Skip to content

ELK Stack for Honeypot Log Collection #22

@IV-cmd

Description

@IV-cmd

From the observability and monitoring point of view of the infra we are building we should deploy Elastics.arch, Logstash, Kibana, and Filebeat to collect and analyze honeypot attack logs.

Requirements:

  • Single-node Elasticsearch cluster (serving as a DB + Search Engine)
  • Logstash for parsing Cowrie JSON logs and filtering work
  • Kibana for visualization
  • Filebeat on honeypot VM (as a Log Aggregator)
  • Real-time log processing

Steps for Implementation:

  1. Deploy Elasticsearch with configuration
  2. Configure Logstash pipeline for Honeypot logs
  3. Set up Kibana dashboards
  4. Install Filebeat on honeypot VM
  5. Test end-to-end log flow

Criteria for success

  • Logs appear in Kibana within seconds
  • GeoIP enrichment should be working fine
  • Dashboard displays attack data
  • System handles huge amount of logs/minute data

This enables us to analyse real-time attacks and extract threat intelligence from honeypot logs thereby improving our system

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions