Activity Feed
- Karma Re: upgrade to 7.2 fails with "ERROR while running mongod-fix-voting-priority migration." for sylim_splunk. 06-05-2020 12:50 AM
- Karma Re: Dedicated Monitoring Console configuration problem - "splunk_server/splunk_server_group do not match any search peer" for zshy_splunk. 06-05-2020 12:50 AM
- Got Karma for Re: Why are the wineventlogs:security indexing in different indexes and sourcetypes from single host.. 06-05-2020 12:50 AM
- Karma Re: splunk kaspersky integration for micahkemp. 06-05-2020 12:49 AM
- Karma Re: How can I create a button switcher? for niketn. 06-05-2020 12:49 AM
- Karma Re: CEF logs parsing for Enterprise Security for dshpritz. 06-05-2020 12:49 AM
- Karma Re: Data Model vs. Datasets - when to use? for mattness. 06-05-2020 12:49 AM
- Karma Re: ES - Completely Inactive Account false positive alerts? for spaceman2_gmx_n. 06-05-2020 12:49 AM
- Karma Re: Can I hide/unhide specific text boxes using a single checkbox? for jeffland. 06-05-2020 12:49 AM
- Got Karma for Several small log files - sourcetype = local-too_small. 06-05-2020 12:49 AM
- Karma Re: How can I show and hide panels based on a checkbox? for jeffland. 06-05-2020 12:48 AM
- Got Karma for Re: Heavy Forwader data route between multiple indexer. 06-05-2020 12:48 AM
- Karma Bind separate IP for Web & Daemon for deyeo. 06-05-2020 12:46 AM
- Posted Splunk Stream: DNS Activity- Query panel empty on All Apps and Add-ons. 02-08-2019 05:11 AM
- Posted Re: How to build: Forcepoint Email Security Add-on on All Apps and Add-ons. 01-24-2019 05:40 AM
- Posted How to build: Forcepoint Email Security Add-on on All Apps and Add-ons. 01-24-2019 01:16 AM
- Posted Re: Why are the wineventlogs:security indexing in different indexes and sourcetypes from single host. on Dashboards & Visualizations. 01-11-2019 08:57 AM
- Posted Re: Windows Security events: XML vs. non-XML format on Dashboards & Visualizations. 01-11-2019 08:49 AM
- Posted Re: Windows Security events: XML vs. non-XML format on Dashboards & Visualizations. 01-04-2019 12:44 AM
- Posted Re: Dedicated Monitoring Console configuration problem - "splunk_server/splunk_server_group do not match any search peer" on Monitoring Splunk. 12-12-2018 07:50 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
02-08-2019
05:11 AM
Hi,
In Splunk Stream app (v7.1.2) there is a panel named Query on the DNS Activity dashboard. For me it is empty, the query its use:
index=* source="stream:Splunk_DNSRequestResponse" | rename count as counts query as Query | eval error=if(reply_code!="NoError", counts, 0) | stats sum(counts) as Counts sum(error) as Errors by Query | sort Counts desc
If I add | spath query to the query its works:
index=* source="stream:Splunk_DNSRequestResponse" | spath query | rename count as counts query as Query | eval error=if(reply_code!="NoError", counts, 0) | stats sum(counts) as Counts sum(error) as Errors by Query | sort Counts desc
Question: can I fix this panel without modifying the query? I don't like to create custom confs in a factory app. Its just makes problems during an upgrade...
Update: I found a similar problem with the "Resolution Integrity" panel, too.
Regards,
István
... View more
- Tags:
- Splunk Stream
01-24-2019
05:40 AM
Hi,
Unfortunately that add-on for Web Security only. Web gateways have a very different (easier) logging style:( .
Regards,
István
... View more
01-24-2019
01:16 AM
Hi there,
Has anybody experience with Forcepoint (Websense) Email gateway log parsing (in order to process them with ES)?
Forcepoint has a docs: https://www.websense.com/content/support/library/email/v85/email_siem/siem_log_map.pdf
Currently, I try to use only "Policy" events to get all the field I needed, but it doesn't look perfect.
So can help somebody who is familiar with Forcepoint help me to build an addon?
Regards,
István
... View more
01-11-2019
08:57 AM
1 Karma
Hi,
If nothing else helps: it's bold but I would try to identify if there are any rouge (forgot/misconfigured/multiple UF on the same server) host with another UF. So try to stop that UF in order to check if there are any rouge UF somewhere with the same hostname.
