<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to make Stream logs CIM compliant in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485805#M7997</link>
    <description>&lt;P&gt;I've used Splunk Stream app to get DNS logs from a Windows DNS server.  I got the logs to a Search Head instance that has the Enterprise Security app.  However, I can't seem to the data, which is in json format CIM compliant.  &lt;/P&gt;

&lt;P&gt;Below is a sample message raw log:&lt;/P&gt;

&lt;P&gt;What would be the best way to make the query field CIM compliant with the query field in the DNS as mentioned here:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://docs.splunk.com/Documentation/CIM/4.15.0/User/NetworkResolutionDNS" target="_blank"&gt;https://docs.splunk.com/Documentation/CIM/4.15.0/User/NetworkResolutionDNS&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;
    {"endtime":"2020-03-04T16:13:55.892181Z","timestamp":"2020-03-04T16:13:55.886950Z","bytes":237,"bytes_in":35,"bytes_out":202,"dest_ip":"8.8.8.8","dest_mac":"00:15:5D:FA:54:6B","dest_port":53,"flow_id":"d53fcb9a-ea29-4761-ac1a-de6ca66d31e4","host_addr":["104.115.41.252"],"hostname":["&lt;A href="http://www.microsoft.com-c-3.edgekey.net%22,%22www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net%22,%22e13678.dspb.akamaiedge.net%22%5D,%22message_type%22:%5B%22QUERY%22,%22RESPONSE%22%5D,%22name%22:%5B%22www.microsoft.com%22,%22www.microsoft.com-c-3.edgekey.net%22,%22www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net%22,%22e13678.dspb.akamaiedge.net%22%5D,%22protocol_stack%22:%22ip:udp:dns%22,%22query%22:%5B%22www.microsoft.com%22%5D,%22query_type%22:%5B%22A%22%5D,%22reply_code%22:%22NoError%22,%22reply_code_id%22:0,%22response_time%22:5231,%22src_ip%22:%2214.33.31.16%22,%22src_mac%22:%22AA:AA:BB:BB:00:51%22,%22src_port%22:65031,%22time_taken%22:5231,%22transaction_id%22:4481,%22transport%22:%22udp%22,%22ttl%22:%5B2265,4012,461,20%5D" target="_blank"&gt;www.microsoft.com-c-3.edgekey.net","www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net","e13678.dspb.akamaiedge.net"],"message_type":["QUERY","RESPONSE"],"name":["www.microsoft.com","www.microsoft.com-c-3.edgekey.net","www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net","e13678.dspb.akamaiedge.net"],"protocol_stack":"ip:udp:dns","query":["www.microsoft.com"],"query_type":["A"],"reply_code":"NoError","reply_code_id":0,"response_time":5231,"src_ip":"14.33.31.16","src_mac":"AA:AA:BB:BB:00:51","src_port":65031,"time_taken":5231,"transaction_id":4481,"transport":"udp","ttl":[2265,4012,461,20]&lt;/A&gt;}&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 04:28:09 GMT</pubDate>
    <dc:creator>akhalfan</dc:creator>
    <dc:date>2020-09-30T04:28:09Z</dc:date>
    <item>
      <title>How to make Stream logs CIM compliant</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485805#M7997</link>
      <description>&lt;P&gt;I've used Splunk Stream app to get DNS logs from a Windows DNS server.  I got the logs to a Search Head instance that has the Enterprise Security app.  However, I can't seem to the data, which is in json format CIM compliant.  &lt;/P&gt;

&lt;P&gt;Below is a sample message raw log:&lt;/P&gt;

&lt;P&gt;What would be the best way to make the query field CIM compliant with the query field in the DNS as mentioned here:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://docs.splunk.com/Documentation/CIM/4.15.0/User/NetworkResolutionDNS" target="_blank"&gt;https://docs.splunk.com/Documentation/CIM/4.15.0/User/NetworkResolutionDNS&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;
    {"endtime":"2020-03-04T16:13:55.892181Z","timestamp":"2020-03-04T16:13:55.886950Z","bytes":237,"bytes_in":35,"bytes_out":202,"dest_ip":"8.8.8.8","dest_mac":"00:15:5D:FA:54:6B","dest_port":53,"flow_id":"d53fcb9a-ea29-4761-ac1a-de6ca66d31e4","host_addr":["104.115.41.252"],"hostname":["&lt;A href="http://www.microsoft.com-c-3.edgekey.net%22,%22www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net%22,%22e13678.dspb.akamaiedge.net%22%5D,%22message_type%22:%5B%22QUERY%22,%22RESPONSE%22%5D,%22name%22:%5B%22www.microsoft.com%22,%22www.microsoft.com-c-3.edgekey.net%22,%22www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net%22,%22e13678.dspb.akamaiedge.net%22%5D,%22protocol_stack%22:%22ip:udp:dns%22,%22query%22:%5B%22www.microsoft.com%22%5D,%22query_type%22:%5B%22A%22%5D,%22reply_code%22:%22NoError%22,%22reply_code_id%22:0,%22response_time%22:5231,%22src_ip%22:%2214.33.31.16%22,%22src_mac%22:%22AA:AA:BB:BB:00:51%22,%22src_port%22:65031,%22time_taken%22:5231,%22transaction_id%22:4481,%22transport%22:%22udp%22,%22ttl%22:%5B2265,4012,461,20%5D" target="_blank"&gt;www.microsoft.com-c-3.edgekey.net","www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net","e13678.dspb.akamaiedge.net"],"message_type":["QUERY","RESPONSE"],"name":["www.microsoft.com","www.microsoft.com-c-3.edgekey.net","www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net","e13678.dspb.akamaiedge.net"],"protocol_stack":"ip:udp:dns","query":["www.microsoft.com"],"query_type":["A"],"reply_code":"NoError","reply_code_id":0,"response_time":5231,"src_ip":"14.33.31.16","src_mac":"AA:AA:BB:BB:00:51","src_port":65031,"time_taken":5231,"transaction_id":4481,"transport":"udp","ttl":[2265,4012,461,20]&lt;/A&gt;}&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:28:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485805#M7997</guid>
      <dc:creator>akhalfan</dc:creator>
      <dc:date>2020-09-30T04:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to make Stream logs CIM compliant</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485806#M7998</link>
      <description>&lt;P&gt;The Splunk Stream Add-on automatically extracts the query field.&lt;/P&gt;

&lt;P&gt;Run the following search in your dns index and verify that the "dns, network, and resolution" tags appear:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=&amp;lt;YOUR DNS INDEX&amp;gt; sourcetype="stream:dns" | stats count by tag
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If not, verify that you have the Splunk Stream Add-on installed: Navigate to Apps &amp;gt; Manage apps. The Splunk Stream Add-on is in the same packaged app as the Splunk Stream app but sometimes the add-on does not properly install. &lt;/P&gt;

&lt;P&gt;If you have the Add-on installed and the tags are showing up, verify that you have your DNS index whitelisted in the CIM setup. This can be done in Enterprise Security by Navigating to Configure &amp;gt; CIM Setup. Click the Network Resolution Data Model and verify the DNS index is whitelisted. &lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 15:43:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485806#M7998</guid>
      <dc:creator>zacharychristen</dc:creator>
      <dc:date>2020-03-06T15:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to make Stream logs CIM compliant</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485807#M7999</link>
      <description>&lt;P&gt;For this query &lt;BR /&gt;
     index=&lt;YOUR dns="" index=""&gt; sourcetype="stream:dns" | stats count by tag&lt;BR /&gt;
only the DNS tag appears (makes sense since it is the only one I actually tagged in the event types. &lt;/YOUR&gt;&lt;/P&gt;

&lt;P&gt;The index is whitelisted.  However, I noticed that the following searh: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=&amp;lt;dns_index&amp;gt; datamodel=Network_Resolution.DNS  where DNS.message_type=QUERY
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I get "no results found" &lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 19:49:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485807#M7999</guid>
      <dc:creator>akhalfan</dc:creator>
      <dc:date>2020-03-06T19:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to make Stream logs CIM compliant</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485808#M8000</link>
      <description>&lt;P&gt;When you look at your installed apps do you see the Splunk Stream Add-on or do you just see the App? &lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 19:52:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485808#M8000</guid>
      <dc:creator>zacharychristen</dc:creator>
      <dc:date>2020-03-06T19:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to make Stream logs CIM compliant</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485809#M8001</link>
      <description>&lt;P&gt;installing the add-on fixed it, I don't need to install the app&lt;BR /&gt;
thanks &lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 22:11:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/485809#M8001</guid>
      <dc:creator>akhalfan</dc:creator>
      <dc:date>2020-03-06T22:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to make Stream logs CIM compliant</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/503804#M8926</link>
      <description>&lt;P&gt;I had a similar issue. The results of the above query only returned the "communicate" and "network" tags.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It appears that the default/eventtypes.conf is ignoring "&lt;SPAN&gt;stream:Splunk_*" which excludes&amp;nbsp; "&lt;/SPAN&gt;stream:Splunk_DNS*" events:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[stream_dns]
search = sourcetype=stream:dns NOT source=stream:Splunk_*&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;I added the following to local/eventtypes.conf&amp;nbsp; and it resolved the issue:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[stream_dns]
search = sourcetype=stream:dns&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Now the dns events return all 4 tags: communicate,&amp;nbsp;dns,&amp;nbsp;network, resolution&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jun 2020 21:35:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-make-Stream-logs-CIM-compliant/m-p/503804#M8926</guid>
      <dc:creator>mokuso</dc:creator>
      <dc:date>2020-06-10T21:35:29Z</dc:date>
    </item>
  </channel>
</rss>

