Getting Data In

Creating a graph based on unique Source IP hits

netdefilr
New Member

Hello,

I'm not sure the best way that this can be handled. But I have a Citrix Netscaler that I've copied logs from our Syslog server to a temporary Splunk setup. I'm looking to graph unique Source IP (in the log) to Vservers. As it seems like a virus on a computer made a number of attempts to one of our websites. Trying to see if there are other computers out there doing these hits as well. Not sure if Splunk is the right answer.

Here's a log sample:

2013-01-07T13:40:59.996431-05:00 netscaler 01/07/2013:13:41:02 netscaler PPE-0 : TCP CONN_DELINK 30096954 : Source ip:port - Vserver ip:port - NatIP ip:port - Destination ip:port - Delink Time 01/07/2013:13:41:02 - Total_bytes_send 943 - Total_bytes_recv 401

Tags (1)
0 Karma
1 Solution

kristian_kolb
Ultra Champion

If your logs look like above, but with IP-addresses instead of "Source IP" and "Vserver ip", and you like to see something like;

vserver      sourceips
1.2.3.4      11.22.33.44
             22.33.44.55
             33.44.55.66

2.3.4.5      6.5.4.3
             8.7.6.5

Then that is most certainly doable!

First you have to make Splunk understand which part of the event you want to report on, and assigning that to a field. If you are really new to this, I suggest you read up on the documentation for the concept of fields and field extraction.

Then when you have the configuration set up, you can search the logs like (for an appropriate time range);

sourcetype = your_type | stats values(sourceips) by vserver

Hope this helps,

Kristian

View solution in original post

0 Karma

kristian_kolb
Ultra Champion

Start with reading up on what splunk is and what it can do. To understand fields and field extraction, see the second link.

http://docs.splunk.com/Documentation/Splunk/latest/Tutorial/WelcometotheSplunkTutorial

http://docs.splunk.com/Documentation/Splunk/latest/Knowledge/Aboutfields

0 Karma

netdefilr
New Member

I've never created an event like this before, any advice?

0 Karma

kristian_kolb
Ultra Champion

If your logs look like above, but with IP-addresses instead of "Source IP" and "Vserver ip", and you like to see something like;

vserver      sourceips
1.2.3.4      11.22.33.44
             22.33.44.55
             33.44.55.66

2.3.4.5      6.5.4.3
             8.7.6.5

Then that is most certainly doable!

First you have to make Splunk understand which part of the event you want to report on, and assigning that to a field. If you are really new to this, I suggest you read up on the documentation for the concept of fields and field extraction.

Then when you have the configuration set up, you can search the logs like (for an appropriate time range);

sourcetype = your_type | stats values(sourceips) by vserver

Hope this helps,

Kristian

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...