Movatterモバイル変換


[0]ホーム

URL:


Loading
  1. Elastic Docs/
  2. Reference/
  3. Ingestion tools/
  4. Elastic integrations

Thycotic Secret Server

Version1.12.1 (View all)
Subscription level
What's this?
Basic
Developed by
What's this?
Community
Ingestion method(s)File, Network Protocol
Minimum Kibana version(s)9.0.0
8.13.0

The Thycotic integration allows you to collect logs from Thycotic Secret Server transmitted using syslog.

If you have used an external syslog receive to write the logs to file, you can also use this integration to read the log file.

The Thycotic integration collects one type of data stream: logs

Log data streams collected by the Thycotic Secret Server integration include admin activity and PAM events, including secret access and modification.

You need Elasticsearch for storing and searching your data and Kibana for visualizing and managing it.

You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your own hardware.

The official vendor documentation regarding how to configure Secret Server to send syslog is hereSecure Syslog/CEF Logging

This PDF is also useful as a reference for how Thycotic Secret Server generates logs in CEF format.

This integration has been tested against Thycotic Secret Server version 11.2.000002 and 11.3.000001.

Versions above this are expected to work but have not been tested.

If the "Preserve original event" is enabled, this will add the tagpreserve_original_event to the event.event.original will be set with theoriginal message contents, which is pre-CEF and pre-syslog parsing. This is useful to see what was originally received from Thycotic in case thedecode_cef filebeat processor is failing for some reason.

Note

This is a real concern, as the integration already uses a custom filebeat javascript processor snippet to fix instances of unescaped backslashes which arrive from Secret Server, and which will causedecode_cef to fail.

This,

function process(event) {  event.Put("message", event.Get("message").replace(/\b\\\b/g,"\\\\"));}

Fixes this as the raw log message emitted by Thycotic SS,

Nov 10 13:13:32 THYCOTICSS02 CEF:0|Thycotic Software|Secret Server|11.3.000001|10004|SECRET - VIEW|2|msg=[[SecretServer]] Event: [Secret] Action: [View] By User: U.Admin Item Name: Admin User Personal Admin Account - example\adminuser (Item Id: 12) Container Name: Admin User (Container Id: 11)  suid=2 suser=U.Admin cs4=Unlimited Administrator cs4Label=suser Display Name src=172.16.1.116 rt=Nov 10 2022 13:13:23 fname=Admin User Personal Admin Account - example\adminuser fileType=Secret fileId=12 cs3Label=Folder cs3=Admin User

Note how the message containsexample\adminuser, and fname contains the sameexample\adminuser.

If the single\ is not replaced with an escaped backslash, e.g.\\ prior todecode_cef being used,decode_cef will do the following,

  1. Add the following error.message array to the event,
"error": {    "message": [      "malformed value for msg at pos 197",      "malformed value for fname at pos 436"    ]  }
  1. Delete themessage field that it original parsed (normal behaviour?)
  2. Fail to add thecef.extensions.message andcef.extensions.filename to the event, because it errored when tring to parse them

So if you're seeing error messages like the above, it may be a similar issue withdecode_cef that will require the javascript processor hack to be expanded.

If the "preserve_cef" tag is added to an integration input, thecef object and all fields under it will be preserved.

If the "preserve_log" tag is added to an integration input, thelog object and all fields under it will be preserved.

Thethycotic_ss.logs data stream provides events from Thycotic Secret Server of the following types: logs

An example event forthycotic_ss.logs looks as following:

Example
{    "@timestamp": "2025-11-10T13:13:18.000Z",    "agent": {        "ephemeral_id": "9b332f1b-3496-4574-ace8-0c4e93681d56",        "id": "4cad8b8e-68de-45a6-938c-44935eb26c44",        "name": "elastic-agent-81566",        "type": "filebeat",        "version": "8.19.2"    },    "data_stream": {        "dataset": "thycotic_ss.logs",        "namespace": "62177",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "4cad8b8e-68de-45a6-938c-44935eb26c44",        "snapshot": false,        "version": "8.19.2"    },    "event": {        "action": "password_displayed",        "agent_id_status": "verified",        "category": [            "iam"        ],        "code": "10039",        "dataset": "thycotic_ss.logs",        "ingested": "2025-11-10T07:36:05Z",        "kind": "event",        "provider": "secret",        "type": [            "info"        ]    },    "host": {        "ip": [            "172.24.0.3"        ],        "name": "THYCOTICSS02"    },    "input": {        "type": "udp"    },    "message": "[[SecretServer]] Event: [Secret] Action: [Password displayed] By User: Example.com\\user.ad Item name: File Name (Item Id: 5631) Container name: Sample User(admin) (Container Id: 1493) Details: Fields: (Password)",    "observer": {        "hostname": "THYCOTICSS02",        "ip": [            "172.24.0.3"        ],        "product": "Secret Server",        "vendor": "Thycotic Software",        "version": "11.7.000061"    },    "related": {        "hosts": [            "THYCOTICSS02"        ],        "ip": [            "172.24.0.3",            "10.10.0.12"        ]    },    "source": {        "ip": "10.10.0.12"    },    "tags": [        "forwarded"    ],    "thycotic_ss": {        "event": {            "secret": {                "folder": "Sample User(admin)",                "id": "5631",                "name": "File Name"            }        }    },    "user": {        "domain": "Example.com",        "full_name": "Sample User(admin)",        "id": "971"    }}

The following fields may be used by the package:

Exported fields
FieldDescriptionType
@timestampDate/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events.date
cef.versionkeyword
data_stream.datasetData stream dataset.constant_keyword
data_stream.namespaceData stream namespace.constant_keyword
data_stream.typeData stream type.constant_keyword
input.typekeyword
thycotic_ss.event.folder.folderkeyword
thycotic_ss.event.folder.idkeyword
thycotic_ss.event.folder.namekeyword
thycotic_ss.event.group.folderkeyword
thycotic_ss.event.group.idkeyword
thycotic_ss.event.group.namekeyword
thycotic_ss.event.permission.folderkeyword
thycotic_ss.event.permission.idkeyword
thycotic_ss.event.permission.namekeyword
thycotic_ss.event.role.folderkeyword
thycotic_ss.event.role.idkeyword
thycotic_ss.event.role.namekeyword
thycotic_ss.event.secret.folderkeyword
thycotic_ss.event.secret.idkeyword
thycotic_ss.event.secret.namekeyword
thycotic_ss.event.timedate
thycotic_ss.event.user.domainkeyword
thycotic_ss.event.user.folderkeyword
thycotic_ss.event.user.full_namekeyword
thycotic_ss.event.user.idkeyword
thycotic_ss.event.user.namekeyword

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.

Sample screenshot
Changelog
VersionDetailsMinimum Kibana version
1.12.1Bug fix (View pull request)
Handle missing cef.extensions.deviceReceiptTime field.
9.0.0
8.13.0
1.12.0Enhancement (View pull request)
Update Kibana constraint to support 9.0.0.
9.0.0
8.13.0
1.11.1Bug fix (View pull request)
Updated SSL description to be uniform and to include links to documentation.
8.13.0
1.11.0Enhancement (View pull request)
Allow the usage of deprecated log input and support for stack 9.0
8.13.0
1.10.0Enhancement (View pull request)
Do not removeevent.original in main ingest pipeline.
8.13.0
1.9.1Bug fix (View pull request)
Fix broken links in Security Service integrations packages.
8.13.0
1.9.0Enhancement (View pull request)
Add "preserve_original_event" tag to documents withevent.kind set to "pipeline_error".
8.13.0
1.8.1Bug fix (View pull request)
Use triple-brace Mustache templating when referencing variables in ingest pipelines.
8.13.0
1.8.0Enhancement (View pull request)
Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template.
8.13.0
1.7.0Enhancement (View pull request)
Update manifest format version to v3.0.3.
8.5.0
1.6.2Enhancement (View pull request)
Changed owners
8.5.0
1.6.1Bug fix (View pull request)
Fix exclude_files pattern.
8.5.0
1.6.0Enhancement (View pull request)
ECS version updated to 8.11.0.
8.5.0
1.5.0Enhancement (View pull request)
Set 'community' owner type.
8.5.0
1.4.0Enhancement (View pull request)
ECS version updated to 8.10.0.
8.5.0
1.3.0Enhancement (View pull request)
The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added 'owner.type: elastic' to package manifest.
8.5.0
1.2.0Enhancement (View pull request)
Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI.
8.5.0
1.1.0Enhancement (View pull request)
Update package to ECS 8.9.0.
8.5.0
1.0.0Enhancement (View pull request)
Release Thyotic Secret Server as GA.
8.5.0
0.4.0Enhancement (View pull request)
Ensure event.kind is correctly set for pipeline errors.
8.5.0
0.3.0Enhancement (View pull request)
Update package to ECS 8.8.0.
8.5.0
0.2.0Enhancement (View pull request)
Update package-spec version to 2.7.0.
8.5.0
0.1.0Enhancement (View pull request)
Update package to ECS 8.7.0.
8.5.0
0.0.1Enhancement (View pull request)
Initial draft of the package
8.5.0

[8]ページ先頭

©2009-2026 Movatter.jp