CIM compliant TA to enable Netflow v5, v9 and IPFIX events in Splunk (Enterprise Security)
This CIM compliant TA can be used with Splunk Enterprise Security and
provides field extractions, aliases, and tags for Netflow v5, v9 and IPFIX data
that has been collected by Logstash.
This fills the Traffic Center panel under Security Domains -> Network in Splunk
Enterprise Security:
Configure Logstash to output a .json file for the received netflow data, for example with the following config file:
input {
udp {
port => 2055
codec => netflow {
versions => [5,9,10]
}
}
}
output {
file {
codec => "json_lines"
path => "/var/log/netflow/netflow.json"
}
}
Have the Splunk Universal Forwarder index the netflow.json
file, for example with the following Splunk inputs.conf:
[monitor:///var/log/netflow/netflow.json]
disabled = false
sourcetype = netflow_raw
index=netflow_raw
Create 2 Splunk indexes:
netflow_raw
This index will temporarily hold the Netflow data, so you can keep it small at e.g. 1GB.
netflow
This index will hold the flow objects built from the netflow_raw index, so size it for proper retention. This index will be filled through a scheduled Splunk search that runs every minute.
Logstash has been tested with the following netflow probes:
netflow probe | v5 | v9 | v10 / IPFIX | output fields |
---|---|---|---|---|
fprobe | y | N | N | Only netflow v5 so no ipv6 |
softflowd | y | y | y | |
nprobe | y | y | y | |
ipt_NETFLOW | y | y | y |
The TA provides fields compatible with the Splunk Common Information Model (CIM):
The original fields are also still available through the netflow.
prefix, followed by their Netflow field names:
TODO
Any feedback in the form of patches, feature requests, bug reports or just an email is most welcome.
If you want to provide patches, please do so through a Pull Request.
If you have any bug reports or feature requests, please submit them to the issue tracker.