icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Corelight App For Splunk
SHA256 checksum (corelight-app-for-splunk_256.tgz) 118d1925c87063c48a80d6495f43c340ca683e8605d66897c815c5e2660cbb1d SHA256 checksum (corelight-app-for-splunk_254.tgz) 55df3d4fe0a8d1e9d305e8c73d737557b52f7832ae0a4238ecfec1f742633c97 SHA256 checksum (corelight-app-for-splunk_253.tgz) e0a00f482263c19b007dfbcf4fa7fa86e95a39eae2aaa49516f5192660af5b17 SHA256 checksum (corelight-app-for-splunk_252.tgz) 34d2146b5c761b2aa3675233dc353db8c59f09167c7608aa2c03bd777ae75d17 SHA256 checksum (corelight-app-for-splunk_251.tgz) b007cd46802274d0bb9d20eb35d9dbae54159805098addee0b97ca3ce840f929 SHA256 checksum (corelight-app-for-splunk_250.tgz) 8a42e1a1013530b3f7b399c58fc09241d9260f52cd2f92091efa6a0cd917010e SHA256 checksum (corelight-app-for-splunk_249.tgz) a7a26af2fd5055f38d3a921d1a262b384b26d5007d79b0c67c1dcf986101cc9c SHA256 checksum (corelight-app-for-splunk_248.tgz) 3eb7b79e4ef1df86ac44d07c090be95d0d37d19ace7b42e1138d5c52796d3594 SHA256 checksum (corelight-app-for-splunk_247.tgz) c60df0aadb48d471988e66f52b7711ee2cfe3a847989fe394aa0126a917f7eeb SHA256 checksum (corelight-app-for-splunk_246.tgz) fa622b0beff2533a9ed87f05135c62f43a00169961bf7ff34d128d1e1a9dfe02 SHA256 checksum (corelight-app-for-splunk_245.tgz) 0781422a7be782880d2b082e3f1645b6fab78195c609e89801bb388267f3e08d SHA256 checksum (corelight-app-for-splunk_244.tgz) 65293388bd63ec84cb31900a20b6507facf3608fb37f38c43361d45e86f14ea1
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Corelight App For Splunk

Splunk Cloud
Overview
Details
The Corelight App for Splunk enables incident responders and threat hunters who use Splunk® and Splunk Enterprise Security to work faster and more effectively. The app and required TA extracts information and knowledge from Zeek (formerly known as Bro) via Corelight Sensors or open-source Zeek, resulting in powerful security insights through key traffic dashboards such as:

Intel: Find IOCs from external sources matched in network traffic.

Notices: See situations flagged by the Notice policy for further investigation.

IP Interrogation: Identify anomalies by reviewing top protocol usage, internal vs. external connections, top connections by bytes transferred and more.

Log Hunting: Accelerate your hunt by narrowing down many logs to only the logs that matter.

Detections: Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.

Connections: Gain situational awareness using lists of top services, ports, dataflows, originators, and responders.

HTTP: Find suspicious HTTP transactions by reviewing a list of top host headers, originators, rare user agents and rare host headers.

DNS: Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.

Files: Find executables hidden in benign extensions and compressed files.

Corelight Egress Monitor: Find risky North/South user connections to weak SSL versions.

Corelight App For Splunk Documentation

The Corelight App for Splunk enables incident responders and threat hunters who use Splunk® and Splunk Enterprise Security to work faster and more effectively.

App Version 2.5.6
App Build 185
Splunk Enterprise Versions 10.X, 9.X
Platforms Splunk Enterprise, Splunk Cloud
Splunkbase Url https://splunkbase.splunk.com/app/3884
Author Aplura, LLC. and Corelight, Inc.
Creates an index False
Implements summarization No
Summary Indexing False
Report Acceleration False
Release Date 06/16/2025

IMPORTANT

When upgrading from Corelight App For Splunk version 2.4.4 or earlier, remove the previous app before installing the latest Corelight App For Splunk app release. Additionally, check in the local/data/ui/views folder for conflicting dashboards.

