SlideShare a Scribd company logo
Copyright © 2017 Splunk Inc.
Splunk Stream
Tomas Baublys
Sr. Sales Engineer
2
Agenda
• Market Challenges
• Product Overview
• Architecture and Deployment
• Stream 7.0 Features
• Demo
• FAQ and Summary
Introduction:
Market Challenges and
Splunk Solution
5
Problem Statement
ITOA / APM / NPM:
• How do we get accurate data for my mission?
Security Analysis:
• Details of conversations may
not be contained in logs
• Security data may be hard to
acquire
• If an entity is compromised, it
may not log at all!
• Applications may not accurately
report their own performance
• Better to rely on an external agent
to report the health of an entity
than the entity itself (especially if
it’s underperforming!)
6
Solution: Wire Data with Splunk Stream!
monitor application conversations and network performance
Direct ingest into Splunk (no props/transforms)
Stream is not a dedicated
– APM / NPM tool, but has aspects of both
– Security Analytics tool, but data is useful for both real-time and forensic security
analysis
It’s Free! https://splunkbase.splunk.com/app/1809/
7
What’s Wire Data?
Network Conversations
Machine data
Poly-structured data
Authoritative record of real-time and
historical communication between
machines and applications
tcpdump -qns 0 -A -r blah.pcap
20:57:47.368107 IP 205.188.159.57.25 > 67.23.28.65.42385: tcp 480
0x0000: 4500 0214 834c 4000 3306 f649 cdbc 9f39 E....L@.3..I...9
0x0010: 4317 1c41 0019 a591 50fe 18ca 9da0 4681 C..A....P.....F.
0x0020: 8018 05a8 848f 0000 0101 080a ffd4 9bb0 ................
0x0030: 2e43 6bb9 3232 302d 726c 792d 6461 3033 .Ck.220-rly-da03
0x0040: 2e6d 782e 616f 6c2e 636f 6d20 4553 4d54 .mx.aol.com.ESMT
0x0050: 5020 6d61 696c 5f72 656c 6179 5f69 6e2d P.mail_relay_in-
0x0060: 6461 3033 2e34 3b20 5468 752c 2030 3920 da03.4;.Thu,.09.
0x0070: 4a75 6c20 3230 3039 2031 363a 3537 3a34 Jul.2009.16:57:4
0x0080: 3720 2d30 3430 300d 0a32 3230 2d41 6d65 7.-0400..220-Ame
0x0090: 7269 6361 204f 6e6c 696e 6520 2841 4f4c rica.Online.(AOL
0x00a0: 2920 616e 6420 6974 7320 6166 6669 6c69 ).and.its.affili
0x00b0: 6174 6564 2063 6f6d 7061 6e69 6573 2064 ated.companies.d
End Users
Typical Collection Point Servers
Network
9
How Will Wire Data Help Solve the Problem?
Wire data represents capture of true conversations between endpoints
It has the “omniscient view” of what actually transpired
The conversations contain the details about each transaction, including
the time of occurrence
Less chance of interference
– Intentional / Malicious
– Load or resource based
10
Stream Metadata vs. Flow Records
Splunk Stream
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
• Traditional Wire Data flow-type records (such
as NetFlow) generally contains only IP
addresses and TCP or UDP ports.
• While this can show host-host connections, it
doesn’t give any insight about the content of
those conversations (like telephone call
records)
• Splunk Stream parses wire data all the way up
the stack and generates Events with
information at every level (more akin to a
written transcript of a phone call)
Flow-type Data
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
11
Stream Metadata vs Full Packet Capture
Stream Metadata contains essential content information:
– L3/L4 and L7 headers and payload
Eliminates the redundancy of thousands of identical headers
– Significantly smaller data storage
12
Stream events in Splunk
1. L2/L3/L4 Flow info (IP, Port,
Proto,App name)
2. L7 Protocol Info (HTTP headers,
SMTP adresses, DNS query/resp)
3. L7 Full bidirectional payload (possibly
hashed or hex encoded)
4. Directly measured metrics (byte
count, resp. time)
5. Empirically derived heuristics (round-
trip, server dealy)
6. Any specific fields, configurable
Product Overview
14
Wire Data Collection / Metadata Generation
End Users Host + (UF/HEC) + STM
Protocol
Decoder
(Deep Packet
Inspection)
EventsDecryption
(If Necessary)
Request/
Response
Packets
15
Wire Data Collection / Metadata Generation
End Users
TAP or SPAN Servers
Protocol
Decoder
(Deep Packet
Inspection)
EventsDecryption
(If Necessary)
Request/
Response
Packets
16
What’s Available In Splunk Stream Data?
Performance Metrics
Round Trip Time
Client Request Time
Server Reply Time
Server Send Time
Total Time Taken
Base HTML Load Time
Page Content Load Time
Total Page Load Time
Application Data
POST Content
AJAX Data
Section
Sub-Section
Page Title
Session Cookie
Proxied IP Address
Error Message
Business Data
Product ID
Customer ID
Shopping Cart ID
Cart Items
Cart Values
Discounts
Order ID
Abandoned?
