In our previous article, we have covered
with Splunk master server setup with a brief demonstration of Dashboard setup
or Log monitoring you can visit that article from here.
Once done with a complete server setup we need to focus on how to bring the
logs from the network environment into Splunk for indexing. We are going to
import data from the client machine or a network of 100 or 1000’s of pc into the
Splunk server that we setuped previously and what else needs to be indexed.
Now let us see how to forward the logs
or Data from client-server to Splunk Enterprise.
Table of Content
·
Prerequisites
·
Configure a receiving on Splunk
Enterprise
·
Configure the receiver using
command line
·
Configure receiver using
configuration file
·
Environment
·
Download and install Universal Forwarder
·
Configure Universal Forwarder to send data Splunk Enterprise
·
Windows Log Monitoring
·
Threat monitoring
Prerequisites
To configure Splunk universal Forwarder on
your client-server, there are some prerequisites required for installation.
§ Windows, Linux systems, or cloud servers with admin access.
§ Splunk Universal forwarder
§ Attacker: Kali Linux
Configure a Receiving on Splunk Enterprise
On your Splunk Dashboard you must configure an indexer to receive data
before you can send data to it. If you did not do this, then your data not
going anywhere.
Use Splunk web interface to configure a receiver for Splunk-to-Splunk
(S2S) communication. To do this follow the below steps
·
Log into Splunk web using your credentials
·
On Splunk web go to Settings > Forwarding and Receiving
·
Select “configure Receiving”.
·
Verify the existing ports are open or not. If there are no ports
available, then add a port also you cannot create a duplicate receiver port. The
most suitable receiver port on indexers is port 9997.
·
Select “New receiving port.”
·
Add a port number and save and do not forget to verify that port is
available or not reserved to any other service or instance.
·
Check the status for receiving port, it should enable for listening the
traffic.
Alternative method: Configure a receiver using
the command line
Use the command-line interface with Admin privilege in windows 10 or
terminal with root user to configure a receiver for S2S communications. To do
this follow the steps as described below.
·
Open a shell with admin rights or terminal with root user
·
Change the path to $SPLUNK_HOME/bin
·
(For Linux) Type:
./splunk enable listen 9997 -auth admin:password
·
(For windows) Type:
Splunk enable listen 9997 -auth admin: password
·
Restart Splunk for the changes to take effect by going into Splunk web
interface setting > server control > restart Splunk.
or
Alternative method: Configure a receiver using
a Configuration file
For
windows
Configure
an inputs.conf file for S2S communication:
·
Open a shell prompt
·
Change the path to $SPLUNK_HOME/etc/system/local
·
Edit the inputs.conf file.
·
Edit the input.conf file with [
splunktcp ] stanza
and define the receiving port. Example:
[splunktcp://9997]
disabled
= 0
·
Save the file.
·
Restart Splunk to take effect of the saved changes.
For
Linux
Open
the Splunk forwarder directory wherever it installs and locate the file named input.conf
and make changes as described above or as per your requirements.
Environment
In this blog, we will target to install a Splunk Universal Forwarder
on a Windows Machine or server. You can download Splunk forwarder by
following the below link.
Choose your installation package
·
Create a Splunk Account and
download Splunk universal forwarder for Windows version by the given above
link.
·
We choose Windows 10 64 bit
.msi Package for the installation in windows. You can choose it as per your
system requirements.
Or also for Linux systems, you
can go with the options are available to download on the Splunk website by drop
down the option Linux then select and download package as per your choice as
shown below.
Install Splunk Universal Forwarder on
Windows 10
To install Universal forwarder into your operating systems, follow the
steps as described below:
Visit the Splunk official website and
select and download universal forwarder for Windows 10 .msi file. It
will download a Zip file into your downloads as shown below.
When it gets downloaded open it and
start the installation process and accept the license agreement then go to customize
options as shown below:
Further, select the installation
directory wherever you want to install it as shown below
Further, it will ask you to for an SSL
certificate for the encryption with your encryption key if you do not have the
SSL certificate then don’t worry forwarded Splunk data will still be encrypted
with the default Splunk certificate all you need to do is go with Next
option.
On the next dialogue you will have two options:
·
Local System. If you specify
the Local System user during the installation process, the universal
forwarder can access all your data on that is available on your local system or
forwarded to this machine.
·
Domain account. This option
installs the forwarder as the Windows user specifies this lets you collect logs
and metrics from remote machines as well as local and forwarded data. You can
set the permissions of account in the next dialogue, as a local administrator
or a reduced privilege user It does not collect data from resources that the
Windows user does not have access to.
So, we go with the option Local
Systems and Install the forwarder as a Local account to do any of
the following:
·
Read Event Logs remotely
·
It Collects all your system
performance counters remotely
·
Read network shares for log
files
·
It can Access the Active
Directory schema, using Active
Directory monitoring if you select it
Then, it will ask you to select the
applications or log files that you want to forward to Splunk Enterprise or
receiver and then proceed with the next option as shown below.
In the next dialogue, it will ask you to create credentials for the administrator account to encrypt all your files on Splunk Enterprise.
On the next dialogue, it will be
(optional) to configure your forwarder as a deployment server if you choose it
then enter the hostname or IP address and management port for your deployment
server and click next
In my case, I will leave it blank and prefer
to go with the next option.
On the next dialogue setup Receiving
indexer by entering the Hostname or IP and port as shown below
And then finally select option Install
it will install Splunk forwarder in your windows environment
After that finish, the installation
process.
Let’s verify the output.conf file to
check is it forwarded to the Receiver or not.
To do this follow the steps as described
below.
Go to file manager and open the
directory where Splunk Universal forwarder installed.
Open the file SplunkUniversalForwarder
file and then open the output.conf file it will be found in under etc >
system > local
By opening it we can verify it either it
is redirected to the correct IP or not as entered during the installation
process if not you can make changes by editing it.
Configure Universal Forwarder to Send
Data to Splunk Enterprise
Open CMD as Admin privilege and follow
the steps described below:
cd c:\Program
Files\SplunkUniversalForwarder
cd bin
splunk add-forward-server
192.168.0.196:9997
splunk enable eventlog system
splunk restart
Congratulations! You have successfully
added Windows as a client
Let’s check what happens to the Splunk
GUI interface is it added or not
As you can see our client is
successfully added
Now search your client into Search and
reporting application by simply running a query index=”main”
Windows Log Monitoring
Let’s check it shows or not suspicious activity happened on our client
end
To do this I m going take RDP session of my client
Now I have an RDP session of my Client let’s check what happens on
Splunk web
Whoa! It works 😊
Great!
Now you can Dig down deeper it with running search Queries.
Threat Monitoring
Let’s monitor what illegal or suspicious activity happens on your client
end or server
To do this I m going to perform a brute-force attack with the help of an
Attacker machine: Kali Linux
To perform this attack run the following command below.
hydra -L user.txt -P pass.txt 192.168.0.196 ssh
where 192.168.0.196 is my client-server IP
Let’s check what happens to Splunk web
hold tight! It’s gonna a little bit special
Run a Query in the Application search and Reporting “sshd: session” and
then see
Owsm! AS we can see it have multiple invalid logins Attempts of invalid
user
Now you can monitor your whole
Environment by using these steps.
Let’s end here.
0 comments:
Post a Comment