Corrupt CSV

In versions of Corelight App For Splunk 2.5.3 and earlier, there is a semi-corrupt lookup. The lookup still works as intended, but will generate an increased volume in internal logging warnings. These additional logs do not increase license usage, as they are in the _internal index. The following search command can be executed within the Corelight App For Splunk to correct the CSV.

| inputlookup corelight_base64conversion |outputlookup corelight_base64conversion

Corelight App For Splunk - Dashboard Overview

The Corelight App For Splunk transforms complex network data into actionable security intelligence, enabling faster threat detection and incident response. By seamlessly integrating with Corelight Sensors and Zeek data, the app provides security teams with comprehensive visibility through specialized dashboards covering alert aggregation, protocol analysis, threat intelligence matching, and network behavior analytics. Built for security analysts, incident responders, and threat hunters, the app streamlines investigation workflows and enhances threat hunting capabilities with features like MITRE ATT&CK framework integration, automated alert correlation, and detailed traffic analysis.

Security Workflows Dashboards

  • Alert Aggregations: Consolidates and prioritizes security alerts with MITRE ATT&CK mapping for streamlined threat response

  • Intel: Monitors IOC matches from external threat intelligence sources in network traffic

  • IP Interrogation: Analyzes specific IP addresses for connection patterns, protocol usage, and network interactions

  • Log Hunting: Enables detailed investigation of network events with customizable filters and search criteria

  • Notices: Tracks system-generated security notices and intelligence alerts with severity classification

  • Security Posture: Provides comprehensive overview of network security status including alerts, encryption, and DNS health

  • RDP Inferences: Monitors Remote Desktop Protocol connections, authentication patterns, and security protocols

  • SSH Inferences: Analyzes SSH connection patterns, authentication methods, and potential security issues

  • Suricata IDS Alert Overview: Displays intrusion detection alerts with temporal patterns and severity levels

  • VPN Insights: Tracks VPN usage patterns, connections, and user activity across the network

Data Explorer Dashboards

  • Connections: Visualizes top services, ports, dataflows, and network connection patterns

  • DNS: Monitors DNS query patterns and potential exfiltration attempts through domain analysis

  • Files: Identifies suspicious files, executables, and compressed file transfers

  • HTTP: Analyzes HTTP transactions for suspicious patterns in headers, user agents, and requests

  • Software: Tracks software versions and usage patterns across monitored network traffic

  • SSL and x509: Monitors SSL/TLS certificates and validation status for encrypted traffic

Data Insights Dashboards

  • Secure Channel Insights: Analyzes encrypted and non-encrypted SSL, SSH, TLS, and x509 traffic

  • Name Resolution Insights: Provides deep analysis of DNS traffic patterns and potential threats

  • Remote Activity Insights: Monitors remote access patterns and authentication attempts

Corelight Menu Dashboards

  • Configuration: Manages app settings, indexes, and logging configuration

  • Lookup Generation: Creates and manages lookup files for dashboard filtering

  • Sensor Overview: Provides operational status of Corelight sensors

  • About: Displays app version information and documentation

User Guide

Custom Search Commands

cid is a custom command provided to turn a tuple of src_ip, src_port, dest_ip, and dest_port into a community string.

Lookups

Corelight App For Splunk contains several lookup files.

<div class="note"> It is a best practice and recommendation to **not** use the direct CSV name, as these will change between versions. Use the `transforms` name as listed in the table. </div>
Transforms Filename Description
port_descriptions port_desc_2.5.6.csv Gives port descriptions to ports.
corelight_systems corelight_systems_2.5.6.csv Auto-generated from sensor data
corelight_services corelight_services_2.5.6.csv Auto-generated from services data
corelight_dns_ports corelight_dns_ports_2.5.6.csv Auto-generated from DNS data
corelight_dns_record_types corelight_dns_record_type_2.5.6.csv Auto-generated from NDS data
corelight_files_mime_types corelight_files_mime_types_2.5.6.csv Auto-generated from files data
corelight_software_types corelight_software_types_2.5.6.csv Auto-generated from software data
corelight_dns_reply_code corelight_dns_reply_code_2.5.6.csv Provided to lookup reply code types
corelight_conn_state_description corelight_conn_state_description_2.5.6.csv Describes connection states
corelight_status_action corelight_status_action_2.5.6.csv Describes Corelight action and status
ssh_inference ssh_inference_lookup_2.5.6.csv Describes inferences
corelight_inferences_description corelight_inferences_description_2.5.6.csv Describes inferences
corelight_severity corelight_severities_2.5.6.csv Maps severity ids and severity text
corelight_error_messages corelight_error_messages_2.5.6.csv Contains information on Corelight Error messages.
corelight_alert_aggregations corelight_alert_aggregations_enrichment.csv Provides enrichments for Suricata alerts.

