ngsiem

CrowdStrike FalconPy CrowdStrike FalconPy CrowdStrike Subreddit

NG-SIEM samples

The examples within this folder focus on leveraging CrowdStrike Falcon Next-Gen SIEM and the NGSIEM service collection.

What the HEC?

This sample discusses ingestion into Falcon Next-Gen SIEM. The solution demonstrates singular, list, file and raw ingest. Events can be randomly generated or provided via a file.

[!IMPORTANT] This solution demonstrates ingestion but does not discuss parsing. Parsers should be developed specifically to handle the data being ingested. More information regarding parsers can be found by navigating to Support and Resources -> Documentation in the Falcon console and selecting "Falcon Next-Gen SIEM".

Running the program

In order to run this demonstration, you you will need to create a HEC / HTTP Event Connector data connection within the Falcon Console (Next-Gen SIEM). The API and URL key associated with this data connection will be required to successfully ingest data.

Execution syntax

This sample leverages simple command-line arguments to implement functionality.

Basic usage

Ingest one thousand randomly generated JSON formatted events.

python3 what_the_hec.py -u $NGSIEM_URL_KEY -a $NGSIEM_API_KEY -g -n 1000 -f json

Debugging can be enabled using the -d argument.

Enable a progress indicator using the -p argument.

Ingest events as a list.

Ingest a file containing events.

Advanced usage

Process events asynchronously with fifty threads.

Ingest a raw file of events.

Adjust the timeout for API response.

Command-line help

Command-line help is available via the -h argument.

Example source code

The source code for this example can be found here.

Last updated

Was this helpful?