icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Corelight App For Splunk
SHA256 checksum (corelight-app-for-splunk_242.tgz) f41874e9cb3b8e08f8e08bc4222c7746beb99fa66780ed6adbac6dfb3900c3c8 SHA256 checksum (corelight-app-for-splunk_241.tgz) a907fba250d5fa94ebc687e935c9742c8acf5a0f4673980820a025f0323c428e SHA256 checksum (corelight-app-for-splunk_240.tgz) efc7dc4c193894620be5b1fd485da7075ea7bb53d89a22f13db458787ca17155 SHA256 checksum (corelight-app-for-splunk_232.tgz) 6675ce3b0f52cd7832ae234fc8b83ca11a601538a3a2f4325505446a4e3a609a SHA256 checksum (corelight-app-for-splunk_231.tgz) b2bb27eff1de7ee0c43ba9c9d933939de8b24c21e7c0cc5537d7c9b17a2d6150 SHA256 checksum (corelight-app-for-splunk_230.tgz) 44f93d5e1abe568353927c7354d67e0ac38b949288be598df432bfb4964b9cbb SHA256 checksum (corelight-app-for-splunk_221.tgz) cc2d2210f6d77d121cfe939375d849336cb5e0e0bc34bcb5d4f9534513d10c52 SHA256 checksum (corelight-app-for-splunk_220.tgz) 995886d9a5698fb08c3155c90e11a8d61647925f3d83dd39eb792e66042a9b61 SHA256 checksum (corelight-app-for-splunk_210.tgz) c38954525be4309b31239f08fb56abd641eca5c565b8803897bda2fb3352a1e3 SHA256 checksum (corelight-app-for-splunk_200.tgz) 169c20f7f212f1d7665da2782905fdac6a8fa7a658410bf083340800e670e637 SHA256 checksum (corelight-app-for-splunk_103.tgz) ea6dc94338793089b0819b46c8cf1a427f73109fef096103acc99859d9933a02
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Corelight App For Splunk

Splunk Cloud
Overview
Details
The Corelight App for Splunk enables incident responders and threat hunters who use Splunk® and Splunk Enterprise Security to work faster and more effectively. The app and required TA extracts information and knowledge from Zeek (formerly known as Bro) via Corelight Sensors or open-source Zeek, resulting in powerful security insights through key traffic dashboards such as:

Intel: Find IOCs from external sources matched in network traffic.

Notices: See situations flagged by the Notice policy for further investigation.

IP Interrogation: Identify anomalies by reviewing top protocol usage, internal vs. external connections, top connections by bytes transferred and more.

Log Hunting: Accelerate your hunt by narrowing down many logs to only the logs that matter.

Detections: Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.

Connections: Gain situational awareness using lists of top services, ports, dataflows, originators, and responders.

HTTP: Find suspicious HTTP transactions by reviewing a list of top host headers, originators, rare user agents and rare host headers.

DNS: Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.

Files: Find executables hidden in benign extensions and compressed files.

Corelight Egress Monitor: Find risky North/South user connections to weak SSL versions.

Welcome to Corelight for Splunk Apps documentation!

Overview

About Corelight App For Splunk

Author Corelight, Inc.
App Version 2.4.2
Vendor Products Corelight Sensor
Has index-time operations false
Creates an index false
Implements summarization Currently, the app does not generate summaries

About Corelight App For Splunk

Corelight App For Splunk allows a Splunk Enterprise administrator to extract information and knowledge from Zeek data via the Corelight Sensor appliance or open-source Zeek

Scripts and binaries

This App provides the following scripts:

  • cid.py
  • Community ID Flow Hashing python libraries

Release notes

Version 2.4.2

  • New Feature
    • Added Local Network Blocks field in Configuration UI. Direction field will be now evaluated based on the Local Network Blocks for CoreLight SSL logs.
    • Migrated App to the Splunk Add-on Builder v4 to use more modern back-end.
  • Bug
    • Removed lookup for direction value to mitigate disk storage issue.

Version 2.4.1

  • Bug
    • Fixed version declaration in Tap Hygiene dashboard to fix Splunk Cloud compatibility.

