logstash-filter-fingerprint 0.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +15 -0
- data/.gitignore +4 -0
- data/Gemfile +4 -0
- data/LICENSE +13 -0
- data/Rakefile +6 -0
- data/lib/logstash/filters/fingerprint.rb +122 -0
- data/logstash-filter-fingerprint.gemspec +26 -0
- data/rakelib/publish.rake +9 -0
- data/rakelib/vendor.rake +169 -0
- data/spec/filters/fingerprint_spec.rb +200 -0
- metadata +89 -0
checksums.yaml
ADDED
@@ -0,0 +1,15 @@
|
|
1
|
+
---
|
2
|
+
!binary "U0hBMQ==":
|
3
|
+
metadata.gz: !binary |-
|
4
|
+
M2IxMjQ1ZjcyMWI0NzE2ZmExYzg1ZGY2MTA5YjE0YjkyYzgxN2MxZg==
|
5
|
+
data.tar.gz: !binary |-
|
6
|
+
OWZiMTA4NGY1NTViY2ExZjNhNDJkZTMxYzc0OTcyZmRhZTU0MGJmNQ==
|
7
|
+
SHA512:
|
8
|
+
metadata.gz: !binary |-
|
9
|
+
NmZkZjJhMzg2MTAzOTAxMDQ5NzZiNDdhZjEyOTA5YTE3YjBmOGI2Y2NiZjQz
|
10
|
+
N2FmMWM3OGMwNDYwNjg5NzQ4NmU5YjFjODY2ZmIzMTUzNWRmOWY2NDEwYTZl
|
11
|
+
YWI0MWQ5NWVmOWM3ODY5YmNjNmFlZGI5MzM5MjhmNDEyMmM2YmM=
|
12
|
+
data.tar.gz: !binary |-
|
13
|
+
OGYwNGI2NGRmMjAyZmM3NGJiY2E3NzAzYTQ5N2JmZDY0MmNhNTVhMWU3ODNj
|
14
|
+
NTZjNGUxY2QyYWMwMjcxOTJkMThjZjEwMDJiNWFjMDdiMmEzNWVmYjMzN2M4
|
15
|
+
ZWY4MDMzNDAxMjYzZjQ5NTdiYmJjODcxMjlkNGU3YWJlMzBkOGI=
|
data/.gitignore
ADDED
data/Gemfile
ADDED
data/LICENSE
ADDED
@@ -0,0 +1,13 @@
|
|
1
|
+
Copyright (c) 2012-2014 Elasticsearch <http://www.elasticsearch.org>
|
2
|
+
|
3
|
+
Licensed under the Apache License, Version 2.0 (the "License");
|
4
|
+
you may not use this file except in compliance with the License.
|
5
|
+
You may obtain a copy of the License at
|
6
|
+
|
7
|
+
http://www.apache.org/licenses/LICENSE-2.0
|
8
|
+
|
9
|
+
Unless required by applicable law or agreed to in writing, software
|
10
|
+
distributed under the License is distributed on an "AS IS" BASIS,
|
11
|
+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
12
|
+
See the License for the specific language governing permissions and
|
13
|
+
limitations under the License.
|
data/Rakefile
ADDED
@@ -0,0 +1,122 @@
|
|
1
|
+
# encoding: utf-8
|
2
|
+
require "logstash/filters/base"
|
3
|
+
require "logstash/namespace"
|
4
|
+
|
5
|
+
# Fingerprint fields using by replacing values with a consistent hash.
|
6
|
+
class LogStash::Filters::Fingerprint < LogStash::Filters::Base
|
7
|
+
config_name "fingerprint"
|
8
|
+
milestone 1
|
9
|
+
|
10
|
+
# Source field(s)
|
11
|
+
config :source, :validate => :array, :default => 'message'
|
12
|
+
|
13
|
+
# Target field.
|
14
|
+
# will overwrite current value of a field if it exists.
|
15
|
+
config :target, :validate => :string, :default => 'fingerprint'
|
16
|
+
|
17
|
+
# When used with IPV4_NETWORK method fill in the subnet prefix length
|
18
|
+
# Not required for MURMUR3 or UUID methods
|
19
|
+
# With other methods fill in the HMAC key
|
20
|
+
config :key, :validate => :string
|
21
|
+
|
22
|
+
# Fingerprint method
|
23
|
+
config :method, :validate => ['SHA1', 'SHA256', 'SHA384', 'SHA512', 'MD5', "MURMUR3", "IPV4_NETWORK", "UUID", "PUNCTUATION"], :required => true, :default => 'SHA1'
|
24
|
+
|
25
|
+
# When set to true, we concatenate the values of all fields into 1 string like the old checksum filter.
|
26
|
+
config :concatenate_sources, :validate => :boolean, :default => false
|
27
|
+
|
28
|
+
def register
|
29
|
+
# require any library and set the anonymize function
|
30
|
+
case @method
|
31
|
+
when "IPV4_NETWORK"
|
32
|
+
require 'ipaddr'
|
33
|
+
@logger.error("Key value is empty. please fill in a subnet prefix length") if @key.nil?
|
34
|
+
class << self; alias_method :anonymize, :anonymize_ipv4_network; end
|
35
|
+
when "MURMUR3"
|
36
|
+
require "murmurhash3"
|
37
|
+
class << self; alias_method :anonymize, :anonymize_murmur3; end
|
38
|
+
when "UUID"
|
39
|
+
require "securerandom"
|
40
|
+
when "PUNCTUATION"
|
41
|
+
# nothing required
|
42
|
+
else
|
43
|
+
require 'openssl'
|
44
|
+
@logger.error("Key value is empty. Please fill in an encryption key") if @key.nil?
|
45
|
+
class << self; alias_method :anonymize, :anonymize_openssl; end
|
46
|
+
end
|
47
|
+
end # def register
|
48
|
+
|
49
|
+
public
|
50
|
+
def filter(event)
|
51
|
+
return unless filter?(event)
|
52
|
+
case @method
|
53
|
+
when "UUID"
|
54
|
+
event[@target] = SecureRandom.uuid
|
55
|
+
when "PUNCTUATION"
|
56
|
+
@source.sort.each do |field|
|
57
|
+
next unless event.include?(field)
|
58
|
+
event[@target] = event[field].tr('A-Za-z0-9 \t','')
|
59
|
+
end
|
60
|
+
else
|
61
|
+
if @concatenate_sources
|
62
|
+
to_string = ''
|
63
|
+
@source.sort.each do |k|
|
64
|
+
@logger.debug("Adding key to string")
|
65
|
+
to_string << "|#{k}|#{event[k]}"
|
66
|
+
end
|
67
|
+
to_string << "|"
|
68
|
+
@logger.debug("String built", :to_checksum => to_string)
|
69
|
+
event[@target] = anonymize(to_string)
|
70
|
+
else
|
71
|
+
@source.each do |field|
|
72
|
+
next unless event.include?(field)
|
73
|
+
if event[field].is_a?(Array)
|
74
|
+
event[@target] = event[field].collect { |v| anonymize(v) }
|
75
|
+
else
|
76
|
+
event[@target] = anonymize(event[field])
|
77
|
+
end
|
78
|
+
end # @source.each
|
79
|
+
end # concatenate_sources
|
80
|
+
|
81
|
+
end # casse @method
|
82
|
+
end # def filter
|
83
|
+
|
84
|
+
private
|
85
|
+
def anonymize_ipv4_network(ip_string)
|
86
|
+
# in JRuby 1.7.11 outputs as US-ASCII
|
87
|
+
IPAddr.new(ip_string).mask(@key.to_i).to_s.force_encoding(Encoding::UTF_8)
|
88
|
+
end
|
89
|
+
|
90
|
+
def anonymize_openssl(data)
|
91
|
+
digest = encryption_algorithm()
|
92
|
+
# in JRuby 1.7.11 outputs as ASCII-8BIT
|
93
|
+
OpenSSL::HMAC.hexdigest(digest, @key, data.to_s).force_encoding(Encoding::UTF_8)
|
94
|
+
end
|
95
|
+
|
96
|
+
def anonymize_murmur3(value)
|
97
|
+
case value
|
98
|
+
when Fixnum
|
99
|
+
MurmurHash3::V32.int_hash(value)
|
100
|
+
else
|
101
|
+
MurmurHash3::V32.str_hash(value.to_s)
|
102
|
+
end
|
103
|
+
end
|
104
|
+
|
105
|
+
def encryption_algorithm
|
106
|
+
case @method
|
107
|
+
when 'SHA1'
|
108
|
+
return OpenSSL::Digest::SHA1.new
|
109
|
+
when 'SHA256'
|
110
|
+
return OpenSSL::Digest::SHA256.new
|
111
|
+
when 'SHA384'
|
112
|
+
return OpenSSL::Digest::SHA384.new
|
113
|
+
when 'SHA512'
|
114
|
+
return OpenSSL::Digest::SHA512.new
|
115
|
+
when 'MD5'
|
116
|
+
return OpenSSL::Digest::MD5.new
|
117
|
+
else
|
118
|
+
@logger.error("Unknown algorithm")
|
119
|
+
end
|
120
|
+
end
|
121
|
+
|
122
|
+
end # class LogStash::Filters::Anonymize
|
@@ -0,0 +1,26 @@
|
|
1
|
+
Gem::Specification.new do |s|
|
2
|
+
|
3
|
+
s.name = 'logstash-filter-fingerprint'
|
4
|
+
s.version = '0.1.0'
|
5
|
+
s.licenses = ['Apache License (2.0)']
|
6
|
+
s.summary = "Fingerprint fields using by replacing values with a consistent hash."
|
7
|
+
s.description = "Fingerprint fields using by replacing values with a consistent hash."
|
8
|
+
s.authors = ["Elasticsearch"]
|
9
|
+
s.email = 'richard.pijnenburg@elasticsearch.com'
|
10
|
+
s.homepage = "http://logstash.net/"
|
11
|
+
s.require_paths = ["lib"]
|
12
|
+
|
13
|
+
# Files
|
14
|
+
s.files = `git ls-files`.split($\)+::Dir.glob('vendor/*')
|
15
|
+
|
16
|
+
# Tests
|
17
|
+
s.test_files = s.files.grep(%r{^(test|spec|features)/})
|
18
|
+
|
19
|
+
# Special flag to let us know this is actually a logstash plugin
|
20
|
+
s.metadata = { "logstash_plugin" => "true", "group" => "filter" }
|
21
|
+
|
22
|
+
# Gem dependencies
|
23
|
+
s.add_runtime_dependency 'logstash', '>= 1.4.0', '< 2.0.0'
|
24
|
+
s.add_runtime_dependency "murmurhash3" #(MIT license)
|
25
|
+
end
|
26
|
+
|
@@ -0,0 +1,9 @@
|
|
1
|
+
require "gem_publisher"
|
2
|
+
|
3
|
+
desc "Publish gem to RubyGems.org"
|
4
|
+
task :publish_gem do |t|
|
5
|
+
gem_file = Dir.glob(File.expand_path('../*.gemspec',File.dirname(__FILE__))).first
|
6
|
+
gem = GemPublisher.publish_if_updated(gem_file, :rubygems)
|
7
|
+
puts "Published #{gem}" if gem
|
8
|
+
end
|
9
|
+
|
data/rakelib/vendor.rake
ADDED
@@ -0,0 +1,169 @@
|
|
1
|
+
require "net/http"
|
2
|
+
require "uri"
|
3
|
+
require "digest/sha1"
|
4
|
+
|
5
|
+
def vendor(*args)
|
6
|
+
return File.join("vendor", *args)
|
7
|
+
end
|
8
|
+
|
9
|
+
directory "vendor/" => ["vendor"] do |task, args|
|
10
|
+
mkdir task.name
|
11
|
+
end
|
12
|
+
|
13
|
+
def fetch(url, sha1, output)
|
14
|
+
|
15
|
+
puts "Downloading #{url}"
|
16
|
+
actual_sha1 = download(url, output)
|
17
|
+
|
18
|
+
if actual_sha1 != sha1
|
19
|
+
fail "SHA1 does not match (expected '#{sha1}' but got '#{actual_sha1}')"
|
20
|
+
end
|
21
|
+
end # def fetch
|
22
|
+
|
23
|
+
def file_fetch(url, sha1)
|
24
|
+
filename = File.basename( URI(url).path )
|
25
|
+
output = "vendor/#{filename}"
|
26
|
+
task output => [ "vendor/" ] do
|
27
|
+
begin
|
28
|
+
actual_sha1 = file_sha1(output)
|
29
|
+
if actual_sha1 != sha1
|
30
|
+
fetch(url, sha1, output)
|
31
|
+
end
|
32
|
+
rescue Errno::ENOENT
|
33
|
+
fetch(url, sha1, output)
|
34
|
+
end
|
35
|
+
end.invoke
|
36
|
+
|
37
|
+
return output
|
38
|
+
end
|
39
|
+
|
40
|
+
def file_sha1(path)
|
41
|
+
digest = Digest::SHA1.new
|
42
|
+
fd = File.new(path, "r")
|
43
|
+
while true
|
44
|
+
begin
|
45
|
+
digest << fd.sysread(16384)
|
46
|
+
rescue EOFError
|
47
|
+
break
|
48
|
+
end
|
49
|
+
end
|
50
|
+
return digest.hexdigest
|
51
|
+
ensure
|
52
|
+
fd.close if fd
|
53
|
+
end
|
54
|
+
|
55
|
+
def download(url, output)
|
56
|
+
uri = URI(url)
|
57
|
+
digest = Digest::SHA1.new
|
58
|
+
tmp = "#{output}.tmp"
|
59
|
+
Net::HTTP.start(uri.host, uri.port, :use_ssl => (uri.scheme == "https")) do |http|
|
60
|
+
request = Net::HTTP::Get.new(uri.path)
|
61
|
+
http.request(request) do |response|
|
62
|
+
fail "HTTP fetch failed for #{url}. #{response}" if [200, 301].include?(response.code)
|
63
|
+
size = (response["content-length"].to_i || -1).to_f
|
64
|
+
count = 0
|
65
|
+
File.open(tmp, "w") do |fd|
|
66
|
+
response.read_body do |chunk|
|
67
|
+
fd.write(chunk)
|
68
|
+
digest << chunk
|
69
|
+
if size > 0 && $stdout.tty?
|
70
|
+
count += chunk.bytesize
|
71
|
+
$stdout.write(sprintf("\r%0.2f%%", count/size * 100))
|
72
|
+
end
|
73
|
+
end
|
74
|
+
end
|
75
|
+
$stdout.write("\r \r") if $stdout.tty?
|
76
|
+
end
|
77
|
+
end
|
78
|
+
|
79
|
+
File.rename(tmp, output)
|
80
|
+
|
81
|
+
return digest.hexdigest
|
82
|
+
rescue SocketError => e
|
83
|
+
puts "Failure while downloading #{url}: #{e}"
|
84
|
+
raise
|
85
|
+
ensure
|
86
|
+
File.unlink(tmp) if File.exist?(tmp)
|
87
|
+
end # def download
|
88
|
+
|
89
|
+
def untar(tarball, &block)
|
90
|
+
require "archive/tar/minitar"
|
91
|
+
tgz = Zlib::GzipReader.new(File.open(tarball))
|
92
|
+
# Pull out typesdb
|
93
|
+
tar = Archive::Tar::Minitar::Input.open(tgz)
|
94
|
+
tar.each do |entry|
|
95
|
+
path = block.call(entry)
|
96
|
+
next if path.nil?
|
97
|
+
parent = File.dirname(path)
|
98
|
+
|
99
|
+
mkdir_p parent unless File.directory?(parent)
|
100
|
+
|
101
|
+
# Skip this file if the output file is the same size
|
102
|
+
if entry.directory?
|
103
|
+
mkdir path unless File.directory?(path)
|
104
|
+
else
|
105
|
+
entry_mode = entry.instance_eval { @mode } & 0777
|
106
|
+
if File.exists?(path)
|
107
|
+
stat = File.stat(path)
|
108
|
+
# TODO(sissel): Submit a patch to archive-tar-minitar upstream to
|
109
|
+
# expose headers in the entry.
|
110
|
+
entry_size = entry.instance_eval { @size }
|
111
|
+
# If file sizes are same, skip writing.
|
112
|
+
next if stat.size == entry_size && (stat.mode & 0777) == entry_mode
|
113
|
+
end
|
114
|
+
puts "Extracting #{entry.full_name} from #{tarball} #{entry_mode.to_s(8)}"
|
115
|
+
File.open(path, "w") do |fd|
|
116
|
+
# eof? check lets us skip empty files. Necessary because the API provided by
|
117
|
+
# Archive::Tar::Minitar::Reader::EntryStream only mostly acts like an
|
118
|
+
# IO object. Something about empty files in this EntryStream causes
|
119
|
+
# IO.copy_stream to throw "can't convert nil into String" on JRuby
|
120
|
+
# TODO(sissel): File a bug about this.
|
121
|
+
while !entry.eof?
|
122
|
+
chunk = entry.read(16384)
|
123
|
+
fd.write(chunk)
|
124
|
+
end
|
125
|
+
#IO.copy_stream(entry, fd)
|
126
|
+
end
|
127
|
+
File.chmod(entry_mode, path)
|
128
|
+
end
|
129
|
+
end
|
130
|
+
tar.close
|
131
|
+
File.unlink(tarball) if File.file?(tarball)
|
132
|
+
end # def untar
|
133
|
+
|
134
|
+
def ungz(file)
|
135
|
+
|
136
|
+
outpath = file.gsub('.gz', '')
|
137
|
+
tgz = Zlib::GzipReader.new(File.open(file))
|
138
|
+
begin
|
139
|
+
File.open(outpath, "w") do |out|
|
140
|
+
IO::copy_stream(tgz, out)
|
141
|
+
end
|
142
|
+
File.unlink(file)
|
143
|
+
rescue
|
144
|
+
File.unlink(outpath) if File.file?(outpath)
|
145
|
+
raise
|
146
|
+
end
|
147
|
+
tgz.close
|
148
|
+
end
|
149
|
+
|
150
|
+
desc "Process any vendor files required for this plugin"
|
151
|
+
task "vendor" do |task, args|
|
152
|
+
|
153
|
+
@files.each do |file|
|
154
|
+
download = file_fetch(file['url'], file['sha1'])
|
155
|
+
if download =~ /.tar.gz/
|
156
|
+
prefix = download.gsub('.tar.gz', '').gsub('vendor/', '')
|
157
|
+
untar(download) do |entry|
|
158
|
+
if !file['files'].nil?
|
159
|
+
next unless file['files'].include?(entry.full_name.gsub(prefix, ''))
|
160
|
+
out = entry.full_name.split("/").last
|
161
|
+
end
|
162
|
+
File.join('vendor', out)
|
163
|
+
end
|
164
|
+
elsif download =~ /.gz/
|
165
|
+
ungz(download)
|
166
|
+
end
|
167
|
+
end
|
168
|
+
|
169
|
+
end
|
@@ -0,0 +1,200 @@
|
|
1
|
+
# encoding: utf-8
|
2
|
+
require "spec_helper"
|
3
|
+
require "logstash/filters/fingerprint"
|
4
|
+
|
5
|
+
describe LogStash::Filters::Fingerprint do
|
6
|
+
|
7
|
+
describe "fingerprint ipaddress with IPV4_NETWORK method" do
|
8
|
+
config <<-CONFIG
|
9
|
+
filter {
|
10
|
+
fingerprint {
|
11
|
+
source => ["clientip"]
|
12
|
+
method => "IPV4_NETWORK"
|
13
|
+
key => 24
|
14
|
+
}
|
15
|
+
}
|
16
|
+
CONFIG
|
17
|
+
|
18
|
+
sample("clientip" => "233.255.13.44") do
|
19
|
+
insist { subject["fingerprint"] } == "233.255.13.0"
|
20
|
+
end
|
21
|
+
end
|
22
|
+
|
23
|
+
describe "fingerprint string with MURMUR3 method" do
|
24
|
+
config <<-CONFIG
|
25
|
+
filter {
|
26
|
+
fingerprint {
|
27
|
+
source => ["clientip"]
|
28
|
+
method => "MURMUR3"
|
29
|
+
}
|
30
|
+
}
|
31
|
+
CONFIG
|
32
|
+
|
33
|
+
sample("clientip" => "123.52.122.33") do
|
34
|
+
insist { subject["fingerprint"] } == 1541804874
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
describe "fingerprint string with SHA1 alogrithm" do
|
39
|
+
config <<-CONFIG
|
40
|
+
filter {
|
41
|
+
fingerprint {
|
42
|
+
source => ["clientip"]
|
43
|
+
key => "longencryptionkey"
|
44
|
+
method => 'SHA1'
|
45
|
+
}
|
46
|
+
}
|
47
|
+
CONFIG
|
48
|
+
|
49
|
+
sample("clientip" => "123.123.123.123") do
|
50
|
+
insist { subject["fingerprint"] } == "fdc60acc4773dc5ac569ffb78fcb93c9630797f4"
|
51
|
+
end
|
52
|
+
end
|
53
|
+
|
54
|
+
describe "fingerprint string with SHA256 alogrithm" do
|
55
|
+
config <<-CONFIG
|
56
|
+
filter {
|
57
|
+
fingerprint {
|
58
|
+
source => ["clientip"]
|
59
|
+
key => "longencryptionkey"
|
60
|
+
method => 'SHA256'
|
61
|
+
}
|
62
|
+
}
|
63
|
+
CONFIG
|
64
|
+
|
65
|
+
sample("clientip" => "123.123.123.123") do
|
66
|
+
insist { subject["fingerprint"] } == "345bec3eff242d53b568916c2610b3e393d885d6b96d643f38494fd74bf4a9ca"
|
67
|
+
end
|
68
|
+
end
|
69
|
+
|
70
|
+
describe "fingerprint string with SHA384 alogrithm" do
|
71
|
+
config <<-CONFIG
|
72
|
+
filter {
|
73
|
+
fingerprint {
|
74
|
+
source => ["clientip"]
|
75
|
+
key => "longencryptionkey"
|
76
|
+
method => 'SHA384'
|
77
|
+
}
|
78
|
+
}
|
79
|
+
CONFIG
|
80
|
+
|
81
|
+
sample("clientip" => "123.123.123.123") do
|
82
|
+
