icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Corelight App For Splunk
SHA256 checksum (corelight-app-for-splunk_200.tgz) 169c20f7f212f1d7665da2782905fdac6a8fa7a658410bf083340800e670e637 SHA256 checksum (corelight-app-for-splunk_103.tgz) ea6dc94338793089b0819b46c8cf1a427f73109fef096103acc99859d9933a02
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Corelight App For Splunk

Splunk AppInspect Passed
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
Overview
Details
The Corelight App for Splunk enables incident responders and threat hunters who use Splunk® and Splunk Enterprise Security to work faster and more effectively. The app and required TA extracts information and knowledge from Zeek (formerly known as Bro) via Corelight Sensors or open-source Zeek, resulting in powerful security insights through key traffic dashboards such as:

Intel: Find IOCs from external sources matched in network traffic.

Notices: See situations flagged by the Notice policy for further investigation.

IP Interrogation: Identify anomalies by reviewing top protocol usage, internal vs. external connections, top connections by bytes transferred and more.

Log Hunting: Accelerate your hunt by narrowing down many logs to only the logs that matter.

Detections: Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.

Connections: Gain situational awareness using lists of top services, ports, dataflows, originators, and responders.

HTTP: Find suspicious HTTP transactions by reviewing a list of top host headers, originators, rare user agents and rare host headers.

DNS: Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.

Files: Find executables hidden in benign extensions and compressed files.

Corelight Egress Monitor: Find risky North/South user connections to weak SSL versions.

Welcome to Corelight for Splunk Apps documentation!

Overview

About Corelight App For Splunk

Author Aplura, LLC. Corelight, Inc.
App Version 2.0.0
App Build 167
Vendor Products Corelight Sensor
Has index-time operations false
Creates an index false
Implements summarization Currently, the app does not generate summaries

About Corelight App For Splunk

Corelight App For Splunk allows a Splunk Enterprise administrator to extract information and knowledge from Bro data via the Corelight Sensor appliance or open-source Bro

Scripts and binaries

This App provides the following scripts:

  • None

Release notes

Version 2.0.0

  • Improvement
    • [CL-56] - Updated and Optimized Dashboards

Version 1.0.3

  • Bug
    • [CL-51] - HTTP Search needs updated
  • Improvement
    • [CL-52] - Add _red sourcetypes
    • [CL-53] - Rework HTTP Page
    • [CL-54] - RED DNS field update

Version 1.0.2

  • Bug

    • [CL-47] - Update DNS Dashboard
  • Improvement

    • [CL-50] - Update CIM for new data types

Version 1.0.1

  • Bug

    • [CL-42] - Conn data does not always display service
  • Improvement

    • [CL-43] - Panel Rename
    • [CL-44] - Update sparkline
    • [CL-45] - Dashboard Search Optimizations

Version 1.0.0

  • New Feature

    • [CL-3] - Custom Icons
    • [CL-5] - Build Eventgen
    • [CL-6] - Overview Dashboard
    • [CL-11] - CIM Mapping
    • [CL-17] - Workflow Action
    • [CL-18] - HTTP Dashboard
    • [CL-19] - DNS Dashboard
  • Improvement

    • [CL-10] - Documentation
    • [CL-21] - Improve HTTP Dashboard
    • [CL-22] - Overview Updates
    • [CL-23] - Overview Dashboard
    • [CL-24] - Connections Page - Revise
    • [CL-25] - DNS Dashboard - Revise
    • [CL-26] - Files Dashboard - Revise
    • [CL-27] - SSL Dashboard
    • [CL-28] - Software Dashboard
    • [CL-29] - Connections Revision
    • [CL-30] - DNS Revisions
    • [CL-31] - Files Revisions
    • [CL-32] - HTTP Revisions
    • [CL-33] - Software Revisions
    • [CL-34] - Dashboard Improvements
    • [CL-35] - Dashboards
    • [CL-36] - Minor Edits and Updates
    • [CL-38] - Documentation
    • [CL-40] - Tags
    • [CL-41] - Additional Dashboard Changes
  • Sub-task

    • [CL-14] - Corelight Connection
    • [CL-15] - Corelight SSL
    • [CL-16] - Corelight File

About this release

Version 2.0.0 of Corelight App For Splunk is compatible with:

Splunk Enterprise versions 6.6, 7.0
Platforms Splunk Enterprise

Compatability

The app and TA extracts information and knowledge from Zeek (formerly known as Bro) via Corelight Sensors or open-source Zeek, resulting in powerful security insights through key traffic dashboards such as:

  • Intel: Find IOCs from external sources matched in network traffic.
  • Notices: See situations flagged by the Notice policy for further investigation.
  • IP Interrogation: Identify anomalies by reviewing top protocol usage, internal vs. external connections, top connections by bytes transferred and more.
  • Log Hunting: Accelerate your hunt by narrowing down many logs to only the logs that matter.
  • Detections: Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.
  • Connections: Gain situational awareness using lists of top services, ports, dataflows, originators, and responders.
  • HTTP: Find suspicious HTTP transactions by reviewing a list of top host headers, originators, rare user agents and rare host headers.
  • DNS: Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.
  • Files: Find executables hidden in benign extensions and compressed files.
  • Corelight Egress Monitor: Find risky North/South user connections to weak SSL versions.

Known Issues

Version 2.0.0 of Corelight App For Splunk has the following known issues:

  • None

Support and resources

Questions and answers

Access questions and answers specific to Corelight App For Splunk at https://answers.splunk.com . Be sure to tag your question with the App.

Support

Support is available via email at appsupport@corelight.com. Responses vary on working days between working hours. Find the latest information about the App and integration on the support website.

Installation and Configuration

Software requirements

Splunk Enterprise system requirements

Because this App runs on Splunk Enterprise, all of the Splunk Enterprise system requirements at https://docs.splunk.com/Documentation/Splunk/latest/Installation/Systemrequirements apply.

Download

Download Corelight App For Splunk at https://splunkbase.splunk.com/.

Installation steps

NOTE: Where referenced, TA-CorelightForSplunk is located on Splunkbase.

Deploy to single server instance

Follow these steps to install the app in a single server instance of Splunk Enterprise:

  1. Deploy as you would any App, and restart Splunk. Do NOT install the TA.

Deploy to Splunk Cloud

  1. Have your Splunk Cloud Support handle this installation.

Deploy to a Distributed Environment

  1. For each Search Head in the environment, deploy the App. DO NOT SEND TA to a Search Head Cluster (SHC).
  2. For each indexer in the environment, deploy a copy of the |ta_name| Add-On that is located as mentioned above.

User Guide

Key concepts for Corelight App For Splunk

Configure TA-CorelightForSplunk for use with Corelight.

  1. TA-CorelightForSplunk should be placed upon the servers that will get the forwarded data from the Corelight Sensor.
  2. Questions should be asked at https://www.corelight.com/support

Indexes

Getting Data In

By default all events will be written to the main index. Please see Corelight documentation on how to change the destination index from the appliance.

Searching for Data

By default, all corelight information is searched for using the corelight_idx event type. To change the location for the app to search for Corelight data, edit the corelight_idx event type to point to your Corelight index.

Troubleshoot Corelight App For Splunk

  1. Check the Monitoring Console (>=v6.5) for errors

Lookups

Corelight App For Splunk contains several lookup files.

  • port_descriptions - Gives port descriptions to ports.
  • corelight_systems - Auto-generated from sensor data
  • corelight_services - Auto-generated from services data
  • corelight_dns_ports - Auto-generated from DNS data
  • corelight_dns_record_types - Auto-generated from NDS data
  • corelight_files_mime_types - Auto-generated from files data
  • corelight_software_types - Auto-generated from software data
  • corelight_dns_reply_code - Provided to lookup reply code types

Event Generator

Corelight App For Splunk does make use of an event generator. This allows the product to display data, when there are no inputs configured.

The stanzas are:

  • conn.json.sample
  • conn_red.json.sample
  • metrics_disk.json.sample
  • files.json.sample
  • files_red.json.sample
  • metrics_memory.json.sample
  • metrics_system.json.sample
  • metrics_iface.json.sample
  • metrics_bro.json.sample
  • http.json.sample
  • http_red.json.sample
  • dns.json.sample
  • dns_red.json.sample

Acceleration

  1. Summary Indexing: No
  2. Data Model Acceleration: No
  3. Report Acceleration: No

Release Notes

Version 2.0.0
Oct. 31, 2019

Updated Dashboards for speed and optimization

Version 1.0.3
May 16, 2019

Fixes the HTTP Panel, much faster.
Adds support for Corelight Reduced logging.

196
Installs
943
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2019 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.