Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Aplura Network Traffic App for Splunk
SHA256 checksum (aplura-network-traffic-app-for-splunk_120.tgz) d3f4356a102fb730c79f0e1dbd8591e8a77533e32db29cf76eeca318d70dca27
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Aplura Network Traffic App for Splunk

Overview
Details
App for exporting and reporting on Network Traffic events.

Aplura Network Traffic App for Splunk Documentation

Overview

About Aplura Network Traffic App for Splunk

Author Aplura, LLC.
App Version 1.2.0
App Build 15
Creates an index false
Implements summarization Currently, the app does not generate summaries

App for exporting and reporting on Network Traffic events.

Scripts and binaries

This App provides the following scripts:

Diag.py For use with the diag command.

Release notes

Version 1.2.0

  • Initial Release

About this release

Version 1.2.0 of Aplura Network Traffic App for Splunk is compatible with:

Splunk Enterprise versions 7.0, 7.1
Platforms Splunk Enterprise

Overview

Very often, network traffic events can provide a lot of information about misconfigurations, potential attacks, and user activity. This app provides searches and dashboards based on the Splunk Common Information Model to help provide insight into your network traffic.

A note on Splunk Data Model Acceleration and Disk Space

This app requires data model acceleration, which will use additional disk space. If you are using the Splunk App for Enterprise Security, this is already enabled, and should have been factored into your retention policies. If not, you should review the documentation on data model acceleration, how it uses disk space, and how to plan for it.

A note on the Splunk Common Information Model

As mentioned above, the app uses the CIM for network traffic events. The CIM allows you to take events from a number of network traffic sources or products, and report on them in one cohesive manner, using a common set of names for fields and event types.

A note on the Network Traffic Data Model, src, dest, src_ip, and dest_ip

The Network Traffic data model includes both src, dest fields, and src_ip, dest_ip fields. For this app, we have opted to use the *_ip versions of these fields, in case hostnames are being used for the other fields. Make sure your field extractions are correctly populating these fields.

Available Dashboards

Overview

Provides a general overview of the network traffic events.

IP Profile

Provides information around an IP address (both dest_ip and src_ip), including traffic from, to, and possible open ports.

Transport Information

Information around the transport field of events (TCP, UDP, ICMP, etc.).

Port Information

This form provides information based on the destination port (dest_port) field of events, such as the traffic over time, conversations, and sources.

Internal and External Traffic

Currently just top destinations (external and from external to internal). The determination on internal vs. external is configured by macros. See the App Configuration Macros section of this document.

Scanning Activity

This dashboard provides the top potential scanners (both host and port scanners) based on network traffic.

Geographic Information

This is based on the geo-ip information provided by the built-in IP location from Splunk. Internal traffic is excluded from this page. Note: The searches on this page may take a while to load.

Network Traffic Search

A form which allows for searching network traffic events based on a few different parameters.

Sourcetype Information

Note: This dashboard is not shown in the navigation bar. To view this dashboard, go to Settings -> User Interface -> Views -> and select the Open option next to the sourcetype_information item in the list.

Prerequisites

Splunk Versions

This app has been tested with Splunk versions 7.0 and 7.1. This app should be installed on the same search head on which the |data_model| data model has been accelerated.

Splunk Common Information Model Add-on

This app depends on data models included in the Splunk Common Information Model Add-on, specifically the |data_model| data model. Please review the information on installing and using the Splunk Common Information Model Add-on and information on configuring the acceleration on the data model.

The Splunk Common Information Model Add-on can be downloaded from Splunkbase.

This app has been tested with versions 4.9 of the CIM add-on.

Data model Acceleration on the Instrusion data model

In order to make the app respond and load quickly, accelerated data models are used to provide summary data. For this data to be available, the |data_model| data model must be accelerated. Information on how to enable acceleration for the |data_model| data model can be found here. The data model must be accelerated for the length of time for which you would like to see reporting.

Installation

This app should be installed on a search head where the |data_model| data model has been accelerated. More information on installing or upgrading Splunk apps can be found here.