insist { subject["fingerprint"] } == "22d4c0e8c4fbcdc4887d2038fca7650f0e2e0e2457ff41c06eb2a980dded6749561c814fe182aff93e2538d18593947a"
|
83
|
+
end
|
84
|
+
end
|
85
|
+
|
86
|
+
describe "fingerprint string with SHA512 alogrithm" do
|
87
|
+
config <<-CONFIG
|
88
|
+
filter {
|
89
|
+
fingerprint {
|
90
|
+
source => ["clientip"]
|
91
|
+
key => "longencryptionkey"
|
92
|
+
method => 'SHA512'
|
93
|
+
}
|
94
|
+
}
|
95
|
+
CONFIG
|
96
|
+
|
97
|
+
sample("clientip" => "123.123.123.123") do
|
98
|
+
insist { subject["fingerprint"] } == "11c19b326936c08d6c50a3c847d883e5a1362e6a64dd55201a25f2c1ac1b673f7d8bf15b8f112a4978276d573275e3b14166e17246f670c2a539401c5bfdace8"
|
99
|
+
end
|
100
|
+
end
|
101
|
+
|
102
|
+
describe "fingerprint string with MD5 alogrithm" do
|
103
|
+
config <<-CONFIG
|
104
|
+
filter {
|
105
|
+
fingerprint {
|
106
|
+
source => ["clientip"]
|
107
|
+
key => "longencryptionkey"
|
108
|
+
method => 'MD5'
|
109
|
+
}
|
110
|
+
}
|
111
|
+
CONFIG
|
112
|
+
|
113
|
+
sample("clientip" => "123.123.123.123") do
|
114
|
+
insist { subject["fingerprint"] } == "9336c879e305c9604a3843fc3e75948f"
|
115
|
+
end
|
116
|
+
end
|
117
|
+
|
118
|
+
describe "Test field with multiple values" do
|
119
|
+
config <<-CONFIG
|
120
|
+
filter {
|
121
|
+
fingerprint {
|
122
|
+
source => ["clientip"]
|
123
|
+
key => "longencryptionkey"
|
124
|
+
method => 'MD5'
|
125
|
+
}
|
126
|
+
}
|
127
|
+
CONFIG
|
128
|
+
|
129
|
+
sample("clientip" => [ "123.123.123.123", "223.223.223.223" ]) do
|
130
|
+
insist { subject["fingerprint"]} == [ "9336c879e305c9604a3843fc3e75948f", "7a6c66b8d3f42a7d650e3354af508df3" ]
|
131
|
+
end
|
132
|
+
end
|
133
|
+
|
134
|
+
describe "Concatenate multiple values into 1" do
|
135
|
+
config <<-CONFIG
|
136
|
+
filter {
|
137
|
+
fingerprint {
|
138
|
+
source => ['field1', 'field2']
|
139
|
+
key => "longencryptionkey"
|
140
|
+
method => 'MD5'
|
141
|
+
}
|
142
|
+
}
|
143
|
+
CONFIG
|
144
|
+
|
145
|
+
sample("field1" => "test1", "field2" => "test2") do
|
146
|
+
insist { subject["fingerprint"]} == "872da745e45192c2a1d4bf7c1ff8a370"
|
147
|
+
end
|
148
|
+
end
|
149
|
+
|
150
|
+
describe "PUNCTUATION method" do
|
151
|
+
config <<-CONFIG
|
152
|
+
filter {
|
153
|
+
fingerprint {
|
154
|
+
source => 'field1'
|
155
|
+
method => 'PUNCTUATION'
|
156
|
+
}
|
157
|
+
}
|
158
|
+
CONFIG
|
159
|
+
|
160
|
+
sample("field1" => "PHP Warning: json_encode() [<a href='function.json-encode'>function.json-encode</a>]: Invalid UTF-8 sequence in argument in /var/www/htdocs/test.php on line 233") do
|
161
|
+
insist { subject["fingerprint"] } == ":_()[<='.-'>.-</>]:-////."
