Activity Feed
- Got Karma for Re: Can someone help me understand this event from Splunk ES ?. 06-05-2020 12:50 AM
- Karma Re: Using certificate-based auth for a TAXII Threat Intel download? for AGLbwa. 06-05-2020 12:49 AM
- Got Karma for Re: Splunk ES tutorials and sample data dump. 06-05-2020 12:49 AM
- Got Karma for Re: Using Inputlookup to Eliminate Search Results. 06-05-2020 12:49 AM
- Got Karma for Re: Using Inputlookup to Eliminate Search Results. 06-05-2020 12:49 AM
- Karma Re: Enterprise Security v4.1.3 Setup on Splunk 6.5.0 for jwelch_splunk. 06-05-2020 12:48 AM
- Got Karma for Re: Creating new notable events based on new inputs via Enterprise Security's correlation engine. 06-05-2020 12:48 AM
- Got Karma for Re: Creating new notable events based on new inputs via Enterprise Security's correlation engine. 06-05-2020 12:48 AM
- Got Karma for Re: Creating new notable events based on new inputs via Enterprise Security's correlation engine. 06-05-2020 12:48 AM
- Got Karma for Re: Log DNS Responses from BIND 9.10 for use with Enterprise Security. 06-05-2020 12:48 AM
- Got Karma for Re: What are the pain points with deploying your Splunk architecture on Windows OS?. 06-05-2020 12:48 AM
- Got Karma for Re: Splunk Enterprise Security: Is it possible to embed an Adaptive Response hyperlink into the Notable Event Next Steps?. 06-05-2020 12:48 AM
- Got Karma for Multi-Site Cluster: What would I configure for replication and search factor with 1 peer at each site?. 06-05-2020 12:47 AM
- Karma Re: Splunk field-extraction strangeness. for Ayn. 06-05-2020 12:46 AM
- Karma Re: Splunk Enterprise Security & Transit Heavy-Forwarder for gkanapathy. 06-05-2020 12:46 AM
- Karma Re: XML column header and delimited events for alacercogitatus. 06-05-2020 12:46 AM
- Karma Re: Best practice with TAs in distributed environment. for jcoates_splunk. 06-05-2020 12:46 AM
- Got Karma for Re: Saved searches on multiple indexers. 06-05-2020 12:46 AM
- Got Karma for Re: Splunk Cisco Firewalls vs. Add-on for Cisco ASA. 06-05-2020 12:46 AM
- Got Karma for Re: Specific Objectives for using Splunk in Datacenter environment. 06-05-2020 12:46 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
1 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
05-29-2019
09:50 PM
Awesome, this will help many people. Thanks!
Chris.
... View more
05-27-2019
07:04 PM
Try the fix for SOLNESS-18773
https://docs.splunk.com/Documentation/ES/5.3.0/RN/KnownIssues
Assuming it's ES on Windows. If that doesn't fix it, suggest contacting support (and advising the fix here too would be nice) 🙂
Cheers,
Chris.
... View more
04-26-2019
05:03 PM
And for assertHaveCommand() the following needs to be updated (line 47 of bin/common.sh from Splunk_TA_nix 6.0.2):
# # # /sbin/ is often absent in non-root users' PATH, and we want it for ifconfig(8)
PATH=$PATH:/sbin/
Ubuntu needs this, or it wont be able to find the "service" command when Splunk is running as non-root (splunk).
# # # Append path to help find commands when running as non-root, as the non-root paths are different
PATH=$PATH:/sbin/:/usr/sbin/
It's called from bin/rlog.sh as follows:
assertHaveCommand service
Cheers,
Chris.
... View more
04-25-2019
08:15 PM
An update on this after a little digging..
In Splunk_TA_nix 6.0.2, It looks like the rlog.sh script is intended to run as root (the implication is Splunk runs as root), per the following check in common.sh:
assertInvokerIsSuperuser ()
{
[ `id -u` -eq 0 ] && return
echo "Must be superuser to run this script, quitting" > $TEE_DEST
exit 1
}
If you enable debugging on rlog.sh (looks like it throws away this important output to /dev/null inside $TEE_DEST unless you have debug enabled):
sudo su - splunk
$SPLUNK_HOME/bin/splunk cmd $SPLUNK_HOME/etc/apps/Splunk_TA_nix/bin/rlog.sh --debug
You'll notice a debug file named debug--rlog.sh-- in the cwd which (unsurprisingly) says:
Must be superuser to run this script, quitting
Per the logic in assertInvokerIsSuperuser()
From an ES point-of-view, this is sub-optimal not only from a security standpoint (running Splunk as root), but the TA is of course designed to work from sourcetype=auditd keyed from the rlog.sh input, so it's not adding the value it could.
