<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple Searches with BRO LOGS - Trying to correlate certificate data. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Multiple-Searches-with-BRO-LOGS-Trying-to-correlate-certificate/m-p/337197#M162464</link>
    <description>&lt;P&gt;In BRO 2.5.X there are about 3 or 4  log files that have SSL Certificate information:  x509.log, ssl.log, conn.log and dns.log. In simplest process I think I need to either build a series of searches or  use multisearch or join in SPL. Infact I would like for it all to be SPL. So not all fields are in all logs so I have to connect field A in log A with field A in log B create a new field B from log A&amp;amp;B and use that in log C to get fields D&amp;amp;E, then create dashboard or I can start off with a table. (Each log is a separate source type)&lt;BR /&gt;
Some of the fields in BRO that are applicable is uid, fuid, CN, id_resp_h, txhost, rxhost.&lt;/P&gt;

&lt;P&gt;Thus.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Gather all certificate activity using the CN field and a dedup to get a list of certificates. (ssl.log)&lt;/LI&gt;
&lt;LI&gt;Take that list of CN and use that in x509.log to get all the certificate information (serial, expiry date, issuer, etc)&lt;/LI&gt;
&lt;LI&gt;Take CN field and certificate information and use it in the dns.log&lt;/LI&gt;
&lt;LI&gt;Convert some fields in to human readable format and create table with fields.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Can anyone give some guidance on this?&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 18:21:49 GMT</pubDate>
    <dc:creator>baegoon</dc:creator>
    <dc:date>2020-09-29T18:21:49Z</dc:date>
    <item>
      <title>Multiple Searches with BRO LOGS - Trying to correlate certificate data.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Multiple-Searches-with-BRO-LOGS-Trying-to-correlate-certificate/m-p/337197#M162464</link>
      <description>&lt;P&gt;In BRO 2.5.X there are about 3 or 4  log files that have SSL Certificate information:  x509.log, ssl.log, conn.log and dns.log. In simplest process I think I need to either build a series of searches or  use multisearch or join in SPL. Infact I would like for it all to be SPL. So not all fields are in all logs so I have to connect field A in log A with field A in log B create a new field B from log A&amp;amp;B and use that in log C to get fields D&amp;amp;E, then create dashboard or I can start off with a table. (Each log is a separate source type)&lt;BR /&gt;
Some of the fields in BRO that are applicable is uid, fuid, CN, id_resp_h, txhost, rxhost.&lt;/P&gt;

&lt;P&gt;Thus.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Gather all certificate activity using the CN field and a dedup to get a list of certificates. (ssl.log)&lt;/LI&gt;
&lt;LI&gt;Take that list of CN and use that in x509.log to get all the certificate information (serial, expiry date, issuer, etc)&lt;/LI&gt;
&lt;LI&gt;Take CN field and certificate information and use it in the dns.log&lt;/LI&gt;
&lt;LI&gt;Convert some fields in to human readable format and create table with fields.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;Can anyone give some guidance on this?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 18:21:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Multiple-Searches-with-BRO-LOGS-Trying-to-correlate-certificate/m-p/337197#M162464</guid>
      <dc:creator>baegoon</dc:creator>
      <dc:date>2020-09-29T18:21:49Z</dc:date>
    </item>
  </channel>
</rss>

