Security

Optiv Threat Intel fields

zigity12
Engager

Hello friends.

I've recently installed optiv threat intel on my splunk indexer on my home network - trying to make it use logs from my DNS (Pihole).

I currently just get this: alt text

Here's an example of a log entry in how I have the fields defined.

alt text

I'm trying to ascertain if I've set it up incorrectly, or if I just don't have any malicious activity on my network and "no news is good news."

I'm relatively new to splunk - but I can run searches for top and rare for the dest_ip field - so I at least think I have the fields setup correctly. Any light someone could cast on this would be much appreciated.

Tags (1)
0 Karma
1 Solution

derekarnold
Communicator

App author here,
You need to install the companion app, Optiv_TA_threat. See the included Readme pdf for detailed instructions. Post here if you get stuck. The companion app is the one that actually pulls the feeds from the internets.

View solution in original post

derekarnold
Communicator

App author here,
You need to install the companion app, Optiv_TA_threat. See the included Readme pdf for detailed instructions. Post here if you get stuck. The companion app is the one that actually pulls the feeds from the internets.

zigity12
Engager

Thanks so much for your reply.

I got the add on app installed - I didn't realize it was required, missed that in the readme.

I'm still sitting on "no results found" - the heart of my question I guess is, is "no results found" code for "it's not working" or is it code for "there's no malicious traffic" (or both?)

Thanks so much for your time.

0 Karma

derekarnold
Communicator

The app pulls the threat feeds down 4x per day. has the app been running that long? also check the troubleshooting tab

0 Karma

zigity12
Engager

That must have been it! The splash page is populating with data now. Thanks so much Derek!

One last question if you have the time - alt text

The large dashes above each section are where an alert would be displayed if an ip or domain shows up in my DNS logs, right?

0 Karma
Get Updates on the Splunk Community!

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...