mirror of
https://github.com/ntop/ntopng.git
synced 2026-04-30 16:09:32 +00:00
Added severity to ntopng checks table
This commit is contained in:
parent
933e8339ec
commit
eda4cfb088
48 changed files with 406 additions and 340 deletions
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local countries_contacts = {
|
||||
-- Script category
|
||||
category = checks.check_categories.security,
|
||||
severity = alert_consts.get_printable_severities().notice,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_countries_contacts,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local dangerous_host = {
|
||||
-- Script category
|
||||
category = checks.check_categories.ids_ips,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_dangerous_host,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local dns = {
|
||||
-- Script category
|
||||
category = checks.check_categories.network,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_dns_traffic,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local dns_contacts = {
|
||||
-- Script category
|
||||
category = checks.check_categories.security,
|
||||
severity = alert_consts.get_printable_severities().notice,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_dns_server_contacts,
|
||||
|
|
|
|||
|
|
@ -3,11 +3,13 @@
|
|||
--
|
||||
|
||||
local checks = require("checks")
|
||||
local alert_consts = require("alert_consts")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
|
||||
local domain_names_contacts = {
|
||||
-- Script category
|
||||
category = checks.check_categories.network,
|
||||
severity = alert_consts.get_printable_severities().notice,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_domain_names_contacts,
|
||||
|
|
|
|||
|
|
@ -3,6 +3,7 @@
|
|||
--
|
||||
|
||||
local checks = require("checks")
|
||||
local alert_consts = require("alert_consts")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
|
||||
local fin_scan = {
|
||||
|
|
@ -11,6 +12,7 @@ local fin_scan = {
|
|||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_fin_scan,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
-- The default threshold value. The format is specific of the
|
||||
-- "threshold_cross" input builder
|
||||
|
|
|
|||
|
|
@ -3,6 +3,7 @@
|
|||
--
|
||||
|
||||
local checks = require("checks")
|
||||
local alert_consts = require("alert_consts")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
|
||||
-- #################################################################
|
||||
|
|
@ -10,6 +11,7 @@ local host_alert_keys = require "host_alert_keys"
|
|||
local flow_flood = {
|
||||
-- Script category
|
||||
category = checks.check_categories.security,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_flow_flood,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local icmp_flood = {
|
||||
-- Script category
|
||||
category = checks.check_categories.security,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_icmp_flood,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local ntp = {
|
||||
-- Script category
|
||||
category = checks.check_categories.network,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_ntp_traffic,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local ntp_contacts = {
|
||||
-- Script category
|
||||
category = checks.check_categories.security,
|
||||
severity = alert_consts.get_printable_severities().notice,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_ntp_server_contacts,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local p2p = {
|
||||
-- Script category
|
||||
category = checks.check_categories.network,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_p2p_traffic,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local pkt_threshold = {
|
||||
-- Script category
|
||||
category = checks.check_categories.network,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_pkt_threshold,
|
||||
|
|
|
|||
|
|
@ -4,10 +4,12 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
local remote_connection = {
|
||||
-- Script category
|
||||
category = checks.check_categories.network,
|
||||
severity = alert_consts.get_printable_severities().notice,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_remote_connection,
|
||||
|
|
|
|||
|
|
@ -4,6 +4,7 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
local script = {
|
||||
-- Script category
|
||||
|
|
@ -13,6 +14,7 @@ local script = {
|
|||
default_enabled = false,
|
||||
|
||||
alert_id = host_alert_keys.host_alert_scan_detected,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_value = {
|
||||
operator = "gt",
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local score_threshold = {
|
||||
-- Script category
|
||||
category = checks.check_categories.security,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = true,
|
||||
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local smtp_contacts = {
|
||||
-- Script category
|
||||
category = checks.check_categories.network,
|
||||
severity = alert_consts.get_printable_severities().notice,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_smtp_server_contacts,
|
||||
|
|
|
|||
|
|
@ -4,12 +4,14 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
-- #################################################################
|
||||
|
||||
local syn_flood = {
|
||||
-- Script category
|
||||
category = checks.check_categories.security,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_syn_flood,
|
||||
|
|
|
|||
|
|
@ -4,10 +4,12 @@
|
|||
|
||||
local checks = require("checks")
|
||||
local host_alert_keys = require "host_alert_keys"
|
||||
local alert_consts = require("alert_consts")
|
||||
|
||||
local syn_scan = {
|
||||
-- Script category
|
||||
category = checks.check_categories.network,
|
||||
severity = alert_consts.get_printable_severities().error,
|
||||
|
||||
default_enabled = false,
|
||||
alert_id = host_alert_keys.host_alert_syn_scan,
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue