<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can you help me a problem I'm having with BRO's DNS logs and Correlation Searches? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-you-help-me-a-problem-I-m-having-with-BRO-s-DNS-logs-and/m-p/459753#M6588</link>
    <description>&lt;P&gt;The Detect Long DNS TXT Record Response does not show anything:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats count min(_time) as firstTime max(_time) as lastTime from datamodel=Network_Resolution where DNS.message_type=response AND DNS.record_type=TXT by DNS.src DNS.dest DNS.answer DNS.record_type |  `drop_dm_object_name("DNS")` | eval anslen=len(answer) | search anslen&amp;gt;100 | `ctime(firstTime)` | `ctime(lastTime)` | rename src as "Source IP", dest as "Destination IP", answer as "DNS Answer" anslen as "Answer Length" record_type as "DNS Record Type" firstTime as "First Time" lastTime as "Last Time" count as Count | table "Source IP" "Destination IP" "DNS Answer" "DNS Record Type"  "Answer Length" Count "First Time" "Last Time"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Seems like all the Network_Resolution datamodel message_type and answers are unknown:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;answer  record_type message_type    count
unknown TXT unknown 44058
unknown TXT unknown 25818
unknown TXT unknown 22868
unknown TXT unknown 17916
unknown TXT unknown 16092
unknown TXT unknown 16087
unknown TXT unknown 8159
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I cut out the src and dest, but as you can see I would get nothing since all the message_type's are unknown and the search is looking for responses.  I think every bro DNS log is both a query and a response if the DNS server responds to the query.&lt;/P&gt;

&lt;P&gt;Do I need to do something special to get the message type of response and the data in the answers?  I know that there is data in the answers field for the index=bro sourcetype=bro_dns:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;_time   query   qtype_name  answers rcode_name  tag vendor
28:53.2 10.231.36.73.imwyyj2pluwatbkhz2yqgkzte3fhckp.r.mail-abuse.com   TXT TXT 143 Mail from 73.36.231.10 blocked using Trend Micro Email Reputation database. Please see &amp;lt;http://www.mail-abuse.com/cgi-bin/lookup?\\73.36.231.10&amp;gt;    NOERROR dns,network,resolution  Bro
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Anyone else using Bro to get DNS into Splunk?&lt;/P&gt;

&lt;P&gt;Thank you,&lt;BR /&gt;
Brian&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 21:54:13 GMT</pubDate>
    <dc:creator>bkirk</dc:creator>
    <dc:date>2020-09-29T21:54:13Z</dc:date>
    <item>
      <title>Can you help me a problem I'm having with BRO's DNS logs and Correlation Searches?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-you-help-me-a-problem-I-m-having-with-BRO-s-DNS-logs-and/m-p/459753#M6588</link>
      <description>&lt;P&gt;The Detect Long DNS TXT Record Response does not show anything:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| tstats count min(_time) as firstTime max(_time) as lastTime from datamodel=Network_Resolution where DNS.message_type=response AND DNS.record_type=TXT by DNS.src DNS.dest DNS.answer DNS.record_type |  `drop_dm_object_name("DNS")` | eval anslen=len(answer) | search anslen&amp;gt;100 | `ctime(firstTime)` | `ctime(lastTime)` | rename src as "Source IP", dest as "Destination IP", answer as "DNS Answer" anslen as "Answer Length" record_type as "DNS Record Type" firstTime as "First Time" lastTime as "Last Time" count as Count | table "Source IP" "Destination IP" "DNS Answer" "DNS Record Type"  "Answer Length" Count "First Time" "Last Time"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Seems like all the Network_Resolution datamodel message_type and answers are unknown:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;answer  record_type message_type    count
unknown TXT unknown 44058
unknown TXT unknown 25818
unknown TXT unknown 22868
unknown TXT unknown 17916
unknown TXT unknown 16092
unknown TXT unknown 16087
unknown TXT unknown 8159
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I cut out the src and dest, but as you can see I would get nothing since all the message_type's are unknown and the search is looking for responses.  I think every bro DNS log is both a query and a response if the DNS server responds to the query.&lt;/P&gt;

&lt;P&gt;Do I need to do something special to get the message type of response and the data in the answers?  I know that there is data in the answers field for the index=bro sourcetype=bro_dns:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;_time   query   qtype_name  answers rcode_name  tag vendor
28:53.2 10.231.36.73.imwyyj2pluwatbkhz2yqgkzte3fhckp.r.mail-abuse.com   TXT TXT 143 Mail from 73.36.231.10 blocked using Trend Micro Email Reputation database. Please see &amp;lt;http://www.mail-abuse.com/cgi-bin/lookup?\\73.36.231.10&amp;gt;    NOERROR dns,network,resolution  Bro
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Anyone else using Bro to get DNS into Splunk?&lt;/P&gt;

&lt;P&gt;Thank you,&lt;BR /&gt;
Brian&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:54:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-you-help-me-a-problem-I-m-having-with-BRO-s-DNS-logs-and/m-p/459753#M6588</guid>
      <dc:creator>bkirk</dc:creator>
      <dc:date>2020-09-29T21:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Can you help me a problem I'm having with BRO's DNS logs and Correlation Searches?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-you-help-me-a-problem-I-m-having-with-BRO-s-DNS-logs-and/m-p/459754#M6589</link>
      <description>&lt;P&gt;I found my own answer!&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/683453/how-do-i-create-a-multivalue-field-with-an-eval-fu.html"&gt;https://answers.splunk.com/answers/683453/how-do-i-create-a-multivalue-field-with-an-eval-fu.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 14:32:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-you-help-me-a-problem-I-m-having-with-BRO-s-DNS-logs-and/m-p/459754#M6589</guid>
      <dc:creator>bkirk</dc:creator>
      <dc:date>2018-11-07T14:32:26Z</dc:date>
    </item>
  </channel>
</rss>

