How to Install Splunk on Ubuntu server?

  • Home
  • How to Install Splunk on Ubuntu server?

How to Install Splunk on Ubuntu server?

image

In this article, I'll explain how to install the latest Splunk on an Ubuntu server. Splunk is aimed to process the data to make it useful for the user without manipulating the original data. It is one of the most powerful tools for analyzing, exploring, and searching data. It is one of the easiest way to index, search, collect and visualize massive data streams in real-time from the application, web servers, databases, server platforms, Cloud-networks, and many more.

Splunk Architecture

There are three main components in Splunk as shown below:

  1. Splunk Forwarder
  2. Splunk Indexer
  3. Splunk Search head
splunk Architecture

As you can see Splunk Forwarder is used for data forwarding. It is the component that is used for collecting the logs. Splunk Indexer is the one used for Parsing and Indexing the data. Splunk instance transforms the incoming data into events and stores it in indexes for performing search operations efficiently. Lastly the Splunk Search Head is a Graphical interface used for searching, analyzing, and reporting.

Installing Splunk on Ubuntu 18.04

Create a Splunk account and download the  Splunk Enterprise Software from their official website here.

Download Splunk Enterprise

Now upload the downloaded file to your Ubuntu 18.04 server and place it in a temporary directory. Next, we can run the dpkg command to install the Splunk server.

# dpkg -i splunk-7.1.0-2e75b3406c5b-linux-2.6-amd64.deb
 Selecting previously unselected package splunk.
 (Reading database ... 66600 files and directories currently installed.)
 Preparing to unpack splunk-7.1.0-2e75b3406c5b-linux-2.6-amd64.deb ...
 Unpacking splunk (7.1.0) ...
 Setting up splunk (7.1.0) ...
 complete

Secondly, we need to create the init.d script so that we can easily start and stop Splunk. Change to the Splunk binary directory at /opt/splunk/bin/  and run Splunk executable with the below arguments.

#cd /opt/splunk/bin/
# ./splunk enable boot-start

Splunk Software License Agreement 04.24.2018

Do you agree with this license? [y/n]: y
Do you agree with this license? [y/n]: y

This appears to be your first time running this version of Splunk.

An Admin password must be set before installation proceeds.
Password must contain at least:
* 8 total printable ASCII character(s).
Please enter a new password:
Please confirm new password:
Copying '/opt/splunk/etc/openldap/ldap.conf.default' to '/opt/splunk/etc/openldap/ldap.conf'.
Generating RSA private key, 2048 bit long modulus
.......+++
................+++
e is 65537 (0x10001)
writing RSA key

Generating RSA private key, 2048 bit long modulus
.............................................................+++
............+++
e is 65537 (0x10001)
writing RSA key

Moving '/opt/splunk/share/splunk/search_mrsparkle/modules.new' to '/opt/splunk/share/splunk/search_mrsparkle/modules'.
Init script installed at /etc/init.d/splunk.
Init script is configured to run at boot.

During this process, you can Press the Spacebar to go through the license agreement and then type Y to accept it as shown in the installation logs. Finally, we can start the Splunk Service with the command below:

# service splunk start

Now you can access your Splunk Web interface at http://Server-IP:8000/ or http://Server-hostname:8000 . You need to make sure this port 8000 is open on your server firewall.

Login Splunk Page

You can provide the admin login credentials created during the installation phase to access your Splunk GUI interface. Once you logged in, you will have your Splunk Dashboard ready to use.

Home Splunk 7.1.0

There are different categories listed over on the home page. You can choose the required one and start Spelunking.

Adding a task

I'm adding an example for a simple task which is been added to the Splunk system. Just see my snapshots to understand how I added it. My task is to add /var/log folder to the Splunk system for monitoring.

Step1:

Open up the Splunk Web interface and choose the Add Data option to start with.

Step 2:

The Add Data Tab opens up with three options: Upload, Monitor, and Forward. Each option is self-explanatory with a short description of the purpose. Here our task is to monitor a folder, so we go ahead with Monitor.