It's designed this way (i'd guess) because /var/log/audit/audit.log by way of ausearch is out-of-the-box only visible by root (without changes), but with proper unix/posix permissions setup, Splunk running as splunk, can ingest the file via ausearch, rlog.sh, etc.
It's debatable whether it's a security risk allowing a non-root user to read the audit.log file, but if you can't bring it up into Splunk to keep eyes on it, it's a relatively small risk to accept.
Anyway, just wanted to get to the bottom of why that was happening.. 🙂
PS: There's also a bug in assertHaveCommand() (at least on Ubuntu) i had to also work-around after assertInvokerIsSuperuser() to get it to work but i haven't yet found the root-cause for that, just a work-around, but looking into it..
Cheers,
Chris.
... View more
04-24-2019
06:38 AM
1 Karma
The supplied Mandiant IOCs do false-positive a lot.
Looks like you got a match on the file-name (threat_match_field=file_name, with a file-name of setup.exe per threat_match_value="Setup.exe"), would be my guess.
You can test it by passing different Setup.exe's (maybe text-files? :)) via the Sourcefire's with different hashes to test the theory 🙂
Chris.
... View more
07-30-2018
04:04 PM
Correlation searches are just searches at the end of the day, running on a schedule.
You could do a search like..
index=_internal sourcetype=scheduler savedsearch_name=part_match
Look for a successful run and there should be an evcount (event count) field with a value of 0 or more if it returned any result (depends on your search if no events returned is normal or not).
Also important is the 'status' field which says if it ran, was delegated, deferred, or skipped by Splunks scheduler.
Please forgive any minor inaccuracies of fields, I'm not in front of a PC at the moment 🙂
Cheers.
... View more
06-12-2018
05:19 AM
1 Karma
Absolutely - try out the Event Generator app.
https://splunkbase.splunk.com/app/1924/
It should generate some data to light up ES to learn on it.
Also, check out the BOTS (Boss of the SOC) v1 competition dataset, as well.
https://github.com/splunk/botsv1
Cheers.
... View more
05-14-2018
08:12 AM
Your app (directory) name probably doesn't follow the convention ES allows via it's app-imports, so ES (specifically) is not importing your app, but it works in other apps.
See the docs:
https://docs.splunk.com/Documentation/ES/5.0.0/Install/ImportCustomApps
Cheers.
... View more
03-29-2018
02:22 PM
George is exactly correct.
@a212830 per George's answer, if you do go the SHC route (as someone who has setup one or two :)), ES works well in a SHC.
Another reason you might consider a SHC, is if HA is absolutely necessary.
SHC has more moving parts is the basic fact, and everything that comes with having more moving parts, applies here as well.
It's just different that way, but if it's required, it does work, and works pretty well 🙂
Cheers!
... View more
03-24-2018
12:57 AM
2 Karma
Try 'search' instead of 'where' since where is an eval operator. (haven't tested it, just a suggestion) 🙂
... View more
02-22-2018
09:15 PM
Depending on authentication load, and given this is a DC, this could be normal, it depends.
You could try selecting this link from your notable-event (which you might have already). Ensure your assets.csv correctly reflects reality, with both IPs and DNS/Hostnames, should make your ES experience better.
Otherwise you could remove "| search src="companydomain.com" from the search and look at everything that is failing authentication to deduce what's happening.
Cheers.
... View more
01-19-2018
05:33 PM
1 Karma
In the lab i used what i had handy, and had a Windows DS push the Splunk Nix Add-on to an OSX machine.
After the app deployed, and wondering why i wasn't getting data from inputs that were turned on, i found the scripted-inputs weren't set to +x and couldn't be executed.
A chmod +x *.sh in the app's bin directory got things going again, but that wasn't nice..
I suspect it's because Windows doesn't grok UNIX permissions and just deployed them as regular files.
... View more
04-26-2017
04:38 PM
Im sure you have a specific use-case in mind but have you seen the "Risk Activity" dashboard in ES?
Repeat offenders tally up a score so they bubble up to the top when the risk is high enough from the total score.
The risk score is also dotted throughout ES making it easy to see.
Just in case you havent come across it is all.
Cheers.
... View more
04-14-2017
07:50 PM
1 Karma
Not sure if it's possible (from a quick read around anyway).
You could try a different approach and use Splunk Stream, which can also run on your BIND server.
https://splunkbase.splunk.com/app/1809/
It will capture request and response codes, and you can specifically pick fields you want.
Stream also has 'config templates' for ES to populate all the ES dashboards.
Cheers.