Regards,
István
... View more
01-11-2019
08:49 AM
Hi,
Yes, please start another post, because it's a separate problem. People can help you easier that way.
(I also try to stop that UF in order to check if there are any rouge UF somewhere with the same hostname.)
Regards,
István
... View more
01-04-2019
12:44 AM
Hi,
I don't think so this is the right post for this question, but anyway:
This is a fresh install (add-ons) or upgraded?
Did you try us btool to debug inputs? (eg.: splunk cmd btool inputs list --debug)
Maybe there left some old confs somewhere in the other apps. Be careful, the new Windows add-on didn't create and configure indexes for inputs. This could cause been used the default index. Check the docs, please.
Docs:
https://docs.splunk.com/Documentation/Splunk/7.2.3/Troubleshooting/Usebtooltotroubleshootconfigurations
https://docs.splunk.com/Documentation/WindowsAddOn/5.0.1/User/Upgrade
Istvan
... View more
12-12-2018
07:50 AM
Hi,
Thanks for your help here as well.
Only one note:
I think the documentation shouldn't assume that MC is already connected to the cluster via the Indexer Cluster settings (not listed in the prerequisites list). Not even because docs say: do not add clustered indexers as a search peer. But connecting MC to the cluster via the Indexer Cluster settings adds all the indexer as a search peer. (Correct me if I'm wrong.)
So a little modification on the documentation would make this clear.
Regards,
István
... View more
12-06-2018
02:25 AM
Hi,
I saw that docs, not too much:(
Just a little note:
- After restoring the (index) configuration it needs to make an indexer rolling restart in order to access the old data.
- I think the "orphaned" index live forever on the indexers...
- The docs say nothing how I should delete an index in a clustered environment. There are several ways I know but mostly is a manual job.
Regards,
István
... View more
12-05-2018
03:06 AM
Hi,
I didn't find a detailed description of what happens when an index configuration has been deleted.
So far, I found:
Standalone:
Delete index using GUI will also remove stored data.
Delete index with remove index configuration stanza won't remove stored data, but cannot search it.
IX Cluster:
Delete index with remove index configuration stanza won't remove stored data, and cannot search it.
Will the buckets removed by Splunk when an index hasbeen deleted only with the configuration stanza removed?
What happens when an admin makes a rollback/recreate the index stanza on the Master Node after a deletion. Will the old data be searchable again?
Does anybody have an experience in this topic? (Or is there a detailed docs somewhere about it?)
Regards,
István
... View more
12-03-2018
02:24 AM
Ohh, sorry, I misunderstand you.
I added MC as IX Cluster Search peer - IXs look good. But "Indexer Clustering: Status" page doesn't. I also add CM as Distributed Search peer. Now it looks good.
So now:
- MC is Cluster Search peer to the CM (it is added all the IX as Distributed Search peer)
- On the MC CM added as Distributed Search peer
Documentation does not say that at all. It looks like a support ticket will be opened...
Thx.
... View more
12-03-2018
01:23 AM
This Is what you are pointing to?: "Repeat these steps for each search head, deployment server, license master, and nonclustered indexer. Do not add clustered indexers, but be sure to add clustered search heads. If you are monitoring an indexer cluster and you are hosting the monitoring console on an instance other than the cluster master, you must add the cluster master as a search peer."
It says add cm as search peer
I also added the CM as Search peer to the MC node. MC also recognized it as a Cluster Master too.
... View more
12-03-2018
12:54 AM
Hi there,
I'm building a test Splunk deployment: 3 SH in cluster, 2x2 IX in multi-site cluster, 1 admin node(CM, Deployer, ...) and 1 dedicated Monitoring Console node. I have a problem with the Monitoring Console setup.
I tried to follow the documentation (https://docs.splunk.com/Documentation/Splunk/7.2.1/DMC/Deploymentsetupsteps)
I've added as Search peer:
- all SH server
- admin node (incl. Cluster Master role)
I've enabled the Distributed Monitor Console, fixed instances' roles if needed. Apply.
Results:
- Under Overview->Topology there are no Indexers listed.
- There are several panels which are empty and have a warning: "Search filters specified using splunk_server/splunk_server_group do not match any search peer."
What am I doing wrong? Please help me fix it.
Regards,
István
... View more
- Tags:
- dmc
- splunk-enterprise
11-24-2018
06:43 AM
Hi,
Thx for the replay.
Unfortunately, I already checked those links. As you can see there are several limitations in pdf export.
On splunkbase I found two apps:
Smart PDF Exporter for Splunk
Office Documents Template System (ODTS) for Splunk
I interested if there are any other simple, flexible out-of-the-box tricks/solutions.
Istvan
... View more
11-23-2018
04:40 AM
Hi there,
What are the possibilities with Splunk to generate and export a complex report with graphical elements, too?
I know there is a pdf export, but so far looks like it has several limitations. I know that chart/tables can be exported separately.
Can Splunk generate a fancy, well-formatted pdf/docx/etc report? (Scheduled.)
Thx,
István
... View more
10-03-2018
07:29 AM
Hi,
I also try to forward Windows events to a 3rd party syslog server. In my case I use syslog-ng.
(https://answers.splunk.com/answers/687843/can-you-help-me-forward-windows-events-to-a-3rd-pa.html)
My current config:
props.conf
[WinEventLog:Application]
TRANSFORMS-external = send_to_syslog
[WinEventLog:Security]
TRANSFORMS-external = send_to_syslog
[WinEventLog:System]
TRANSFORMS-external = send_to_syslog
transforms.conf
[send_to_syslog]
REGEX = .
DEST_KEY = _SYSLOG_ROUTING
FORMAT = external
outputs.conf
[tcpout]
defaultGroup=nothing
[syslog]
[syslog:external]
server=syslog.server:514
type = tcp
Everything is configured on the indexer. UF in on default config (Windows TA v4.8.4)
At first sight, I received events in a single line, but the syslog header not perfect...
István
... View more
09-21-2018
01:09 PM
Hi,
I am trying to monitor Windows servers BIOS versions using Registry monitoring with UF. For testing, I installed a full Splunk Ent. and used a web GUI to add some Registry input with the baseline.
I received several events, but the _time field for the baseline event is weird. Approximately, they are in 3 days late. The create/etc. events look good.
_raw _time
09/21/2018 21:59:09.175 event_status="(0)The operation completed successfully." pid=16872 process_image="c:\Windows\regedit.exe" registry_type="DeleteKey" key_path="HKLM\hardware\description\system\bios\új azonosító (#1)" data_type="REG_NONE" data="" 2018-09-21 21:59:09
09/21/2018 21:59:09.175 event_status="(0)The operation completed successfully." pid=16872 process_image="c:\Windows\regedit.exe" registry_type="SetValue" key_path="HKLM\hardware\description\system\bios\test_key" data_type="REG_SZ" data="" 2018-09-21 21:59:09
09/21/2018 21:59:04.570 event_status="(0)The operation completed successfully." pid=16872 process_image="c:\Windows\regedit.exe" registry_type="SetValue" key_path="HKLM\hardware\description\system\bios\új azonosító (#1)" data_type="REG_SZ" data="" 2018-09-21 21:59:04
09/18/2018 10:47:04.786 registry_type="baseline" key_path="\registry\machine\hardware\description\system\bios\SystemVersion" data_type="REG_SZ" data="" 2018-09-18 10:47:04
09/18/2018 10:47:04.786 registry_type="baseline" key_path="\registry\machine\hardware\description\system\bios\SystemVersion" data_type="REG_SZ" data="" 2018-09-18 10:47:04
09/18/2018 10:47:04.786 registry_type="baseline" key_path="\registry\machine\hardware\description\system\bios\SystemVersion" data_type="REG_SZ" data="" 2018-09-18 10:47:04
The upper events are the create/update/etc events created within a few minutes with the baseline events, but baseline shows 18. Sept, update events 21 Sept. (today).
How it is possible, what am I doing wrong? The base system is a Win 10, and the system time is ok.
Inputs:
[WinRegMon://kulcsi01]
baseline = 1
disabled = 0
hive = HKEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\SYSTEM\\BIOS\\?.*
proc = C:\\.*
type = set|rename|create|delete
[WinRegMon://kulcsi02]
baseline = 1
disabled = 0
hive = HKEY_LOCAL_MACHINE\\SYSTEM\\HardwareConfig\\Current\\?.*
proc = C:\\.*
type = create
Thx,
István
... View more
09-19-2018
05:00 AM
Hi,
Thx. I found the problem which caused the non-requested syslog forwarding... I forget to delete some config from the prev. test...
The Windows TA v4.8.4 a little messy, at least for me. I didn't find 3 identical stanzas for the System/App/Security events...
Finally, these are I choose:
[source::WinEventLog:System]
TRANSFORMS-external = send_to_syslog
[WinEventLog:Application]
TRANSFORMS-external = send_to_syslog
[source::*:Security]
TRANSFORMS-external = send_to_syslog
So far looks good. Thx.
... View more
09-19-2018
01:22 AM
Hi,
I am trying to forward the Windows events from Splunk to a 3rd party syslog system. I checked the docs and also several answers here.
I have a Search head, an Indexer and Universal Forwarder (UF) agents on the source Windows servers. (Splunk version 7.1.3)
The UFs forward all the events to the indexer with no problems. The IX forwards all(?) — or at least most —of the required events to the 3rd party system, but also is forwarding some other syslog messages (received from VMware vcenter) which it should not do.
What am I doing wrong?
The outputs.conf on the IX:
[syslog]
[syslog:external]
server=192.168.10.134:514
priority=NO_PRI
The transforms.conf on the IX:
[send_to_syslog]
REGEX = .
DEST_KEY=_SYSLOG_ROUTING
FORMAT=external
I am using Windows TA v4.8.4. I tried to found how to configure to forward all the system/application/security events and nothing else.
So I added the the following code to several place in props.conf:
TRANSFORMS-external = send_to_syslog
Regards,
István
... View more
09-13-2018
05:54 AM
Yep, thx.
That's what I was afraid to do. I have to find out which source is ES relevant, which is not...
Thanx for your time and help.
Regards,
István
... View more
09-11-2018
01:02 AM
Hi,
Thx for the reply. I familiar with the Splunk Enterprise licensing.
We have security related sources along with non-security ones. And there are some partial security and non -security sources.
After all, we don't wanna buy ES license for all the Splunk Enterprise license, somehow we have to measure the log volume processed by ES.
Based on what I've been up to today, I guess there is no built-in solution for this, but maybe someone can help, so I asked.
Regards,
István
... View more
09-10-2018
04:56 AM
Hi,
Because of license renew/upgrade: is there any way to report/estimate the license volume processed by Enterprise Security?
Regards,
István
... View more
06-26-2018
11:05 PM
Hi,
I am trying to clean out a little the correlation alerts in ES. Currently focusing on the Completely Inactive Account. Please help me understand the following situation. Why logging Windows this way or why Splunk doesn't recognize this as a false positive, or why am I wrong.
So I found several alerts for inactivity which looks like as badly typed account names but logged as successful login.
A sample edited event.
My problems are:
- bad_usename doesn't exist, cannot log in successfully
- Splunk fetch this event as a successful event, with user: "bad_user"
- and after 90 days ES alert that bad_user inactive...
EventCode=4648
EventType=0
TaskCategory=Logon
OpCode=Info
Keywords=Audit Success
Message=A logon was attempted using explicit credentials.
Subject:
Security ID: legal_domain\legal_user
Account Name: legal_user
Account Domain: legal_domain
Account Whose Credentials Were Used:
Account Name: bad_user
Account Domain: legal_domain
Target Server:
Target Server Name: legal_server
Additional Information: legal_server
Process Information:
Process ID: 0x4
Process Name:
Network Information:
Network Address: -
Port: -
This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS comman
And yes, there is a failed login event with bad_user just before this wired event.
Please help me understand this situation and solve somehow.
Regards,
István
... View more
06-17-2018
10:43 PM
Hi,
Thanks for your answer.
"pull out whatever you need and put it in a shell app": you mean I have to collect all the needed conf files and exclude the inputs and put it into a new app, then install the new app into SH cluster?
If I understand you correctly, you not installed OPSEC Lea, but have a similar app installed it already into SH cluster?
Regards,
István
... View more
06-15-2018
03:58 AM
Hi,
We are planning to implement SH cluster. We also use OPSEC LEA Add-on for the firewall log collection. Docs say: Search Head Clusters NOT supported. (http://docs.splunk.com/Documentation/AddOns/released/OPSEC-LEA/Install)
Can anyone confirm that OPSEC add-on can be installed on a SH cluster when using only the knowledge objects part of the add-on? The scripted inputs are handled on HFs.
Regards,
Istvan
... View more