Movatterモバイル変換


[0]ホーム

URL:


Loading
  1. Elastic Docs/
  2. Reference/
  3. Ingestion tools/
  4. Elastic integrations

Slack Integration

Version1.26.0 (View all)
Subscription level
What's this?
Basic
Developed by
What's this?
Community
Ingestion method(s)API
Minimum Kibana version(s)9.1.4
9.0.7
8.19.4

Slack is used by numerous orgazations as their primary chat and collaboration tool.

The Slack integration usesSlack's API to retrieve audit events and ingest them into Elasticsearch. This allows you to search, observe, and visualize the Slack log events through Elasticsearch.

The Elastic agent running this integration interacts with Slack's infrastructure using their APIs to retrieveaudit logs for a workspace or enterprise.

Please note the Audit Logs API is only available to Slack workspaces on an Enterprise Grid plan. These API methods will not work for workspaces on a Free, Standard, or Business+ plan.

  1. In Kibana go toManagement > Integrations
  2. In the "Search for integrations" search bar typeSlack.
  3. Click on "Slack" integration from the search results.
  4. Click onAdd Slack button to add Slack integration.

Enter values "OAuth API Token".

  1. OAuth API Token will be generated when aSlack App is created.

For the Slack integration to be able to successfully get logs the following "User Token Scopes"" must be granted to the Slack App:

  • auditlogs:read

Audit logs summarize the history of changes made within the Slack Enterprise.

