Activity Feed
- Got Karma for Unable to delete search events. 02-07-2022 06:36 AM
- Karma Re: Monitoring a wireshark file using Splunk for MuS. 06-05-2020 12:46 AM
- Karma Re: Monitoring a wireshark file using Splunk for MuS. 06-05-2020 12:46 AM
- Karma Re: Monitoring a wireshark file using Splunk for MuS. 06-05-2020 12:46 AM
- Karma Re: Monitoring a wireshark file using Splunk for MuS. 06-05-2020 12:46 AM
- Got Karma for Splunk REST API. 06-05-2020 12:46 AM
- Got Karma for Editing props.conf & transforms.conf configuration file. 06-05-2020 12:46 AM
- Got Karma for Editing props.conf & transforms.conf configuration file. 06-05-2020 12:46 AM
- Got Karma for Editing props.conf & transforms.conf configuration file. 06-05-2020 12:46 AM
- Got Karma for Unable to delete search events. 06-05-2020 12:46 AM
- Got Karma for Unable to delete search events. 06-05-2020 12:46 AM
- Got Karma for Unable to delete search events. 06-05-2020 12:46 AM
- Got Karma for Unable to delete search events. 06-05-2020 12:46 AM
- Got Karma for Accessing Splunk Resources for a remote splunk server. REST. 06-05-2020 12:46 AM
- Got Karma for Java Splunk REST SDK missing class??. 06-05-2020 12:46 AM
- Got Karma for Getting to the create alert dialog box.. 06-05-2020 12:46 AM
- Got Karma for Creating a particular custom condition for creating alerts that monitor matching results in real time within a rolling window. 06-05-2020 12:46 AM
- Got Karma for Getting logs out of txt files converted from wireshark captures pcap file. 06-05-2020 12:46 AM
- Got Karma for Monitoring a wireshark file using Splunk. 06-05-2020 12:46 AM
- Got Karma for Re: Setting up input for file monitoring. 06-05-2020 12:46 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
1 | |||
1 | |||
0 | |||
0 | |||
0 | |||
1 | |||
0 | |||
0 |
05-23-2012
10:12 PM
This search only searches for a set of log messages that contains TCP protocol, info field value that contains syn, the same dest field value and eventcount >= 20 (for 20 consecutive log messages). How do i change this search expression that includes checking if any messages that contains log messages that contains TCP protocol, same dest field and info field value contains FIN and ACK such that splunk produce the same result.
protocol="TCP" |where match(info, "SYN") |transaction dest |search eventcount>=20
... View more
- Tags:
- search
05-22-2012
01:50 AM
okay. I understand
... View more
05-22-2012
01:25 AM
I also need another citeria, the src field values and the dest field values are the same for the two log messages. How to combine the two citerias to the search expression that you stated above?
... View more
05-20-2012
08:19 PM
Lets say I have Splunk that monitors a log file that contains two log messages that look like this :
Tue Mar 06 07:41:28 SGT 2012 no = 8 time = 30.614993 src = 10.1.1.1 dest = 129.111.30.27 protocol = IPv4 length = 70 info = "Fragmented IP protocol (proto=UDP 0x11, off=0, ID=00f2) "
Tue Mar 06 07:41:29 SGT 2012 no = 9 time = 30.615348 src = 10.1.1.1 dest = 129.111.30.27 protocol = UDP length = 38 info = "Source port: 31915 Destination port: 20197 [BAD UDP LENGTH 36 > IP PAYLOAD LENGTH] "
I would like to have the ALERT triggered in real time whenever Splunk detects these two messages that contains the same src field value same dest field value and info that contains this value "Fragmented IP protocol (proto=UDP 0x11, off=0, ID=00f2)" and info that contains "Source port: 31915 Destination port: 20197 [BAD UDP LENGTH 36 > IP PAYLOAD LENGTH] "
What would be the custom condition ?
... View more
04-27-2012
12:28 AM
i asked again because i thought my question wasn't clear enough.
... View more
04-27-2012
12:06 AM
Sorry, i beg your pardon. What i mean is I would like this kind of alert to be triggered whenever the CONSECUTIVE log events contains the protocol = TCP AND the same dest field values AND the info field contains the word "SYN" eg. trigger the alert whenever the above conditions(in bold) i mentioned appear more than 20 times. Is it going to be the same search stmt? or replace | with &&?? I just need to clarify.
... View more
04-26-2012
05:34 PM
Thanks for the answer.
