Activity Feed
- Posted Re: Assign custom urgency to notables on Getting Data In. 02-10-2025 02:18 AM
- Posted Assign custom urgency to notables on Getting Data In. 02-09-2025 09:37 PM
- Posted Re: Extracting fields from XML on Deployment Architecture. 02-03-2025 04:03 AM
- Posted Extracting fields from XML on Deployment Architecture. 02-03-2025 03:52 AM
- Tagged Extracting fields from XML on Deployment Architecture. 02-03-2025 03:52 AM
- Karma Re: Adding existing standalone search heads to a cluster for gcusello. 01-28-2025 01:25 AM
- Posted Re: Adding existing standalone search heads to a cluster on Deployment Architecture. 01-28-2025 12:59 AM
- Posted Adding existing standalone search heads to a cluster on Deployment Architecture. 01-27-2025 11:07 PM
- Posted Re: Dashboard for employee passing through gates on All Apps and Add-ons. 12-18-2024 05:25 AM
- Posted Dashboard for employee passing through gates on All Apps and Add-ons. 12-18-2024 01:34 AM
- Posted Incident Review kv store /lookup migration on Security. 09-18-2024 12:03 AM
- Posted Re: Splunk Security Essentials Javascript errors on All Apps and Add-ons. 09-10-2024 12:21 AM
- Posted Re: line break to different entries on Getting Data In. 09-09-2024 10:39 PM
- Karma Re: line break to different entries for PickleRick. 09-09-2024 10:38 PM
- Posted Re: line break to different entries on Getting Data In. 09-09-2024 02:42 AM
- Posted Re: line break to different entries on Getting Data In. 09-06-2024 03:06 PM
- Posted line break to different entries on Getting Data In. 09-06-2024 01:24 AM
- Posted Re: trying to read a script out using UF on Getting Data In. 08-12-2024 08:39 AM
- Posted trying to read a script out using UF on Getting Data In. 08-12-2024 05:27 AM
- Posted Can we restore data from one single host? on Monitoring Splunk. 07-05-2023 11:58 PM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
02-10-2025
02:18 AM
Hi @livehybrid Thanks for the response | tstats summariesonly=true values(All_Traffic.dest) as dest dc(All_Traffic.dest) as count from datamodel=Network_Traffic where All_Traffic.dest_port!="443" All_Traffic.dest_port!="80" All_Traffic.src_ip!="*:*" All_Traffic.src_ip!="5.195.243.8" ```cpx PT IP``` by All_Traffic.src_ip All_Traffic.dest_port | rename All_Traffic.src_ip as src All_Traffic.dest_port as dest_port | search NOT [| inputlookup internalip] | where count>=20 | iplocation src | | eval severity="high" this is how one of the usecase looks like and recent notables have the urgency as below when i check index-notable for this alert severity is showing as high
... View more
02-09-2025
09:37 PM
Hi team I have been working on assigning a custom urgency level to all notables triggered through our correlation searches using (ES). Specifically, I aimed to set the severity to "high" by adding eval severity=high in each relevant search. However, despite implementing this change, some of the notables are still being categorized as "medium." Could you please assist with identifying what might be causing this discrepancy and suggest any additional steps required to ensure all triggered notables reflect the intended high urgency level? Thank you for your assistance
... View more
Labels
- Labels:
-
field extraction
02-03-2025
04:03 AM
Hi @livehybrid thanks for quick response . Unfortunately this is not working , I am attaching a screenshot of the same log which might help to understand it better
... View more
02-03-2025
03:52 AM
i have a sample xml which looks like this script_family>Amazon Linux Local Security Checks</script_family> <filename>al2023_ALAS2023-2025-816.nasl</filename> <script_version>1.1</script_version> <script_name>Amazon Linux 2023 : runfinch-finch (ALAS2023-2025-816)</script_name> <script_copyright>This script is Copyright (C) 2025 and is owned by Tenable, Inc. or an Affiliate thereof.</script_copyright> <script_id>214620</script_id> <cves> <cve>CVE-2024-45338</cve> <cve>CVE-2024-51744</cve> </cves> <bids> </bids> <xrefs> </xrefs> <preferences> </preferences> <dependencies> <dependency>ssh_get_info.nasl</dependency> </dependencies> <required_keys> <required_key>Host/local_checks_enabled</required_key> <required_key>Host/AmazonLinux/release</required_key> <required_key>Host/AmazonLinux/rpm-list</required_key> </required_keys> <excluded_keys> </excluded_keys> <required_ports> </required_ports> <required_udp_ports> </required_udp_ports> <attributes> <attribute> <name>exploitability_ease</name> <value>No known exploits are available</value> </attribute> <attribute> <name>cvss3_temporal_vector</name> <value>CVSS:3.0/E:U/RL:O/RC:C</value> </attribute> <attribute> <name>vuln_publication_date</name> <value>2024/11/04</value> </attribute> <attribute> <name>cpe</name> <value>p-cpe:/a:amazon:linux:runfinch-finch cpe:/o:amazon:linux:2023</value> </attribute> <attribute> <name>cvss3_vector</name> <value>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N</value> </attribute i want to extract few fields from search using spath or similar methods field value payer should look somthing like key value exploitability_ease No known exploits are available cvss3_temporal_vector CVSS:3.0/E:U/RL:O/RC:C solution Run 'dnf update runfinch-finch --releasever 2023.6.20250123' to update i tried something similar to this but no luck | spath input=_raw path="attributes.attribute[*].name" output=name | spath input=_raw path="attributes.attribute[*].value" output=value | table name value
... View more
- Tags:
- fields
Labels
- Labels:
-
search head
01-28-2025
12:59 AM
HI @gcusello Thanks for the quick response. Can you guide me to the any official documentation where they explain about ES migration. I assume we have to create a custom app for search,ES and then move all the configs related to the app and then once the ES and cluster is built will copy the configs. Am i on the right track
... View more
01-27-2025
11:07 PM
Hi Team We have a deployment with 3 standalone search heads . One of them have ES running on it. We are planning to introduce a new server as a deployer and make this 3 search head clustered. Question: 1. Is it possible to add these exisitng search heads to a cluster or should we copy all configs then create new search heads and copy the configs to all? If this is the only possibility what are the recommendations and challenges ? Can we take a backup of full /etc/apps and then deploy new search heads-> add to cluster-> replicate /etc/apps. Is this approach? Any heads up will be appreciated
... View more
Labels
- Labels:
-
search head
-
search head clustering
12-18-2024
05:25 AM
Hi @inventsekar thanks for responding I have user gatelogs . my logs look something like this user=john gate=gate1 action="IN" use_id=12345 i am trying to visualise this in such a way that i have a live dashboard which shows me which users are passing through which gate
... View more
12-18-2024
01:34 AM
Hi trying to build a dashboard for user gateaccess, How to visualise this in a live data. I am looking for some inbuilt visuaisations that helps for this, something like a missilemap but for user moving from one gate to other
... View more
Labels
- Labels:
-
dashboard
09-18-2024
12:03 AM
We have two separate splunk instances with ES (standalone not clustered) . Consider it as a HO DR when i try to move to DR instance of splunk and copy /etc/apps , After restarting DR instance all the notables are in new status . Those notables which are closed in HO splunk is also showing as new. What could be the reason? I do know that this is managed as a kv store. If we have to migrate KV store related to this. What are the best practises in this case
... View more
09-10-2024
12:21 AM
Did you manage to solve this
... View more
09-09-2024
10:39 PM
@PickleRick Your comments helped. I was applying this on the UF level and changing to indexers made it work. Thanks
... View more
09-09-2024
02:42 AM
Hi
thanks for the response .
sample logs: (these are coming as a single event as mentioned in screenshot)
zowin.exposed. 3600 in ns ns1.dyna-ns.net.
zowin.exposed. 3600 in ns ns2.dyna-ns.net.
zuckerberg.exposed. 3600 in ns ns1.afternic.com.
zuckerberg.exposed. 3600 in ns ns2.afternic.com.
zwiebeltvde.exposed. 3600 in ns docks13.rzone.de.
zwiebeltvde.exposed. 3600 in ns shades01.rzone.de
I am applying this on UF config . (/etc/system/local/propes.conf
[zone_files]
LINE_BREAKER= ([\r\n]+)
SHOULD_LINEMERGE = false
~
... View more
09-06-2024
03:06 PM
Hi thanks for the response. If i can reindex the data how to apply line breaking settings effficiently to achieve this
... View more
09-06-2024
01:24 AM
I have logs indexed like this. How to break entries based on each lines . i need each line as a seperate entry. I tried to do this via line breaker but didnt succeed. Any method to do it via search after indexing
... View more
Labels
- Labels:
-
indexer
-
universal forwarder
08-12-2024
08:39 AM
Hi @PickleRick thanks for the response i tried something similar to this . I tried to fetch %userprofile% and saved it to a variable and then call the variable as part of another command but it didnt help. Can you give an example
... View more
08-12-2024
05:27 AM
Hi Splunkers The idea is to pull any new file creations on a particular folder inside C:\users\<username>\appdata\local\somefolder i wrote a batch script to pull and index this data. its working but the issue is i cannot define a token for users. eg: In script if i mention the path as C:\users\<user1>\appdata\local the batch script will run as expected an data will be indexed to splunk but if i mention the user1 as %userprofile% or %localappdata% the batch script is not running. How to resolve this
... View more
Labels
- Labels:
-
universal forwarder
07-05-2023
11:58 PM
Hi
Is it possible to restore archive data from one single host
consider we have an index=windows ,we want to restore archive data only for one host
ie;index=windows host=xxx . Is it possible someway?
Thanks in advance
... View more
12-27-2022
02:46 AM
Facing the same issue in splunk security essentials
... View more
10-11-2022
01:47 AM
Hi
I have a lookup which looks like this
no name student rollno
1 john yes 12
2 George no 2345
3 jin yes 111
How can i iterate through this lookup by the 'no' field and display each entry as a result . I only need one result at a time
so when i first run the search the result should be
no name student rollno
1 john yes 12
When i run the same search after a minute the result should be
no name student rollno
2 George no 2345
Please help
... View more
Labels
- Labels:
-
lookup
-
search job inspector
05-03-2021
02:13 AM
Hi Team I want to collect source ip from an alert triggered /search ran and then add that to a .txt file exposed on a separate server.(https://urlofserver/ipfile.txt) What is the best way to achieve this
... View more
Labels
- Labels:
-
alert action
10-30-2016
07:58 AM
Hi
I have an extracted field from regex, ie Time_extract which gives hour. Now I want to get the logs between a period of time, ie time_extract>=10 AND time_extract<23 ..how to go about that?
Current search:
Date_extract="10/29/16" | stats count by severity | where Time_extract>=12 AND Time_extract<23
... View more
08-27-2016
11:53 PM
Can you guide me on checking that?
... View more
08-18-2016
03:38 PM
Hi Team
My Splunk Enterprise Security Incident Review is not loading...It just shows "loading" for a long time. I created a notable event and also tried copying the same code to create a separate incident review button, but no luck...please help
Thanks in advance
... View more