17
Splunk Stream (7.0)
Metadata Collection
– Collects essential elements of the
application conversation
– Eliminates redundancy of duplicate
packet headers
Live Interface Collection Option
– Collect directly on hosts
– Also from a tap or SPAN port
Estimate Mode
– Deploy Stream without collecting data (or
affecting license)
Commercial App Detection (300+)
– Works even if the app is encrypted
Aggregation Mode
– Statistics generated at endpoint
– Similar to “stats sum(x)” in SPL
Filtering at Endpoint
Out-of-Box Content
– Dashboards for common protocols
Distributed Forwarder Mgt
– Similar to Splunk UF mgt
– All config centrally managed
– Forwarder Groups
1GbE and 10GbE link options
– 10 GbE uses DPDK SDK (dpdk.org)
18
Protocols Parsed with Stream 7.0
Simple Transport
TCP
UDP
IP
Infrastructure
ARP
DHCP
SNMP
DNS
ICMP
File Transfer
FTP
HTTP
File Service
NFS
SMB
Email
IMAP
MAPI
POP3
SMTP
Messaging
AMQP
IRC
SMPP
XMPP
Authentication
Diameter
LDAP
RADIUS
Database
MYSQL
Postgres
TDS (Sybase / MS-SQL)
TNS (Oracle SQL*Net)
VoIP
SIP
RTP
19
Commercial Application Detection
Add the many hundreds of applications to be detected to the TCP
stream type existing “app” field
Help diagnose the problem of:
– “what is going over port 80”?
– “what’s taking all of my bandwidth?”
DOES NOT PARSE applications, simply detects them
– Will detect encrypted protocols!
– Will detect vendor-proprietary protocols!
– Uses empirical patterns, DNS, Cert CNs and other methods
Current feature supports 300+ applications, many more to be added
20
300+ Commercial Applications Detected 
Adobe Flash Plugin Update Adobe Update Manager AIM express AIM Transfer AllMusic.com Altiris Amazon Ad System Amazon Cloud Drive Amazon Generic Services Amazon MP3 Amazon Video
Amazon Web Services/Cloudfront CDN Android connectivity Manager Aol AOL Instant Messenger (formerly OSCAR) Apple AirPlay Apple Airport Apple AirPrint Apple App Store Apple FaceTime Apple
Generic Services Apple HTTP Live Streaming Apple Location Apple Maps Apple Music Apple Push Notification Service Apple SIRI Apple Update ASProxy Atlassian Background Intelligent Transfer
Service Baidu Player Baidu_wallet Baidu.com Bet365.com Bitcoin client BitTorrent Bittorrent Apps BitTorrent Bleep (aka BitTorrent Chat) BlackBerry Locate BlackBerry Messenger BlackBerry
Messenger Audio BlackBerry Messenger Video BlackBerry.com Border Gateway Protocol CARBONITE CCProxy ChatON Chatroulette.com Chrome Update Cisco Discovery Protocol Cisco MeetingPlace
Cisco Netflow Common Unix Printer System Crackle craigslist Data Stream Interface DB2 Debian/Ubuntu Update Dropbox Download Dropbox Upload Dropbox.com eBay.com Edonkey Evernote.com
EverQuest - EverQuest II Facebook Facebook Messenger FarmVille Find My iPhone Firefox Update Flickr Generic Routing Encapsulation GitHub Gmail Basic Gmail drive Gmail Mobile GNUnet Gnutella
Google Accounts Google Analytics Google App Engine Google Cache Google Calendar Google Chat Google Cloud Messaging Google Cloud Storage Google Documents (aka Google Drive) Google Earth
Google Generic Google groups Google GStatic Google Hangouts (formerly Google Talk) Google Mail Google Maps Google Picasa Google Play Music,Google Play Musique Google Play Store Google Plus
Google Safe Browsing Google Tag Manager Google Toolbar Google Translate Google.com GoToDevice Remote Administration GoToMeeting Online Meeting GoToMyPC Remote Access GPRS
Tunneling Protocol GPRS Tunneling Protocol version 2 Half-Life Hi5.com High Entropy Hot Standby Router Protocol HP Printer Job Language Hulu HyperText Transfer Protocol version 2,HTTP/2 I2P
Invisible Internet Project IBM Informix IBM Lotus Sametime IBM SmartCloud IBM Websphere MQ iCloud (Apple) iHeartRADIO iMessage File Download Imgur.com Independant Computing
Architecture (Citrix) Instagram Internet Group Management Protocol Internet Printing Protocol Internet Security Association and Key Management Protocol Internet Small Computer Systems
Interface iOS over-the-air (OTA) update IP Payload Compression Protocol IP-in-IP tunneling IPsec Encapsulating Security Payload IRC File Transfer Data iTunes Jabber File Transfer Java Update JEDI
(Citrix) Kazaa (FastTrack protocol) KIK Messenger King Digital Entertainment LinkedIn.com Live hotmail for mobile Livestream.com LogMeIn Rescue magicJack Mail.ru Agent Maktoob mail Media
Gateway Control Protocol Message Session Relay Protocol Microsoft ActiveSync Microsoft Lync Microsoft Lync Online Microsoft Office 365 Microsoft Remote Procedure Call Microsoft Service Control
Microsoft SharePoint Microsoft SharePoint Administration Application Microsoft SharePoint Blog Management Application Microsoft SharePoint Calendar Management Application Microsoft
SharePoint Document Management Application Multi Protocol Label Switching data-carrying mechanism Nagios Remote Data Processor Nagios Remote Plugin Executor Name Service Provider
Interface Netflix.com NetMeeting ILS Network Time Protocol Nintendo Wi-Fi Connection Nortel/SynOptics Netwok Management Protocol OkCupid Online Certificate Status Protocol Oovoo Open
Shortest Path First Opera Update Orkut.com Outlook Web Access (Office 365) Outlook Web App PalTalk Paltalk audio chat PalTalk Transfer Protocol Paltalk video Pandora Radio Pastebin
Pastebin_posting PCAnywhere Photobucket.com Pinterest.com Playstation Network Plenty Of Fish QIK Video QQ QQ File Transfer QQ Games QQ Mail QQ WeiBo QQ.com QQDownload QQLive
Network Player QQMusic QQStream Quake quic QVOD Player RapidShare.com Real Time Streaming Protocol Remote Desktop Protocol (Windows Terminal Server) Remote Procedure Call RetroShare
Routing Information Protocol V1 Routing Information Protocol V2 Routing Internet Protocol ng1 Rovio Entertainment RSS Salesforce.com SAP SecondLife.com Secure Shell Session Traversal Utilities