... View more
04-14-2017
07:26 PM
You will need the ISC BIND Add-On, and specific documentation here:
http://docs.splunk.com/Documentation/AddOns/released/ISCBIND/Setup2
Cheers.
... View more
03-27-2017
02:53 PM
1 Karma
One way to achieve your goal is to maybe have your "next steps" link implemented as a workflow action?
Cheers.
... View more
03-17-2017
03:08 PM
No problem. Think of CIMing as preparing the data for ES to process correctly, then you can use either the built-in, or write your own correlation-searches, to apply the security logic you want.
CIMing is done in the app or TA. When you look for apps on Splunkbase (eg for Bro, Bit9, etc) look on the right column, and it'll list if it's CIM-compliant (and usually a CIM version, eg 4.7, etc..)
If it's not CIM compliant it wont work out of the box with ES until it's CIMed. Of course, it'll work with vanilla Splunk, but ES expects CIM'ed data.
Then to change your security logic, you can create your own correlation-searches to look for different security threats, or adjust the supplied ones. Remember, correlation-searches are just searches at heart.
Also you can adjust the workflow also in ES to suit your runbooks.
Some useful links..
http://docs.splunk.com/Documentation/CIM/4.7.0/User/UsetheCIMtonormalizedataatsearchtime
http://docs.splunk.com/Documentation/ES/4.6.0/Tutorials/CorrelationSearch
Cheers.
... View more
03-16-2017
04:15 AM
3 Karma
Hey Tyrone,
Logs that have sourcetype's applied, if their to be used with ES, would adhere to Splunk's CIM (Common Information Model).
As part of the CIM, tags will be added to the logs, that direct which part of ES (datamodels really) the logs apply to (eg, Endpoint, Network, etc..)
In theory, you can keep adding new sources of data, as long as your using CIM-compliant app's or TA's, ES should be making use of the data (if it's security relevant data that is..)
You can alway adjust the configs yourself, or even write your own TA or app, so ES processes the data as you prefer.
Or you could simply write your own correlation-searches, to process pre-CIM'ed data the way you want.
Hope it helps..
Cheers.
... View more
02-07-2017
04:34 PM
As long as your forwarding your indexes to the indexers, ensure your indexer hardware specs meet (preferably exceed) the spec defined in the ES docs.
The datamodel acceleration happens on the indexers, so check those. Sounds like your SH is ok.
http://docs.splunk.com/Documentation/ES/latest/Install/DeploymentPlanning#Indexer_scaling_considerations_for_Splunk_Enterprise_Security
Cheers.
... View more
12-06-2016
08:51 PM
I don't have ES in front of me, but i believe the "Brute Force Access" (words to that effect) correlation-search looks for "try/fail, try/fail, try/succeed" (within 1 day if memory serves, but could be wrong..) no matter if it's Windows or anything else, and it's also built into ES.
ES does it via tags and CIM knowledge provided in the apps/TA's.
Hope it helps.
... View more
11-04-2016
12:51 PM
Hi all,
Upgraded to Splunk 6.5.0 a little while ago (on a test system) and noticed the Splunk App for Stream 6.6.2 stopped working and on it's app page doesn't yet list Splunk Enterprise 6.5.0 as a supported platform.
Not a huge problem for me, but i was wondering when the new Stream app that supports 6.5.0 will be hitting the app-store?
Thanks!
... View more
- Tags:
- 6.5.0
- Splunk Stream
10-16-2016
03:14 AM
This also occurred from the ES 4.1.3 -> 4.5.0. The same fix resolved that issue as well.
Not sure of the root-cause, it would be nice to be able to go through the setup.
... View more
10-11-2016
04:28 AM
Hi jwelch,
Awesome, thanks that got me back in. 🙂
Cheers.
... View more
10-08-2016
12:07 AM
Hi,
On a test system, i am having trouble upgrading ES from v4.1.2 on Splunk 6.5.0 to v4.1.3.
After installing the app, selecting Apps -> Enterprise-Security, selecting the green button to start the ES setup, am greeted with a blank screen (grey screen, and has the black navbar at the top).
The upgrade path went as follows..
Upgraded Splunk 6.4.2 -> 6.5.0
Upgraded ES to v4.1.2 (worked fine)
Upgraded ES to v4.1.3 (current problem)
Any thoughts?
Thanks.
... View more
09-27-2016
04:59 AM
Hi Vikas,
Sure, the Splunk EventGen (Event Generator) app https://splunkbase.splunk.com/app/1924/ can generate logs to light up ES dashboards.
Not sure if it'll work with Splunk Cloud (not sure if you have ES on-prem or in Splunk Cloud), but EventGen is the app to generate dummy logs to allow you to explore ES.
Hope it helps!
... View more