Getting Data In

Controlling Forwarders, and "spam" into Splunk

Ricapar
Communicator

We have a very large environment.. and with Splunk charging by the GB/day, we obviously have an interest in controlling what data goes into Splunk and what doesn't.

For the most part, if someone's host is "spamming" Splunk (sending wayy too much data, bad sourcetypes, etc), I'll just look up who owns that host and work with them from there.

However.. I ran into a problem where a host's Universal Forwarder is configured to identify itself to Splunk as something that is not its proper hostname. It is currently sending about 15+GB/day of garbage syslog data into Splunk.

Aside from blasting out an email to the entire group, how can I find where the data is truly originating from? Is it possible to perhaps get the IP address of where the data is coming from?

Additionally on this topic - Is it possible to control who can connect to my indexers at all? It seems like anyone can set up a forwarder and connect it to our (publicly known) indexer's hostname.

0 Karma

Ricapar
Communicator

Alright.. Kidnof answered part of my own question. There has to be a better way of doing this... but it worked for now.

I was able to find the culprit using tcpdump.

tcpdump -A -vv -i eth0 port 9997 > /tmp/splunkdump

My indexers are listening on port 9997 for incoming data. This host in particular was sending a lot of data, so I didn't have to wait that long to kill the dump.

After that I scanned the file for the bogus hostname it was reporting, and saw where the data was really originating from.

Still-standing questions are:

  1. Is there a better way to do this? It worked here, but tcpdump and the like are usually my last resort.
  2. Is there a way to limit who can send data to my indexers?
0 Karma

bmacias84
Champion

Can you elborate on what you define as spam?

0 Karma

Ricapar
Communicator

Thanks for the SoS app suggestion. Quite helpful!

I still don't have anything for the controlling spam into Splunk aspect though.

0 Karma

bmacias84
Champion

Why are you not using SOS aka Splunk on Splunk App? It was built for that purpose.

Get Updates on the Splunk Community!

How to Monitor Google Kubernetes Engine (GKE)

We’ve looked at how to integrate Kubernetes environments with Splunk Observability Cloud, but what about ...

Index This | How can you make 45 using only 4?

October 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Splunk Education Goes to Washington | Splunk GovSummit 2024

If you’re in the Washington, D.C. area, this is your opportunity to take your career and Splunk skills to the ...