Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cybersixgill Actionable Alerts #1576

Merged
merged 75 commits into from
Apr 26, 2023
Merged
Show file tree
Hide file tree
Changes from 5 commits
Commits
Show all changes
75 commits
Select commit Hold shift + click to select a range
add9b4f
Cybersixgill Actionable Alerts
fshaik3494 Oct 19, 2022
aa3a546
Cybersixgill Actionable Alerts
fshaik3494 Oct 19, 2022
046c203
Cybersixgill Actionable Alerts
fshaik3494 Oct 20, 2022
a0a0470
Cybersixgill Actionable Alerts
fshaik3494 Oct 21, 2022
7ce22af
Cybersixgill Actionable Alerts
fshaik3494 Oct 21, 2022
9a3d5a6
Cybersixgill Actionable Alerts
fshaik3494 Oct 25, 2022
653cb78
Cybersixgill Actionable Alerts
fshaik3494 Oct 31, 2022
c0b62f3
Cybersixgill Actionable Alerts
fshaik3494 Oct 31, 2022
8aaa3f5
Cybersixgill Actionable Alerts
fshaik3494 Nov 2, 2022
227e662
Cybersixgill Actionable Alerts
fshaik3494 Nov 3, 2022
8fd052a
Cybersixgill Actionable Alerts
fshaik3494 Nov 10, 2022
1b6a508
Cybersixgill Actionable Alerts
fshaik3494 Nov 16, 2022
9c8e1f0
Cybersixgill Actionable Alerts
fshaik3494 Nov 16, 2022
738fc46
Cybersixgill Actionable Alerts
fshaik3494 Nov 16, 2022
82579f4
Cybersixgill Actionable Alerts
fshaik3494 Nov 18, 2022
cb5e6b3
Submitted with changes requested in check.py
fshaik3494 Dec 5, 2022
a33cd6e
Cybersixgill Actionable Alerts Validate command fix
fshaik3494 Dec 13, 2022
7d83770
Cybersixgill Actionable Alerts
fshaik3494 Dec 14, 2022
97d43cc
Cybersixgill Actionable Alerts
fshaik3494 Dec 14, 2022
2abe032
Cybersixgill Actionable Alerts
fshaik3494 Dec 16, 2022
9cf3ccc
Cybersixgill Actionable Alerts
fshaik3494 Dec 20, 2022
1210926
Cybersixgill Actionable Alerts
fshaik3494 Dec 21, 2022
2cde9be
Cybersixgill Actionable Alerts
fshaik3494 Dec 22, 2022
1859088
Cybersixgill Actionable Alerts
fshaik3494 Jan 4, 2023
a79f71e
Cybersixgill Actionable Alerts
fshaik3494 Jan 4, 2023
91ece12
Cybersixgill Actionable Alerts
fshaik3494 Jan 11, 2023
5cffccd
Cybersixgill Actionable Alerts
fshaik3494 Jan 11, 2023
7fa9605
Cybersixgill Actionable Alerts
fshaik3494 Feb 6, 2023
e7bf653
Cybersixgill Actionable Alerts
fshaik3494 Feb 7, 2023
3d6d43d
Cybersixgill Actionable Alerts
fshaik3494 Feb 9, 2023
dbfc6e4
Cybersixgill Actionable Alerts
fshaik3494 Feb 9, 2023
2fbf24f
Cybersixgill Actionable Alerts
fshaik3494 Feb 9, 2023
0d91737
Cybersixgill Actionable Alerts
fshaik3494 Feb 14, 2023
126a1dd
Cybersixgill Actionable Alerts
fshaik3494 Feb 14, 2023
0496911
Cybersixgill Actionable Alerts
fshaik3494 Feb 15, 2023
7851fc3
Cybersixgill Actionable Alerts
fshaik3494 Feb 15, 2023
20cdd9a
Cybersixgill Actionable Alerts
fshaik3494 Feb 20, 2023
6e5f5e7
