Loading

Elastic Sandfly Security connector reference

The Elastic Sandfly Security connector is a connector for Sandfly Security. This connector is written in Python using the Elastic connector framework.

View the source code for this connector (branch main, compatible with Elastic 9.0).

Important

As of Elastic 9.0, managed connectors on Elastic Cloud Hosted are no longer available. All connectors must be self-managed.

Note

This connector is a community contribution and is not supported by Elastic. Support for this connector is provided by the community. Please refer to the connector's source code repository for issues and support requests.

This connector is available as a self-managed connector.

This self-managed connector is compatible with Elastic versions 9.1.0+.

To use this connector, satisfy all self-managed connector requirements.

To create a new Sandfly Security connector:

  1. In the Kibana UI, navigate to the Search → Content → Connectors page from the main menu, or use the global search field.
  2. Follow the instructions to create a new Sandfly Security self-managed connector.

You can use the Elasticsearch Create connector API to create a new self-managed Sandfly Security connector.

For example:

				PUT _connector/my-sandfly-connector
					{
  "index_name": "my-elasticsearch-index",
  "name": "Content synced from Sandfly Security",
  "service_type": "sandfly"
}
		

Refer to the Elasticsearch API documentation for details of all available Connector APIs.

To use this connector as a self-managed connector, see Self-managed connectors For additional usage operations, see Connectors UI in Kibana.

Configure Sandfly Security credentials to fetch data from your Sandfly Security server.

You'll need to provide:

  • Server URL: The URL of your Sandfly Security server, including the API version (v4). For example: https://your-sandfly-server.com/v4
  • Username: A valid username for the Sandfly Security server
  • Password: The password for the specified username

This connector is compatible with Sandfly Security servers that support API version v4.

The following configuration fields are required:

server_url
Sandfly Server URL including the API version (v4). For example: https://server-name/v4
username
Sandfly Server Username for authentication.
password
Sandfly Server Password for authentication.
enable_pass
Toggle to enable indexing of "pass" results. When disabled (default), only Alert and Error results are indexed. Default value is False.
verify_ssl
Toggle to verify the Sandfly Server SSL certificate. Disable to allow self-signed certificates. Default value is True.
fetch_days
Number of days of results history to fetch during a Full Content Sync. Default value is 30.

You can deploy the Sandfly Security connector as a self-managed connector using Docker. Follow these instructions.

Refer to DOCKER.md in the elastic/connectors repo for more details.

Find all available Docker images in the official registry.

Tip

We also have a quickstart self-managed option using Docker Compose, so you can spin up all required services at once: Elasticsearch, Kibana, and the connectors service. Refer to this README in the elastic/connectors repo for more information.

The connector syncs the following objects and entities from Sandfly Security:

  • Results: Investigation results including alerts, errors, and check results from security scans
  • Hosts: Information about Linux hosts protected by Sandfly Security
  • SSH Keys: Details about SSH keys discovered during investigations
Note
  • License validation is performed during each sync to ensure the Sandfly Security server is properly licensed for Elasticsearch Replication.
  • By default, only Alert and Error results are synced. Enable "Pass Results" configuration to include all result types.

Full syncs are supported by default for all connectors.

This connector also supports incremental syncs.

Basic sync rules are identical for all connectors and are available by default. For more information read Types of sync rule.

Note

Advanced sync rules are not currently supported for this connector.

See Content extraction.

The connector framework enables operators to run functional tests against a real data source. Refer to Connector testing for more details.

To perform E2E testing for the Sandfly Security connector, run the following command:

$ make ftest NAME=sandfly
		

For faster tests, add the DATA_SIZE=small flag:

make ftest NAME=sandfly DATA_SIZE=small
		

There are currently no known issues for this connector. Refer to Known issues for a list of known issues for all connectors.

See Troubleshooting.

See Security.