infrastructure
pfelk
infrastructure | pfelk | |
---|---|---|
1 | 23 | |
131 | 985 | |
- | 0.8% | |
9.4 | 9.1 | |
5 days ago | 4 days ago | |
YAML | Shell | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
infrastructure
-
Manage multiple docker-compose services
As far as I know, there’s no pre-included solution. What I’ve seen people do is use shell scripts for this: https://github.com/RealOrangeOne/infrastructure/blob/master/ansible/roles/docker_cleanup/files/docker-utils/dc-all
pfelk
-
Best way to use my SFF PCs
I understood that OPNsense runs fine with 8GB RAM and a relatively weak CPU, but then I saw this, which provides extended search and visualisation features to help you use the data created by OPNsense, and it recommends 32GB. pfelk/pfelk: pfSense/OPNsense + Elastic Stack (github.com)
-
pfELK won't receive syslog data on port 5140
I've carefully followed the manual Ubuntu setup of pfelk from https://github.com/pfelk/pfelk/tree/main, the instructions are pretty good. I did everything manually except for the dashboards, used the handy script. I've also configured syslog to remote log everything to it, plus unbound data.
- SIEM or Dashboards
- Logs to LogStash then to Sentinel. Parsing problem.
-
i'm looking for an PFsense app that i Can use it with splunk, i find only one but it miss Many options
I've been using pfElk. You could probably use some of the parsers from there to parse things yourself in Splunk.
-
My growing homelab, CS student in Germany
On the left is a Kibana dashboard, showing information from the firewall (blocks/passes, connection type, etc). I use pfelk and customised the dashboard and the indexing a bit to suit my needs.
- PfSense Guide for Viewing Traffic History?
-
Running a private mail server for six years, easy peasy
> So many chinese and russians IPs...
And Korean, and Dutch, I recall significant from Central America.
For anyone interested in what Geo's appear to be attacking you, and is a noob like me: https://github.com/pfelk/pfelk is really cool.
- How to best visualize Suricata alerts in pfsense
What are some alternatives?
openwrt-config - Ansible playbook library for automated configuring of OpenWrt.
ElastiFlow - Network flow analytics (Netflow, sFlow and IPFIX) with the Elastic Stack
ansible-yaml-snippets - Simple and easy-to-use Ansible code snippets in YAML
docker-elk - The Elastic stack (ELK) powered by Docker and Compose.
terrible - An Ansible playbook that applies the principle of the Infrastructure as Code on a QEMU/KVM environment.
pfSense-Dashboard - A functional and useful dashboard for pfSense that utilizes influxdb, grafana and telegraf
homelab - Fully automated homelab from empty disk to running services with a single command.
HELK - The Hunting ELK
ansible-docker-compose-openvpn-secure-centos8 - Ansible Playbook for starting OpenVPN server on CentOS 8
docker-compose-macvlan - Docker-compose macvlan example - container using different IP address than host.
fast-geoip - A faster & low-memory replacement for geoip-lite, a node library that maps IPs to geographical information
securityonion - Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.