Integrating Amazon’s WAF with opEvents Monitoring Automation

At Opmantek, we use our own software heavily for monitoring our production and development systems, solving our own IT Operations challenges that we know our customers share, it also helps us to develop the products faster in real-world environments through early testing.

We have been using Amazon’s Web Application Firewall (WAF) to help protect our web-facing infrastructure. One of the issues with the out-of-the-box solution is how does one monitor the firewall’s logs as part of your overall IT operations and how do you perform analysis of those logs, with context, to the workloads they relate to.

Firstly to help check newly implemented rules are working as intended and secondly, to provide quick diagnoses in the event of attack.

We first tested a 3rd party product to help visualise the logs and hopefully provide out-of-the-box insights into the data, but we found the TCO of this solution was much higher than using the extensibility of the Opmantek products.  The results from the out-of-the-box solution would also have been isolated from the overall network health visibility.

Our WAF is set up with the rules sets provided by the AWS marketplace as well as internally developed custom rules sets with reputation / ip blacklists that are constantly evolving.

Our Architecture follows:

  • AWS Web Application Firewall (Layer 7 Firewall)
  • AWS Kinesis Delivery Stream (durable real-time data streaming service)
  • Opmantek Kinesis Log Service (Kinesis stream receiving transformation service)
  • opEvents ( Centralised logging and Event Management)

Our WAF is set up to send all logs through to our Kinesis Delivery Stream.

AWS kinesis delivery stream is set up to deliver batched requests over HTTPS to a specified endpoint within your own environment. We developed a small HTTP service in GoLang to securely ingest the batched logs from AWS, and we provide this AWS ingestion service to customers on request.

Our GoLang service also remaps JSON keys before writing the file out to disk.

To see what AWS publishes in its logs you can find them – here.

opEvents jsons_log service listens for filesystem changes, reads them, and runs the event through the opEvents Engine.

We have added a new property country which is the ISO country code of the request.

Element: is mapped to the Requestor’s  IpAddress.

Node: is the name of our WAF in AWS.

Description: is the WAF action, WAF rule which was triggered, ipAddress and country code. This gives opEvents unique enough data to create rolled up event counts for WAF actions. Through opEvents’ dashboard you can see a quick count of clients who have made the most POST requests, or a bot trying SQL injection against your site.

We are using opEvents to store metadata about the WAF log, headers, requesting IP, country and which WAF rules were terminated. Using the IP address we can quickly make an assumption about the requesting origin and know if we have bots scraping us from data centres or users acting unlawfully. With this quick drill down into the event data we can make quick operational changes to implement rules to stop certain traffic or add entire subnets to our IP blacklist.

How we are using this information…

Debugging WAF rules

Implementing WAF rules can be challenging especially when you have to go back and look at access history. opEvents is storing 30 days of WAF logs which we can quickly filter to find the blocked request and debug the rule and make an exception or change how our application works for better security.

Detecting bots

Some crawlers generate quite a large amount of web traffic as they quickly scan our domains, being able to have an aggregate view of requests for an ip Address and rules being triggered it’s easy to find the block of address causing issues. We then drill down into the request metadata checking the headers, location, who owns the IP and past requests patterns. From this we can then quickly ban malicious bot IP ranges.

Website usage statistics 

With MongoDB backing opEvents it’s easy to write queries and run them through the mongo shell and aggregate usage data for more in depth reporting. Which Country Code uses this endpoint the most, Which user-agent makes the most requests.

Automated Response

Using Opmantek’s Operational Process Automation methodology when we correlate sets of WAF events we trigger automated actions into our AWS Environment to respond to the incidents and avoid issues.

opEvents engine makes it flexible to ingest any type of structured data and we could quickly integrate into our production monitoring to give us greater insight into our public facing web systems.

If you would like to know more about about using opEvents and processing web firewall logs we offer live demos with our technical team here.

Uncategorized

Open-AudIT 4.0.0

As at October 2020, we have released a new version of Open-AudIT using version 4.0.0.

Why the major version bump?

Well our underlying build infrastructure and libraries have changed in an incompatible way.

