icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Gigamon Application Intelligence for Splunk
SHA256 checksum (gigamon-application-intelligence-for-splunk_102.tgz) a741ddee77403a76193ec6a0f16c7ae74a9ba0c9b84d39c5ba3c363da5749221
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Gigamon Application Intelligence for Splunk

Splunk AppInspect Passed
Overview
Details
The Gigamon Application Intelligence for Splunk allows customers to easily select, index and display Application metadata generated by the Gigamon's Application Metadata Intelligence.

The GigaSECURE Security Delivery Platform allows users to extract and consolidate metadata from any monitored network traffic flows, package them into IPFIX or CEF records, then send them to Splunk Enterprise for indexing.

End User License Agreement

Installation and use of this app signifies acceptance of the Gigamon End User License Agreement(EULA) inclusive of any future updates.

Quick Start

Navigate to the Installation steps section for a step-by-step installation.

Table of Contents

OVERVIEW

  • About Gigamon Application Intelligence for Splunk
  • Release notes
  • Scripts and binaries
  • Known issues
  • Support and resources

INSTALLATION

  • Requirements
  • Installation steps
  • Deploy to a Single Server Instance

CONFIGURABILITY

  • Editing csv files

OVERVIEW

About Gigamon Application Intelligence for Splunk

About Gigamon Application Intelligence for Splunk
App Version 1.0.0
Folder Name Gigamon_Application_Intelligence
Vendor Products GigaVUE-OS >=5.7 with GigaSMART
Splunk Requirements Splunk Stream >= 7.1.3
Splunk Requirements URL Toolbox >= 1.6
Splunk Requirements Python for Scientific Computing (for Linux 64-bit) >= 1.3
Splunk Requirements TA-IOC Lookup >= 2.0.1
Has index-time operations true (SEDCMD for ASN.1 Encoded Elements)
Create an index false
Implements summarization false

Gigamon Application Intelligence for Splunk allows a Splunk Admin the ability to configure Splunk Stream for Gigamon Specific elements over IPFIX or CEF.

Scripts and binaries

There is a script located in /Gigamon_Application_Intelligence/appserver/static/library and called SplunkAppconfiguration.py called SplunkAppconfiguration.py
This script automates setting up Splunk Stream for ingesting IPFIX

Release notes

These are the improvements packaged as part of version 1.0.0.
* This is the first release for this app

About this release

Version 1.0.0 of Gigamon Application Intelligence for Splunk is compatible with:

Item Value
Splunk Enterprise versions 6.5, 6.6, 7.0.0, 7.1.1, 7.3.0
Splunk Stream versions 7.0.1, 7.1.x
URL Toolbox 1.6
CIM 4.8
Platforms Platform independent
Vendor Products GigaVUE-OS >=5.7 with GigaSMART

Gigamon Metadata Application For Splunk requires Splunk Stream 7.3.0 or higher to ingest IPFIX data. Splunk Stream is not required to ingest CEF data.

Fixed issues

Version 1.0.0 of Gigamon Application Intelligence for Splunk fixes the following issues:

  • No Fixed Issues. If you find an error, please contact support.

Known issues

Version 1.0.0 of Gigamon_Application_Intelligence has the following known issues:

  • When upgrading between Splunk Stream versions:
    • the splunk_app_stream vocabulary file will be deleted. This needs restored with the correct version of the vocab.
    • the splunk_app_stream stream file will be deleted. This needs restored with the correct version of the stream.
    • the change in streams (metadata vs packet) requires the deletion and re-addition of the configured netflow stream.
    • follow the instructions listed under ##### Install into Stream ::install_stream_manual:: to restore correct vocabulary files.
  • If the netflow stream file is changed, any existing streams using that stream configuration need to be deleted and re-added.

Support and resources

Questions and answers

Access questions and answers specific to Gigamon_Application_Intelligence at https://answers.splunk.com.

Support

Support Email: apps@gigamon.com or App.Splunk@gigamon.com
Please visit https://answers.splunk.com, and ask your question regarding Gigamon Metadata Application For Splunk. Please tag your question with the correct App Tag, and your question will be attended to.

INSTALLATION AND CONFIGURATION

Software requirements

To function properly, Gigamon Metadata Application For Splunk requires the following software:

  • Splunk 6.5, 6.6, 7.0.0, 7.1.1,7.3.x
  • Splunk Stream >= 7.3.0
  • URL Toolbox >= 1.6
  • GigaVUE-OS >= 5.7

Splunk Enterprise system requirements

Because this add-on runs on Splunk Enterprise, all of the Splunk Enterprise system requirements apply.