Simple Installation Process

  • Make sure the field extractions and tags on your network traffic events are correct.
  • Install the Splunk Common Information Model Add-on (skip if you are installing on an ES search head).
  • Install the Aplura Network Traffic App for Splunk for Splunk.
  • Enable accelerations on the |data_model| data model (skip if you are installing on an ES search head).
  • Wait for the accelerations to start. After the acceleration searches have run, you should start seeing the dashboards populate.
  • Restart Splunk.
  • Continue with App Configuration.

App Configuration

This app may require some configuration before it will work properly (outside of the configuration of the Data Model Acceleration). In particular, you may need to edit the configuration macros, as well as the dropdown which populates the Device dropdown found on many of the dashboards.

App Configuration Macros

network_traffic_dvcs

This macro contains the search which is used to populate the Devices dropdown found on many of the dashboards. By default this is the auto-generated lookup, however, the macro can be edited to point to another lookup as needed.

network_traffic_dest_external

This macro contains a partial search which determines when a network traffic events destination IP address is external to your network. By default this will exclude private IP addresses, but can be edited to reflect your own network configuration. Note: this search snippet is used in searches using the accelerated data models and the tstats command. While the normal SPL does support CIDR, tstats does not. Make sure your search syntax will work with the tstats command.

network_traffic_src_external

This macro contains a partial search which determines when a network traffic events source IP address is external to your network. By default this will exclude private IP addresses, but can be edited to reflect your own network configuration. Note: this search snippet is used in searches using the accelerated data models and the tstats command. While the normal SPL does support CIDR, tstats does not. Make sure your search syntax will work with the tstats command.

Device Dropdown Lookup

For the Device dropdown, present on many of the dashboards, you can use the auto-generated lookup, which runs every morning at 2 am. If your Network_Traffic data model is populated, you can run the saved search network_traffic_dvc_auto_gen to populate the dropdown.

The lookup has two fields: dvc and device_name. device_name can be a description of the device. dvc can be wild-carded (not CIDR, as that is not available in tstats searches used with the accelerated data models). The search used to populate this dropdown can be configured using the network_traffic_dvcs macro.

References

Splunk Common Information Model

Downloads

Known Issues

Version 1.2.0 of Aplura Network Traffic App for Splunk has the following known issues:

  • None

Support and resources

Questions and answers

Access questions and answers specific to Aplura Network Traffic App for Splunk at https://answers.splunk.com . Be sure to tag your question with the App.

Support

  • Support Email: None
  • Support Offered: Splunk Answers

Installation and Configuration

Software requirements

Splunk Enterprise system requirements

Because this App runs on Splunk Enterprise, all of the Splunk Enterprise system requirements apply.

Download

Download Aplura Network Traffic App for Splunk at https://splunkbase.splunk.com.

Installation steps

Deploy to single server instance

Follow these steps to install the app in a single server instance of Splunk Enterprise:

  1. Deploy as you would any App, and restart Splunk.
  2. Configure.

Deploy to Splunk Cloud

  1. Have your Splunk Cloud Support handle this installation.

Deploy to a Distributed Environment

  1. For each Search Head in the environment, deploy a copy of the App.

User Guide

Configure Aplura Network Traffic App for Splunk

  • Install the App according to your environment (see steps above)

Lookups

Aplura Network Traffic App for Splunk contains the following lookup files.

  • None

Event Generator

Aplura Network Traffic App for Splunk does not include an event generator.

Acceleration

  1. Summary Indexing: No
  2. Data Model Acceleration: If Enabled
  3. Report Acceleration: No

Third Party Notices

Version 1.2.0 of Aplura Network Traffic App for Splunk incorporates the following Third-party software or third-party services.

  • None

Related Topics

2018, Aplura, LLC. | Powered by Sphinx 1.6.4 & Alabaster 0.7.10

Release Notes

Version 1.2.0
Sept. 30, 2018

Initial Release

29
Installs
88
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2018 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.