Splunk Monitor

In the Monitor option, there are four categories as below:

Files & Directories: To monitor files/folders

HTTP Event Collector: Monitor data streams over HTTP

TCP/ UDP: Monitor traffic over the TCP/UDP ports

Scripts: Monitor Custom Scripts or Commands

Step 3:

According to our purpose, I choose the Files & Directories option.

Add Data Select Source Splunk 7.1.0

Step 4:

Now, I'm browsing the exact folder path /var/log from the server to monitor. Once you select the settings, you can click Next and Review.

Add Data Select Source Log
Review Splunk 7.1.0

Once all your settings are reviewed, you can click 'Submit' to conclude.

Step 5:

Now you have added successfully your data source to Splunk for monitoring. You can start searching and monitoring the log file as required. I have narrowed down the logs to Apache application on the server.

This is just a simple example of Splunking, you can add as many tasks to this and explore your local or remote server data. It also provides you with tools to create tables and visualizations using multiple fields and metrics depending on your log analysis.



Image Jan 9, 2023

What is Threat Intelligence ?

Cybersecurity is a complex and constantly evolving field. As threats change, so must the way we approach them. One of the most essential tools in any cybersecurity practitioner’s toolkit is threat intelligence.What is Threat Intelligence?Threat intelligence is a critical component of effective cyber defense. It’s an ongoing process that requires the collaboration of many different teams and organizations, including security operations centers (SOCs), threat research teams, network engineering, and forensics experts.TI can be used in three primary ways: Identify cyber threats and vulnerabilities before they are exploited. Detect suspicious behavior within your network and respond quickly if an attack occurs. Improve the overall security posture of your organization by helping you prioritize your efforts based on accurate threat information and analysis.Why is Threat Intelligence Important?Threat intelligence sheds light on the unknown by helping security professionals understand how an adversary operates, their intentions, and how they intend to carry out their objectives.Threat intelligence helps you better understand the adversary’s decision-making process so that you can prevent attacks from happening in the future.Threat intelligence empowers business stakeholders – including executive boards, CISOs, CIOs, and CTOs – with the information they need to make informed decisions based on data rather than speculation or assumptions about an attack’s likelihood or impact.Who Benefits from Threat Intelligence?A good threat intelligence program provides value to a wide range of stakeholders. Here’s a list of some of the key groups that can benefit from threat intelligence:IT security professionalsIT security managers and directorsChief information security officers (CISOs)Chief information officers (CIOs)Chief executive officers (CEOs)The Lifecycle of Threat IntelligenceIn the past, cyberattacks were limited to a small number of computers located in one country. Nowadays, however, attacks are much more widespread and can be launched from anywhere in the world. As a result, it’s becoming increasingly difficult for security teams to keep track of all the latest threats and stay on top of them quickly enough before they cause any damage.This is where the threat intelligence lifecycle comes in handy: it’s a comprehensive framework that organizes all different aspects of threat intelligence processes into six stages (direction, collection, processing, analysis & dissemination) so you can focus on what matters most for your organization’s needs.DirectionThe threat intelligence lifecycle begins with establishing which assets and business processes need protection the most.Determine the threat intelligence objectives.Set the threat intelligence strategy.Set the threat intelligence mission, vision, and goals.CollectionThreat intelligence data helps you understand and proactively protect your organization from cyber threats. It includes data, such as known malicious IP addresses, domain names, email addresses, and other indicators of compromise (IOCs) that can be used to block or detect malicious activity. You can collect threat intelligence by using various methods, including:Feeds – These are automated notifications sent by feed providers when new IOCs are identified or existing IOCs change in status (e.g., become active again).Databases – These contain manually curated datasets of IOCs maintained by researchers or organizations like ours at Cyber Sainik.Dashboards – These pull together multiple types of threat data into one interface so you can quickly identify potential threats to your organization’s infrastructure and act on them accordingly.AnalysisNext, you will analyze your data. This step is where you find patterns and make sense of what’s going on in your environment. Look for modules that allow you to perform analysis tasks—such as pattern recognition (using machine learning), malicious behavior detection (using threat intelligence), or event correlation (connecting related ev

Read More
Image Dec 11, 2022

What Is Managed Detection and Response (MDR)?

Managed Detection and Response (MDR) denotes outsourced cybersecurity services designed to protect your data and assets even if a threat eludes common organizational security controls.An MDR security platform is considered an advanced 24/7 security control that often includes a range of fundamental security activities including cloud-managed security for organizations that cannot maintain their own security operations center. MDR services combine advanced analytics, threat intelligence, and human expertise in incident investigation and response deployed at the host and network levels.What challenges can Managed Detection and Response (MDR) address?As the volume, variety, and sophistication of cybersecurity threats increase exponentially, organizations struggle to maintain security operations centers staffed with highly skilled personnel and resources. As a result, Managed Detection and Response vendors provide a cost-effective menu of services designed to improve an enterprise’s cybersecurity defenses and minimize risk without an upfront cybersecurity investment.MDR services provide higher skill-level analysts utilizing cutting-edge security tools and up-to-the-minute global databases beyond the reach and cost-effectiveness of most enterprise budgets, skill levels, and resources. Thus, helping keep pace with continually evolving adversarial tactics and techniques.MDR services provide an alternative to enterprises chasing the latest in advanced security products by integrating Endpoint Detection and Response (EDR) tools that become a challenge for security operations teams to learn and maintain. As a result, an enterprise’s level of threat monitoring, detection, and analysis is improved without the challenge and expense required to keep an internal security team fully staffed and up to date with the latest threat data.MDR services are not limited to greater detection and response capabilities. They also provide proactive defense intelligence and insight into advanced threats to potentially overwhelmed security teams. Detection levels are improved while the dwell time of breaches is reduced. Compliance challenges also can be met using MDR services providing full stakeholder reporting and log retention on a wide range of regulations and standards.Why choose Managed Detection and Response (MDR) over Managed Security Services Providers (MSSPs)?Managed Detection and Response services are often compared to Managed Security Services Provider (MSSP) services. While they share similarities, they also differ in technology, expertise, and relationship. MDR services are typically proactive and focus on threats. MSSPs are designed to be reactive and focus on vulnerabilities. Unlike MSSPs, MDR services focus on detection, response, and threat hunting rather than security alert monitoring. MSSPs manage firewalls, but do not necessarily provide the same level of threat research, analytics, and forensics as MDRs. MSSPs recognize security issues but are incapable of revealing details of the threat that MDR services provide. MSSPs use log management and monitoring, vulnerability scanning, and often Security Incident and Event Management (SIEM) platforms to notify organizations of threats. Automated MDR analytics and responses to advanced threats, file-less malware, and breaches can augment MSSP services. MDR services rely on more-direct communications such as voice or emails to analysts, rather than portals. MSSP's primary interfaces are portals and emails with secondary chat and phone access to analysts.Here are typical MDR and MSSP service comparisons. Not all MDR providers include the same levels of capabilities and tools in the following services: one.MDR ServicesMSSPs24x7 threat detection and responseSome, but not allManage firewalls and security infrastructureYesProactively managed threat hunting for unknowns on network and endpointsNoIntelligence-based threat detection, triage, and extensive forensicsNoTeam of experienced threat detection experts available via phone, email, textNoAccess to global threat intelligence and analysisNoIntegrated endpoint and network security technologyNoIn the face of seemingly overwhelming security threats and campaigns, organizations are also coping with increasing security budgets and a challenging security job market leans on skilled security analysts. Gaining more protection, insight, and compliance without adding more tools and people is a goal that enterprises of all sizes seek. MDR can provide beneficial security services capable of meeting and sustaining an organization’s goals:24/7 monitoring and improved communications mechanisms with experienced SOC analystsExperienced security analysts oversee your organization’s defenses without adding full-time staff and resourcesComplete managed endpoint threat detection and response serviceImproved threat detection and extended detection coverageExpert investigation of alerts and incidents, and subsequent actionsProactive threat huntingImproved threat intelligence based on indicators and behaviors captured from global insightsImproved threat responseDecreased breach responseImproved forensics and higher-level investigationsVulnerability managementMajor incident response and log managementRemove the burden of day-to-day security management from your staff and budgetMaintain access and customization to your organization’s security defensesImproved compliance and reportingReduced security investment, increased ROI

Read More