Because this add-on requires Splunk Stream, all of the Splunk Stream system requirements apply.

Download

Download Gigamon Metadata Application For Splunk at Splunkbase.
<br/>

Installation steps ::gsi::

Deploy to single server instance

Follow these steps to install the app in a single server instance of Splunk Enterprise:

  1. Download the Gigamon Metadata Application For Splunk package from https://splunkbase.splunk.com.
  2. Install the App via the recommended installation methods (CLI, Web GUI)
  3. Restart Splunk.
  4. See the Instructions below.

Steps to Ingest CEF Data

  1. Edit $SPLUNK_HOME/etc/apps/GigamonMetadataForSplunk/appserver/static/library/gigamon_cef_inputs.conf to change the receiver port to your local settings (replace PORT).
  2. Copy gigamon_cef_inputs.conf to $SPLUNK_HOME/etc/apps/GigamonMetadataForSplunk/inputs.conf

Here is an example output of inputs.conf file
[udp://10514]
connection_host = ip
sourcetype = cefevents

10514 above is the port number. Change it to whatever the port number desired. Make sure that it matches with port number configuration on GigaSMART device.

Steps to ingest IPFIX

The Gigamon and Stream integration requires precise adherence to the instructions. Failure to do so may cause Stream to not collect the Gigamon IPFIX data appropriately.

The GSI (Gigamon and Stream Integration) is an advanced configuration technique, designed to extend the protocol decoding abilities of Splunk Stream. As this feature relies on Splunk Stream, Splunk Stream is a requirement and must be installed on your Splunk server(s). Please see the instructions on how to install Splunk Stream.

Install Stream ::ss_install::

If you are installing Stream for the first time, the preferred version at this time is 7.3.x. If you have an existing stream installation, ensure the version number is 7.1.3 (other versions, if available, have not been tested).

NOTE: The NIC associated with the Netflow collection should not be in promiscuous mode. Stream is being used as a protocol decoder in this configuration only.

Extend Stream

In order to extend the base installation of Stream, there must be file-level changes made. There are two installation methods, script and manual. The base location of the Gigamon-specific configuration is $SPLUNK_HOME/etc/apps/GigamonMetadaForSplunk/appserver/static/library. $SPLUNK_HOME refers to the install location of Splunk.

Manual Configuration ::install_manual::

This configuration method requires the user to edit and copy various files to locations in the splunk_app_stream and Splunk_TA_stream apps. $SPLUNK_HOME refers to the install location of Splunk.

Install into Stream ::install_stream_manual::
  1. Edit $SPLUNK_HOME/etc/apps/GigamonMetadaForSplunk/appserver/static/library/gigamon_streamfwd.conf to change the reciever IP and Port to your local settings (replace @@IP and @@PORT).
  2. Copy $SPLUNK_HOME/etc/apps/GigamonMetadaForSplunk/appserver/static/library/gigamon_streamfwd.conf to $SPLUNK_HOME/etc/apps/splunk_app_stream/local/streamfwd.conf and $SPLUNK_HOME/etc/apps/Splunk_TA_stream/local/streamfwd.conf.
  3. Copy the Splunk Stream Version-specific vocabulary file (see file names right below) to $SPLUNK_HOME/etc/apps/splunk_app_stream/default/vocabularies/gigamon.xml and $SPLUNK_HOME/etc/apps/Splunk_TA_stream/default/vocabularies/gigamon.xml.
    1. For Splunk Stream 7.1.3: gigamon_vocabulary_7.1.3.xml
  4. Copy $SPLUNK_HOME/etc/apps/GigamonMetadaForSplunk/appserver/static/library/gamon_stream.json to $SPLUNK_HOME/etc/apps/splunk_app_stream/default/streams/netflow.
  5. GigaSMART occasionally sends data elements encoded in ASN.1 to Stream. To avoid excessive license usage, apply the following fix.
    1. On the system indexing the Stream data (typically where splunk_app_stream is installed), edit the $SPLUNK_HOME/etc/apps/splunk_app_stream/local/props.conf file.
    2. For the stanza [stream:netflow], add this line of configuration: SEDCMD-remove_nulls_gigamon = s/\\u0000//g. If the stanza doesn't exist, create it.
    3. This SEDCMD will remove any data that cannot be decoded correctly.
  6. Restart Splunk.
  7. Configure Stream via the steps at Stream Configuration.