Version 2.4.0

  • New Feature

    • Added the dashboard support for Zeek product data.
    • Added the configuration page from where the user can select the product and indexes from which they want to visualize the data.
    • Added drilldowns in the below dashboards.
      • Connections
      • HTTP
      • Intel
      • Notices
      • SSH Inference Overview
    • Optimized the queries for better performance.
  • Bug

    • Fixed "Log Rates" panel in Home, Overview and Sensor Overview dashboards
    • Fixed Corelight Sensor filter in Connections and HTTP dashboards

Version 2.3.2

  • Bug
    • [CL-78] - Fixed fieldalias for ssl_curve
    • [CL-79] - Made objects created by this app accessible to other system apps

Version 2.3.1

  • New Feature

    • [CL-76] - Added tap hygiene dashboards
  • Bug

    • [CL-77] - Fixed issue with naming translations within TSV for names with multiple underscores

Version 2.3.0

  • New Feature
    • [CL-75] - Added support for TSV log format

Version 2.2.1

  • New Feature

    • [CL-67] - Added Suricata Dashboard
  • Improvement

    • [CL-70] - Iimproved DNS Hunting dashboard functionality
    • [CL-68] - Improved support for Open Source Zeek data
  • Bug

    • [CL-69] - Corrected issues with Drill-down from SSH Inferences Dashboard

Version 2.2.0

Corelight data natively enables Splunk Enterprise Security correlation search functionality for more than 30 correlation searches within the Certificates, Network Resolution, Network Sessions, Network Traffic, and Web data models. Corelight provides data for many Splunk Enterprise Security dashboards out of the box.

• Added parsing and dashboard visibility for Corelight Suricata logs.
• Tagged Suricata for Intrusion Detection data model functionality.
• Improved x509 log tagging for Certificate data model functionality.
• Improved conn log tagging for Network Traffic and Network Session data model functionality.
• Improved dns log tagging for Network Resolution data model functionality.
• Added DNS Hunting dashboard.
• Corrected parsing and extraction issues for corelight_x509_red log.
• Corrected issues with Home and Notices dashboards

Release notes

Version 2.0.0

Compatability

The app and TA extracts information and knowledge from Zeek (formerly known as Bro) via Corelight Sensors or open-source Zeek, resulting in powerful security insights through key traffic dashboards such as:

  • Intel: Find IOCs from external sources matched in network traffic.
  • Notices: See situations flagged by the Notice policy for further investigation.
  • IP Interrogation: Identify anomalies by reviewing top protocol usage, internal vs. external connections, top connections by bytes transferred and more.
  • Log Hunting: Accelerate your hunt by narrowing down many logs to only the logs that matter.
  • Detections: Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.
  • Connections: Gain situational awareness using lists of top services, ports, dataflows, originators, and responders.
  • HTTP: Find suspicious HTTP transactions by reviewing a list of top host headers, originators, rare user agents and rare host headers.
  • DNS: Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.
  • Files: Find executables hidden in benign extensions and compressed files.
  • Corelight Egress Monitor: Find risky North/South user connections to weak SSL versions.

Known Issues

Version 2.0.0 of Corelight App For Splunk has the following known issues:

  • None

Support and resources

Questions and answers

Access questions and answers specific to Corelight App For Splunk at https://answers.splunk.com . Be sure to tag your question with the App.

Support

Support is available via email at appsupport@corelight.com. Responses vary on working days between working hours. Find the latest information about the App and integration on the support website.

Installation and Configuration

Software requirements

Splunk Enterprise system requirements

Because this App runs on Splunk Enterprise, all of the Splunk Enterprise system requirements at https://docs.splunk.com/Documentation/Splunk/latest/Installation/Systemrequirements apply.

Download

Download Corelight App For Splunk at https://splunkbase.splunk.com/.

Installation steps

NOTE: Where referenced, TA-CorelightForSplunk is located on Splunkbase.

Deploy to single server instance

Follow these steps to install the app in a single server instance of Splunk Enterprise:

  1. Deploy as you would any App, and restart Splunk. Do NOT install the TA.

Deploy to Splunk Cloud

  1. Have your Splunk Cloud Support handle this installation.

Deploy to a Distributed Environment

  1. For each Search Head in the environment, deploy the App. DO NOT SEND TA to a Search Head Cluster (SHC).
  2. For each indexer in the environment, deploy a copy of the |ta_name| Add-On that is located as mentioned above.

User Guide

Key concepts for Corelight App For Splunk

Configure TA-CorelightForSplunk for use with Corelight.

  1. TA-CorelightForSplunk should be placed upon the servers that will get the forwarded data from the Corelight Sensor.
  2. Questions should be asked at https://www.corelight.com/support

Indexes

Getting Data In

By default all events will be written to the main index. Please see Corelight documentation on how to change the destination index from the appliance.