for NAT SharePoint Online Silverlight (Microsoft Smooth Streaming) Simple Object Access Protocol Skinny Client Control Protocol Slacker Radio Slingbox Snapchat SOCKet Secure v5 SoMud Bittorrent
tracker SoundCloud SourceForge SPDY Spotify SquirrelMail Steampowered.com Symantec Norton AntiVirus Updates Syslog Systems Network Architecture Teamspeak v2 TeamSpeak v3 TeamViewer
Telnet Teredo protocol Terminal Access Controller Access-Control System Plus TIBCO RendezVous Protocol Tor2web Tumblr Twitch Twitpic Twitter UStream uTorrent uTP (Micro Transport Protocol)
UUSee Protocol VEVO Viber Vimeo.com Vine Virtual Router Redundancy Protocol VMWare vmware_horizon_view Waze Social GPS Maps & Traffic WebEx WhatsApp Messenger WHOIS
WiiConnect24 Wikipedia.com Windows Azure CDN Windows Internet Naming Service Windows Live File Storage Windows Live Groups Windows Live Hotmail Windows Live Hotmail Attachements
Windows Live SkyDrive Windows Live SkyDrive Login Windows Marketplace Windows Update WordPress.com World of Warcraft Xbox Live Xbox Live Marketplace Xbox Music Xbox Video (Microsoft
Movies and Tv) xHamster.com Yahoo groups Yahoo Mail classic Yahoo Mail v.2.0 Yahoo Messenger Yahoo Messenger conference service Yahoo Messenger Transfer Protocol Yahoo Messenger Video
Yahoo Search Yahoo webmail for mobile Yahoo Webmessenger Yahoo.com Yellow Page Bind Yellow Page Passwd Yellow Pages Server Youtube.com
21
Example of Applications in Search
amazon_aws 31 krb5 30
apple 5 live_hotmail 6
apple_location 2 norton_update 5
dhcp 6 ntp 2
facebook 6 ocsp 81
flickr 1 pinterest 1
google 58 skype 1411
google_analytics 4 smb 12
google_gen 29 spdy 4
google_safebrowsing 8 spotify 3
google_tags 3 teredo 15
gstatic 11 tumblr 28
http 7945 twitter 11
http2 11 yahoo 129
https 214 yahoo_search 1
icloud 8 ymsg_webmessenger 3
imgur 9 youtube 1
sourcetype=stream:* | stats count by app
22
Data Estimate Mode (per-Stream)
Stream
Estimate
Estimate
Data Volume
Mode
Selection
23
Prebuilt Reporting
Get visibility into
applications
performance and
user experience
Understand
database activity
and performance
without impacting
database operation
Improve security
and application
intelligence with
DNS analytics
Live Demo
Architecture and
Deployment
26
Collect and Monitor Data with Stream
Stream has two deployment architectures and two collection
methodologies
Deployment:
– In-line directly on monitored host
– Out-of-band (stub) with TAP or SPAN port
Collection:
– Technical Add-On (TA) with Splunk Universal Forwarder (UF)
– Independent Stream Forwarder using HTTP Event Collector (HEC)
27
Deployment: Dedicated Collector
End Users
TAP or SPAN
Firewall
Search Head
Linux Forwarder
Splunk_TA_Stream
Servers
Internet
Splunk
Indexers
28
Deployment: Run on Servers
Splunk
Indexers
Search Head
Physical or Virtual Servers
Universal Forwarder
Splunk_TA_stream
Physical Datacenter,
Public or Private Cloud
End Users
FirewallInternet
29
Stream Forwarder Options
2. Independent Stream Forwarder
• Makes it easy to add Stream anywhere in your environment
• 1. Stream TA
• Stream deploys as a modular input on
top of your Splunk Forwarders.
• Stream deploys as a stand-alone binary
and communicates via HEC.
• Requires >= Splunk 6.3.1
Splunk
Fwd
Splunk
Indexers
Splunk
Indexers
Any Linux Host
Splunk Forwarder
HTTP/S
31
Distributed Forwarder Management
Gain more deployment flexibility
Increase management efficiency
with per-forwarder protocol
control
Tailor data collection by assigning
different sets of protocols to
groups of forwarders
TNS
MySQL
HTTP
DNS
TCP
SIP
Diameter
UDP
Protocol
Selection,
Configuration
& Distribution
New Features in
Stream 7
33
Major New Features in Stream 7.0
Splunk Stream 7.0 was released GA in November 2016
NetFlow Collector
– NetFlow v5, v9 (with template support), IPFIX (with vendor extensions)
MD5 Hashing
– Any parsed Stream field, including SMTP attachments and HTTP files
– Integrates with Enterprise Security – Threat Intelligence Framework
Flow Visualization for all IPv4 space
PCAP Upload via SH and Continuous Directory Monitoring via Forwarder
Enhanced Metadata Fields (e.g., FlowID, Protocol Stack, Event Name)
Configuration Templates
– Easier integration with other Splunk products
34
Flow Collection
Active Flow listening socket on Stream Forwarder
Flexible Configuration Options
– Selectable fields and filtering
– Can configure multiple, distinct listening ports on each Stream Forwarder
Supports most common versions of Flow protocols
– Cisco NetFlow, Juniper jFlow, HP sFlow, cFlowd
– NetFlow v5, v9, IPFIX
– V9 with templates (standard and custom)
– IPFIX with vendor extensions
Aggregation of Flow records (pre-indexing) can dramatically reduce the number of
Splunk Events created
Performance > 465,000 flows/second (on a single Independent Stream Forwarder)
35
Flow Collector Data Flow
35
NetFlow Collector
• NetFlow listening sockets
(UDP ports)
• Actively capture Flows
from NetFlow v5, v9,
IPFIX
• Creates Splunk-
compatible Flow Records
• Management from
Stream Centralized UI
NetFlow enabled devices
1
Export NetFlow (over UDP)
2
NetFlow Metadata
captured by Stream
3
Events in Splunk Indexer /
Search Head
4
1
2
4
Router
Network Switch
3
36
NetFlow and sFlow Streams UX
37
MD5 Hashing of Files
File Hashing provides integrity verification of files, can be used for a number of security
use cases
– inbound malware detection
– outbound data loss prevention
Stream generates MD5 hashes equivalent to “md5sum” unix command after decoding
content back to binary
Specifically for SMTP file attachments and HTTP
MD5 hashes generated with Stream integrate directly into the Threat Intelligence
framework of Enterprise Security, and has been tested with ES
As a bonus, *any* non-numeric field can be MD5 hashed using the “Extract New Field”
option. Field can be length-truncated if desired.