Exported fields
FieldDescriptionType
@timestampEvent timestamp.date
cloud.image.idImage ID for the cloud instance.keyword
data_stream.datasetData stream dataset name.constant_keyword
data_stream.namespaceData stream namespace.constant_keyword
data_stream.typeData stream type.constant_keyword
event.datasetEvent datasetconstant_keyword
event.moduleEvent moduleconstant_keyword
host.containerizedIf the host is a container.boolean
host.os.buildOS build information.keyword
host.os.codenameOS codename, if any.keyword
input.typeType of Filebeat input.keyword
log.flagsFlags for the log file.keyword
log.offsetOffset of the entry in the log file.long
slack.audit.actor.typeThe type of entity performing the action.keyword
slack.audit.actor.user.teamThe the team of the actor if they are a user.keyword
slack.audit.context.domainThe domain of the Workspace or Enterprisekeyword
slack.audit.context.idThe ID of the workspace or enterprisekeyword
slack.audit.context.nameThe name of the workspace or enterprisekeyword
slack.audit.context.session_idThe identifier that is unique to each authenticated session.keyword
slack.audit.context.typeThe type of account. EitherWorkspace orEnterprisekeyword
slack.audit.details.locationThe location the activity occured in when event.action is anomalykeyword
slack.audit.details.md5The md5 hash of a file associated with afile_malicious_content_detected event.keyword
slack.audit.details.previous_ip_addressThe IP address previously observed for the entity in the event when event.action is anomalyip
slack.audit.details.previous_user_agentThe User-Agent string previously observed for the entity in the event when event.action is anomalykeyword
slack.audit.details.reasonThe anomaly rule triggered to generate the event when event.action is anomaly: asn, excessive_downloads, ip_address, session_fingerprint, tor, user_agentkeyword
slack.audit.details.url_privateURL associated with the action.keyword
slack.audit.entity.barriered_from_usergroupThe user group barrier when entity_type is barrierkeyword
slack.audit.entity.channelThe channel the entity is within when entity_type is messagekeyword
slack.audit.entity.domainDomain of the entity when entity_type is Workspace or Enterprisekeyword
slack.audit.entity.emailEmail address of the entity when entity_type is userkeyword
slack.audit.entity.entity_typeType of the entity: workspace, enterprise, user, file, channel, app, workflow, user, usergroup, barrier, message, role, account_type_role.keyword
slack.audit.entity.filetypeFiletype of the entity when entity_type is filekeyword
slack.audit.entity.idID of the entitykeyword
slack.audit.entity.is_directory_approvedIf App is approved when entity_type is appboolean
slack.audit.entity.is_distributedIf App is distributed when entity_type is appboolean
slack.audit.entity.is_org_sharedIf channel is shared when entity_type is channelboolean
slack.audit.entity.is_sharedIf channel is shared when entity_type is channelboolean
slack.audit.entity.is_workflow_appIf App is a workflow when entity_type is appboolean
slack.audit.entity.nameName of the entitykeyword
slack.audit.entity.primary_usergroupThe primary user group when entity_type is barrierkeyword
slack.audit.entity.privacyPrivacy status of entity when entity_type is channelkeyword
slack.audit.entity.scopesThe OAuth scopes when entity_type is appkeyword
slack.audit.entity.teamTeam that the entity exists within when entity_type is user or messagekeyword
slack.audit.entity.teams_shared_withList of orgs channel is shared with when entity_type is channelkeyword
slack.audit.entity.timestampThe timestamp of the entity when entity_type is messagekeyword
slack.audit.entity.titleTitle of the entity when entity_type is filekeyword
slack.audit.entity.typeThe type of the entity when entity_type is rolekeyword
Example
{    "@timestamp": "2023-01-13T17:40:21.862Z",    "agent": {        "ephemeral_id": "4493e0ba-0e9b-43e7-ad59-2a2c6c330c73",        "id": "6790db85-6c1f-425a-a093-87887eed5a5d",        "name": "elastic-agent-86233",        "type": "filebeat",        "version": "8.19.4"    },    "data_stream": {        "dataset": "slack.audit",        "namespace": "54041",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "6790db85-6c1f-425a-a093-87887eed5a5d",        "snapshot": false,        "version": "8.19.4"    },    "event": {        "action": "anomaly",        "agent_id_status": "verified",        "created": "2025-12-05T07:31:29.085Z",        "dataset": "slack.audit",        "id": "2125fb41-c67c-4cf5-a5c4-d90cb58dd5f9",        "ingested": "2025-12-05T07:31:30Z",        "kind": "event",        "original": "{\"action\":\"anomaly\",\"actor\":{\"type\":\"user\",\"user\":{\"email\":\"aaron@example.com\",\"id\":\"e65b0f5c\",\"name\":\"roy\"}},\"context\":{\"ip_address\":\"81.2.69.143\",\"location\":{\"domain\":\"Docker\",\"id\":\"e65b11aa\",\"name\":\"Docker\",\"type\":\"workspace\"},\"ua\":\"Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:23.0) Gecko/20131011 Firefox/23.0\"},\"date_create\":1683836273,\"details\":{\"action_timestamp\":1673631621862,\"location\":\"England, GB\",\"previous_ip_address\":\"175.16.199.64\",\"previous_ua\":\"\",\"reason\":[\"asn\",\"ip_address\"]},\"entity\":{\"type\":\"user\",\"user\":{\"email\":\"jbob@example.com\",\"id\":\"asdfasdf\",\"name\":\"Joe Bob\",\"team\":\"T234SAH2\"}},\"id\":\"2125fb41-c67c-4cf5-a5c4-d90cb58dd5f9\"}",        "type": [            "info"        ]    },    "input": {        "type": "httpjson"    },    "related": {        "ip": [            "81.2.69.143"        ],        "user": [            "e65b0f5c",            "aaron@example.com"        ]    },    "slack": {        "audit": {            "actor": {                "type": "user"            },            "context": {                "domain": "Docker",                "id": "e65b11aa",                "name": "Docker",                "type": "workspace"            },            "details": {                "location": "England, GB",                "previous_ip_address": "175.16.199.64",                "reason": [                    "asn",                    "ip_address"                ]            },            "entity": {                "email": "jbob@example.com",                "entity_type": "user",                "id": "asdfasdf",                "name": "Joe Bob",                "team": "T234SAH2"            }        }    },    "source": {        "address": "81.2.69.143",        "geo": {            "city_name": "London",            "continent_name": "Europe",            "country_iso_code": "GB",            "country_name": "United Kingdom",            "location": {                "lat": 51.5142,                "lon": -0.0931            },            "region_iso_code": "GB-ENG",            "region_name": "England"        },        "ip": "81.2.69.143"    },    "tags": [        "forwarded",        "slack-audit",        "preserve_original_event"    ],    "user": {        "email": "aaron@example.com",        "full_name": "roy",        "id": "e65b0f5c"    },    "user_agent": {        "device": {            "name": "Other"        },        "name": "Firefox",        "original": "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:23.0) Gecko/20131011 Firefox/23.0",        "os": {            "full": "Windows 7",            "name": "Windows",            "version": "7"        },        "version": "23.0"    }}
Changelog
VersionDetailsMinimum Kibana version
1.26.0Enhancement (View pull request)
Prevent updating fleet health status to degraded when the next_cursor is not present.
9.1.4
9.0.7
8.19.4
1.25.1Bug fix (View pull request)
Fix handling of empty Slackcontext.ip_address fields.
9.0.0
8.13.0
1.25.0Enhancement (View pull request)
Update Kibana constraint to support 9.0.0.
9.0.0
8.13.0
1.24.1Bug fix (View pull request)
Updated SSL description in package manifest.yml to be uniform and to include links to documentation.
8.13.0
1.24.0Enhancement (View pull request)
Do not removeevent.original in main ingest pipeline.
8.13.0
1.23.0Enhancement (View pull request)
Add "preserve_original_event" tag to documents withevent.kind set to "pipeline_error".
8.13.0
1.22.0Enhancement (View pull request)
Mapdetails.url_private andactor fields.

