
What's this?
Elastic
Ingestion method(s) API, Webhook

This integration allows for the shipping of Sysdig logs to Elastic for security, observability and organizational awareness. Logs can then be analyzed by using either the dashboard included with the integration or via the creation of custom dashboards within Kibana.

The Sysdig integration collects four types of logs:

Alerts The Alerts data stream collected by the Sysdig integration is comprised of Sysdig Alerts. See more details about Sysdig Alerts in Sysdig's Alerts Documentation. A complete list of potential fields used by this integration can be found in the Logs reference

Event The event data stream collected through the Sysdig integration consists of Sysdig Security Events. See more details about Security Events in Sysdig's Events Feed Documentation. It uses Sysdig's Next Gen API (standardized). You can access your regional documentation through the links here.

CSPM The CSPM data stream collected through the Sysdig integration consists of Sysdig compliance results. See more details about compliance results in Sysdig's Compliance documentation. It uses Sysdig's Current API (non-standardised). You can access your regional documentation through the links here.

Vulnerability The vulnerability data stream collected through the Sysdig integration consists of Sysdig vulnerability scan results. See more details about vulnerabilities in Sysdig's Vulnerability Management documentation. It uses Sysdig's Next Gen API (standardized). You can access your regional documentation through the links here.

For vulnerability data, Each interval fetches all available scan results from the configured stage. Currently, only one stage can be configured at a time. Users wishing to collect scan results from different stages must configure additional integrations for each desired stage.

Scan results are broken down into separate events for each package-vulnerability pair. If no vulnerability is found for a package, then only the package details will be included in the published event. If the scans contain no package information, then only the scan details will be included in the published event.

In detail, a package is included in one layer, which can be built upon several base images. Furthermore, a package can have multiple vulnerabilities, each of which can have multiple risk accepts.

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions.

Sysdig must be configured to output alerts to a supported output channel as defined in Setup. The system will only receive common fields output by Sysdig's rules, meaning that if a rule does not include a desired field the rule must be edited in Sysdig to add the field.

For step-by-step instructions on how to set up an integration, see the Getting started guide.

In order to capture alerts from Sysdig you must configure Sysdig to output Alerts as JSON via HTTP.

The HTTP input allows the Elastic Agent to receive Sysdig Alerts via HTTP webhook.

Required: To configure Sysdig to output JSON, you must set up as webhook notification channel as outlined in the Sysdig Documentation.

  1. In Kibana navigate to Management > Integrations.
  2. In "Search for integrations" top bar, search for Sysdig.
  3. Select the "Sysdig" integration from the search results.
  4. Select "Add Sysdig" to add the integration.
  5. Add all the required integration configuration parameters, including the URL, API Token, Interval, and Initial Interval, to enable data collection.
  6. Select "Save and continue" to save the integration.

Note:

  • If you see an error saying exceeded maximum number of CEL executions during data ingestion, it usually means a large volume of data is being processed for the selected time interval. To fix this, try increasing the Maximum Pages Per Interval setting in the configuration.
  • Users wishing to collect vulnerability scan results from multiple stages must configure individual integrations for each desired stage.

Sysdig alerts can contain a multitude of various fields pertaining to the type of activity on the host machine.

This is the event dataset.

This is the CSPM dataset.

This is the vulnerability dataset.

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.