Watch this demonstration of the Splunk Enterprise Security’s incident review framework to learn how you can detect, analyze and respond to security incidents and threats. The demo highlights benefits of using Asset Investigator, Risk and other key concepts in the context of investigating and managing overall Incident Response in SIEM workflows.
Watch this demonstration of the Splunk Enterprise Threat Intelligence capability and gain the ability to quickly detect and investigate threats using Threat Intelligence. Splunk Enterprise Security’s Threat Intelligence framework helps organizations to aggregate, prioritize and manage wide varieties of threat intelligence from threat lists such as STIX/TAXII, Open Source and many more.
Watch this demonstration of Splunk Enterprise Security to learn the key capabilities of Splunk Enterprise Security and how to use it to solve key security challenges. Splunk Enterprise Security helps security practitioners detect, investigate and respond to internal and external attacks by simplifying threat management while minimizing risk to safeguard your business.
After posting about the SPLing Bee back in November, I have got around to trying it out myself. After working out a few bugs, shout out to Charlie Huggard for the help, I have the SPLing Bee ready for download.
In the app, there is the dashboards, inputs, indexes, props, and macros configuration files.
connection_host = ip
index = spl_bee
sourcetype = spl_bee_json
source = spl_bee_input
[spl_bee] coldPath = $SPLUNK_DB/spl_bee/colddb homePath = $SPLUNK_DB/spl_bee/db maxTotalDataSizeMB = 512000 thawedPath = $SPLUNK_DB/spl_bee/thaweddb
[spl_bee_results_csv] INDEXED_EXTRACTIONS = csv KV_MODE = none NO_BINARY_CHECK = true SHOULD_LINEMERGE = false TIMESTAMP_FIELDS = LatestSubmissionTime category = Structured description = Comma-separated value format. Set header and other settings in "Delimited Settings" disabled = false pulldown_type = true DATETIME_CONFIG =
[spl_bee_json] KV_MODE=json NO_BINARY_CHECK = true category = Structured disabled = false pulldown_type = true
definition = inputlookup round1.csv | append [| inputlookup round2.csv] | append [| inputlookup round3.csv] | append [| inputlookup round4.csv] | append [| inputlookup round5.csv] | append [| inputlookup round6.csv] | append [| inputlookup round7.csv] | append [| inputlookup round8.csv] | append [| inputlookup round9.csv]
iseval = 0
If the Splunk indexer you are using to play/judge is publicly available, you can have the contestants use Splunk Cloud trial to spin up machines to play. If your indexer is on a private network, you will need to spin up a Splunk indexer/heavy forwarder to be able to play. The contestant will need a full instance of Splunk and not a universal forwarder as they will need to index data, run searches against the data, and add a Splunk application to the indexer.
Things to do when setting up the game.
- Make sure that the indexer isn’t setup to use port 9997. The SPLing Bee app will setup a TCP input to listen to port 9997.
- Update the text Round 1 of the dashboard with the correct instructions for the contest and where to send the data.
- Make sure there are machines available for the contestants or have the main indexer publicly facing so they can use a Splunk Cloud trial.
For running the contest, Splunk wrote the SPLing_Bee_Directions for .conf2015.
If you were not able to attend the Splunk’s conference, you missed out on a great game. The SPLing Bee is a game that helped you to develop your searching skills.
Here are the SPLing_Bee_Directions that were wrote for .conf2015.
Here is the SPLing_Bee_Application. You’ll also need the sendjobmeta custom search command, this is used for have your contestant instances send their search results / answers to a master instance of your choice – https://splunkbase.splunk.com/app/2839/
It’s best to have everyone use cloud trial instances and install the app + index the sample dataset you want to use. The IP address will be different using the cloud instances whereas if people are using their local instances you may see the same IP come in when trying to judge.
Here is the PowerPoint from the October 2015 meeting:
Thank you to the Nonprofit Hub in Lincoln for allowing us to take over the area. Thank you to Tony Reinke from National Research Corporation, John Foss of Splunk, and Bret Brasfield of Continuum for your presentations. There was a lot of good discussion on Enterprise Security and we were very happy that Kanad Sharma from Splunk Professional Services was there and able to share his experiences.
Take the survey on this meeting and the over all group.
Thank you to everyone that joined us for our developer focused meeting. Thank you to Nimble Storage for providing the food. Thank you to Continuum for providing the drinks. And thank you to National Research for hosting the event. It was great to learn more about writing code for Splunk. Below you will find the PDF of both Tony Reinke of National Research and Brian Knopp of Nimble Storage’s presentations.
Please take a moment and answer a quick 5 question survey. Let us know if you could or could not make the event, rate our speakers, and help us to decide the topics of upcoming meetings.
Recently a call for papers has gone out for the 2015 Splunk Conference. Got a great success story? Made a killer app? They will accept submissions via the Call for Papers until April 28th, and begin announcing accepted sessions on May 28, 2015.
Submit here: http://conf2015cfp.hubb.me/
If you missed the meeting, you can watch the meeting below. We noticed the audio cut out in a few places in the recordings. We will try to catch this quicker in future meetings.
We have recently started to stream our meetings live on YouTube. I put together a how to use Wirecast to stream to YouTube.
Click to download the PDF: Broadcasting on YouTube using Wirecast
The January 2015 user group meeting will be at the First Data offices in Omaha, NE. We will be meeting at 6pm on January 28th.
Register for in person tickets and online viewing tickets at:
Watch Live on YouTube:
Schedule of Events:
6:00pm – Start Meeting, Introductions and Welcomes
6:15pm – How First Data using Splunk – Patrick Swartz of First Data will show us how First Data is currently using Splunk.
6:45pm – Getting your data in to Splunk – Mike Mizener of Continuum Security Solutions will teach us about getting our data in to Splunk. Learn just what all the .conf files do and why they are there.
7:30pm – Violin Memory – Philip Wieczorek will be joining us to talk about Violin Memory and how their products can help you with your Splunk instances.
8:30pm – Networking
Tony Reinke spoke at the Cornhusker Chapter of AITP tonight. He gave an overview of what Splunk is and how it can be used.
Download Slides or view the slides below