Security Event Monitoring with Splunk

Setting up the Splunk Enterprise on the Ubuntu 20.04 system

First, I tried creating an instance through Linode's Cloud, however, ran into multiple errors including this error code:



After hours of researching and trying to configure/update the certificates being used, it still wouldn't budge, so instead of using a cloud instance, I decided to download the Splunk Enterprise software directly onto my Ubuntu box.

Here were the steps taken in order to install Splunk:
wget -O splunk-8.2.4-87e2dda940d1-linux-2.6-amd64.deb
ls (copy the download file name)
sudo apt install ./(paste the download file name)
sudo su
cd /opt/splunk/bin
./splunk start --accept_license -y

splunklogin

Configuring features on Splunk

Now that Splunk is downloaded and we are logged in, we want to make some changes first in order to configure for our lab environment.

Once you are brought to the Dashboard, we want to first configure the receiving of data:



confnewport

Next, Find more Apps on the top left and scroll to Browse More Apps

Setting up the Universal Forwarder

In order to collect the data that is coming from the Snort IDS and into the Splunk Application, we must download and use the Splunk Universal Forwarder.

The Splunk Universal Forwarder is responsible for forwarding/collecting the data from remote sources and forwarding the data into Splunk software for indexing and consolidation.

They can be used to scale tens of thousands of remote systems, collecting terabytes of data.

Here are the steps in order to download the Universal Forwarder:

Now that the file has been installed, change to the splunkforwarder/bin directory. Accept the license agreement and create a username and password for the forwarder.

Configuring Forward Server to forward the data to the Splunk Server:

sudo ./splunk add forward-server 127.0.0.1:9997


Next we are responsible for configuring the outputs.conf / inputs.conf files. confoutput

Next we want to add the actual path of the file we want forwarded to the Splunk Application:
sudo ./splunk add monitor /var/log/snort/alert

Lastly, the following should be added in to the inputs.conf file which can be found under this file path: Before we run splunk, we have to restart the splunk application.

confinput

Analyzing the Data

With the configuration out of the way, we can now view the imported data by navigating under Search and Reporting and clicking on Data Summary and then under sources.

If configured correctly, the data should be present with the name of the file being the name of the virtual machine.

Using Splunk, you are able to break down each event, view the full event and time stamp.

You are able to visualize each event with selected fields to create graphs, charts, or any other form of visualization to view trends.

Troubleshooting and Errors

While running through this lab I had many different errors.

One flaw I ran into was reaching the maximum free disk space reached error when trying to conduct a search using the Installed Snort Alert for Splunk App.

Link: https://medium.com/@sweetdee360/making-my-way-through-splunk-bff7c1ccb1c1
One of the biggest problems I was facing was through the File Monitoring Input.

I was having trouble with the Ingestion Latency and Real-time Reader-0.

These two factors were telling me that the monitor input couldn’t produce data because the process queues were full and passing the threshold.

I tried searching for the error and haven’t really found a feasible solution that would be able to work.

splunkerror