Activity Feed
- Got Karma for Re: How do I validate that boot-start was indeed enabled?. 11-04-2022 05:05 AM
- Posted Re: From where I can find Content Pack for Monitoring Unix and Linux? on Splunk ITSI. 02-22-2022 05:19 AM
- Posted Re: From where I can find Content Pack for Monitoring Unix and Linux? on Splunk ITSI. 02-22-2022 02:42 AM
- Posted From where I can find Content Pack for Monitoring Unix and Linux? on Splunk ITSI. 02-21-2022 06:20 PM
- Posted Rare iplocation fields handling when applying to data model on Splunk Enterprise. 07-01-2021 05:53 AM
- Tagged Rare iplocation fields handling when applying to data model on Splunk Enterprise. 07-01-2021 05:53 AM
- Tagged Rare iplocation fields handling when applying to data model on Splunk Enterprise. 07-01-2021 05:53 AM
- Posted Re: How to ignore unknown objects in Risk adaptive response? on Splunk Enterprise Security. 06-07-2021 07:55 PM
- Posted How to ignore unknown objects in Risk adaptive response? on Splunk Enterprise Security. 06-05-2021 01:56 AM
- Tagged How to ignore unknown objects in Risk adaptive response? on Splunk Enterprise Security. 06-05-2021 01:56 AM
- Karma Re: Search on most recent data has completed. Expect slower search speeds as we search the reduced bucket for richgalloway. 01-17-2021 06:59 PM
- Posted Re: Search on most recent data has completed. Expect slower search speeds as we search the reduced bucket on Deployment Architecture. 01-16-2021 05:53 PM
- Posted Search on most recent data has completed. Expect slower search speeds as we search the reduced bucket on Deployment Architecture. 01-15-2021 06:03 PM
- Tagged Search on most recent data has completed. Expect slower search speeds as we search the reduced bucket on Deployment Architecture. 01-15-2021 06:03 PM
- Posted Re: Search peer intermittently reported down on Splunk Search. 01-12-2021 05:19 PM
- Posted Search peer intermittently reported down on Splunk Search. 01-12-2021 01:08 AM
- Tagged Search peer intermittently reported down on Splunk Search. 01-12-2021 01:08 AM
- Posted Re: How to get event _time from CIM data model? on Splunk Search. 01-12-2021 01:00 AM
- Posted How to get event _time from CIM data model? on Splunk Search. 01-11-2021 11:22 PM
- Tagged How to get event _time from CIM data model? on Splunk Search. 01-11-2021 11:22 PM
Topics I've Started
Subject | Karma | Author | Latest Post |
---|---|---|---|
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 | |||
0 |
02-22-2022
05:19 AM
Here is the document https://docs.splunk.com/Documentation/CPNixMon/2.0.1/CP/About
... View more
02-22-2022
02:42 AM
Sorry, I should be more precise. What I'm looking for is the backup package for ITSI 4.8 or earlier. If you're using ITSI version 4.8 or earlier, you need to install the content pack using the backup ZIP file. For installation instructions, see Install and configure the Content Pack for Monitoring Unix and Linux. Use the following table to determine ITSI version compatibility with various versions of the Content Pack for Monitoring Unix and Linux: Content pack version ITSI version Splunk App for Content Packs version 1.1.0 4.9.4 or 4.11.0 and higher 1.4.0 1.0.2 4.9.0 and higher 1.0.0 1.0.1 4.6.0 and higher N/A 1.0.0 4.2.1 - 4.5.x N/A
... View more
02-21-2022
06:20 PM
It's always mentioned from doc but I couldn't find anywhere to download it including splunk base.
... View more
Labels
- Labels:
-
installation
-
using ITSI
07-01-2021
05:53 AM
I added iplocation lookup into my CIM data model. I found there's a rare handling when I validate the result by running | from datamodel: SPL The result SPL is like following an intermediate search filter was applied. search src_lon=* src_lat=* src_City=* src_Region=* src_Country=* dest_lon=* dest_lat=* dest_City=* dest_Region=* dest_Country=* I have no idea why this is added. My data without location mapped will be dropped. In order to reduce the impact of this, seems I need to add EVAL to check if lon,lat,City,Country was not produced after running iplocation lookup. e.g. | from datamodel expanded SPL (index=* OR index=_*) (((index=MY_INDEX)) tag=ids tag=attack) DIRECTIVES(READ_SUMMARY(datamodel="Intrusion_Detection.IDS_Attacks" summariesonly="false" allow_old_summaries="true")) | eval dvc=if(isnull(dvc) OR dvc="","unknown",dvc), ids_type=if(isnull(ids_type) OR ids_type="","unknown",ids_type), category=if(isnull(category) OR category="","unknown",category), signature=if(isnull(signature) OR signature="","unknown",signature), severity=if(isnull(severity) OR severity="","unknown",severity), src=if(isnull(src) OR src="" OR src="N/A","unknown",src), dest=if(isnull(dest) OR dest="" OR dest="N/A","unknown",dest), user=if(isnull(user) OR user="","unknown",user), vendor_product=case(isnotnull(vendor_product),vendor_product,isnotnull(vendor) AND vendor!