This section describes how to replace files of Kaspersky Threat Feed Service for a SIEM solution with those of Kaspersky CyberTrace for Linux.
To upgrade the files of Kaspersky Threat Feed Service for a SIEM solution:
If Kaspersky CyberTrace is shipped as an RPM package:
/opt/kaspersky/ktfs/etc/init.d/kl_feed_service stop
run.sh upgrade
Follow the installation script instructions. For how to ensure that the regular expressions are properly transferred to the new configuration file, see the procedure in step 2 below.
/opt/kaspersky/ktfs/etc/init.d/kl_feed_service start
If Kaspersky CyberTrace is shipped as a TGZ package:
/opt/kaspersky/ktfs/etc/init.d/kl_feed_service stop
/tmp
directory as follows:cp /opt/kaspersky/ktfs/etc/kl_feed_service.conf /opt/kaspersky/ktfs/etc/kl_feed_util.conf /opt/kaspersky/ktfs/dmz/feeds.pem /tmp
The following information from these files will be automatically used by the configurator (which is the configure
script):
If a regular expression had an MD5
, SHA1
, SHA256
, IP
, or URL
substring in its name, then this regular expression will be added to the Feed Service configuration file with the corresponding type. Otherwise, regular expressions are transferred to the new configuration file with the CONTEXT
type.
/opt/kaspersky/ktfs/
directory and overwrite existing files as follows:tar zxvf Kaspersky_CyberTrace-Linux-x86_64-X.Y.Z.T-Release_for_SIEM.tar.gz -C /opt/kaspersky
In this command, replace Kaspersky_CyberTrace-Linux-x86_64-X.Y.Z.T-Release_for_SIEM.tar.gz
with the real name of the distribution archive.
mv /opt/kaspersky/ktfs /opt/kaspersky/old_ktfs
If you do not want to keep old files, run the following command:
rm -fr /opt/kaspersky/ktfs
mv /opt/kaspersky/Kaspersky_CyberTrace-Linux-x86_64-X.Y.Z.T-Release_for_SIEM /opt/kaspersky/ktfs
ln -s /opt/kaspersky/ktfs/etc/init.d/kl_feed_service /etc/init.d/kl_feed_service
ln -s /opt/kaspersky/ktfs/etc/kl_feed_service.conf /etc/kl_feed_service.conf
configure
script in upgrade mode as follows:/opt/kaspersky/ktfs/bin/configure -u -s %SIEM%
Here %SIEM%
is the SIEM solution being used, which can have one of the following values: ArcSight
, Splunk
, QRadar
, RSA
, Log_Scanner
.
/opt/kaspersky/ktfs/etc/init.d/kl_feed_service start
input_regexp_to_match
parameter for each required feed field. This parameter must be the same as the name of the regular expression specified in the Source
element. Below is an example of what the Feed Service configuration file must look like after editing. Note how the newly transfered REDIRECT_IP
regular expression is associated with the ip
feed field through the input_regexp_to_match
attribute.<InputSettings> <RegExps> <Source id="default"> <DST_IP concatenate="#1" extract="first" type="IP">dst\=(\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})(?:$|\s)</DST_IP> <SRC_IP concatenate="#1" extract="first" type="IP">src\=(\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})(?:$|\s)</SRC_IP> <REDIRECT_IP concatenate="#1" extract="first" type="IP">redirect\=(\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})(?:$|\s)</REDIRECT_IP> </Source> <RegExps> </InputSettings> <Feeds per_scan_detect_limit="10000"> <Feed filename="Demo_IP_Reputation_Data_Feed.json" enabled="true"> <Field name="ip" matching_type="Exact" input_regexp_to_match="DST_IP" category="KL_IP_Reputation"/> <Field name="ip" matching_type="Exact" input_regexp_to_match="SRC_IP" category="KL_IP_Reputation"/> <Field name="ip" matching_type="Exact" input_regexp_to_match="REDIRECT_IP" category="KL_IP_Reputation"/> </Feed> </Feeds> |