38
MD5 Hashing Data Flow
38
MD5 hashing
• Used to enable DLP and
Security use cases
• Examines both inbound
and outbound data
transfer
• Can be used to find IOCs
as well as data exfiltration
• Better metric than file
names or file types
File Transfer Traffic
between Client and Server
directed towards Stream
1
3
Network Switch
Client
Server
(Malware)FileTransfer
Tap or SPAN E
S
TA-
Splice
Threat Intelligence
1
2
Stream generates MD5
hashes of files, sends to
Splunk Indexers
2 MD5 hashes compared
against Threat Intel from
public databases
3
Internet
39
Flow Visualization
Designed to show limited Client->Server interaction for IPv4 address
space. Overview and Detail views
Can be used in real-time, interactive, and forensic modes
Bubble chart that animates as flows appear (Detail view only)
3
40
Flow Visualization Detail View
4
Horizontal Trends show your
externally-accessible hosts
The Bubbles animate in
real-time or in play-
back mode
Vertical Trends
illustrate your
internal host
address space
Live Demo
FAQ and Summary
43
FAQ
• Yes. The app enables capture of only the relevant network/wire data
for analytics, through filters and aggregation rules
• Select or deselect protocols and associated attributes with fine-grained
precision within the app interface
Can I limit the amount of
data collected with Stream?
• Data volume can vary based upon the number of selected protocols,
attributes and the amount of network traffic
• Use Stream Estimate to understand the indexing impact
How can I estimate my
indexing volume?
• Stream can be installed on any physical or virtual host running
supported OS, on premises or in the cloud
• It can be installed off of TAP and SPAN ports
• It can be deployed in combination with TAP aggregation or visibility
switches
Where is Stream typically
installed?
Thank You

More Related Content

PPTX
Splunk App for Stream
PDF
Saldırı Tipleri ve Log Yönetimi
PDF
SIEM Başarıya Giden Yol
PPTX
Power of Splunk Search Processing Language (SPL) ...
PDF
Hacklenmiş Web Sunucu Analizi
PDF
İleri Seviye Ağ Güvenliği Lab Kitabı
PDF
Open Source SOC Kurulumu
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk App for Stream
Saldırı Tipleri ve Log Yönetimi
SIEM Başarıya Giden Yol
Power of Splunk Search Processing Language (SPL) ...
Hacklenmiş Web Sunucu Analizi
İleri Seviye Ağ Güvenliği Lab Kitabı
Open Source SOC Kurulumu
Splunk for Enterprise Security featuring User Behavior Analytics

What's hot (20)

PDF
Splunk 101
PDF
Log yönetimi ve siem
PPTX
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 7, 8, 9
PDF
Zararlı Yazılım Analizi Eğitimi Lab Kitabı
PPTX
Splunk Architecture
PDF
Elk - An introduction
PDF
Uygulamalı Ağ Güvenliği Eğitimi Lab Çalışmaları
PPTX
Log Yönetimi ve Saldırı Analizi Eğitimi - 2
PDF
Hacklenmiş Windows Sistem Analizi
PPTX
Splunk Architecture overview
PDF
Kurumsal Ağlarda Log İnceleme Yöntemiyle Saldırı Analizi
PPT
Encoded Attacks And Countermeasures
PDF
The importance of normalizing your security data to ECS
PPTX
Splunk Enterprise Security
PDF
10 Adımda Sızma Testleri
PDF
Beyaz Şapkalı Hacker CEH Eğitimi - Post Exploit Aşaması
PDF
Zararlı Yazılım Analizi ve Tespitinde YARA Kullanımı
PDF
SINIFLANDIRMA TEMELLİ KORELASYON YAKLAŞIMI
PPTX
Log Yönetimi ve Saldırı Analizi Eğitimi -1
PDF
NetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe Önal
Splunk 101
Log yönetimi ve siem
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 7, 8, 9
Zararlı Yazılım Analizi Eğitimi Lab Kitabı
Splunk Architecture
Elk - An introduction
Uygulamalı Ağ Güvenliği Eğitimi Lab Çalışmaları
Log Yönetimi ve Saldırı Analizi Eğitimi - 2
Hacklenmiş Windows Sistem Analizi
Splunk Architecture overview
Kurumsal Ağlarda Log İnceleme Yöntemiyle Saldırı Analizi
Encoded Attacks And Countermeasures
The importance of normalizing your security data to ECS
Splunk Enterprise Security
10 Adımda Sızma Testleri
Beyaz Şapkalı Hacker CEH Eğitimi - Post Exploit Aşaması
Zararlı Yazılım Analizi ve Tespitinde YARA Kullanımı
SINIFLANDIRMA TEMELLİ KORELASYON YAKLAŞIMI
Log Yönetimi ve Saldırı Analizi Eğitimi -1
NetSecTR - "Siem / Log Korelasyon Sunumu" Huzeyfe Önal
Ad

