The TA for Zeek allows a Splunk Enterprise administrator to parse open source Zeek data in JSON or TSV format, and map it into the Common Information Model for use by multiple Splunk security apps.
Author | Aplura, LLC |
App Version | 1.0.8 |
App Build | 14 |
Creates an index | False |
Implements summarization | No |
Summary Indexing | False |
Data Model Acceleration | None |
Report Acceleration | None |
Splunk Enterprise versions | 9.x, 8.x |
Platforms | Splunk Enterprise |
This App provides the following scripts:
Corelight Add-on for Zeek contains the following lookup files.
bro_conn_state.csv
bro_note_alert_type.csv
bro_protocols.csv
bro_status_action.csv
bro_tc_flag.csv
bro_vendor_info.csv
Corelight Add-on for Zeek does not include an event generator.
Summary Indexing: No
Data Model Acceleration: No
Report Acceleration: No
Bug
[DESK-1539] - Updated props.conf
for zeek:files
to remove an incorrect evaluator (!==
) from an eval statement.
Bug
[DESK-1537] - Updated props.conf
for zeek:ssl
to include the proper lookup definition.
props.conf
for zeek:files
to remove an incorrect evaluator (!==
) from an eval statement.props.conf
for zeek:ssl
to include the proper lookup definition.Fixed a bug in the mapping of the dest_port field
Add DNS field mappings for improved Enterprise Security/CIM functionality
Added new FIELDALIAS values per field request
Add several FIELDALIAS items for CIM mapping, as well as event types that make the data render better within the Corelight App for Splunk.
Minor bug fixes
• Updated “action” field to produce values in line with the Network Traffic data model, including removing the mappings for actions from the notice log.
• Moved several fields from global declarations to local ones based on where the data will actually be present:
◦ attachment_type
◦ bytes
◦ bytes_in
◦ bytes_out
◦ duration
◦ file_name
◦ http_content_type
◦ lease_duration
◦ message_id
◦ method
◦ packets
◦ packets_in
◦ packets_out
◦ record_type
◦ referrer
◦ request_body_len
◦ response_body_len
◦ sender
◦ service
◦ status
◦ transport
◦ url
◦ user_agent
◦ user
• Removed incorrect mappings for “body”, “subject”, “orig_recipient”, and “severity”
• Added mappings for “ssl_issuer_email” and “ssl_issuer_organization”
• Added a value for vendor_action field
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.