Splunk Tips and Tricks

≯℡__Kan透↙ 提交于 2019-11-26 16:23:28

Splunk Installation:
On Google Cloud Windows 2016 VM

1. Change Web Management Port from 8000 to 80
Splunk enterprise default http/https port is 8000. You can use either Splunk Web GUI to change it to some other port.

To change the ports from their installation settings:

  • Log into Splunk Web as the admin user.
  • Click Settings in the top-right of the interface.
  • Click the Server settings link in the System section of the screen.
  • Click General settings.
  • Change the value for either Management port or Web port, and click Save.

You may need to update your local firewall configuration based on your new port. Here is an example to change my Windows 2016 server’s firewall configuration to allow tcp port 80.

2. Fortinet Fortigate App for Splunk

Youtube Video:

2.1 Device
type=”traffic” AND index=”fortinet”  | stats dc(devid)

2.2 Virtual Domains
type=”traffic” AND index=”fortinet” | eval dev-vd= devid.”-“.vd | stats dc(dev-vd)

2.3 Sessions
Original:
type=”traffic” AND index=”fortinet” | eval dev-sess= devid.”-“.session_id | stats dc(dev-sess)
Change to :
type=”traffic” AND index=”fortinet” | eval dev-sess= devid.”-“.sessionid | stats dc(dev-sess)
type=”traffic” AND index=”fortinet”   | stats dc(sessionid)

2.4 Session Transferred Overtime
index=”fortigate” type=”traffic” |timechart count by devname

2.5 Top 20 Applications
index=”fortigate” type=”traffic” | TOP limit=20 app

2.6 Threat
type=”UTM” AND index=”fortinet” AND (apprisk=critical OR apprisk=high OR apprisk=medium OR apprisk=low) | timechart count by apprisk

2.6 Application by Destination Countries
index=”fortigate” type=”traffic” | iplocation “dstip” | geostats count by app

3. Customized Dashboard

3.1 Traffic Sessions by Destination IP
index=”fortigate” srcip=* dstip=*  type=”traffic” action=*  NOT dstip=”255.255.255.255″ | timechart count by dstip

3.2 Traffic Sessions by Action
index=”fortigate” srcip=* dstip=* type=”traffic” action=* | timechart count by action

3.3 Statistic for UTM
index=”fortigate” OR index=main  type=utm | stats count by srcip,dstip,hostname,url,service,direction,app,apprisk | sort -count

4. New Data Input – UDP 514 for Syslog

5. Reset Splunk to Factory Default
5.1 Clean all eventdata (Database / Indexes)

[email protected]:~$ sudo su [email protected]:/home/johnyan_ca# /opt/splunk/bin/splunk stop Stopping splunkd... Shutting down.  Please wait, as this may take a few minutes. .. Stopping splunk helpers...  Done. [email protected]:/home/johnyan_ca# /opt/splunk/bin/splunk clean eventdata This action will permanently erase all events from ALL indexes; it cannot be undone. Are you sure you want to continue [y/n]? y Cleaning database _audit. Cleaning database _internal. Cleaning database _introspection. Cleaning database _telemetry. Cleaning database _thefishbucket. Cleaning database fortinet. Cleaning database history. Cleaning database main. Cleaning database summary. Cleaning database unix_summary. Cleaning database windows. Disabled database 'splunklogger': will not clean. 