Viewers also liked (20)

PPTX
Splunk Überblick
PPTX
Data Obfuscation in Splunk Enterprise
PPTX
Getting Started Getting Started With Splunk Enterprise
PPTX
Power of SPL - Search Processing Language
PPTX
Daten getriebene Service Intelligence mit Splunk ITSI
PPTX
Splunk für Security
PPTX
Machine Learning
PPTX
Splunk Technologie Add-ons und Alert Actions entwickeln
PDF
Discovery Day Milano 2017
PDF
UX, ethnography and possibilities: for Libraries, Museums and Archives
PDF
Designing Teams for Emerging Challenges
PDF
Splunk at Banco Popolare de Sondrio
PDF
Visual Design with Data
PDF
3 Things Every Sales Team Needs to Be Thinking About in 2017
PDF
How to Become a Thought Leader in Your Niche
PPTX
Splunk Discovery Day Hamburg - Data Driven Insights
PPTX
SplunkLive! Frankfurt 2017 - MediaMarktSaturn
PDF
SplunkLive! Frankfurt 2017 - DB Cargo
PDF
What is A Cloud Stack in 2017
PDF
Design in Tech Report 2017
Splunk Überblick
Data Obfuscation in Splunk Enterprise
Getting Started Getting Started With Splunk Enterprise
Power of SPL - Search Processing Language
Daten getriebene Service Intelligence mit Splunk ITSI
Splunk für Security
Machine Learning
Splunk Technologie Add-ons und Alert Actions entwickeln
Discovery Day Milano 2017
UX, ethnography and possibilities: for Libraries, Museums and Archives
Designing Teams for Emerging Challenges
Splunk at Banco Popolare de Sondrio
Visual Design with Data
3 Things Every Sales Team Needs to Be Thinking About in 2017
How to Become a Thought Leader in Your Niche
Splunk Discovery Day Hamburg - Data Driven Insights
SplunkLive! Frankfurt 2017 - MediaMarktSaturn
SplunkLive! Frankfurt 2017 - DB Cargo
What is A Cloud Stack in 2017
Design in Tech Report 2017
Ad

Similar to Splunk Stream - Einblicke in Netzwerk Traffic (20)

PDF
Splunk app for stream
PPTX
Data Onboarding Breakout Session
PPT
Cloud Connectivity Service
PDF
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
PDF
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
PPT
Mobility & Data Strategies
PPTX
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
PDF
IoTaConf 2014 - IoT Connectivity, Standards, and Architecture
PDF
Introduction to back-end
PPT
Web Services and Devices Profile for Web Services (DPWS)
PPT
Adobe PDF and LiveCycle ES Security
PPTX
3 Software Stacks for IoT Solutions
PPT
Sinnreich Henry Johnston Alan Pt 2
PPTX
Windows iot barone
PPTX
MICROSOFT E IL MONDO IOT
PPT
The Internet and World Wide Web
PPTX
Incident Response: SIEM
PPTX
Being HAPI! Reverse Proxying on Purpose
Splunk app for stream
Data Onboarding Breakout Session
Cloud Connectivity Service
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
Mobility & Data Strategies
Why And When Should We Consider Stream Processing In Our Solutions Teqnation ...
IoTaConf 2014 - IoT Connectivity, Standards, and Architecture
Introduction to back-end
Web Services and Devices Profile for Web Services (DPWS)
Adobe PDF and LiveCycle ES Security
3 Software Stacks for IoT Solutions
Sinnreich Henry Johnston Alan Pt 2
Windows iot barone
MICROSOFT E IL MONDO IOT
The Internet and World Wide Web
Incident Response: SIEM
Being HAPI! Reverse Proxying on Purpose

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Modernizing your data center with Dell and AMD
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Modernizing your data center with Dell and AMD
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I

Splunk Stream - Einblicke in Netzwerk Traffic

  • 1. Copyright © 2017 Splunk Inc. Splunk Stream Tomas Baublys Sr. Sales Engineer
  • 2. 2 Agenda • Market Challenges • Product Overview • Architecture and Deployment • Stream 7.0 Features • Demo • FAQ and Summary
  • 4. 5 Problem Statement ITOA / APM / NPM: • How do we get accurate data for my mission? Security Analysis: • Details of conversations may not be contained in logs • Security data may be hard to acquire • If an entity is compromised, it may not log at all! • Applications may not accurately report their own performance • Better to rely on an external agent to report the health of an entity than the entity itself (especially if it’s underperforming!)
