icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Corelight App For Splunk
SHA256 checksum (corelight-app-for-splunk_249.tgz) a087042432559cfb1ad2b04019a5d555d872dd312f70d0bcb83a7d822f38cdad SHA256 checksum (corelight-app-for-splunk_248.tgz) 953e9ed1fd834070473e5defbd2ac3e37c69b769d59263c65e79855cfd371ee3 SHA256 checksum (corelight-app-for-splunk_247.tgz) 17edebdece3837becd1bb8e228e89218573e308ea1efef76efb0dc166f05b59e SHA256 checksum (corelight-app-for-splunk_246.tgz) 3a1c611cd501740e98fe42d1957fc51c9cf11ae627c7a27d4ac5fdb61805ec60 SHA256 checksum (corelight-app-for-splunk_245.tgz) abdb4211ffff3df1abca5c1377976a8b3cd4d89d08803dd226330dd866ed205a SHA256 checksum (corelight-app-for-splunk_244.tgz) a301e2729d1dfb133726e57cc42d76e45880474e74a53462f16967dd8c7d7a4c
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Corelight App For Splunk

Splunk Cloud
Overview
Details
The Corelight App for Splunk enables incident responders and threat hunters who use Splunk® and Splunk Enterprise Security to work faster and more effectively. The app and required TA extracts information and knowledge from Zeek (formerly known as Bro) via Corelight Sensors or open-source Zeek, resulting in powerful security insights through key traffic dashboards such as:

Intel: Find IOCs from external sources matched in network traffic.

Notices: See situations flagged by the Notice policy for further investigation.

IP Interrogation: Identify anomalies by reviewing top protocol usage, internal vs. external connections, top connections by bytes transferred and more.

Log Hunting: Accelerate your hunt by narrowing down many logs to only the logs that matter.

Detections: Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.

Connections: Gain situational awareness using lists of top services, ports, dataflows, originators, and responders.

HTTP: Find suspicious HTTP transactions by reviewing a list of top host headers, originators, rare user agents and rare host headers.

DNS: Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.

Files: Find executables hidden in benign extensions and compressed files.

Corelight Egress Monitor: Find risky North/South user connections to weak SSL versions.

Corelight App For Splunk Documentation

The Corelight App for Splunk enables incident responders and threat hunters who use Splunk® and Splunk Enterprise Security to work faster and more effectively.

App Version 2.4.9
App Build 124
Splunk Enterprise Versions 9.1, 9.0, 8.2, 8.1
Platforms Splunk Enterprise, Splunk Cloud
Splunkbase Url https://splunkbase.splunk.com/app/3884
Author Aplura, LLC. and Corelight, Inc.
Creates an index False
Implements summarization No
Summary Indexing False
Report Acceleration False
<div class="important"> If upgrading from a Splunk app version 2.4.4 or earlier, the previous app must be deleted for the updated dashboards to appear. Additionally, check in the `local/data/ui/views` folder for conflicting dashboards. </div>

The App and Add-on extract information and knowledge from Zeek (formerly known as Bro) via Corelight Sensors or open-source Zeek, resulting in powerful security insights through key traffic dashboards such as:

  • Intel: Find IOCs from external sources matched in network traffic.

  • Notices: See situations flagged by the Notice policy for further investigation.

  • IP Interrogation: Identify anomalies by reviewing top protocol usage, internal vs. external connections, top connections by bytes transferred and more.

  • Log Hunting: Accelerate your hunt by narrowing down many logs to only the logs that matter.

  • Detections: Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.

  • Connections: Gain situational awareness using lists of top services, ports, dataflows, originators, and responders.

  • HTTP: Find suspicious HTTP transactions by reviewing a list of top host headers, originators, rare user agents and rare host headers.

  • DNS: Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.

  • Files: Find executables hidden in benign extensions and compressed files.

  • Corelight Egress Monitor: Find risky North/South user connections to weak SSL versions.

User Guide

Key concepts for Corelight App For Splunk

Configure the Technical Add-On for use with Corelight.

  1. The Technical Add-On should be placed upon the servers that will get the forwarded data from the Corelight Sensor.

  2. This step is OPTIONAL based on your environment. The full App contains the required configurations for full index-time parsing.

  3. Questions should be asked at https://www.corelight.com/support

Indexes

Getting Data In

By default, all events will be written to the ``main`` index. Please see Corelight documentation on how to change the destination index from the appliance.

Searching for Data

By default, all Corelight information is searched for using the corelight_idx event type. To change the location for the app to search for Corelight data, edit the corelight_idx event type to point to your Corelight index.

Custom Search Commands

cid is a custom command provided to turn a tuple of src_ip, src_port, dest_ip, and dest_port into a community string.

Lookups

Corelight App For Splunk contains several lookup files.

<div class="note"> It is a best practice and recommendation to **not** use the direct CSV name, as these will change between versions. Use the `transforms` name as listed in the table. </div>
Transforms Filename Description
port_descriptions port_desc_2.4.9.csv Gives port descriptions to ports.
corelight_systems corelight_systems_2.4.9.csv Auto-generated from sensor data
corelight_services corelight_services_2.4.9.csv Auto-generated from services data
corelight_dns_ports corelight_dns_ports_2.4.9.csv Auto-generated from DNS data
orelight_dns_record_types corelight_dns_record_type_2.4.9.csv Auto-generated from NDS data
corelight_files_mime_types corelight_files_mime_types_2.4.9.csv Auto-generated from files data
corelight_software_types corelight_software_types_2.4.9.csv Auto-generated from software data
corelight_dns_reply_code corelight_dns_reply_code_2.4.9.csv Provided to lookup reply code types
corelight_conn_state_description corelight_conn_state_description_2.4.9.csv Describes connection states
corelight_status_action corelight_status_action_2.4.9.csv Describes Corelight action and status
ssh_inference ssh_inference_lookup_2.4.9.csv Describes inferences
corelight_inferences_description corelight_inferences_description_2.4.9.csv Describes inferences
corelight_severity corelight_severities_2.4.9.csv Maps severity ids and severity text
corelight_error_messages corelight_error_messages_2.4.9.csv Contains information on Corelight Error messages.

Scripts and binaries

This App provides the following scripts:

  • cid.py

  • Script for use with the cid command.

  • Diag.py

  • Custom diag generation

  • Utilities.py

  • Splunk utilities for python scripts

  • version.py

  • The splunk app version for logging purposes

  • app_properties.py

  • The Splunk extension properties.

Event Generator

Corelight App For Splunk does not make use of an event generator.

Acceleration

  1. Summary Indexing: No

  2. Data Model Acceleration: No

  3. Report Acceleration: No

Known Issues

Version 2.4.9 of Corelight App For Splunk has the following known issues:

  • None

Versions prior to 2.4.7 have the following known issues:

  • Any dashboard that uses the inferences{} field may have issues with search settings.

Versions prior to 2.4.6 have the following known issues:

  • During calculation of the community id with the cid command, the transport was not correct for IPv6 src_ip fields.

Release Notes

Version 2.4.9
Nov. 16, 2023

Version 2.4.9

  • Dashboard Enhancements
  • HTTP
    • Added dropdown filter for User Agents. Shows Top 100 only.
  • VPN Insights
    • Added dropdown filter for Inferences.
    • Fixed incorrect query for Largest Transfers Between Host Pairs Over VPN
  • Intel
    • Added dropdown filter for Incident Types.
  • Notices
    • Added a textual filter field for msg or note fields.
  • Updated Corelight Suricata IDS Alerts dashboard.
  • Extractions
  • Updated various sourcetypes to remove confusion around src/dest fields relating to id.* fields.
Version 2.4.8
July 7, 2023

Version 2.4.8

  • Updated TA for proper permissions to pass Splunk Cloud
  • Updated corelight_ntp sourcetype: correct an if statement
Version 2.4.7
June 1, 2023
  • Removed KV_MODE on corelight_tsv as invalid against INDEXED_EXTRACTIONS
  • Updated lookups to a version based file-naming convention to facilitate Splunk Cloud updates.
  • Additional CIM additions for additional sourcetypes
Version 2.4.6
March 31, 2023

= Version 2.4.6

  • Updated to CIM v5.1
  • Fixed bug in cid search command relating to icmp6 with IPv6 src_ips.
  • Updated inferences props for better extractions.
Version 2.4.5
Sept. 2, 2022
  • Converted cid custom command to a v2 Search Command.
  • Updated splunklib to current version.
  • Updated Configuration Management page
  • Added additional support easier diagnostic gathering
Version 2.4.4
Dec. 3, 2021
  • [New] Added "Passive Identification" dashboard under "Security Workflows".
  • [Enhancemnet] Removed unused jQuery code for improved Splunk Cloud support.

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.