Merge remote-tracking branch 'origin/Cybersixgill-Alerts' into Cybers…
fshaik3494 Feb 20, 2023
2d30e1e
Cybersixgill Actionable Alerts
fshaik3494 Feb 22, 2023
03d9e89
Cybersixgill Actionable Alerts
fshaik3494 Feb 22, 2023
4b843a9
Cybersixgill Actionable Alerts
fshaik3494 Feb 22, 2023
fd1730b
Cybersixgill Actionable Alerts
fshaik3494 Feb 22, 2023
840bdd3
Cybersixgill Actionable Alerts
fshaik3494 Feb 22, 2023
36f4809
Cybersixgill Actionable Alerts
fshaik3494 Feb 23, 2023
e2b6b73
Cybersixgill Actionable Alerts
fshaik3494 Feb 23, 2023
cb24c9f
Cybersixgill Actionable Alerts
fshaik3494 Feb 23, 2023
2ebd929
Cybersixgill Actionable Alerts
fshaik3494 Feb 24, 2023
6c194c0
Cybersixgill Actionable Alerts
fshaik3494 Feb 25, 2023
a06c606
Cybersixgill Actionable Alerts
fshaik3494 Feb 25, 2023
099c9f0
Cybersixgill Actionable Alerts
fshaik3494 Feb 28, 2023
6bda536
resolved review comments
shahul-loginsoft Mar 17, 2023
d1b3049
resolved review comments
shahul-loginsoft Mar 17, 2023
fc78164
CyberSixgill Actionable Alerts
shahul-loginsoft Mar 17, 2023
6260d2f
Cybersixgill Actionable Alerts
shahul-loginsoft Mar 28, 2023
b4e739b
changelog date updated
shahul-loginsoft Mar 30, 2023
15494ac
comments are addressed
shahul-loginsoft Mar 31, 2023
4b1824b
addressed review comments
shahul-loginsoft Apr 7, 2023
d8d4572
review comments are addressed
shahul-loginsoft Apr 7, 2023
1ff3554
review comments addressed
shahul-loginsoft Apr 7, 2023
f3a0bf0
review comments are reverted
shahul-loginsoft Apr 7, 2023
8d96971
review comments are addressed
shahul-loginsoft Apr 7, 2023
e33f9fa
Cybersixgill Actionable Alerts
shahul-loginsoft Apr 7, 2023
ba5478a
cybersixgill actionable alerts
shahul-loginsoft Apr 7, 2023
61bf61d
conflicts resolved
shahul-loginsoft Apr 8, 2023
ca86bba
Merge branch 'master' into Cybersixgill-Alerts
shahul-loginsoft Apr 12, 2023
3fc853e
updated codeowners file
shahul-loginsoft Apr 13, 2023
3184398
updated code owner file
shahul-loginsoft Apr 17, 2023
4b1c62b
Merge branch 'master' into Cybersixgill-Alerts
bgoldberg122 Apr 18, 2023
1ac2d50
added test case
shahul-loginsoft Apr 21, 2023
78ef4f2
test cases updated for test coverage
shahul-loginsoft Apr 24, 2023
39e1465
fixed test coverage
shahul-loginsoft Apr 24, 2023
ff482e7
added test case for test coverage
shahul-loginsoft Apr 25, 2023
a3b668a
json file formatted
shahul-loginsoft Apr 26, 2023
7cb090c
json formatted
shahul-loginsoft Apr 26, 2023
7ab9b8f
added test cases for test coverage
shahul-loginsoft Apr 26, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions cybersixgill_actionable_alerts/CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
# CHANGELOG - cybersixgill_actionable_alerts