  • 5. 6 Solution: Wire Data with Splunk Stream! monitor application conversations and network performance Direct ingest into Splunk (no props/transforms) Stream is not a dedicated – APM / NPM tool, but has aspects of both – Security Analytics tool, but data is useful for both real-time and forensic security analysis It’s Free! https://splunkbase.splunk.com/app/1809/
  • 6. 7 What’s Wire Data? Network Conversations Machine data Poly-structured data Authoritative record of real-time and historical communication between machines and applications tcpdump -qns 0 -A -r blah.pcap 20:57:47.368107 IP 205.188.159.57.25 > 67.23.28.65.42385: tcp 480 0x0000: 4500 0214 834c 4000 3306 f649 cdbc 9f39 E....L@.3..I...9 0x0010: 4317 1c41 0019 a591 50fe 18ca 9da0 4681 C..A....P.....F. 0x0020: 8018 05a8 848f 0000 0101 080a ffd4 9bb0 ................ 0x0030: 2e43 6bb9 3232 302d 726c 792d 6461 3033 .Ck.220-rly-da03 0x0040: 2e6d 782e 616f 6c2e 636f 6d20 4553 4d54 .mx.aol.com.ESMT 0x0050: 5020 6d61 696c 5f72 656c 6179 5f69 6e2d P.mail_relay_in- 0x0060: 6461 3033 2e34 3b20 5468 752c 2030 3920 da03.4;.Thu,.09. 0x0070: 4a75 6c20 3230 3039 2031 363a 3537 3a34 Jul.2009.16:57:4 0x0080: 3720 2d30 3430 300d 0a32 3230 2d41 6d65 7.-0400..220-Ame 0x0090: 7269 6361 204f 6e6c 696e 6520 2841 4f4c rica.Online.(AOL 0x00a0: 2920 616e 6420 6974 7320 6166 6669 6c69 ).and.its.affili 0x00b0: 6174 6564 2063 6f6d 7061 6e69 6573 2064 ated.companies.d End Users Typical Collection Point Servers Network
  • 7. 9 How Will Wire Data Help Solve the Problem? Wire data represents capture of true conversations between endpoints It has the “omniscient view” of what actually transpired The conversations contain the details about each transaction, including the time of occurrence Less chance of interference – Intentional / Malicious – Load or resource based
  • 8. 10 Stream Metadata vs. Flow Records Splunk Stream 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical • Traditional Wire Data flow-type records (such as NetFlow) generally contains only IP addresses and TCP or UDP ports. • While this can show host-host connections, it doesn’t give any insight about the content of those conversations (like telephone call records) • Splunk Stream parses wire data all the way up the stack and generates Events with information at every level (more akin to a written transcript of a phone call) Flow-type Data 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
  • 9. 11 Stream Metadata vs Full Packet Capture Stream Metadata contains essential content information: – L3/L4 and L7 headers and payload Eliminates the redundancy of thousands of identical headers – Significantly smaller data storage
  • 10. 12 Stream events in Splunk 1. L2/L3/L4 Flow info (IP, Port, Proto,App name) 2. L7 Protocol Info (HTTP headers, SMTP adresses, DNS query/resp) 3. L7 Full bidirectional payload (possibly hashed or hex encoded) 4. Directly measured metrics (byte count, resp. time) 5. Empirically derived heuristics (round- trip, server dealy) 6. Any specific fields, configurable
  • 12. 14 Wire Data Collection / Metadata Generation End Users Host + (UF/HEC) + STM Protocol Decoder (Deep Packet Inspection) EventsDecryption (If Necessary) Request/ Response Packets
  • 13. 15 Wire Data Collection / Metadata Generation End Users TAP or SPAN Servers Protocol Decoder (Deep Packet Inspection) EventsDecryption (If Necessary) Request/ Response Packets
  • 14. 16 What’s Available In Splunk Stream Data? Performance Metrics Round Trip Time Client Request Time Server Reply Time Server Send Time Total Time Taken Base HTML Load Time Page Content Load Time Total Page Load Time Application Data POST Content AJAX Data Section Sub-Section Page Title Session Cookie Proxied IP Address Error Message Business Data Product ID Customer ID Shopping Cart ID Cart Items Cart Values Discounts Order ID Abandoned?
  • 15. 17 Splunk Stream (7.0) Metadata Collection – Collects essential elements of the application conversation – Eliminates redundancy of duplicate packet headers Live Interface Collection Option – Collect directly on hosts – Also from a tap or SPAN port Estimate Mode – Deploy Stream without collecting data (or affecting license) Commercial App Detection (300+) – Works even if the app is encrypted Aggregation Mode – Statistics generated at endpoint – Similar to “stats sum(x)” in SPL Filtering at Endpoint Out-of-Box Content – Dashboards for common protocols Distributed Forwarder Mgt – Similar to Splunk UF mgt – All config centrally managed – Forwarder Groups 1GbE and 10GbE link options – 10 GbE uses DPDK SDK (dpdk.org)
  • 16. 18 Protocols Parsed with Stream 7.0 Simple Transport TCP UDP IP Infrastructure ARP DHCP SNMP DNS ICMP File Transfer FTP HTTP File Service NFS SMB Email IMAP MAPI POP3 SMTP Messaging AMQP IRC SMPP XMPP Authentication Diameter LDAP RADIUS Database MYSQL Postgres TDS (Sybase / MS-SQL) TNS (Oracle SQL*Net) VoIP SIP RTP
  • 17. 19 Commercial Application Detection Add the many hundreds of applications to be detected to the TCP stream type existing “app” field Help diagnose the problem of: – “what is going over port 80”? – “what’s taking all of my bandwidth?” DOES NOT PARSE applications, simply detects them – Will detect encrypted protocols! – Will detect vendor-proprietary protocols! – Uses empirical patterns, DNS, Cert CNs and other methods Current feature supports 300+ applications, many more to be added