This new version is not able to be installed with older Opmantek applications that are designed to talk to NMIS8, hence the major version number increase to 4.0.0.

Wait – my applications won’t work, what?

Unfortunately this is a breaking change. If you are using other Opmantek applications on the same server, you will need to upgrade them all at the same time, including upgrading to NMIS9.

New License Required (perpetual license only)

A new license will be required if you have a perpetual license. Subscription licenses are unaffected. Contact Opmantek if you require a new license.

Application wise, what has changed for me?

Not much really. Most of the changes are behind the scenes. Having said that, there are a few minor front end changes, as detailed in the Release Notes for Open-AudIT v4.0.0.

We have disabled Open-AudIT – NMIS integration for the moment. This is one component that we have to rework in order to be compatible. This is coming ASAP. We have implemented the ability to import and export to and from NMIS as below (all available using the GUI, see Manage → Devices → Import from NMIS). What we don’t have is the ability to sync between NMIS and Open-AudIT.

Community

Auto Import from NMIS 8 using locally loaded and parsed Nodes.nmis (Linux only) and also uploading a Nodes.nmis file (Windows and Linux).
Auto Import from NMIS 9 on Linux using the local command line (Linux only).
Manual export to NMIS 8 – you select the devices and it’ll give you a CSV and instructions to import. (Windows and Linux).

Professional / Enterprise

Auto Import from NMIS 8 using locally loaded and parsed Nodes.nmis (Linux only).
Auto Import from NMIS 9 on Linux using the local command line (Linux only).

Should I upgrade?

No, but maybe you should migrate. That will depend on if you are using NMIS on the same machine (hence Windows users will be unaffected). If you’re not using NMIS (or any other Opmantek applications) on the same server, migrate away! If you are using NMIS on the same server as Open-AudIT, to get to version 4.0.0 you will need to be running NMIS9 and any associated and migrated Opmantek products (opCharts, opReports, et al). If you migrate any Opmantek applications for NMIS9, you will need to migrate them all. We do encourage users to migrate to version 4.x as soon as you can (bearing in mind the NMIS9 requirements).

How do I migrate (and why is this different to an upgrade)?

Our installer will not allow you to upgrade from 3.x to 4.x on Linux. This is in part because when you change to 4.x, you must uplift all other Opmantek applications and we want to make sure you knowingly choose to do so. So, how do you do this? It’s actually very easy. Stop the OMKD daemon, move the /usr/local/omk folder out of the way, and start the 4.x installer. NOTE – If you have NMIS 8 installed, but only Open-AudIT, DO NOT UPGRADE, it will break. Again – NMIS 9 only (at least for now).


# Stop the daemon
sudo systemctl stop omkd

# Move the old install out of the way (do *not* delete it)
sudo mv /usr/local/omk /usr/local/omk.old

# Run the installer
sudo ./tmp/OAE-Linux-x86_64-release_4.0.0.run

# Copy the original configuration files back
sudo cp -r /usr/local/omk.old/conf/* /usr/local/omk/conf/

# Convert those original files to JSON
sudo /usr/local/omk/bin/opcommon-cli.exe act=convert_json_dir dir=”/usr/local/omk/conf/”

# Restart the OMKD daemon so it uses the newly converted files
sudo systemctl restart omkd

After doing the above, if Open-AudIT doesn’t acknowledge you have a license, copy the encrypted string from /usr/local/omk.old/conf/opLicense.nmis and paste into the text field at /omk/opLicense (use the Enter a License Key button).

On Windows, there is nothing to do, just run the installer.

What about Windows users?

Windows users are essentially unaffected. Opmantek does not release or support any other products for Windows. Our plan is to get a Windows release out ASAP. This will also be version 4.0.0.

What will happen to us version 3.x users?

We plan to focus development going forward on the 4.x series, so that’s where major new features will be introduced. We won’t completely forget version 3.x users though. Any important bug fixes, minor GUI improvements or security issues will be back-ported.

Is Open-AudIT Community affected?