eho1307 marked this conversation as resolved.
Show resolved Hide resolved
## 1.0.0 / 2022-10-30
67 changes: 67 additions & 0 deletions cybersixgill_actionable_alerts/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
# Agent Check: cybersixgill_actionable_alerts

## Overview
By integrating Cybersixgill actionable alerts, Datadog customers gain a premium,
automated threat intelligence solution based on the most comprehensive data sources from the deep, dark and surface web.
eho1307 marked this conversation as resolved.
Show resolved Hide resolved
It is customizable, enabling users to define key assets relevant to their brand, industry, and geolocation. Users can covertly
monitor critical assets such as IP addresses, domains, vulnerabilities, and VIPs for activity on the underground and closed sources - and
prioritize, as well as respond to threats directly from the Siemplify dashboard.
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved
eho1307 marked this conversation as resolved.
Show resolved Hide resolved
This check monitors [cybersixgill_actionable_alerts][1].
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This check monitors [cybersixgill_actionable_alerts][1].

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggesting to remove this sentence as it's redundant with the content above.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shahul-loginsoft can you remove this line? Thanks!


## Setup

emarsha94 marked this conversation as resolved.
Show resolved Hide resolved
### Installation

To install the cybersixgill_actionable_alerts check on your host:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
To install the cybersixgill_actionable_alerts check on your host:
To install the Cybersixgill actionable alerts check on your host:


emarsha94 marked this conversation as resolved.
Show resolved Hide resolved

1. Install the [developer toolkit][11] on any machine.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Install the [developer toolkit][11] on any machine.
1. Install the [developer tool][11] on any machine.


2. To build the package, run the command: `ddev release build cybersixgill_actionable_alerts`

3. [Install the Datadog Agent][10] on your host.

4. Once the Agent is installed, upload the build artifact by running the command: `datadog-agent integration install -w
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved
path/to/cybersixgill_actionable_alerts/dist/datadog_cybersixgill_actionable_alerts-0.0.1-py3-none-any.whl`.

### Configuration

1. Provide Client Id and Client Secret in Configuration.yaml file which you will get it [email protected].
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved
2. Provide the min collection interval in seconds. `min_collection_interval: 3600`
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved

### Validation

1. Verify that [events][12] are generated in your account

## Data Collected

### Metrics

cybersixgill_actionable_alerts does not include any metrics.

### Service Checks
eho1307 marked this conversation as resolved.
Show resolved Hide resolved

See assets/service_checks.json for a list of service checks provided by this integration..
eho1307 marked this conversation as resolved.
Show resolved Hide resolved

### Events

cybersixgill_actionable_alerts does include events.
eho1307 marked this conversation as resolved.
Show resolved Hide resolved

## Troubleshooting

Need help? Contact [Datadog support][3] or [Cybersixgill support][13].
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved

[1]: https://www.cybersixgill.com/
[2]: https://app.datadoghq.com/account/settings#agent
[3]: https://docs.datadoghq.com/agent/kubernetes/integrations/
eho1307 marked this conversation as resolved.
Show resolved Hide resolved
[4]: https://github.com/DataDog/integrations-extras/blob/master/cybersixgill_actionable_alerts/datadog_checks/cybersixgill_actionable_alerts/data/conf.yaml.example
[5]: https://docs.datadoghq.com/agent/guide/agent-commands/#start-stop-and-restart-the-agent
[6]: https://docs.datadoghq.com/agent/guide/agent-commands/#agent-status-and-information
[7]: https://github.com/DataDog/integrations-extras/blob/master/cybersixgill_actionable_alerts/metadata.csv
[8]: https://github.com/DataDog/integrations-extras/blob/master/cybersixgill_actionable_alerts/assets/service_checks.json
[9]: https://docs.datadoghq.com/help/
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved
[10]: https://docs.datadoghq.com/getting_started/agent/
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[10]: https://docs.datadoghq.com/getting_started/agent/
[10]: https://app.datadoghq.com/account/settings#agent

[11]: https://docs.datadoghq.com/developers/integrations/new_check_howto/#developer-toolkit
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[11]: https://docs.datadoghq.com/developers/integrations/new_check_howto/#developer-toolkit
[11]: https://docs.datadoghq.com/developers/integrations/new_check_howto/?tab=configurationtemplate#configure-the-developer-tool

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks like this URL has been updated, please confirm.

[12]: https://app.datadoghq.com/event/explorer
[13]: [email protected]
emarsha94 marked this conversation as resolved.
Show resolved Hide resolved