Stream Configuration ::stream_config::

Full and complete documentation of Stream Configuration is located at docs.splunk.com. This instructions use Stream 7.1.0 as the basis, but instructions for Stream 7.0.1 are available as well at Stream 7.0.1 - User Manual - Configure Streams.

  1. On the Splunk Home page, click on the app “Splunk Stream”
  2. Use the navigation bar: Configuration -> Configure Streams
  3. In the top right of the dashboard, click New Stream -> Metadata Stream
    1. ( Full Documentation here)
  4. Basic Info
    1. Protocol: Netflow
    2. Name: your source name
    3. Click Next
  5. Aggregation ( Full documentation here)
    1. Click Next to accept the default of No
  6. Fields ( Full documentation here)
    1. Deselect the fields that you do not want to collect
    2. Click Next
  7. Filters ( Full documentation here)
    1. Create a filter to limit the data that is collected
    2. Click Next
  8. Settings
    1. Select an index to collect data to
    2. Select the status
    3. Click Next
  9. Groups
    1. Select a forwarder group (if applicable)
    2. Click Create Stream
  10. Done
    1. Click Done

Stream Upgrade Notes

  • When upgrading Stream:

    • the splunk_app_stream vocabulary file will be deleted. This needs restored with the correct version of the vocab.
      • Follow Step 3 in the Manual Configuration.
    • the splunk_app_stream stream file will be deleted. This needs restored with the correct version of the stream.
      • Follow Step 4 in the Manual Configuration.
  • If the netflow stream file is changed, any existing streams using that stream configuration need to be deleted and re-added.

Troubleshoot Gigamon Application Intelligence for Splunk

The best place to start troubleshooting Gigamon Application Intelligence for Splunk is to visit the Monitoring Console Health Check. There are 4 specific checks related to the Gigamon Stream configuration.
Click the "Start" button and then review the results.

If you are still having problems, use the Command line and run this command:

$SPLUNK_HOME/bin/splunk diag --collect app:GigamonApplicationIntelligence

Send the generated diag file to Gigamon Application Intelligence for Splunk support.

Upgrade Gigamon Application Intelligence for Splunk

Gigamon Application Intelligence for Splunk by re-installing into your environment per Splunk Documentation and your environment (see steps above).

Third-party software attributions

Gigamon Application Intelligence for Splunk incorporates the third-party software or libraries referred at the path $SPLUNK_HOME/etc/apps/Gigamon_Application_Intelligence/appserver/static/html/3pp.md

Configurability

Each of the use cases supported in this app are shown in their own dashboards. Each of these use cases run Splunk query to get the data, massage that data and then compared that data against configured entries. Many of the use cases in this app are configurable and configuration files for each of these use cases present in <splunk_home>/etc/apps/ Gigamon_Application_Intelligence/lookups

corp_domains.csv

This file contains the domain name of the organization. It’s used to look into all DNS records to collect host address to host name mapping. Edit this file to put your organization domain name. In the example below replace “.gigamon.com” to say “.google.com”

Sample domain name:

cat corp_domains.csv

domain, valid
"*.gigamon.com",1

priv_user.csv

This file contains login id and host name of privilege users of the organization. Network admins, SOC admins and finance admins are considered privilege users. You can customize this file to include your own list of privilege users. This file is used in the use-case High Privilege User Login Activity.
Sample priv_user.csv:

cat priv_user.csv

"host_name","login_id"
"lt-Ptom-mac.gigamon.com",ptom
"dt-Sdave-mac.gigamon.com",sdave

corp_networks.csv

This file contains allowed corporate network subnets. It’s used to validate endpoints of remote connections for the use case Suspicious Remote connections. Edit this file to put your organization allowed network subnets.

Sample corp_networks.csv

cat corp_networks.csv

network_prefix,network_type,valid
10.,corp,1
192.
,remote,1

server_list.csv

This file contains trusted and known servers allowed in the organization. Servers in this file are used to validate against rogue servers seen in the organization. Currently this file is used to validate DNS and DHCP servers for the use case Rogue Servers. Edit this file to put your own server IP address and server type.

Sample server_list.csv:

cat server_list.csv

Server,State,Type
1.2.3.4,Trusted,DNS
8.8.8.8,Known,DNS
4.4.4.4,Known,DNS
1.2.3.5,Trusted,DHCP

Release Notes

Version 1.0.2
July 23, 2019

Version 1.0.2

**New Features**
Enhanced Overview Section to update dynamically.

15
Installs
27
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2019 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.