Basically, no. Professional and Enterprise build their feature sets on top of Community. There have been a couple of very minor changes to Community that don’t affect users (ie, we check and parse an additional config file from Enterprise because that changed). Minor stuff like that. As a result, when you install Professional or Enterprise you will see version 4.0.0 in the title bar, however if you change to the Community GUI you’ll see version 3.5.1. Both the version 4.x and 3.x streams of Professional and Enterprise use the same version of Community (as said, currently 3.5.1). Eventually (when we discontinue support for the 3.x series of Professional / Enterprise) we will increase the Community version to match the 4.x series.

Uncategorized

4 TecnologĂ­as Emergentes en 2020 Para Las Que Debemos Estar Listos

Este año ha estado lleno de muchos retos sin embargo la tecnología sigue creciendo a pasos agigantados. Hoy en día contamos con innovaciones tecnológicas en prácticamente todo nuestro entorno, incluso podemos saber algunos de nuestros signos vitales gracias a nuestro reloj inteligente, todos estos avancen nos hacen pensar que las ciber amenazas y la necesidad de administrar nuestros entornos de una forma eficiente serán una necesidad básica de estos tiempos modernos.
AquĂ­ tenemos algunos ejemplos de las tecnologĂ­as a las que el mundo tiene acceso hoy en dĂ­a.

 

 

Redes 5G

Esta nueva generaciĂłn nos brinda una altĂ­sima velocidad de carga y descarga, asĂ­ como una gran flexibilidad y escalabilidad, esta red se anuncio de 2019 y hoy en dĂ­a muchas marcas de celulares ya cuentan con ella en sus terminales de ultima generaciĂłn.
Esta tecnología aún es muy limitada en términos de ubicaciones y redes móviles. Una buena noticia es que podemos esperar más de esto en el futuro. 2020 parece ser un año en el que las redes 5G saldrán con toda su fuerza, con una cobertura mejorada y planes más asequibles.
Y es gracias a sus alcances que nos será posible gozar de una conexión ultra rápida que hará posible transmitir videos y música en alta calidad, permitirá el desarrollo de diversas innovaciones como Inteligencia Artificial, Realidad Virtual, IoT y  realidad aumentada.

 

Autos que se manejan solos.

Ăšltimamente no es raro toparnos con videos en Youtube de autos que funcionan de forma autĂłnoma y sin duda esta tecnologĂ­a esta muy cerca de ser una realidad cotidiana en nuestro mundo.
Tesla de Elon Musk es uno de los pioneros en esa industria. Que han logrado muchos avances en el desarrollo de vehículos autónomos, aunque aún están lejos de desarrollar un automóvil completamente autónomo para 2020, como se había prometido.
Hasta ahora, todos los fabricantes no están más allá del tercer nivel de autonomía, lo que significa que todas las funciones de seguridad están automatizadas, pero es el conductor quien se encarga de hacerse cargo en caso de emergencia. Todavía requiere que el conductor se concentre en el proceso de conducción a pesar de que el automóvil realiza todas las tareas.

 

Plataformas de AutomatizaciĂłn de servicios

Según Gartner, el 48% de los CIO globales implementarán IA para 2020. Además, la mayoría de las empresas han hecho del big data una pieza esencial y están invirtiendo fuertemente en ella. Debido al impacto de la inteligencia artificial,  los servicios se volverán cada vez más complejos y exigentes por lo tanto será necesario contar con sistemas óptimos para hacer más eficientes  los procesos empresariales en su totalidad, gracias a herramientas como las de Opmantek las cuales se enfocan en “service aware” será posible impulsar el giro de cualquier empresa permitiendo a los administradores centrarse en lo que realmente es importante y dejando los detalles particulares  al cuidado de la herramienta.
-Si quieres saber mas sobre como podemos ayudarte a generar un entorno inteligente de descarga nuestra máquina virtual o solicita una demo aquí-

 

Blockchain

La tecnología blockchain o de cadena de bloques es uno de los avances tecnológicos más significativos producidos en los últimos tiempos y que ya está transformando empresas e industrias.
Una cadena de bloques es una base de datos distribuida, lo que significa que los dispositivos de almacenamiento de la base de datos no están todos conectados a un mismo ordenador. Esta base de datos almacena una lista creciente de registros, denominados «bloques». Cada bloque contiene un sello de tiempos (fecha, hora) y está enlazado al bloque anterior.

