Splunk Enterprise Security

Automatic Adaptive response action based on correlation search

ramesh_babu71
Path Finder

Hello,

I'm trying out a Adaptive response action of VirusTotal which i created by following this site http://dev.splunk.com/view/addon-builder/SP-CAAAFBQ.

The following screnarios are working

  1. Running the Adaptive response on ad-hoc mode where in I have to provide a complete url (like http://www.google.com)as parameter.
  2. Running the Adaptive response from correlation search using Adaptive Response Actions where in I provide a complete url (like http://www.google.com) as parameter.

However on the same correlation search If I try to pass on the parameter as $url$ it fails to execute and I get failure under Notable events details.

The correlation search query is basic one which reads data from a lookup table which contains only one column called url. It returns the URL

Correlation Search query

| inputlookup demoARdata | where isnotnull(url)

Adaptive response action
alt text

Error Message in log file VirusTotal_modalert.log
2017-11-27 19:16:38,641 INFO pid=16371 tid=MainThread file=setup_util.py:log_info:114 | Log level is not set, use default INFO
2017-11-27 19:16:38,642 ERROR pid=16371 tid=MainThread file=cim_actions.py:message:271 | sendmodaction - signature="url is a mandatory parameter, but its value is None." action_name="VirusTotal" search_name="Threat - Splunk alert $url$ - Rule" sid="scheduler_adminSplunkEnterpriseSecuritySuite_RMD5839fb9bced15ebfc_at_1511790360_253" rid="0" app="SplunkEnterpriseSecuritySuite" user="admin" action_mode="saved" action_status="failure"

Not sure where I went wrong? 😞

0 Karma

ramesh_babu71
Path Finder

Thanks. It worked 🙂

0 Karma

ramesh_babu71
Path Finder

Thanks It worked 🙂

0 Karma

starcher
Influencer

You can try $result.url$

However though this will work for an event, it is not the most correct way. Inside your code, you should pull and loop through all urls for all events sent into the AR in case it is somehow used on multiple events. So really you don't want to pass url at all. You want to just pull it from each event sent to the AR and execute per result.

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...