NOTE: This add-on works properly only on a Single Instance of Splunk Cloud and Splunk Enterprise. It does not work on a Cluster environment.
Am working to fix this issue.
This Add-on does not add any logs to Splunk license because it does not ingest the logs into any index.
The logs are filtered by it and properly formatted into csv files that are named on the add-on.
It is built for security teams that do not have MISP installed but need to ingest IOCs that can be used for use case correlation or for threat hunting. It does not have all the IPs, and URLs but it has some that can help any security team from reputable open source websites such as Abuse.ch and Proofpoint firewall block IPs
Added a search named ioc-opensourceIP that combines all the IPs into one CSV file and removes duplicate IPs from the lists. This search runs once daily and replaces the old csv file with a new one every time it runs.
In order for the search which is located on the IPURL IOC Ingestion app to run, it needs to be enabled.
Note: When it runs the first time, it produces this error "The lookup table 'ioc-opensourceIP.csv' requires a .csv or KV store lookup definition".
That is what happens in Splunk when the outputlookup command is used in a search and needs to create a new file that was not previously created. Refresh to see the results and since the new csv file is created. It should run smoothly.
This Addon downloads IPs and URL from Proofpoint IP blocklist, Cisco Talos Snort blocklist, Abuse CNC blocklist and URLHAUS. All these lists are cleaned and placed into a CSV file that can be used for correlation.
A search will be needed by the security team to combine these IPs into one CSV file to remove duplicates from all these sources on version 1.0.0.
Note: In order for the Add-on to start downloading new IOCs, a new input will need to be created after the installation.
As regarding Splunk Cloud, this Add-on should be installed on Splunk Cloud IDM but the new input should be created on the Splunk Cloud Search Head in order for the CSV files to be properly used in the correlation.
As regarding Splunk Enterprise, this add-on can be installed on either the Indexer or Search head depending on where the correlation needs to be done.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.