Las técnicas de criptografía usadas garantizan que los usuarios solo pueden modificar las partes de la cadena que les pertenecen (porque dichos usuarios poseen las claves privadas necesarias para ello).

Además, se garantiza que todas las copias de la cadena de bloques distribuidas están sincronizadas. Esto hace que las cadenas de bloques sean una forma excelente de registrar o almacenar eventos, transacciones, etc.

Lo cierto es que la fama de blockchain se debe fundamentalmente a una de sus aplicaciones, las criptomonedas como Bitcoin, Ethereum, LiteCoin, Ripple, etc., ya que permite, en transacciones monetarias, como virtualmente en el resto de operaciones, eliminar «intermediarios» en el proceso (eliminando así costes de gestión debidos a la intermediación).

La tecnología crece a pasos agigantados y el progreso no se detiene, estas 4 innovaciones solo son una pequeña parte de una gran lista que nunca deja de evolucionar. Sin duda es un requisito para las personas y empresas el mantenernos actualizados e investigando sobre nuevas formas en las que podemos hacer uso de dichas tecnologías.

Uncategorized

The Differences Between Nodes & Elements

Many customers come to us and talk about elements and are confused when we talk about nodes, so let’s dive in and see the difference. 

A node is a logical device such as a PC, Server, Switch, Router, IoT Device, Firewall as so forth. A virtualised server or network device would be a node and the physical host it runs on would be another node.

Each node will have items that you want to monitor. CPU, Memory, Disk, Interface, to name a few.  At Opmantek we call these elements, and big nodes have a small number of elements, but big servers and routers have many elements.

Most network management software companies also refer to these as elements.

It is likely that with each node you monitor, it is sensible to report on that node further than just whether it is up or down. You need to know more about your network infrastructure beyond whether devices are up or down. You will want to measure and instrument for thresholds such as Utilisations, Throughput, Errors, Statuses and so forth. Opmantek CTO Keith Sinclair talks about that here:

Let us look at how elements are counted:

Say you have a 48 port switch. You want to monitor the device for whether it is online, Interfaces (up/down), CPU, and Memory (RAM).

Element Count:

48 Interface Elements

1 Device up/down Element

1 CPU Element

1 Memory Element

Total = 51 Elements

Let us look at monitoring the same items as a node count:

48 Interface contained in a node

1 Device up/down contained in a node

1 CPU contained in a node

1 Memory contained in a node

Total = 1 Node

Node Graphic - 650

At Opmantek we license our products by node not by element. Based on the examples above, using our 100 node license for your switches would be a 5100 element license with some companies.
Also, consider that the instrumentation that you may decide to set up is also included within that node.  Other companies consider QoS, IPSLA and other types of instrumentation to be additional elements.
So there’s the difference between nodes and elements. It demonstrates how much further a node licence goes when compared to an element licence.
If you would like to see our software in action, request a one to one demonstration with our staff. It is a no-obligation demo with no hard sales push. We just want you to know what we can do, and the quickest way is to show you.

Book a Demo

Uncategorized

Getting Started, Configuring the Applications

Introduction

Getting up and running is as simple as finding the virtual machines IP and calling the application page’s URL. After that you will want to enter your license (or get a free license) and we would suggest using the Wizard to kick start your journey.

If you need additional configuration over and above what the wizard offers, our applications are all extremely configurable. The in depth material is hosted on each applications individual space within our wiki. For links to those, see the bottom of this page.

If you need assistance, feel free to ask on  Opmantek’s Community Questions site or contact Opmantek Support.

If you have more in-depth or unique requirements Opmantek is ready and able to customise our solutions to meet your needs – just ask!

Accessing the Application Modules on the VM

Finding the IP and hostname of the VM

Log in to the console using username: omkadmin, password: NM1$88 (you’ll need console access if you don’t know the IP to SSH to).