="unknown" AND isnotnull(product) AND product!="unknown",vendor." ".product,isnotnull(vendor) AND vendor!="unknown" AND (isnull(product) OR product="unknown"),vendor." unknown",(isnull(vendor) OR vendor="unknown") AND isnotnull(product) AND product!="unknown","unknown ".product,isnotnull(sourcetype),sourcetype,1=1,"unknown") | iplocation src prefix="src_" | iplocation dest prefix="dest_" | eval src_Country=if(isnull(src_Country) OR src_Country ="","unknown", src_Country), dest_Country=if(isnull(dest_Country) OR dest_Country ="","unknown", dest_Country) | search src_lon=* src_lat=* src_City=* src_Region=* src_Country=* dest_lon=* dest_lat=* dest_City=* dest_Region=* dest_Country=* sourcetype="MY_SOURCETYPE" | eval is_Application_IDS_Attacks=if(searchmatch("(ids_type=\"application\")"),1,0), is_not_Application_IDS_Attacks=1-is_Application_IDS_Attacks, is_Host_IDS_Attacks=if(searchmatch("(ids_type=\"host\")"),1,0), is_not_Host_IDS_Attacks=1-is_Host_IDS_Attacks, is_Network_IDS_Attacks=if(searchmatch("(ids_type=\"network\")"),1,0), is_not_Network_IDS_Attacks=1-is_Network_IDS_Attacks | fields "_time" "host" "source" "sourcetype" "action" "dest_bunit" "dest_category" "dest_port" "dest_priority" "dvc_bunit" "dvc_category" "dvc_priority" "file_hash" "file_name" "file_path" "src_bunit" "src_category" "src_priority" "transport" "tag" "user_bunit" "user_category" "user_priority" "soc_site" "vendor_action" "CVE" "dvc" "ids_type" "category" "signature" "severity" "src" "dest" "user" "vendor_product" "src_Country" "dest_Country" "is_Application_IDS_Attacks" "is_not_Application_IDS_Attacks" "is_Host_IDS_Attacks" "is_not_Host_IDS_Attacks" "is_Network_IDS_Attacks" "is_not_Network_IDS_Attacks"
... View more
- Tags:
- datamodel
- iplocation
Labels
- Labels:
-
using Splunk Enterprise
06-07-2021
07:55 PM
@lakshman239 There's is no "unknown" source from my intelligence. Indeed, some of my incidents got a IP hit my intelligence. So the score of the exact IP keeps raising which is reasonable. However, the same incident also has "unknown" src or user, make "unknown" got high score as well.
... View more
06-05-2021
01:56 AM
Hi, There're some incidents hit my threat intelligence IP, e.g. dest. That's why Threat Activity notable event is triggered which is good to see. However, my concern is it would at the same time multiple the score of "unknown" user and "unknown" src/dest. How can I filter these noise effectively, so not so many false alert introduced by "unknown" user or IP?
... View more
- Tags:
- Enterprise Security
Labels
- Labels:
-
risk analysis
01-16-2021
05:53 PM
Thanks, The index I concerned got timePeriodInSecBeforeTsidxReduction = 604800 but enableTsidxReduction is not enabled. The result of running dbinspect tsidxState is full
... View more
01-15-2021
06:03 PM
What's the meaning of this warning message? I didn't enable index reduction at all. "Search on most recent data has completed. Expect slower search speeds as we search the reduced buckets."
... View more
- Tags:
- bucket
Labels
- Labels:
-
distributed search
-
search peer
01-12-2021
05:19 PM
The peer is up all the times. So I don't think it's HTTPS problem. I wonder what's the bandwidth between search head and indexers, but you know it takes time to find out...
... View more
01-12-2021
01:08 AM
Quite often I saw this warning from dashboard panels. I have no cue what happened with following message. The search peers didn't look busy at all. Can someone give any advice? Thanks!! DistributedPeerManager - Unable to distribute to peer named x.x.x.x:8089 at uri=x.x.x.x:8089 using the uri-scheme=https because peer has status=Down. Verify uri-scheme, connectivity to the search peer, that the search peer is up, and that an adequate level of system resources are available. See the Troubleshooting Manual for more information. I read this manual but still can't find any obvious delay/disconnect https://docs.splunk.com/Documentation/Splunk/8.1.1/Troubleshooting/authtimeout
... View more
- Tags:
- distributed search
Labels
- Labels:
-
search job inspector
01-12-2021
01:00 AM
Just happend _time is not in the field list. So I was lost my mind. Thanks for the suggestion!
... View more
01-11-2021
11:22 PM
I checked CIM data models have inherited _time but I couldn't retrieve. Anyone can tell what's wrong? | tstats summariesonly=true allow_old_summaries=true count from datamodel=Network_Traffic.All_Traffic where All_Traffic.action=allowed by All_Traffic.src All_Traffic.dest All_Traffic._time
... View more
Labels
- Labels:
-
tstats
11-02-2020
11:22 PM
Labels
- Labels:
-
heavy forwarder
-
indexer
11-02-2020
05:33 PM
1 Karma
Sorry... startwebserver means only Web (aka :8000) I guess. Does it really imply boot-start?
... View more