Searching for Data

By default, all corelight information is searched for using the corelight_idx event type. To change the location for the app to search for Corelight data, edit the corelight_idx event type to point to your Corelight index.

Troubleshoot Corelight App For Splunk

  1. Check the Monitoring Console (>=v6.5) for errors

Lookups

Corelight App For Splunk contains several lookup files.

  • port_descriptions - Gives port descriptions to ports.
  • corelight_systems - Auto-generated from sensor data
  • corelight_services - Auto-generated from services data
  • corelight_dns_ports - Auto-generated from DNS data
  • corelight_dns_record_types - Auto-generated from NDS data
  • corelight_files_mime_types - Auto-generated from files data
  • corelight_software_types - Auto-generated from software data
  • corelight_dns_reply_code - Provided to lookup reply code types

Event Generator

Corelight App For Splunk does make use of an event generator. This allows the product to display data, when there are no inputs configured.

The stanzas are:

  • conn.json.sample
  • conn_red.json.sample
  • metrics_disk.json.sample
  • files.json.sample
  • files_red.json.sample
  • metrics_memory.json.sample
  • metrics_system.json.sample
  • metrics_iface.json.sample
  • metrics_bro.json.sample
  • http.json.sample
  • http_red.json.sample
  • dns.json.sample
  • dns_red.json.sample

Acceleration

  1. Summary Indexing: No
  2. Data Model Acceleration: No
  3. Report Acceleration: No

Release Notes

Version 2.4.2
Oct. 12, 2021
  • New Feature
    • Added Local Network Blocks field in Configuration UI. Direction field will be now evaluated based on the Local Network Blocks for CoreLight SSL logs.
    • Migrated App to the Splunk Add-on Builder v4 to use more modern back-end.
  • Bug
    • Removed lookup for direction value to mitigate disk storage issue.
Version 2.4.1
Sept. 8, 2021

Fix bug blocking release to Splunk Cloud

Version 2.4.0
Sept. 2, 2021

Added mandatory index and product selection page, so that queries could be accelerated by adding indexes
Improved dashboard support for Zeek product data
Added additional drilldowns
Fixed "Log Rates" panel in Home, Overview, and Sensor Overview dashboards
Fixed Corelight Sensor filter in Connections and HTTP dashboards
Updated default time ranges and fixed time constraints across multiple dashboards

Version 2.3.2
April 29, 2021

Version 2.3.2

  • Bug
    • [CL-78] - Fixed fieldalias for ssl_curve
    • [CL-79] - Made objects created by this app accessible to other system apps
Version 2.3.1
April 28, 2021
  • New Feature

    • [CL-76] - Added tap hygiene dashboards
  • Bug

    • [CL-77] - Fixed issue with naming translations within TSV for names with multiple underscores
Version 2.3.0
April 15, 2021

Version 2.3.0 adds support for TSV log format on ingest.

Version 2.2.1
March 30, 2021

New Feature
- Added Suricata Dashboard

Improvement
- Iimproved DNS Hunting dashboard functionality
- Improved support for Open Source Zeek data

Bug
- Corrected issues with Drill-down from SSH Inferences Dashboard

Version 2.2.0
Dec. 28, 2020

Corelight data natively enables Splunk Enterprise Security correlation search functionality for more than 30 correlation searches within the Certificates, Network Resolution, Network Sessions, Network Traffic, and Web data models. Corelight provides data for many Splunk Enterprise Security dashboards out of the box.
• Added parsing and dashboard visibility for Corelight Suricata logs.
• Tagged Suricata for Intrusion Detection data model functionality.
• Improved x509 log tagging for Certificate data model functionality.
• Improved conn log tagging for Network Traffic and Network Session data model functionality.
• Improved dns log tagging for Network Resolution data model functionality.
• Added DNS Hunting dashboard.
• Corrected parsing and extraction issues for corelight_x509_red log.
• Corrected issues with Home and Notices dashboards

Version 2.1.0
July 17, 2020

New SSH dashboard, bug fixes, major ingest and dashboard performance improvements. Community ID can now be generated at search time for non-Corelight data.

Version 2.0.0
Oct. 31, 2019

Updated Dashboards for speed and optimization

Version 1.0.3
May 16, 2019

Fixes the HTTP Panel, much faster.
Adds support for Corelight Reduced logging.

767
Installs
4,258
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.