The default credentials can be found here.

By default the VM boots with DHCP enabled. On the command line run the below to determine the IP.
ifconfig | grep inet | grep -v inet6 | grep -v "127\.0\.0\.1"
To determine the VMs hostname, run the below.
hostname

Calling a URL

The applications can be access by using the URL http://{ip from above}/omk

You will be presented with the following screen.

All the module names are clickable and link to the respective applications; but you can also navigate directly to NMIS, Open-AudIT or any of the other Opmantek applications.

Simply open your favorite web browser and navigate to:

  • NMIS 9 Virtual Appliance:
    • http://<vm ip address>/nmis9 for NMIS,
    • or http://<vm ip address>/omk for the list of all Opmantek applications.

The default access credentials are username “nmis”, password “nm1888” (more info regarding credentials can be found on this page).

Once you’ve got either the NMIS dashboard or one of the Opmantek application dashboards open, you can also navigate between modules using the “NMIS Modules” and “Modules” menus, respectively.

Getting Started Wizard

On the default /omk page you will see a section in the top left titled “Simple Configuration Wizard”. We highly recommend you use this to easily configure items such as authentication and email (among others).

Application Module Licensing

The first step to using a module is knowing how to open it, the next is to get a license for it. This process is simple and painless: all products on the appliance now support free licenses (which are not time-limited but limited to 20 nodes). For these applications the initial dialog offers the generation of such a free license.

Simply click “Activate a Free License”:

And then fill out the details, note these details are used for your license key and recovery information, ensure they are accurate:

You can also use the “opLicensing” module (reachable at http://<vm ip address>/omk/opLicense or from the Modules menu) to manage your licenses comfortably (including the ability to download previously purchased licenses from the Opmantek website). More info about opLicensing can be found here.

Exploring and Configuring Application Modules

All modules on the Virtual Appliance come with their configuration set to very minimal but safe defaults; to explore the full functionality available you will very likely have to make config modifications to suit your environment. These configuration options are all documented on the Opmantek Community Wiki, in the per-application section (or “Application Space”); certain common, shared aspects are discussed in the “opCommon” space.

For all recent Opmantek applications you’ll find links to the respective sections of Wiki in the “Help” menu (usually under “Online Documentation”); there’s also an online version check on the welcome/landing page, and on each application’s “About” page which helps with keeping your modules up to date.

Our individual applications are covered in great detail in their own wiki spaces (see below).

Getting Started With The Opmantek VM

This page details the four simple steps you need to get started using the Opmantek Virtual Machine.

The virtual machine is a vendor neutral image (OVF) that can be converted and used with VMware (ESXi, Fusion, et al), Virtual Box, KVM and Hyper-V. It’s a quick and easy way to get up and running for Proof of Concepts, Trials and other scenarios where a full production install is not required. Download it, convert it and run it and you’re good to go.

Of course you may have requirements around configuring your Linux machines in a company standard way, and in that case our individual applications are also available to install on a machine built by you to your requirements. To download individual applications, you can here.

Step 1 – Download

Download the Opmantek Virtual Appliance from here.

Step 2 – Deploy

So you’ve downloaded the latest version of the Opmantek Virtual Appliance and now you want to set it up and take it for a test drive to see how NMIS and the Opmantek networking modules can help you administer your network. No problem. Easy. Simply:

  1. Import the OVA (Open Virtual Appliance Format) or OVF file into VMware, Virtualbox,…
  2. Start up the new VM, optionally set a static IP address.
  3. Access NMIS and the other Opmantek applications in your browser.

For more details on how to do this including specific hypervisor detail, follow the instructions for your hypervisor of choice below:

Step 3 – Configure

Out of the box there is nothing to do – just start the virtual machine and connect to the application URL, done!

If you would like to configure the virtual machine to use HTTPS, set the hostname or set the IP options to your liking, see here – Getting Started, Configuring the Appliance

Step 4 – Run

Start the virtual machine and configure the application settings, see here – Getting Started, Configuring the Applications

Our individual applications are covered in great detail in their own wiki spaces (see below).

Uncategorized