Scripts and binaries

This App provides the following scripts:

  • cid.py

  • Script for use with the cid command.

  • Diag.py

  • Custom diag generation

  • Utilities.py

  • Splunk utilities for python scripts

  • version.py

  • The splunk app version for logging purposes

  • app_properties.py

  • The Splunk extension properties.

Event Generator

Corelight App For Splunk does not make use of an event generator.

Acceleration

  1. Summary Indexing: No

  2. Data Model Acceleration: No

  3. Report Acceleration: No

Installation

Software requirements

Splunk Enterprise system requirements

Review the Splunk Enterprise system requirements at Splunk Enterprise system Requirements at https://docs.splunk.com.

Download

The Corelight App For Splunk and the TA for Corelight add-on are available on Splunkbase.

Important: The TA for Corelight add-on is required on indexers, or index clusters. If your Corelight sensors send data directly to a heavy forwarder or a Splunk Cloud Platform receiver that is a heavy forwarder, the TA for Corelight is also required on those instances. The add-on is not required on search heads, or single-instance Splunk Enterprise environments.

App Installation steps

Your Splunk Enterprise infrastructure will determine where the Corelight App for Splunk is installed.

Splunk Cloud Platform customers

Contact your Splunk Administrator before installing Splunk apps in your Splunk Cloud Platform environment. The Corelight App for Splunk supports self-service installation. Cloud app installation guidance is available in Install apps on your Splunk Cloud Platform deployment at https://docs.splunk.com

Splunk Enterprise on-premises customers

When working with an on-premises Splunk Enterprise infrastructure, contact your Splunk Administrator to determine what locations and options are available for installing and distributing Splunk Apps. Installing Splunk apps typically requires administrative credentials.

Splunk Enterprise single-instance

To deploy to single server instance of Splunk Enterprise:

  1. Log in to Splunk Web as an administrator.

  2. Browse to Apps > Find More Apps.

  3. Use the search box to find Corelight.

  4. Click the Install button for the Corelight App for Splunk.

  5. (Optional) If a restart is required, click Restart Splunk to restart Splunk services.

Other Splunk Enterprise architectures

Review the Corelight App for Splunk documentation at https://docs.corelight.com

Install the Add-on

The TA for Corelight add-on is required on indexers, or index clusters. If your Corelight sensors send data directly to a heavy forwarder or a Splunk Cloud Platform receiver that is a heavy forwarder, the TA for Corelight is also required on those instances. The add-on is not required on search heads, or single-instance Splunk Enterprise environments.

  • Contact your Splunk Administrator. To determine which instances require the TA for Corelight add-on, you must understand the data flow from the sensor network to the Splunk Enterprise indexers, including any intermediate forwarding layers, and the tools used to deploy changes to those Splunk Enterprise instances.

Configuration Steps

Configuring the Corelight App For Splunk requires the ``admin_all_objects`` capability, typical reserved for administrative users only. Once the configuration changes are saved, the admin user is no longer required.

  1. Log in to Splunk Web on the search head as an administrator.

  2. Browse to Apps > Corelight App for Splunk.

  3. Select the Corelight drop-down, and click Configuration.

  4. Review the Indexes field, and add all indexes that contain Corelight sensor log data.

  5. Review the Products field, and verify that Corelight is selected.

    • If the Corelight option is selected, the dashboard searches will use log data source types beginning with the name ``corelight_``.

    • If the Zeek option is selected, the dashboard searches will use log data source types beginning with the name ``bro_``. If those source types do not exist in the indexes configured, the dashboard panels will display a warning about missing eventtypes. For example, ``Eventtype bro_x509 does not exist or is disabled.`` If your sensor log sources don’t use source type names starting with ``bro_``, you can disable the Zeek option.

  6. Review the Local Network Block(s) field, and define your local networks in CIDR format. The networks defined in the app should match the Local Network Blocks defined on the Corelight sensor, or in the Fleet Manager sensor policy. For more information on sensor local networks, see Configure network infrastructure at https://docs.corelight.com.