  • 18. 20 300+ Commercial Applications Detected  Adobe Flash Plugin Update Adobe Update Manager AIM express AIM Transfer AllMusic.com Altiris Amazon Ad System Amazon Cloud Drive Amazon Generic Services Amazon MP3 Amazon Video Amazon Web Services/Cloudfront CDN Android connectivity Manager Aol AOL Instant Messenger (formerly OSCAR) Apple AirPlay Apple Airport Apple AirPrint Apple App Store Apple FaceTime Apple Generic Services Apple HTTP Live Streaming Apple Location Apple Maps Apple Music Apple Push Notification Service Apple SIRI Apple Update ASProxy Atlassian Background Intelligent Transfer Service Baidu Player Baidu_wallet Baidu.com Bet365.com Bitcoin client BitTorrent Bittorrent Apps BitTorrent Bleep (aka BitTorrent Chat) BlackBerry Locate BlackBerry Messenger BlackBerry Messenger Audio BlackBerry Messenger Video BlackBerry.com Border Gateway Protocol CARBONITE CCProxy ChatON Chatroulette.com Chrome Update Cisco Discovery Protocol Cisco MeetingPlace Cisco Netflow Common Unix Printer System Crackle craigslist Data Stream Interface DB2 Debian/Ubuntu Update Dropbox Download Dropbox Upload Dropbox.com eBay.com Edonkey Evernote.com EverQuest - EverQuest II Facebook Facebook Messenger FarmVille Find My iPhone Firefox Update Flickr Generic Routing Encapsulation GitHub Gmail Basic Gmail drive Gmail Mobile GNUnet Gnutella Google Accounts Google Analytics Google App Engine Google Cache Google Calendar Google Chat Google Cloud Messaging Google Cloud Storage Google Documents (aka Google Drive) Google Earth Google Generic Google groups Google GStatic Google Hangouts (formerly Google Talk) Google Mail Google Maps Google Picasa Google Play Music,Google Play Musique Google Play Store Google Plus Google Safe Browsing Google Tag Manager Google Toolbar Google Translate Google.com GoToDevice Remote Administration GoToMeeting Online Meeting GoToMyPC Remote Access GPRS Tunneling Protocol GPRS Tunneling Protocol version 2 Half-Life Hi5.com High Entropy Hot Standby Router Protocol HP Printer Job Language Hulu HyperText Transfer Protocol version 2,HTTP/2 I2P Invisible Internet Project IBM Informix IBM Lotus Sametime IBM SmartCloud IBM Websphere MQ iCloud (Apple) iHeartRADIO iMessage File Download Imgur.com Independant Computing Architecture (Citrix) Instagram Internet Group Management Protocol Internet Printing Protocol Internet Security Association and Key Management Protocol Internet Small Computer Systems Interface iOS over-the-air (OTA) update IP Payload Compression Protocol IP-in-IP tunneling IPsec Encapsulating Security Payload IRC File Transfer Data iTunes Jabber File Transfer Java Update JEDI (Citrix) Kazaa (FastTrack protocol) KIK Messenger King Digital Entertainment LinkedIn.com Live hotmail for mobile Livestream.com LogMeIn Rescue magicJack Mail.ru Agent Maktoob mail Media Gateway Control Protocol Message Session Relay Protocol Microsoft ActiveSync Microsoft Lync Microsoft Lync Online Microsoft Office 365 Microsoft Remote Procedure Call Microsoft Service Control Microsoft SharePoint Microsoft SharePoint Administration Application Microsoft SharePoint Blog Management Application Microsoft SharePoint Calendar Management Application Microsoft SharePoint Document Management Application Multi Protocol Label Switching data-carrying mechanism Nagios Remote Data Processor Nagios Remote Plugin Executor Name Service Provider Interface Netflix.com NetMeeting ILS Network Time Protocol Nintendo Wi-Fi Connection Nortel/SynOptics Netwok Management Protocol OkCupid Online Certificate Status Protocol Oovoo Open Shortest Path First Opera Update Orkut.com Outlook Web Access (Office 365) Outlook Web App PalTalk Paltalk audio chat PalTalk Transfer Protocol Paltalk video Pandora Radio Pastebin Pastebin_posting PCAnywhere Photobucket.com Pinterest.com Playstation Network Plenty Of Fish QIK Video QQ QQ File Transfer QQ Games QQ Mail QQ WeiBo QQ.com QQDownload QQLive Network Player QQMusic QQStream Quake quic QVOD Player RapidShare.com Real Time Streaming Protocol Remote Desktop Protocol (Windows Terminal Server) Remote Procedure Call RetroShare Routing Information Protocol V1 Routing Information Protocol V2 Routing Internet Protocol ng1 Rovio Entertainment RSS Salesforce.com SAP SecondLife.com Secure Shell Session Traversal Utilities for NAT SharePoint Online Silverlight (Microsoft Smooth Streaming) Simple Object Access Protocol Skinny Client Control Protocol Slacker Radio Slingbox Snapchat SOCKet Secure v5 SoMud Bittorrent tracker SoundCloud SourceForge SPDY Spotify SquirrelMail Steampowered.com Symantec Norton AntiVirus Updates Syslog Systems Network Architecture Teamspeak v2 TeamSpeak v3 TeamViewer Telnet Teredo protocol Terminal Access Controller Access-Control System Plus TIBCO RendezVous Protocol Tor2web Tumblr Twitch Twitpic Twitter UStream uTorrent uTP (Micro Transport Protocol) UUSee Protocol VEVO Viber Vimeo.com Vine Virtual Router Redundancy Protocol VMWare vmware_horizon_view Waze Social GPS Maps & Traffic WebEx WhatsApp Messenger WHOIS WiiConnect24 Wikipedia.com Windows Azure CDN Windows Internet Naming Service Windows Live File Storage Windows Live Groups Windows Live Hotmail Windows Live Hotmail Attachements Windows Live SkyDrive Windows Live SkyDrive Login Windows Marketplace Windows Update WordPress.com World of Warcraft Xbox Live Xbox Live Marketplace Xbox Music Xbox Video (Microsoft Movies and Tv) xHamster.com Yahoo groups Yahoo Mail classic Yahoo Mail v.2.0 Yahoo Messenger Yahoo Messenger conference service Yahoo Messenger Transfer Protocol Yahoo Messenger Video Yahoo Search Yahoo webmail for mobile Yahoo Webmessenger Yahoo.com Yellow Page Bind Yellow Page Passwd Yellow Pages Server Youtube.com