... View more
04-26-2012
05:34 PM
I wasn't present when you replied to my question. so now that i'm online i can mark your answer. I'm quite sorry to have kept you waiting.
... View more
04-26-2012
01:35 AM
1 Karma
I would like to know where do i get to this create alert dialog box shown below. I got click the create button on search app then click alert.., i do not see the tabs save search, set up alert and define actions.
... View more
- Tags:
- alerts
04-26-2012
01:18 AM
1 Karma
Lets say i have a set of log events like this in the search app of splunk:
Thu Apr 26 09:39:22 SGT 2012 INFO no = 1 time = 0.000000 src = 164.124.33.78 dest = 192.168.0.1 protocol = TCP length = 54 info = "35165 > 80 [SYN] Seq=0 Win=16384 Len=0 "
Thu Apr 26 09:39:22 SGT 2012 INFO no = 2 time = 0.000001 src = 38.198.26.9 dest = 192.168.0.1 protocol = TCP length = 54 info = "14378 > 80 [SYN] Seq=0 Win=16384 Len=0 "
Thu Apr 26 09:39:22 SGT 2012 INFO no = 3 time = 0.000003 src = 132.212.36.201 dest = 192.168.0.1 protocol = TCP length = 54 info = "31944 > 80 [SYN] Seq=0 Win=16384 Len=0 "
I clicked the create button > alert . Then i chose "monitor in real time over a rolling window of.." the under tigger if i select "custom condition is set" fom the drop down menu. I would like to create the alert that would be triggered when the custom condition is set.
I would like this kind of alert to be triggered whenever the CONSECUTIVE log events contains the protocol = TCP, the same dest field values and the info field contains the word "SYN" eg. trigger the alert whenever the above conditions(in bold) i mentioned appear more than 20 times.
The question is how do i create the custom condition so that the custom condition would statisfy the above conditions(in bold) i mentioned.
... View more
04-25-2012
02:04 AM
I monitored a log file located in my local PC using Splunk. I created the alert that that monitor matching results in real time within a rolling window. In the splunk search app, i click create>alerts. I followed the steps to create that kind of alert in the splunk's documentation. I created the alerts in the alert manager. After creating, i went to the Manager>Searches and reports>SYN-Flood Alert(The name of the alert) to change the Splunk's search command so that the search command would match whenever the log data matches the search then the alert will be triggered. However, i do not see the alerts triggered immediately after i created the alert and modified the search command for that particular alert. Why is this so? Is there any way that i can make sure the alert is triggered in the alert manager?
... View more
- Tags:
- alerts
04-23-2012
06:50 AM
I would like to use Splunk to detect Denial of Service log anomaly. I used Wireshark as a source to get log data. i'm new to denial of service attack and i would want to clarify.
First Question : Is Denial of Service considered an Intrusion?
If Yes,
Second Question : so if Denial of Service is a form of intrusion, that means i have to use TCPDUMP to get log data since it is a intrusion detection system and not wireshark cos wireshark is not exactly an intrusion detection system? Is that right?
If Yes,
Third Question : The log data that i would like to create would come from the packet data gotten from the intrusion detection system. Am i right to say that these log data in Splunk should contain fields based on the Common Information Model such as signature,dvc,category,severity,src,dest,user,vendor,product,ids_type under the Intrusion Detection category? Is that right?
so all these information i can get from the data that comes from the intrusion detection system right?
... View more
04-22-2012
06:41 PM
What is a feature about tcpdump that makes it suitable for detecting Denial of Service attacks?
... View more
04-20-2012
12:04 AM
What does the action field for the network protection/traffic represent? Does it represent the action of the packet??
... View more
04-19-2012
11:41 PM
Lets say if i want to monitor the traffic of the network as in detecting Denial of service attacks, the log message should contain the fields under the network protection category of the Common Information Model. Is that true?
... View more
04-19-2012
07:24 PM
I would like to create log messages that would be used for log analysis using Splunk such as checking for occurence of Denial of Service attacks. What would be the best logging practices for that as in what are the most important information that i should be displaying in the log messages???
... View more
04-18-2012
05:15 AM
Okay. Understood.
... View more
04-18-2012
02:19 AM
1 Karma
Based on the question asked on http://splunk-base.splunk.com/answers/2922/splunk-monitoring-a-wireshark-file
Jerrad showed a sample log output. So the log output is shown in Splunk search app whenever you search for this sample log data? So how did Jerrad manage to output the sample log :
Mar 25, 2011 03:12:25.154535000 0x0c038f47 0x1496242c 11.11.11.11 128 0x584f9ea0 10.10.10.10 00:00:00:00:00:00 00:00:00:00:00:00
from the wireshark pcap txt file? as in GETTING LOGS OUT from the wireshark capture file in txt file? Does anyone have any idea??
