zeek2es.py
Python application to translate Zeek logs into ElasticSearch's bulk load JSON format with detailed instructions and features.

zeek2es.py
Python application to translate Zeek logs into ElasticSearch's bulk load JSON format with detailed instructions and features.
Go Beyond the Directory. Track the Entire Market.
Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.
zeek2es.py Description
This Python application translates Zeek's ASCII TSV and JSON logs into ElasticSearch's bulk load JSON format. Table of Contents: Introduction Installation Elastic v8.0+ Docker Upgrading zeek2es ES Ingest Pipeline Filtering Data Python Filters Filter on Keys Command Line Examples Command Line Options Requirements Notes Humio JSON Log Input Data Streams Helper Scripts Cython Introduction Want to see multiple Zeek logs for the same connection ID (uid) or file ID (fuid)? Here are the hits from files.log, http.log, and conn.log for a single uid: You can perform subnet searching on Zeek's 'addr' type: You can create time series graphs, such as this NTP and HTTP graph: IP Addresses can be Geolocated with the -g command line option: Aggregations are simple and quick: This application will 'just work' when Zeek log formats change. The logic reads the field names and associated types to set up the mappings correctly in ElasticSearch. This application will recognize gzip or uncompressed logs. This application assumes you have ElasticSearch set up on your localhost at the default port. If you do not have ElasticSearch you can output the JSON to stdout with the -s -b command line opt
zeek2es.py FAQ
Common questions about zeek2es.py including features, pricing, alternatives, and user reviews.
zeek2es.py is Python application to translate Zeek logs into ElasticSearch's bulk load JSON format with detailed instructions and features.. It is a Security Operations solution designed to help security teams with Log Analysis, Data Ingestion, Zeek.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox