Activity Feed
- Posted Re: Splunk Enterprise Security slow performance on All Apps and Add-ons. 05-22-2024 09:00 PM
- Posted Splunk Enterprise Security slow performance on All Apps and Add-ons. 05-22-2024 05:31 AM
- Posted Re: Splunk Enterprise Security passing fields in notable settings on Getting Data In. 05-20-2024 11:42 PM
- Karma Re: Splunk add-on for Fudo PAM | How to parse logs from Fudo? for tej57. 05-20-2024 09:20 PM
- Posted Re: Splunk Enterprise Security passing fields in notable settings on Getting Data In. 05-20-2024 02:55 AM
- Posted Re: Splunk Enterprise Security passing fields in notable settings on Getting Data In. 05-20-2024 02:20 AM
- Karma Re: Splunk Enterprise Security passing fields in notable settings for gcusello. 05-20-2024 02:20 AM
- Posted Splunk Enterprise Security passing fields in notable settings on Getting Data In. 05-19-2024 10:28 PM
- Posted Re: How to create your own add-on? | How to parse unusual logs? on Getting Data In. 05-19-2024 02:41 AM
- Karma Re: How to create your own add-on? | How to parse unusual logs? for gcusello. 05-19-2024 02:40 AM
- Posted How to create your own add-on? | How to parse unusual logs? on Getting Data In. 05-19-2024 12:52 AM
- Posted Splunk add-on for Fudo PAM | How to parse logs from Fudo? on Getting Data In. 05-17-2024 03:34 AM
- Karma Re: Splunk Enterprise Security notables and investigations | SOC analysts work with Splunk ES for gcusello. 05-16-2024 11:24 PM
- Got Karma for Re: How to configure time picker for dashboard in Enterprise Security?. 05-16-2024 11:16 PM
- Posted Splunk Enterprise Security notables and investigations | SOC analysts work with Splunk ES on Getting Data In. 05-16-2024 10:07 PM
- Posted Re: How to configure time picker for dashboard in Enterprise Security? on Getting Data In. 05-16-2024 09:50 PM
- Karma Re: How to assign priority to an asset? Splunk ES for bowesmana. 05-15-2024 10:52 PM
- Karma Re: How does Splunk define and assign urgency in Splunk Enterprise Security? for koshyk. 05-15-2024 10:46 PM
- Got Karma for Re: How to configure time picker for dashboard in Enterprise Security?. 05-14-2024 06:59 PM
- Karma Re: How to configure time picker for dashboard in Enterprise Security? for Temuulen0303. 05-14-2024 05:25 AM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
05-22-2024
09:00 PM
Hello @gcusello , See below I show the .spl file name and download date. I believe I have the latest version of the ES currently. Cheers, splunky_diamond
... View more
05-22-2024
05:31 AM
Hello splunkers! Has anyone else experienced slow performance with Splunk Enterprise Security? For me, when I open the "Content Management" in "Configure" and let's say try to filter to see enabled correlation searches, it might take up to 5 minutes to load just 5 or 6 correlation searches. However, if I try to perform a search in search and reporting (Within Enterprise Security) the searches will run pretty much fast, returning hunderds of thousands of events. Another case where I might experience huge lags is when: creating a new investigation, updating the status of the notable, deleting investigation, opening Incident review settings, adding new note in investigation. If anyone had similar experience could someone please share how to improve the performance in Enterprise Security app? Some notes to give more info about my case: - The health circle is green. - The deployment is all-in-one (Splunk Enterprise, ES, and all the apps and add-ons, everything is running on ubuntu server 20.04 virtual machine with 42 GB RAM, 200 GB hard disk (thin provisioned), 32 vCPU - My Splunk deployment has around 4-5 sources from which it receives the logs, average load of data is around 500-700 MB/day Thanks for taking your time reading and replying to my post ❤️
... View more
Labels
- Labels:
-
troubleshooting
05-20-2024
11:42 PM
Hello @gcusello Update: it actually did work! I just got new notable generated and the field value passed successfully! Thank you very much!
... View more
05-20-2024
02:55 AM
@gcusello , I used quotes when I was trying different cases, with hope that maybe adding them might somehow solve my problem, haha! Anyways, I tried the last search that you provided :
index=fudo_index completed_action="deleted session." | stats values(user) AS user values(fudo_session) AS session values(completed_action) AS "completed action" count(completed_action) AS counter BY node_address | where counter>0 | rename node_address AS address
Unfortunately, it didn't help the situation. the $address$ is still not resolved. By the way, it does not matter whether I try with this new field that I extracted, or if I try with the $dest$ or $dvc$ that were parsed in my logs from the beginning, for some reason neither of them resolve in the notable title 😞 Do you have any other ideas what I can check in order to solve my issue? Cheers, splunky_diamond
... View more
05-20-2024
02:20 AM
@gcusello , I tried your suggestion, it worked for the "fudo_session" field, thank you! However, I tried the same on "dvc" field and it does not work for some reason... I tried extracting new field called "node_address" and added it to my search in the following way: index=fudo_index completed_action="deleted session." | stats values("node_address") as address values("user") as user values("fudo_session") as session values("completed_action") as "completed action" count("completed_action") as counter | where 'counter'>0 And in the title of the notable I have the following: Deleted recorded session $session$ detected on $address$ Also I added both fields in the incident review settings as you said. Here is the result: The value that should appear instead of "$address$" is the IPv4 address. When I was extracting the field node_address, I did it in the enterprise security app in the search. For the permissions I made it global with everyone being able to read and only admin with write permissions (just like fudo_session field). If both of them are completely identical, why isn't this field getting evaluated like fudo_session? Could you please help with troubleshooting this?
... View more
05-19-2024
10:28 PM
Hello Splunkers! I have built my own correlation search: From which I am generating a notable. In that notable I want to pass some fields using the $ I saw this trick of passing the fields like $this$ in some other pre-configured correlation searches in Enterprise Security, but in my own correlation search it does not work for some reason: Can someone please tell me how can I make it work? Let me know if you want me to share some other configurations that I did, that might be relevant to this issue. Thanks for taking your time reading and replying to my post ❤️
... View more
05-19-2024
02:41 AM
Thank you very much @gcusello ! You never fail to deliver best solutions for splunk newbies like me 🙂
... View more
05-19-2024
12:52 AM
Hello Splunkers! I am collecting logs from Fudo PAM for which I haven't found any suitable existing add-on on the Splunk Base website. The logs are being collected over syslog, yet the regular "syslog" sourcetype doesn't suit the events coming from my source. I was searching the web for some tutorials on how to create your own add-on in Splunk in order to parse the unusual logs like in my case, but I haven't found any. Could someone please help me with that? Does anyone have any tutorial or guide on how to create your own parser, or can maybe explain what is needed for that, in case it's not a difficult task? If someone decides to provide answer themselves, by explaining how to create your own add-on, I would really appreciate detailed description that will involve such notes as: required skills, difficulty, how long it will take, and whether it's the best practice in such situations or there are more efficient ways. Again, the main goal for me is to get my logs from Fudo PAM (coming over syslog) parsed properly. Thank you for taking your time reading my post and replying to it ❤️
... View more
Labels
- Labels:
-
Linux
-
props.conf
-
syslog
-
transforms.conf
05-17-2024
03:34 AM
Hello splunkers! Has anyone had experience with getting data in Splunk from PAM (Privileged Access Management) systems? I want to do the integration of Splunk with Fudo PAM. Question of getting logs from Fudo to Splunk is not a problem at all, it's easily done over syslog. However, I don't know how to parse these logs. The syslog sourcetype doesn't properly parse the events, it misses a lot of useful information such as: users, processes, action done, accounts, basically almost everything except for the IP of the node and the timestamp of the event. Does anyone know if there is a good add-on for parsing logs from Fudo PAM? Or any other good way how to parse its logs? Thanks for taking time reading and replying to my post ❤️
... View more
05-16-2024
10:07 PM
Hello Splunkers! I am learning Splunk, but I've never deployed or worked with Splunk ES in production environment especially in SOC. As you know, we have notables and investigations in ES and for both of them we can change the status to indicate when the investigation is in process or not, but I am not quite sure about how SOC actually uses these features. That's why I have couple of questions regarding that. 1) Do analysts always start investigation when they are about to handle a notable in the incident review tab? Probably the first what analysts do is changing the status from new to "in progress" and assign the event to themselves, to indicate that they are handling notable, but do they also start a new investigation or add them to the existing one, or analyst can handle the notable without adding it to an existing one or starting the new investigation? 2) When a notable was added to an investigation, what do analysts do when they close they figure out the disposition (complete their investigation)? Do they merely change the status through editing the investigation and the notable in their associated tabs? Do they always put their conclusions about an incident in the comment section like described in this article: The Five Step SOC Analyst Method. This 5-step security analysis… | by Tyler Wall | Medium? 3) Does SOC analyst of the first level directly put the status "closed" when the notable/investigation is completed, or he/she always has to put it to "resolved" for their more-experienced colleagues' confirmation? I hope my questions are clear, thanks for taking your time reading my post and replying to it ❤️
... View more
05-16-2024
09:50 PM
1 Karma
Update: it actually did work! I just opened the dashboard in a search and the time-picker is indeed applied.
... View more
05-14-2024
03:55 AM
1 Karma
Hello @Temuulen0303 , Thanks for taking your time replying to my post! I checked, it is only applicable to search "notable event by urgency", as for the saved searches, there is no option to choose the time range: Also, for some reason when I linked the time range with "notable events by urgency" when I select the custom time, it does not apply for some reason... I checked in the source code of that search, the query for the earliest and latest time, it does take it from my time picker that I added.
... View more
05-13-2024
10:59 PM
Hello Splunkers! In the Security Posture by default there are no filters that would allow us to adjust the time, meaning, we see the summary about notable events over the last 24 hours. I want to change that, I have added a time picker that I would like to bind to one dashboard in the security posture - "Key indicators" so that I can see for example the summary of notable events over the last 12 hours or 7 days. Can someone please explain what needs to be done on time picker or dashboard in order to achieve this, or maybe is there an easier way to do this? Thanks for taking your time reading and replying to my post ❤️
... View more
05-11-2024
03:54 AM
I checked, it does not apply to Security Posture, but I found something, we can add the time range to that dashboard: I just need to figure out how to bind it to my specific dashboard, and it should work!
... View more
05-11-2024
03:28 AM
Hello @bowesmana , thanks for replying to my post. Regarding your last suggestion, if I got it right, I can assign priority value in the search string itself? So far what I've read is that the identities and assets are added via lookups to Splunk, from which the information about their priority is pulled. So, if I got your suggestion about assigning priorities in the searches themselves, could you please provide an example? I would really appreciate it! Cheers, Splunky diamond
... View more
05-11-2024
02:37 AM
Hello @gcusello , Thanks for replying to my post! I am sorry, but I don't think I quite understand what you are suggesting. Just FYI, here are all the available configurations in the [Configure > All configurations]: I checked multiple settings, but I don't think any of them relate to a specific dashboard that I am looking to change settings for. Cheers, splunky_diamond.
... View more
05-11-2024
01:29 AM
Hello Splunkers! I want to change the time picker of this dashboard in Enterprise security to provide the count of notables not over the last 24 hours, but over 12 hours. I tried changing values related to time in the source code via GUI: It does not work, for some reason, the changes are not being saved, even though I am hitting the save button. Is there a way to add a time picker for this dashboard, so that we can select our interested time period at any time, and update the dashboard instantly? Thanks in advance for taking time reading and replying to my post ❤️
... View more
05-10-2024
12:17 AM
Hello, Splunkers! I am learning Splunk ES and trying to understand how urgency value is assigned for notables generated from the correlation searches. I went over this article: How urgency is assigned to notable events in Splunk Enterprise Security - Splunk Documentation . So, if severity is assigned in the settings of the correlation search, where do we assign the priority to assets? Can someone please explain or provide a documentation page of how this process (assigning priority) is done exactly? Specifically, I would really appreciate if someone could share, where should this be configured, whether on Enterprise Security itself, or elsewhere, is it done through GUI, or it requires manually editing some config files. Also, a bit stupid question, but, can we also assign priority to identities, for example to indicate higher priority for admin accounts rather than usual accounts. Thank you for taking your time reading and replying to my post ❤️
... View more
05-05-2024
10:37 PM
Thank you so much for such a detailed addition @PickleRick !
... View more
05-05-2024
12:00 AM
Hello, Splunkers! I hope there are some SOC analysts around who are using Splunk Enterprise and Splunk ES in their work. I've been learning Splunk for the past month and I have worked with Splunk ES a bit and tried configuring some correlation searches with automated notable generation along with email notification alerts. I now have to present some cases in my test lab, where I have an attacker who performs some malicious activity that triggers some of the correlation searches that I have configured, and then I need to demonstrate the full investigation process from SOC analyst's POV. The problem is, I have almost 0 knowledge of how SOC operates and if they were to use Splunk Enterprise and Enterprise Security app, what would they do exactly? Would they just go over all the new notables and look at the drill-down searches trying to understand what notables are related to other notables? Would they try to correlate the events by time? Would they only work around Splunk ES, or would they also go to the dashboards and search for some data there? I would appreciate it if someone could explain how SOC works with Splunk ES in case of some simple, uncomplicated attacks, that trigger 2-3 correlation searches max. Also small question, since I have the email notifications configured, who is usually the one receiving the email notifications about triggered correlation searches, is it a SOC director, or analyst, or someone else? Please let me know if more information is required, I would love to provide as many details as needed, as long as I get the best answer that would help me. Thanks in advance for taking the time to read and reply to my post!
... View more
Labels
- Labels:
-
Linux
05-04-2024
11:42 PM
Thank you very much! That pretty much explains everything!
... View more
05-04-2024
06:19 AM
Hello @deepakc , thanks for your post. As I mentioned in my post, I knew about the data acceleration and ability to run the searches across multiple sources. Undoubtedly, these are the main advantages of using data models. However, regarding the usage of data models in Splunk ES, I have a custom correlation search that is running without the usage of data models, and it works perfectly fine, which leaves the question about the need of usage of data models in correlation searches in ES still open.
... View more
05-04-2024
05:50 AM
Hello splunkers! I have a simple question regarding Splunk data models and regular searches, I have found some answers, but I would like to dig deeper. What's the advantage of using the data models? Like, why would we want to use the data models instead of regular searches where we just label the indexes in which we want to search for the data? I know so far that the data models allow searching through multiple sources (network devices and workstations) by having the standardized fields. I also know about the data accelaration, that we can use tstats in our searches on accelerated data models in order to speed up the searches. Is there a particular scenario where we must use data models and not using them will not work? (I am using Enterprise Security as well, so if there is any scenario that involves this app, it is most welcome) I would really appreciate a well-detailed answer. Thank you for taking time reading and replying to my post ❤️
... View more
- Tags:
- data models
- searches
05-03-2024
10:49 PM
Hello, @gcusello , thanks for the additional information. I tested this case in my lab environment and it worked! I just want to clarify some small details. I have added the maxQueueSize in the /SplunkUniversalForwarder/etc/apps/SplunkUniversalForwarder/local outputs.conf, for I have configured that file in that path before in order to send logs to Splunk, but I also found this article Howto configure SPLUNK Universal Forwarder (kura2gurun.blogspot.com) , where it says that we should configure outputs.conf file, located at /opt/splunkforwarder/etc/system/local/. Is there any impact or difference that I didn't configure outputs in that specific path, but instead did it in the one that I mentioned above? Cheers, SplunkyDiamond
... View more
05-03-2024
05:41 AM
Thank you very much for your reply, @gcusello ! I have some questions to your post, where can I configure for how long UF stores the logs when the connection is interrupted? Also how can I know the location of where UF stores these logs, is it some file within the add-on? And finally, what's the capacity of that file/those files, where the logs will be stored in this scenario before the connection to Splunk machine is re-established?
... View more