All Apps and Add-ons

Empty minemeld feeds

jvalentine
Engager

Running Splunk 7.0.3 and the most recent Palo Alto Networks Splunk app + TA, and trying to integrate with AutoFocus and MineMeld. Almost everything seems to be working properly, but I'm struggling with the MineMeld integration.

I've added my AutoFocus API key to the Palo Alto Networks App for Splunk. I then ran this command:

| panautofocustags

And now when I run

| `pan_autofocus_tags`

I can see all of the AutoFocus tags from within Splunk... thousands of entries. So far, so good.

I've also created a MineMeld Input, using the URL from the AutoFocus-hosted MineMeld output node. (I've verified that the URL is good, as I can visit it from my PC and I see the list of indicators/IP addresses). These indicators do not seem to be importing into Splunk. I run this command:

| `mm_indicators`

And 0 responses are returned. (Coincidently, there was an issue opened in the github repository not too long ago for something similar, but was closed because it wasn't an appropriate troubleshooting venue). I'm having the same problem it seems.

How do we troubleshoot this? Thanks!

jvalentine
Engager

I was able to track this down to authentication/permissions from my splunk box to the minemeld feed URL. My desktop had authenticated and had access, but the Splunk TA had not. Here's the logfiles + entries that helped me track it down:

grep UNAUTHORIZED /opt/splunk/var/log/splunk/Splunk_TA_paloalto_minemeld_feed.log 

2018-04-26 10:54:06,935 ERROR pid=14717 tid=MainThread file=base_modinput.py:log_error:307 | Failed to get entries for "AFtest": 401 Client Error: UNAUTHORIZED for url: https://redacted.paloaltonetworks-app.com/feeds/AF-Ransomware-FeedHCRedWithValue-IPv4?tr=1&v=json

I used a different minemeld feed with less restrictive access controls and it seems to be working correctly:

2018-05-03 18:20:15,283 INFO pid=16561 tid=MainThread file=setup_util.py:log_info:114 | Log level is not set, use default INFO
2018-05-03 18:20:15,283 INFO pid=16561 tid=MainThread file=base_modinput.py:log_info:293 | START Splunk_TA_paloalto indicator retrieval for "AF_o365_IPv4"
2018-05-03 18:20:15,283 INFO pid=16561 tid=MainThread file=setup_util.py:log_info:114 | Proxy is not enabled!
2018-05-03 18:20:15,314 INFO pid=16561 tid=MainThread file=base_modinput.py:log_info:293 | Removing 502 previous entries for MineMeld feed "AF_o365_IPv4"
2018-05-03 18:20:15,316 INFO pid=16561 tid=MainThread file=setup_util.py:log_info:114 | Proxy is not enabled!
2018-05-03 18:20:15,366 INFO pid=16561 tid=MainThread file=setup_util.py:log_info:114 | Proxy is not enabled!
2018-05-03 18:20:15,665 INFO pid=16561 tid=MainThread file=base_modinput.py:log_info:293 | Saving 502 entries for MineMeld feed "AF_o365_IPv4"
2018-05-03 18:20:15,665 INFO pid=16561 tid=MainThread file=setup_util.py:log_info:114 | Proxy is not enabled!
2018-05-03 18:20:15,712 INFO pid=16561 tid=MainThread file=setup_util.py:log_info:114 | Proxy is not enabled!
2018-05-03 18:20:15,743 INFO pid=16561 tid=MainThread file=base_modinput.py:log_info:293 | END Splunk_TA_paloalto indicator retrieval for "AF_o365_IPv4"
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...