|
162
|
+
end
|
163
|
+
end
|
164
|
+
|
165
|
+
context 'Timestamps' do
|
166
|
+
epoch_time = Time.at(0).gmtime
|
167
|
+
|
168
|
+
describe 'OpenSSL Fingerprinting' do
|
169
|
+
config <<-CONFIG
|
170
|
+
filter {
|
171
|
+
fingerprint {
|
172
|
+
source => ['@timestamp']
|
173
|
+
key => '0123'
|
174
|
+
method => 'SHA1'
|
175
|
+
}
|
176
|
+
}
|
177
|
+
CONFIG
|
178
|
+
|
179
|
+
sample("@timestamp" => epoch_time) do
|
180
|
+
insist { subject["fingerprint"] } == '1d5379ec92d86a67cfc642d55aa050ca312d3b9a'
|
181
|
+
end
|
182
|
+
end
|
183
|
+
|
184
|
+
describe 'MURMUR3 Fingerprinting' do
|
185
|
+
config <<-CONFIG
|
186
|
+
filter {
|
187
|
+
fingerprint {
|
188
|
+
source => ['@timestamp']
|
189
|
+
method => 'MURMUR3'
|
190
|
+
}
|
191
|
+
}
|
192
|
+
CONFIG
|
193
|
+
|
194
|
+
sample("@timestamp" => epoch_time) do
|
195
|
+
insist { subject["fingerprint"] } == 743372282
|
196
|
+
end
|
197
|
+
end
|
198
|
+
end
|
199
|
+
|
200
|
+
end
|
metadata
ADDED
@@ -0,0 +1,89 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: logstash-filter-fingerprint
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.1.0
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Elasticsearch
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
date: 2014-11-05 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: logstash
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - ! '>='
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: 1.4.0
|
20
|
+
- - <
|
21
|
+
- !ruby/object:Gem::Version
|
22
|
+
version: 2.0.0
|
23
|
+
type: :runtime
|
24
|
+
prerelease: false
|
25
|
+
version_requirements: !ruby/object:Gem::Requirement
|
26
|
+
requirements:
|
27
|
+
- - ! '>='
|
28
|
+
- !ruby/object:Gem::Version
|
29
|
+
version: 1.4.0
|
30
|
+
- - <
|
31
|
+
- !ruby/object:Gem::Version
|
32
|
+
version: 2.0.0
|
33
|
+
- !ruby/object:Gem::Dependency
|
34
|
+
name: murmurhash3
|
35
|
+
requirement: !ruby/object:Gem::Requirement
|
36
|
+
requirements:
|
37
|
+
- - ! '>='
|
38
|
+
- !ruby/object:Gem::Version
|
39
|
+
version: '0'
|
40
|
+
type: :runtime
|
41
|
+
prerelease: false
|
42
|
+
version_requirements: !ruby/object:Gem::Requirement
|
43
|
+
requirements:
|
44
|
+
- - ! '>='
|
45
|
+
- !ruby/object:Gem::Version
|
46
|
+
version: '0'
|
47
|
+
description: Fingerprint fields using by replacing values with a consistent hash.
|
48
|
+
email: richard.pijnenburg@elasticsearch.com
|
49
|
+
executables: []
|
50
|
+
extensions: []
|
51
|
+
extra_rdoc_files: []
|
52
|
+
files:
|
53
|
+
- .gitignore
|
54
|
+
- Gemfile
|
55
|
+
- LICENSE
|
56
|
+
- Rakefile
|
57
|
+
- lib/logstash/filters/fingerprint.rb
|
58
|
+
- logstash-filter-fingerprint.gemspec
|
59
|
+
- rakelib/publish.rake
|
60
|
+
- rakelib/vendor.rake
|
61
|
+
- spec/filters/fingerprint_spec.rb
|
62
|
+
homepage: http://logstash.net/
|
63
|
+
licenses:
|
64
|
+
- Apache License (2.0)
|
65
|
+
metadata:
|
66
|
+
logstash_plugin: 'true'
|
67
|
+
group: filter
|
68
|
+
post_install_message:
|
69
|
+
rdoc_options: []
|
70
|
+
require_paths:
|
71
|
+
- lib
|
72
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
73
|
+
requirements:
|
74
|
+
- - ! '>='
|
75
|
+
- !ruby/object:Gem::Version
|
76
|
+
version: '0'
|
77
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
78
|
+
requirements:
|
79
|
+
- - ! '>='
|
80
|
+
- !ruby/object:Gem::Version
|
81
|
+
version: '0'
|
82
|
+
requirements: []
|
83
|
+
rubyforge_project:
|
84
|
+
rubygems_version: 2.4.1
|
85
|
+
signing_key:
|
86
|
+
specification_version: 4
|
87
|
+
summary: Fingerprint fields using by replacing values with a consistent hash.
|
88
|
+
test_files:
|
89
|
+
- spec/filters/fingerprint_spec.rb
|