So just to ask. That means,To get the logs form wireshark pcap txt file, set the capture settings in the first place and what you choose to save,create field extractions in props.conf and transforms.conf ?? is it?? Is that the way do do it? Overall i would like to know the whole process of doing this cos i still don't understand the answers given for the question : http://splunk-base.splunk.com/answers/2922/splunk-monitoring-a-wireshark-file
... View more
04-17-2012
10:25 PM
Lets say i have already converted a wireshark pcap file to a windows text file, so do i need to "format" the data from the wireshark txt file to log data if i want to monitor the wireshark text data using Splunk??? I went to the Splunk manager > data inputs > Add data > Files and Directories > Data Preview > Add New. Under Add new section i selected "Continuously index data from a file or directory this Splunk instance can access" then i entered the path of the wireshark windows txt file and i saved the settings.
After that i went to the Splunk's search app to view the logs.
The logs appeared too strange for me :
2:36:17.000 PM
Frame 1: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
host=TokJunXin-PC Options| sourcetype=logcapture Options| source=C:UsersTok Jun XinDesktoplogcapture.txt Options
2 » 2/2/10
10:40:36.412 PM
Arrival Time: Feb 2, 2010 22:40:36.412684000 Malay Peninsula Standard Time
host=TokJunXin-PC Options| sourcetype=logcapture Options| source=C:UsersTok Jun XinDesktoplogcapture.txt Options
3 » 2/2/10
10:40:36.412 PM
Arrival Time: Feb 2, 2010 22:40:36.412682000 Malay Peninsula Standard Time
host=TokJunXin-PC Options| sourcetype=logcapture Options| source=C:UsersTok Jun XinDesktoplogcapture.txt Options
4 » 2/2/10
10:40:36.412 PM
Arrival Time: Feb 2, 2010 22:40:36.412681000 Malay Peninsula Standard Time
host=TokJunXin-PC Options| sourcetype=logcapture Options| source=C:UsersTok Jun XinDesktoplogcapture.txt Options
Then some look like this :
41 » 2/2/10
10:40:36.411 PM
Arrival Time: Feb 2, 2010 22:40:36.411832000 Malay Peninsula Standard Time
host=TokJunXin-PC Options| sourcetype=logcapture Options| source=C:UsersTok Jun XinDesktoplogcapture.txt Options
42 » 2/2/10
10:40:36.000 PM
Epoch Time: 1265121636.412684000 seconds
[Time delta from previous captured frame: 0.000002000 seconds]
[Time delta from previous displayed frame: 0.000002000 seconds]
[Time since reference or first frame: 0.000852000 seconds]
Frame Number: 40
Frame Length: 54 bytes (432 bits)
Capture Length: 54 bytes (432 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ip:tcp]
Show all 66 lines
host=TokJunXin-PC Options| sourcetype=logcapture Options| source=C:UsersTok Jun XinDesktoplogcapture.txt Options
43 » 2/2/10
10:40:36.000 PM
Epoch Time: 1265121636.412682000 seconds
[Time delta from previous captured frame: 0.000001000 seconds]
[Time delta from previous displayed frame: 0.000001000 seconds]
[Time since reference or first frame: 0.000850000 seconds]
Frame Number: 39
Frame Length: 54 bytes (432 bits)
Capture Length: 54 bytes (432 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ip:tcp]
Show all 67 lines
Every raw data for each log event shown for the wireshark txt file source doesn't seem right to me. I would like to know if there is any way to display the wireshark capture data in the windows txt file as log events correctly as in getting logs out of Wireshark pcap files????
... View more
04-17-2012
02:37 AM
Is this the question you are referring to? : I had a sample Wireshark capture data file as txt file that contains an Ocurrence of SYN Flood. I would like Splunk to monitor that file only without any real time monitoring for a time being then i will switch to real time monitoring. The capture file as well as the Splunk is located in the same local PC.
... View more
04-17-2012
02:28 AM
So even if i use wireshark which you claim isn't the best tool, it is still possible to monitor its capture files but not a good tool thats all. I just want to be able to monitor wiresharks capture files as txt files using Splunk that all for time being and now.
... View more
04-17-2012
02:25 AM
Obviously I am the one asking the question. so Snort is the best tool ?? Snort run as a command line is it??
... View more