Security

Optiv Threat Intel fields

zigity12
Engager

Hello friends.

I've recently installed optiv threat intel on my splunk indexer on my home network - trying to make it use logs from my DNS (Pihole).

I currently just get this: alt text

Here's an example of a log entry in how I have the fields defined.

alt text

I'm trying to ascertain if I've set it up incorrectly, or if I just don't have any malicious activity on my network and "no news is good news."

I'm relatively new to splunk - but I can run searches for top and rare for the dest_ip field - so I at least think I have the fields setup correctly. Any light someone could cast on this would be much appreciated.

Tags (1)
0 Karma
1 Solution

derekarnold
Communicator

App author here,
You need to install the companion app, Optiv_TA_threat. See the included Readme pdf for detailed instructions. Post here if you get stuck. The companion app is the one that actually pulls the feeds from the internets.

View solution in original post

derekarnold
Communicator

App author here,
You need to install the companion app, Optiv_TA_threat. See the included Readme pdf for detailed instructions. Post here if you get stuck. The companion app is the one that actually pulls the feeds from the internets.

zigity12
Engager

Thanks so much for your reply.

I got the add on app installed - I didn't realize it was required, missed that in the readme.

I'm still sitting on "no results found" - the heart of my question I guess is, is "no results found" code for "it's not working" or is it code for "there's no malicious traffic" (or both?)

Thanks so much for your time.

0 Karma

derekarnold
Communicator

The app pulls the threat feeds down 4x per day. has the app been running that long? also check the troubleshooting tab

0 Karma

zigity12
Engager

That must have been it! The splash page is populating with data now. Thanks so much Derek!

One last question if you have the time - alt text

The large dashes above each section are where an alert would be displayed if an ip or domain shows up in my DNS logs, right?

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

What Is Splunk? Here’s What You Can Do with Splunk

Hey Splunk Community, we know you know Splunk. You likely leverage its unparalleled ability to ingest, index, ...

Level Up Your .conf25: Splunk Arcade Comes to Boston

With .conf25 right around the corner in Boston, there’s a lot to look forward to — inspiring keynotes, ...

Manual Instrumentation with Splunk Observability Cloud: How to Instrument Frontend ...

Although it might seem daunting, as we’ve seen in this series, manual instrumentation can be straightforward ...