  7. (Optional) In the Aggregation Saved Searches field, enable the Corelight Suricata Detections search option. The search runs on a 10-minute interval by default, and generates data for the corelight_suri_aggregations sourcetype.

  8. Under Application Control, click the Application Configured switch.

Enable the lookup generating searches

The Corelight App for Splunk includes lookup searches used to populate filters on the Corelight App dashboards.

  1. Log in to Splunk Web on the search head as an administrator.

  2. Browse to Apps > Corelight App for Splunk.

  3. Select the Corelight drop-down, and click Configuration.

  4. In the Lookup Generators section, verify the lookup generating searches are enabled.

The lookup searches run on a 60-minute interval by default.

Generate the lookup files manually

The lookup generating searches run on a schedule by default. You can generate the lookup files immediately by running the lookup searches manually.

Next Steps

Use app dashboards such as the Data Explorer dashboards to verify the sensor data is available in Splunk Enterprise, and the Corelight App For Splunk is configured.

Troubleshooting

Actions

  • Check the Monitoring Console for errors

  • Validate if the Index(s), Product(s) and Local Network Block(s) are configured (Corelight > Configuration).

  • Ensure the lookup tables were fully updated by running the searches in the Lookup Generation dashboard (Corelight > Lookup Generation)

Support

App support is available through the Corelight Support site at https://corelight.com.

You can find the latest documentation on the Corelight documentation site at https://docs.corelight.com.

Customer Agreement and Licensing

  • For information related to access and use of Corelight Offerings, please refer to the following document.

Release Notes

Version 2.5.6

  • Improvements
  • Updated props to ensure that all sourcetypes evaluate the sensor name correctly.

Version 2.5.5

  • POTENTIAL BREAKING Change

  • Due to enforcement of Splunk AppInspect check check_props_conf_has_no_prohibited_characters_in_sourcetypes, the "wildcard" property in props.conf has been REMOVED.

  • The settings are included below for reference if needed.

  • NOTE: This will not be available in Splunk Cloud.

    [(?::){0}corelight*]
    TRUNCATE                 = 9999999
    SHOULD_LINEMERGE         = FALSE
    TIME_PREFIX              = _write_ts(?:"\s*:\s*")?
    TIME_FORMAT              = %Y-%m-%dT%H:%M:%S.%6QZ
    MAX_TIMESTAMP_LOOKAHEAD  = 40
    KV_MODE                  = JSON
    FIELDALIAS-dest          = id.resp_h ASNEW dest id.resp_h ASNEW id_resp_h
    FIELDALIAS-dest_ip       = id.resp_h ASNEW dest_ip
    FIELDALIAS-dest_port     = id.resp_p ASNEW dest_port id.resp_p ASNEW id_resp_p
    FIELDALIAS-src           = id.orig_h ASNEW src id.orig_h ASNEW id_orig_h
    FIELDALIAS-src_ip        = id.orig_h ASNEW src_ip
    FIELDALIAS-src_port      = id.orig_p ASNEW src_port id.orig_p ASNEW id_orig_p
    EVAL-direction           = case(isnotnull(direction),direction,local_orig="true" AND local_resp="true", "internal", local_orig="true" and local_resp="false", "outbound", local_orig="false" and local_resp="false", "external", local_orig="false" and local_resp="true", "inbound", 1=1, "unknown")
    EVAL-is_broadcast        = if(src in("0.0.0.0", "255.255.255.255") OR dest in("255.255.255.255", "0.0.0.0"),"true","false")
    EVAL-is_src_internal_ip  = if(cidrmatch("10.0.0.0/8",src) OR cidrmatch("172.16.0.0/12",src) OR cidrmatch("192.168.0.0/16", src), "true", "false")
    EVAL-is_dest_internal_ip = if(cidrmatch("10.0.0.0/8",dest) OR cidrmatch("172.16.0.0/12",dest) OR cidrmatch("192.168.0.0/16", dest), "true", "false")
    EVAL-vendor_product      = "Corelight"
    EVAL-vendor              = "Corelight"
    EVAL-sensor_name         = coalesce(system_name, host, "unknown")
    

