I am presently running Splunk Free on my home network, collecting syslog data from my Sophos UTM. I'd like the ability to translate srcip and dstip fields in the firewall data into country names so that I can do searches and pivots however I'm looking for a step by step guide to getting this setup. Splunk is running on Ubuntu Server in a ESX VM. Have anyone put something like this together?
You have to use either lat/long or iplocaton
before using the geostats
command.
An example would be
index=firewall | iplocation srcip | geostats count by Country
You then need to select the Geolocation
visualization to see it plotted on a world map
You may want to specify a certain bubble size based on the number of hits from that ip, so you could do
index=firewall | iplocation srcip | geostats count by Country | eval redCount = if(TOTAL >= 500,TOTAL,0) | eval yellowCount = if((TOTAL >= 300 AND TOTAL < 500),TOTAL,0) | eval greenCount = if(TOTAL < 300,TOTAL,0) | fields - TOTAL
You can also specify by city and state
index=firewall | iplocation srcip | geostats count by City
index=firewall | iplocation srcip | geostats count by State
Perfect, just what I needed. Thank you
You have to use either lat/long or iplocaton
before using the geostats
command.
An example would be
index=firewall | iplocation srcip | geostats count by Country
You then need to select the Geolocation
visualization to see it plotted on a world map
You may want to specify a certain bubble size based on the number of hits from that ip, so you could do
index=firewall | iplocation srcip | geostats count by Country | eval redCount = if(TOTAL >= 500,TOTAL,0) | eval yellowCount = if((TOTAL >= 300 AND TOTAL < 500),TOTAL,0) | eval greenCount = if(TOTAL < 300,TOTAL,0) | fields - TOTAL
You can also specify by city and state
index=firewall | iplocation srcip | geostats count by City
index=firewall | iplocation srcip | geostats count by State