50 changes: 50 additions & 0 deletions cybersixgill_actionable_alerts/assets/configuration/spec.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
name: Cybersixgill Actionable Alerts
files:
- name: cybersixgill_actionable_alerts.yaml
options:
- template: init_config
options:
- template: init_config/default
- template: instances
options:
- name: cl_id
required: true
description: The Client Id given by Cybersixgill
enabled: true
value:
type: string
example: clientid
display_default: null
- name: cl_secret
required: true
description: The Client Secret given by Cybersixgill
enabled: true
value:
type: string
example: client00000secret
display_default: null
yzhan289 marked this conversation as resolved.
Show resolved Hide resolved
- name: alerts_limit
required: false
description: The number of alerts to fetch on a single request default is 50
enabled: false
value:
type: string
example: 50
display_default: null
- name: threat_type
required: false
description: Predefined types of threats alerts you would like to see like fraud, malware
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a set list of valid types of threats? If so, we could convert this into an enum similar to https://github.com/DataDog/integrations-core/blob/1a38012c974eca7d3714374510ddad62a438f00c/teradata/assets/configuration/spec.yaml#L98-L105

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shahul-loginsoft Please see the above

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@shahul-loginsoft Please see the above

enabled: false
value:
type: string
example: compromised accounts, fraud
display_default: null
- name: threat_level
required: false
description: Type of alerts which are either imminent or emerging
enabled: false
value:
type: string
example: imminent
display_default: null
- template: instances/default
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
{
"viz": "timeseries",
"requests": [
{
"style": {
"palette": "dog_classic"
},
"type": "bars",
"formulas": [
{
"formula": "query1"
}
],
"response_format": "timeseries",
"queries": [
{
"search": {
"query": "source:my_apps"
},
"data_source": "events",
"compute": {
"aggregation": "count"
},
"name": "query1",
"indexes": [
"*"
],
"group_by": []
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
{
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am unable to review the dashboard. Can you re-copy the dashboard json from your account and upload it here? Thanks!

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@fshaik3494 Can you update the title on the dashboard and export it to replace the output in this file? Thanks!

"viz": "event_stream",
"requests": [
{
"query": {
"query_string": "source: my_apps",
"data_source": "event_stream",
"event_size": "s"
},
"columns": [
{
"field": "source",
"width": 50
},
{
"field": "message",
"width": "auto"
},
{
"field": "date",
"width": 90
}
],
"response_format": "event_list"
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"viz": "sunburst",
"requests": [
{
"formulas": [
{
"formula": "query2",
"limit": {
"order": "desc"
}
}
],
"response_format": "scalar",
"queries": [
{
"search": {
"query": "source:my_apps message:\"Threat Level: emerging\""
},
"data_source": "events",
"compute": {
"aggregation": "count"
},
"name": "query2",
"indexes": [
"*"
],
"group_by": []
}
]
}
],
"legend": {
"type": "automatic"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"viz": "sunburst",
"requests": [
{
"formulas": [
{
"formula": "query2",
"limit": {
"order": "desc"
}
}
],
"response_format": "scalar",
"queries": [
{
"search": {
"query": "source:my_apps message:\"Threat Level: imminent\""
},
"data_source": "events",
"compute": {
"aggregation": "count"
},
"name": "query2",
"indexes": [
"*"
],
"group_by": []
}
]
}
],
"legend": {
"type": "automatic"
}
}
26 changes: 26 additions & 0 deletions cybersixgill_actionable_alerts/assets/service_checks.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
[
{
"agent_version": "7.37.1",
"integration": "Cybersixgill Actionable Alerts",
"groups": [],
"check": "cybersixgill.can_connect",
"statuses": [
"ok",
"critical"
],
"name": "Can Connect",
"description": "Returns `OK` If Client Id and Client Secre are present in Instance. Returns `CRITICAL` If Configuration Errors occurs."
},
{
"agent_version": "7.37.1",
"integration": "Cybersixgill Actionable Alerts",
"groups": [],
"check": "cybersixgill.health",
"statuses": [
"ok",
"critical"
],
"name": "Health",
"description": "Returns `CRITICAL` If the agent is unable to connect to Cybersixgill API"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
"description": "Returns `CRITICAL` If the agent is unable to connect to Cybersixgill API"
"description": "Returns `CRITICAL` If the Agent is unable to connect to Cybersixgill API"

}
]
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
__path__ = __import__('pkgutil').extend_path(__path__, __name__) # type: ignore
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
__version__ = '0.0.1'
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
from .__about__ import __version__
from .check import CybersixgillActionableAlertsCheck

__all__ = ['__version__', 'CybersixgillActionableAlertsCheck']
Loading