Release Notes

Version 2.5.6
June 16, 2025

Version 2.5.6

  • Improvements
  • Updated props to ensure that all sourcetypes evaluate the sensor name correctly.
Version 2.5.4
March 31, 2025

=== Version 2.5.4

  • Administrative Change
    ** The app is no longer exported system by default. Please see latest Splunk documentation to enable system-wide export of knowledge objects. This change is to allow Splunk Administrators the ability to review all configurations prior to making the configurations globally available.
  • Bugs
    Fixed bugs in sourcetype corelight_investigator_alerts
    FIELDALIAS of _time caused subsearch failure in ITSI specific searches
    ** EVAL of src_ip and dest_ip have incorrect mvfilters
Version 2.5.3
March 5, 2025

Version 2.5.3

  • Documentation
  • Updated documentation
  • Sourcetypes
  • Added new sourcetype corelight_investigator_alerts
  • Dashboards
  • Added new "Operational Insights" dashboard to explore sensor health
Version 2.5.2
Jan. 22, 2025

Release Notes

Version 2.5.2

  • Configuration Dashboard
    • Index Dropdown updated to allow more than 30 indexes
    • Added toggles to enable/disable Saved Searches
  • Python Library
    • Updated Python library splunk-sdk to 2.1.0
Version 2.5.1
Nov. 25, 2024
  • Introducing a new suite of dashboards designed to aggregate Suricata alerts. These dashboards feature AI-driven enrichments and mappings to the MITRE ATT&CK framework, offering a comprehensive analytical perspective.
  • New Dashboards:
    • Alert Aggregations
    • Alert Aggregations Details
  • Added corelight_ssh to the CIM framework with accurate tagging and mapping to their respective Splunk Data Models.
  • Removed versioning from generated lookups to prevent upgrade issues between generations.
  • Enhanced search performance on Security Posture panels, including SMBv1, FTP, and DNS.
  • Updated corelight_http, corelight_http_red, and corelight_http2 stanzas in props.conf to correctly handle field aliases for bytes_in and bytes_out.
  • Removed versioning from generated lookups to prevent upgrade issues between generations.
  • Updated various dashboards for formatting and search optimizations.
  • Upgraded splunk-sdk to 2.0.2.
Version 2.5.0
May 17, 2024

Version 2.5.0

  • Dashboard Updates
  • Updated the Welcome dashboard
  • Added Security Posture
  • Added Secure Channel Insights
  • Added Name Resolution Insights
  • Added Remote Activity Insights
Version 2.4.9
Nov. 16, 2023

Version 2.4.9

  • Dashboard Enhancements
  • HTTP
    • Added dropdown filter for User Agents. Shows Top 100 only.
  • VPN Insights
    • Added dropdown filter for Inferences.
    • Fixed incorrect query for Largest Transfers Between Host Pairs Over VPN
  • Intel
    • Added dropdown filter for Incident Types.
  • Notices
    • Added a textual filter field for msg or note fields.
  • Updated Corelight Suricata IDS Alerts dashboard.
  • Extractions
  • Updated various sourcetypes to remove confusion around src/dest fields relating to id.* fields.
Version 2.4.8
July 7, 2023

Version 2.4.8

  • Updated TA for proper permissions to pass Splunk Cloud
  • Updated corelight_ntp sourcetype: correct an if statement
Version 2.4.7
June 1, 2023
  • Removed KV_MODE on corelight_tsv as invalid against INDEXED_EXTRACTIONS
  • Updated lookups to a version based file-naming convention to facilitate Splunk Cloud updates.
  • Additional CIM additions for additional sourcetypes
Version 2.4.6
March 31, 2023

= Version 2.4.6

  • Updated to CIM v5.1
  • Fixed bug in cid search command relating to icmp6 with IPv6 src_ips.
  • Updated inferences props for better extractions.
Version 2.4.5
Sept. 2, 2022
  • Converted cid custom command to a v2 Search Command.
  • Updated splunklib to current version.
  • Updated Configuration Management page
  • Added additional support easier diagnostic gathering
Version 2.4.4
Dec. 3, 2021
  • [New] Added "Passive Identification" dashboard under "Security Workflows".
  • [Enhancemnet] Removed unused jQuery code for improved Splunk Cloud support.

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.