Skip to content
This repository has been archived by the owner on Jun 5, 2023. It is now read-only.

Latest commit

 

History

History
48 lines (30 loc) · 1.86 KB

WHITELIST.md

File metadata and controls

48 lines (30 loc) · 1.86 KB

← Configuring outliers

Whitelisting outliers

Table of contents

ee-outliers provides support for whitelisting of certain outliers. By whitelisting an outlier, you prevent them from being tagged and stored in Elasticsearch.

For events that have already been enriched and that match a whitelist later, the es_wipe_all_whitelisted_outliers flag can be used in order to remove them. If a new entry is added to the whitelist, the housekeeping process will search and remove events that are now whitelisted.

Two different whitelists are defined in the configuration file:

Literals whitelist

This whitelist will only hit for outlier events that contain an exact whitelisted string as one of its event field values. The whitelist is checked against all the event fields, not only the outlier fields!

Example:

[whitelist_literals]
slack_connection=rare outbound connection: Slack.exe

Regular expression whitelist

This whitelist will hit for all outlier events that contain a regular expression match against one of its event field values. The whitelist is checked against all the event fields, not only the outlier fields!

Example:

[whitelist_regexps]
scheduled_task_user_specific_2=^.*rare scheduled task:.*-.*-.*-.*-.*$
autorun_user_specific=^.*rare autorun:.*-.*-.*-.*-.*$

Whitelist per model

It is possible to define whitelist entries per model. This option is possible with literal or regex whitelist.

To define a model whitelist entry, the whitelist_literals and/or the whitelist_regexps sections can be added to the use cases' configuration file.

Notification system →