Skip to content
Snippets Groups Projects
Commit 96604a0a authored by Jan Mach's avatar Jan Mach
Browse files

Updated default module configuration files.

According to our current production installation. (Redmine issue: #3387)
parent cd3464c4
No related branches found
No related tags found
No related merge requests found
...@@ -10,10 +10,10 @@ ...@@ -10,10 +10,10 @@
#--------------------------------------------------------------------------- #---------------------------------------------------------------------------
# Path to database files (for disk usage measurements). # Path to database files (for disk usage measurements).
# default: "/var/lib/postgresql/10/main" # default: "/var/lib/postgresql/12/main"
# type: string # type: string
# #
"db_path": "/var/lib/postgresql/10/main", "db_path": "/var/lib/postgresql/12/main",
# Perform simulation, do not remove anything (flag). # Perform simulation, do not remove anything (flag).
# default: false # default: false
...@@ -128,8 +128,8 @@ ...@@ -128,8 +128,8 @@
#"regular": false, #"regular": false,
#"shell": false, #"shell": false,
#"command": "generate", #"command": "cleanup",
"interval": "6_hourly", "interval": "hourly",
#"adjust_thresholds": false, #"adjust_thresholds": false,
#"time_high": null, #"time_high": null,
......
...@@ -86,23 +86,6 @@ ...@@ -86,23 +86,6 @@
] ]
} }
#
# [CHAIN A|ENTRY]: Message inspection module - event classifications
#
#{
# "exec": "mentat-inspector.py",
# # Enable multiple instances working the same queue directory
# #"paralel": true,
# # In case of paralel mode, you MUST set the required number of instances
# #"count": 3,
# "args": [
# # Enable debug information before daemonization
# #"--debug"
# # Force logging level ['debug', 'info', 'warning', 'error', 'critical']
# #"--log-level=debug"
# ]
#}
# #
# [CHAIN B|ENTRY|FINAL]: Additional message inspection module # [CHAIN B|ENTRY|FINAL]: Additional message inspection module
# #
......
...@@ -110,14 +110,14 @@ ...@@ -110,14 +110,14 @@
}, },
{ {
"name": "Check: Source Type Unknown", "name": "Check: Source Type Unknown",
"rule": "exists Source.Type and not Source.Type in ['Proxy', 'OriginMalware', 'OriginSandbox', 'OriginSpam', 'Phishing', 'Malware', 'MITM', 'Spam', 'Backscatter', 'Open', 'Poisoned', 'FastFlux', 'Botnet', 'CC', 'Tor', 'Incomplete']", "rule": "exists Source.Type and not Source.Type in ['Proxy', 'OriginMalware', 'OriginSandbox', 'OriginSpam', 'OriginBlacklist', 'Phishing', 'Malware', 'MITM', 'Spam', 'Backscatter', 'Open', 'Poisoned', 'FastFlux', 'Botnet', 'CC', 'Tor', 'Incomplete', 'Anonymised']",
"actions": [ "actions": [
{"action": "tag", "args": {"path": "_CESNET.InspectionErrors[*]", "value": "Source_Type_unknown", "unique": true}} {"action": "tag", "args": {"path": "_CESNET.InspectionErrors[*]", "value": "Source_Type_unknown", "unique": true}}
] ]
}, },
{ {
"name": "Check: Target Type Unknown", "name": "Check: Target Type Unknown",
"rule": "exists Target.Type and not Target.Type in ['Proxy', 'OriginMalware', 'OriginSandbox', 'OriginSpam', 'Phishing', 'Malware', 'MITM', 'Spam', 'Backscatter', 'Open', 'Poisoned', 'FastFlux', 'Botnet', 'CC', 'Tor', 'Incomplete']", "rule": "exists Target.Type and not Target.Type in ['Proxy', 'OriginMalware', 'OriginSandbox', 'OriginSpam', 'Phishing', 'Malware', 'MITM', 'Spam', 'Backscatter', 'Open', 'Poisoned', 'FastFlux', 'Botnet', 'CC', 'Tor', 'Incomplete', 'Anonymised']",
"actions": [ "actions": [
{"action": "tag", "args": {"path": "_CESNET.InspectionErrors[*]", "value": "Target_Type_unknown", "unique": true}} {"action": "tag", "args": {"path": "_CESNET.InspectionErrors[*]", "value": "Target_Type_unknown", "unique": true}}
] ]
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment