Getting Data In

How to edit inputs.conf to prevent WinNetMon from using up all my license?

brent_weaver
Builder

I enabled WinNetMon and need to throttle it back. Here is my inputs.conf:

###### Network monitoring ######
[WinNetMon://inbound]
direction = inbound
disabled = 1
interval = 60
readInterval = 500
index = os

[WinNetMon://outbound]
direction = outbound
disabled = 1
interval = 60
readInterval = 500
index = os

What can I tweak to make this less chatty? I do realize that there is a cost to doing this but my license is exhausted. As you can see I already changed readInterval from the default 100 to 500

templets
Path Finder

It seems that the default conf captures not just connection requests and accepts, but each packet (i.e. transport). Also, the events are duplicated in both the inbound and outbound sources.

I mitigated this by replacing the existing WinNetMon stanza with:

[WinNetMon://winnetmon]
direction = inbound;outbound
disabled = 0
index = windows
packetType = accept;connect

samhodgson
Path Finder

Genius! was seeing cpu utilisation of 20-40% on our DC's from the splunk-netmon process and this knocked it down to 2%.

0 Karma

SAF_IT
Engager

I am trying to figure this out too. Can someone provide some examples from the inputs.conf file?

Using multikv mode seems to break the Splunk Microsoft Windows App. for network monitoring.

0 Karma

PPape
Contributor

As described in Splunk Docs - inputs.conf you could Filter to remote Adresses, processes and users.

remoteAddress = <regular expression>
* A regular expression that represents the remote IP address of a
  host that is involved in network communication.
* This setting accepts a regular expression that matches against
  IP addresses only, not host names. For example: 192\.163\..*
* The input includes events for remote IP addresses that match
  the regular expression that you specify here.
* The input filters out events for remote IP addresses that do not
  match the regular expression.
* Defaults to unset (including all remote address events).

process = <regular expression>
* A regular expression that represents the process or application that
  performed a network access.
* The input includes events for processes that match the
  regular expression that you specify here.
* The input filters out events for processes that do not match the
  regular expression.
* Defaults to unset (including all processes and application events).

user = <regular expression>
* A regular expression that represents the Windows user name that
  performed a network access.
* The input includes events for user names that match the
  regular expression that you specify here.
* The input filters out events for user names that do not match the
  regular expression.
* Defaults to unset (including all user name events).
0 Karma

SAF_IT
Engager

I found that I could add

protocol = tcp;udp

to the inbound and outbound WinNetMon stanzas in inputs.conf file on the UF. That stopped the ICMP traffic, which helps.

0 Karma

brent_weaver
Builder

Thank you for the reply but i want all events just less of them...

0 Karma

miteshp250283
Path Finder

It doesn't matter how frequently you choose to receive the events within the 24-hour window, the license will still get consumed for that day.

The only way to keep data ingestion within license limits is, to filter unimportant events from coming in.

SAF_IT
Engager

I'm wrestling with this as well. The WinNetMon traffic generates the largest number of events. Is there a way to write a RegEx to exclude processes, like ICMP which generates a lot of traffic?

0 Karma

SAF_IT
Engager

I found that I could add

protocol = tcp;udp

to the inbound and outbound WinNetMon stanzas in inputs.conf file on the UF. That stopped the ICMP traffic, which helps.

0 Karma

brent_weaver
Builder

I dont want to filter on just process and user, i want all of the data just not as frequently

0 Karma

jconger
Splunk Employee
Splunk Employee

In addition, setting the mode to multikv will help a lot as well.

0 Karma

emikulic
Explorer

This is an old post so a known issue. I think folks using ES app or using Splunk as a SIEM and almost any US Govt supplier will need most of that 'extra' info for any IT sec forensic analysis. Most all US Govt suppliers are subject to NIST now and CMMC coming in 2024. I would imagine HIPPA, SOX, GDPR, GLBA, and CCPA companies systems will need that as well.

It is noisy but attacks are very often using non-standard ports to transfer information/data to/from an outside host like ICMP, SSH, and RDP as most application level IDS/IPS are looking at 80/443 inspection.

For general SMB and Small Enterprise this is probably viable in some respects though.

0 Karma
Get Updates on the Splunk Community!

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...