2020-12-17
Splunk-User-Behavior-Analytics

Read More

2020-12-17
Splunk-Infrastructure-Overview

Read More

2020-12-17
splunk_knowledge_object

列一下目前知道的 splunk knowledge object

Splunk knowledge objects (SKOs)

  • Macros
    • A parameterized portion of a search such as an eval statement or a search term that can be reused in multiple places, including saved and ad hoc searches, and which is used in a manner similar to a search command. Search macros can contain arguments, but they are not required.
    • Macros are configured through the Advanced Configuration section of the GUI, or via the macros.conf file located within the App.
  • Event types
    • A type of knowledge object that enables you to categorize and label all the indexed events that match a specified search string. An event type has a name and an associated search.
    • Event types are configured through the Advanced Configuration section of the GUI, or via the eventtypes.conf file located within the App
  • Tags
    • A knowledge object that enables you to efficiently search for events that contain particular field values. You can assign one or more tags to any field/value combination, including event types, hosts, sources, and source types.
    • They offer a very granular approach to searching data; tags are created through the GUI, or are present within tags.conf.
  • Saved searches
    • A search a user has made available for later use. Searches can be saved as reports, alerts, or dashboard panels.
    • Saved searches can be created through the GUI, or by editing savedsearches.conf.
  • Dashboards
    • A type of view associated with an App. A dashboard contains one or more searches that display data in visualizations. Panels in the dashboard contain the visualizations.
    • Dashboards are critical to Apps, as they show all the data visualizations that are relevant to an App. Without dashboards, your App is an add-on. Dashboards have a specific place within the App
  • Lookups
    • A knowledge object that enables the addition of fields and related values to search results based on field matching with a CSV table or a Python script. For example, you can use a lookup to perform DNS or reverse DNS lookups on IP addresses or host names in your data.
    • Lookups help to enrich your indexed data with static data or state data
    • Lookups are in the lookups folder of the App, and are generally CSV files.
  • Configurations
    • A file (also referred to as a conf file) that contains Splunk configuration information. Splunk writes configuration settings into configuration files. Configuration files are stored in a number of directories, including $SPLUNK_HOME/etc/system/default (these are preconfigured and not to be edited), $SPLUNK_HOME/etc/system/local, and $SPLUNK_HOME/etc/apps/. You can configure Splunk settings and processes by editing configuration file stanzas.
    • Configuration files are the meat and potatoes of your application. They decide how all of your SKOs get defined, how fields are extracted, and more. Almost everything that needs to be done can be done within a configuration file.

Object permissions

  • Object permissions are an integral part of securing Apps and their knowledge objects
  • Splunk permissions are role-based, meaning that a user needs a specific role (either assigned by Splunk or via external authentication and authorization systems) to read or write the knowledge object.
  • Permissions are controlled within the default.meta and local.meta files in your metadata folder in the App
  • The configuration structure
    [<object_type>/<object_name>] access = read : [ <comma-separated list of roles>], write : [ comma-separated list of roles>]
Read More

2020-12-09
splunk_apps

splunk developer site

create Splunk App

Splunkbase

Splunk app & add-on

Splunk AppInspect

Splunk Develop

跟 syslog 相關的

pack Splunk App uisng Packing Toolkit

App Design Patterns

Splunk Syntax Highlight

可以在進階看有關 Splunk App 的部分

Restart Splunk Enterprise & refresh Splunk Web UI 的方式

  • Restart Splunk Enterprise:
    1. In Splunk Web, click Settings, then Server Controls, then Restart Splunk.
    2. When you log back in, navigate to your app. The navigation will be updated and your dashboard will be open by default.
  • Force a refresh of Splunk Web UI:
    • Navigate to http://localhost:8000/en-US/_bump, click Bump version to flush the client cache. If you make changes to client-side JavaScript, CSS, or static resources, this command forces those assets to be updated.
    • Navigate to http://localhost:8000/en-US/debug/refresh, click Refresh to refresh almost all Splunk Enterprise knowledge objects. To refresh only views, navigation, or saved searches, you could append ?entity=data/ui/views, ?entity=data/ui/nav, or ?entity=saved/searches to the end of the URL.
  • Understand asset caching and state changes in Splunk Enterprise

有關 splunk conf

Run using docker

parsing CEF format

Call to external Restful API

Document

相關的 conference

自動產生 event 的程式

可參考的 app install & 設定文件

刪除 index data 的方式

Reference Term

  • SIEM(Security Information Event Management)資安事件管理平台解決方案
Read More