Enhancement (View pull request)
Improve pipeline efficiency.
8.13.0
1.21.2Bug fix (View pull request)
Use triple-brace Mustache templating when referencing variables in ingest pipelines.
8.13.0
1.21.1Bug fix (View pull request)
Use triple-brace Mustache templating when referencing variables in ingest pipelines.
8.13.0
1.21.0Enhancement (View pull request)
Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template.
8.13.0
1.20.0Enhancement (View pull request)
Improve handling of empty responses.
8.12.0
1.19.0Enhancement (View pull request)
Map md5 hash detail for files.
8.12.0
1.18.0Enhancement (View pull request)
Set sensitive values as secret.
8.12.0
1.17.1Enhancement (View pull request)
Changed owners
8.10.1
1.17.0Enhancement (View pull request)
Limit request tracer log count to five.
8.10.1
1.16.0Enhancement (View pull request)
ECS version updated to 8.11.0.
8.10.1
1.15.1Bug fix (View pull request)
Choose the correct value for theoldest param.
8.10.1
1.15.0Enhancement (View pull request)
Improve 'event.original' check to avoid errors if set.
8.7.1
1.14.1Bug fix (View pull request)
Keepoldest parameter when paginating responses.
8.7.1
1.14.0Enhancement (View pull request)
Set 'community' owner type.
8.7.1
1.13.0Enhancement (View pull request)
Update the package format_version to 3.0.0.
8.7.1
1.12.0Enhancement (View pull request)
Update package to ECS 8.10.0 and align ECS categorization fields.
8.7.1
1.11.0Enhancement (View pull request)
Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI.
8.7.1
1.10.1Bug fix (View pull request)
Fix handling of API query param 'oldest'
8.7.1
1.10.0Enhancement (View pull request)
Update package-spec to 2.9.0.
8.7.1
1.9.0Enhancement (View pull request)
Update package to ECS 8.9.0.
8.7.1
1.8.0Enhancement (View pull request)
Document duration units.
8.7.1
1.7.1Bug fix (View pull request)
Parse action_timestamp values as microseconds since unix epoch.
8.7.1
1.7.0Enhancement (View pull request)
Document valid duration units.
8.7.1
1.6.0Enhancement (View pull request)
Ensure error.message is correctly set for pipeline errors.
8.7.1
1.5.0Enhancement (View pull request)
Update package to ECS 8.8.0.
8.7.1
1.4.0Enhancement (View pull request)
Adds anomaly detail fields.

Bug fix (View pull request)
Fix formatting of 'oldest' API query parameter.
8.7.1
1.3.0Enhancement (View pull request)
Addslack.audit.context.session_id field.
8.7.1
1.2.0Enhancement (View pull request)
Add a new flag to enable request tracing
8.7.1
1.1.0Enhancement (View pull request)
Update package to ECS 8.7.0.
8.1.0
1.0.0Enhancement (View pull request)
Release Slack as GA.
8.1.0
0.3.0Enhancement (View pull request)
Update package to ECS 8.6.0.
8.1.0
0.2.1Bug fix (View pull request)
Remove duplicate fields.
8.1.0
0.2.0Enhancement (View pull request)
Update package to ECS 8.5.0.
8.1.0
0.1.2Bug fix (View pull request)
Remove duplicate field.
8.1.0
0.1.1Enhancement (View pull request)
Use ECS geo.location definition.
8.1.0
0.1.0Enhancement (View pull request)
Initial draft of the package
8.1.0

[8]ページ先頭

©2009-2026 Movatter.jp