Elasticsearch Recon Ingestion Scripts (ERIS) 🔎
Go to file
2024-01-20 21:37:27 -05:00
ingestors Updated mirrors 2024-01-20 21:37:27 -05:00
LICENSE Updated README, fixed issue using the wrong domain in records for zone file ingestion (woops) 2024-01-20 10:53:55 -05:00
README.md Updated mirrors 2024-01-20 21:37:27 -05:00

Elasticsearch Recon Ingestion Scripts (ERIS)

A utility for ingesting various large scale reconnaissance data logs into Elasticsearch

Work In Progress

Prerequisites

Usage

python ingest_XXXX.py [options] <input>

Note: The <input> can be a file or a directory of files, depending on the ingestion script.

Options
Argument Description
--dry-run Perform a dry run without indexing records to Elasticsearch.
--batch_size Number of records to index in a batch (default 25,000).
Elasticsearch Connnection Options
Argument Description
--host Elasticsearch host (default 'localhost').
--port Elasticsearch port (default 9200).
--user Elasticsearch username (default 'elastic').
--password Elasticsearch password. If not provided, it checks the environment variable ES_PASSWORD.
--api-key Elasticsearch API Key for authentication.
--self-signed Allow self-signed certificates.
Elasticsearch Index Options
Argument Description
--index Elasticsearch index name (default 'zone_files').
--replicas Number of replicas for the index.
--shards Number of shards for the index

Mirrors for this repository: acid.vegasSuperNETsGitHubGitLabCodeberg