Getting Data In

need to help extract the timestamp value from eventlast seen field from aws.

lksridhar
Explorer

Hi Folks,

we have ingested the aws logs using aws add on and able to see the logs. now we are trying to extract the timestamp value from eventlastseen field and that value in eventlastseen field but it is not working while using the below method. could you please help me to extract timestamp value from eventlastseen field.

sample event:

[
{
"schemaVersion": "2.0",
"accountId": "893386011857",
"region": "us-east-2",
"partition": "aws",
"id": "42b1b691434e33399b13f013f9740757",
"arn": "arn:aws:guardduty:us-east-2:893386011857:detector/a8b16945bc4a8767dcac8d7edbf84e03/finding/42b1b691434e33399b13f013f9740757",
"type": "Recon:EC2/PortProbeUnprotectedPort",
"resource": {
"resourceType": "Instance",
"instanceDetails": {
"instanceId": "i-048dfd648094a1fdc",
"instanceType": "t2.micro",
"launchTime": "2018-05-17T07:06:43Z",
"platform": "windows",
"productCodes": [],
"iamInstanceProfile": null,
"networkInterfaces": [
{
"ipv6Addresses": [],
"networkInterfaceId": "eni-0b1a9d3e70ae5c43b",
"privateDnsName": "ip-172-31-22-179.us-east-2.compute.internal",
"privateIpAddress": "172.31.22.179",
"privateIpAddresses": [
{
"privateDnsName": "ip-172-31-22-179.us-east-2.compute.internal",
"privateIpAddress": "172.31.22.179"
}
],
"subnetId": "subnet-2076a65a",
"vpcId": "vpc-1d741675",
"securityGroups": [
{
"groupName": "launch-wizard-2",
"groupId": "sg-007141e05a28f56e8"
}
],
"publicDnsName": "ec2-18-191-78-236.us-east-2.compute.amazonaws.com",
"publicIp": "18.191.78.236"
}
],
"tags": [],
"instanceState": "running",
"availabilityZone": "us-east-2b",
"imageId": "ami-fd0f3298",
"imageDescription": "Microsoft Windows Server 2016 with Desktop Experience Locale English AMI provided by Amazon"
}
},
"service": {
"serviceName": "guardduty",
"detectorId": "a8b16945bc4a8767dcac8d7edbf84e03",
"action": {
"actionType": "PORT_PROBE",
"portProbeAction": {
"portProbeDetails": [
{
"localPortDetails": {
"port": 3389,
"portName": "RDP"
},
"remoteIpDetails": {
"ipAddressV4": "103.89.91.215",
"organization": {
"asn": "135905",
"asnOrg": "VIETNAM POSTS AND TELECOMMUNICATIONS GROUP",
"isp": "Vietnam Posts And Telecommunications Group",
"org": "Vietnam Posts And Telecommunications Group"
},
"country": {
"countryName": "Vietnam"
},
"city": {
"cityName": "Hanoi"
},
"geoLocation": {
"lat": 21.0333,
"lon": 105.85
}
}
}
],
"blocked": false
}
},
"resourceRole": "TARGET",
"additionalInfo": {
"threatName": "Scanner",
"threatListName": "ProofPoint"
},
"eventFirstSeen": "2018-05-17T08:02:12Z",
"eventLastSeen": "2018-05-17T08:55:47Z",
"archived": false,
"count": 2
},
"severity": 2,
"createdAt": "2018-05-17T08:06:09.308Z",
"updatedAt": "2018-05-17T09:06:09.505Z",
"title": "Unprotected port on EC2 instance i-048dfd648094a1fdc is being probed.",
"description": "EC2 instance has an unprotected port which is being probed by a known malicious host."
}
]

props.conf

TIME_PREFIX="eventLastSeen":\s"
TIME_FORMAT=%Y-%m-%dT%H:%M:%SZ
MAX_TIMESTAMP_LOOKAHEAD=20

Tags (1)
0 Karma

adonio
Ultra Champion

hello there,

seems like a nice JSON format event you got there.
why not use the oootb configurations for it from splunk?
try this in props.conf (on your first full splunk instance, HF or Indexer) rename the stanza as you wish

[ CHANGE_ME_json ]
CHARSET=AUTO
INDEXED_EXTRACTIONS=json
KV_MODE=none
SHOULD_LINEMERGE=true
category=Structured
description=JavaScript Object Notation format. For more information, visit http://json.org/
disabled=false
pulldown_type=true
TIME_FORMAT=%Y-%m-%dT%H:%M:%SZ
TIMESTAMP_FIELDS=service.eventLastSeen

hope it helps

0 Karma

lksridhar
Explorer

Thanks adonio for your input, i have tried above method it is not working and still it is not extract the value from eventlastseen field.

[ aws:kiness ]
CHARSET=AUTO
INDEXED_EXTRACTIONS=json
KV_MODE=none
SHOULD_LINEMERGE=true
category=Structured
description=JavaScript Object Notation format. For more information, visit http://json.org/
disabled=false
pulldown_type=true
TIME_FORMAT=%Y-%m-%dT%H:%M:%SZ
TIMESTAMP_FIELDS=service.eventLastSeen

0 Karma

lksridhar
Explorer

Folks,

Could you please check above post and let me know your thought as still it is not resolved.

0 Karma

adonio
Ultra Champion

where did you place the props.conf
it works nice on my single instance lab
are you using the app for AWS?

0 Karma

lksridhar
Explorer

i have configured the props.conf in HF, also we are using the AWS app.

0 Karma

adonio
Ultra Champion

not sure, this props.conf works well for me.
try to remove the spaces in your [ aws:kiness ]
so it will look like that: [aws:kiness]
also, double check there is no conflict props in your aws app / ta

0 Karma

lksridhar
Explorer

i have checked and found that the aws kiness input configuration is created in aws_kinesis_task.conf in TA.

look like it is not communicating with props.conf to extract the time_prefix and other index time opertation

is there any separate file do we need to use to do index operation for aws:kinesis sourcetype.

0 Karma

ameyap16
Engager

Did you find a solution to this issue?

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...