5.2 Remove all apps installed

[email protected]:/home/johnyan_ca# cd /opt/splunk/etc/apps/ [email protected]:/opt/splunk/etc/apps# ls SplunkAppForFortinet          alert_webhook                  learned             splunk_gdi SplunkForwarder               appsbrowser                    legacy              splunk_httpinput SplunkLightForwarder          eventid                        sample_app          splunk_instrumentation Splunk_TA_fortinet_fortigate  framework                      search              splunk_monitoring_console Splunk_TA_linux               gettingstarted                 sh_collectd         user-prefs Splunk_TA_nix                 introspection_generator_addon  splunk_app_for_nix alert_logevent                launcher                       splunk_archiver [email protected]:/opt/splunk/etc/apps# rm -rf SplunkAppForFortinet/ [email protected]:/opt/splunk/etc/apps# rm -rf Splunk_TA_fortinet_fortigate/ [email protected]:/opt/splunk/etc/apps# rm -rf Splunk_TA_linux/ [email protected]:/opt/splunk/etc/apps# rm -rf Splunk_TA_nix/ [email protected]:/opt/splunk/etc/apps# rm -rf eventid/ [email protected]:/opt/splunk/etc/apps# rm -rf splunk_app_for_nix/ 

If you just want to reset app’s configuration, you can use following command to remove local configuration.

/opt/splunk/etc/apps# rm -rf eventid/local/*

Last step is to start splunk application.

[email protected]:/opt/splunk/etc/apps# /opt/splunk/bin/splunk start  Splunk> Winning the War on Error  Checking prerequisites...         Checking http port [80]: open         Checking mgmt port [8089]: open         Checking appserver port [127.0.0.1:8065]: open         Checking kvstore port [8191]: open         Checking configuration...  Done.         Checking critical directories...        Done         Checking indexes...                 Validated: _audit _internal _introspection _telemetry _thefishbucket fortinet history main summary         Done         Checking filesystem compatibility...  Done         Checking conf files for problems...         Done         Checking default conf files for edits...         Validating installed files against hashes from '/opt/splunk/splunk-7.2.0-8c86330ac18-linux-2.6-x86_64-manifest'         All installed files intact.         Done All preliminary checks passed.  Starting splunk server daemon (splunkd)...   Done   Waiting for web server at http://127.0.0.1:80 to be available....... Done   If you get stuck, we're here to help.   Look for answers here: http://docs.splunk.com  The Splunk web interface is at http://ubuntu  [email protected]:/opt/splunk/etc/apps#   

6. Delete an index data

From GUI, use this command

index=”fortinet” | delete

or

index=”fortinet” AND sourcetype=Fortigate60D | delete

From command line:

[email protected]:~$ sudo su [sudo] password for john:  [email protected]:/home/john# cd /opt/splunk/bin [email protected]:/opt/splunk/bin# ./splunk stop Stopping splunkd... Shutting down.  Please wait, as this may take a few minutes. ........ Stopping splunk helpers...  Done. [email protected]:/opt/splunk/bin# ./splunk clean eventdata -index fortinet -f Cleaning database fortinet. [email protected]:/opt/splunk/bin# ./splunk start  Splunk> Be an IT superhero. Go home early.  Checking prerequisites...         Checking http port [80]: open         Checking mgmt port [8089]: open         Checking appserver port [127.0.0.1:8065]: open         Checking kvstore port [8191]: open         Checking configuration...  Done.         Checking critical directories...        Done         Checking indexes...                 Validated: _audit _internal _introspection _telemetry _thefishbucket fortinet history main summary         Done         Checking filesystem compatibility...  Done         Checking conf files for problems...         Done         Checking default conf files for edits...         Validating installed files against hashes from '/opt/splunk/splunk-7.2.0-8c86330ac18-linux-2.6-x86_64-manifest'         All installed files intact.         Done All preliminary checks passed.  Starting splunk server daemon (splunkd)...   Done   Waiting for web server at http://127.0.0.1:80 to be available... Done   If you get stuck, we're here to help.   Look for answers here: http://docs.splunk.com  The Splunk web interface is at http://ubuntu18  [email protected]:/opt/splunk/bin#   

Unfortunately, those commands can not reclaim the space. You will have to wait until those index age timed out.

标签
易学教程内所有资源均来自网络或用户发布的内容,如有违反法律规定的内容欢迎反馈
该文章没有解决你所遇到的问题?点击提问,说说你的问题,让更多的人一起探讨吧!