  • 19. 21 Example of Applications in Search amazon_aws 31 krb5 30 apple 5 live_hotmail 6 apple_location 2 norton_update 5 dhcp 6 ntp 2 facebook 6 ocsp 81 flickr 1 pinterest 1 google 58 skype 1411 google_analytics 4 smb 12 google_gen 29 spdy 4 google_safebrowsing 8 spotify 3 google_tags 3 teredo 15 gstatic 11 tumblr 28 http 7945 twitter 11 http2 11 yahoo 129 https 214 yahoo_search 1 icloud 8 ymsg_webmessenger 3 imgur 9 youtube 1 sourcetype=stream:* | stats count by app
  • 20. 22 Data Estimate Mode (per-Stream) Stream Estimate Estimate Data Volume Mode Selection
  • 21. 23 Prebuilt Reporting Get visibility into applications performance and user experience Understand database activity and performance without impacting database operation Improve security and application intelligence with DNS analytics
  • 24. 26 Collect and Monitor Data with Stream Stream has two deployment architectures and two collection methodologies Deployment: – In-line directly on monitored host – Out-of-band (stub) with TAP or SPAN port Collection: – Technical Add-On (TA) with Splunk Universal Forwarder (UF) – Independent Stream Forwarder using HTTP Event Collector (HEC)
  • 25. 27 Deployment: Dedicated Collector End Users TAP or SPAN Firewall Search Head Linux Forwarder Splunk_TA_Stream Servers Internet Splunk Indexers
  • 26. 28 Deployment: Run on Servers Splunk Indexers Search Head Physical or Virtual Servers Universal Forwarder Splunk_TA_stream Physical Datacenter, Public or Private Cloud End Users FirewallInternet
  • 27. 29 Stream Forwarder Options 2. Independent Stream Forwarder • Makes it easy to add Stream anywhere in your environment • 1. Stream TA • Stream deploys as a modular input on top of your Splunk Forwarders. • Stream deploys as a stand-alone binary and communicates via HEC. • Requires >= Splunk 6.3.1 Splunk Fwd Splunk Indexers Splunk Indexers Any Linux Host Splunk Forwarder HTTP/S
  • 28. 31 Distributed Forwarder Management Gain more deployment flexibility Increase management efficiency with per-forwarder protocol control Tailor data collection by assigning different sets of protocols to groups of forwarders TNS MySQL HTTP DNS TCP SIP Diameter UDP Protocol Selection, Configuration & Distribution
  • 30. 33 Major New Features in Stream 7.0 Splunk Stream 7.0 was released GA in November 2016 NetFlow Collector – NetFlow v5, v9 (with template support), IPFIX (with vendor extensions) MD5 Hashing – Any parsed Stream field, including SMTP attachments and HTTP files – Integrates with Enterprise Security – Threat Intelligence Framework Flow Visualization for all IPv4 space PCAP Upload via SH and Continuous Directory Monitoring via Forwarder Enhanced Metadata Fields (e.g., FlowID, Protocol Stack, Event Name) Configuration Templates – Easier integration with other Splunk products
  • 31. 34 Flow Collection Active Flow listening socket on Stream Forwarder Flexible Configuration Options – Selectable fields and filtering – Can configure multiple, distinct listening ports on each Stream Forwarder Supports most common versions of Flow protocols – Cisco NetFlow, Juniper jFlow, HP sFlow, cFlowd – NetFlow v5, v9, IPFIX – V9 with templates (standard and custom) – IPFIX with vendor extensions Aggregation of Flow records (pre-indexing) can dramatically reduce the number of Splunk Events created Performance > 465,000 flows/second (on a single Independent Stream Forwarder)
  • 32. 35 Flow Collector Data Flow 35 NetFlow Collector • NetFlow listening sockets (UDP ports) • Actively capture Flows from NetFlow v5, v9, IPFIX • Creates Splunk- compatible Flow Records • Management from Stream Centralized UI NetFlow enabled devices 1 Export NetFlow (over UDP) 2 NetFlow Metadata captured by Stream 3 Events in Splunk Indexer / Search Head 4 1 2 4 Router Network Switch 3
  • 33. 36 NetFlow and sFlow Streams UX
  • 34. 37 MD5 Hashing of Files File Hashing provides integrity verification of files, can be used for a number of security use cases – inbound malware detection – outbound data loss prevention Stream generates MD5 hashes equivalent to “md5sum” unix command after decoding content back to binary Specifically for SMTP file attachments and HTTP MD5 hashes generated with Stream integrate directly into the Threat Intelligence framework of Enterprise Security, and has been tested with ES As a bonus, *any* non-numeric field can be MD5 hashed using the “Extract New Field” option. Field can be length-truncated if desired.
  • 35. 38 MD5 Hashing Data Flow 38 MD5 hashing • Used to enable DLP and Security use cases • Examines both inbound and outbound data transfer • Can be used to find IOCs as well as data exfiltration • Better metric than file names or file types File Transfer Traffic between Client and Server directed towards Stream 1 3 Network Switch Client Server (Malware)FileTransfer Tap or SPAN E S TA- Splice Threat Intelligence 1 2 Stream generates MD5 hashes of files, sends to Splunk Indexers 2 MD5 hashes compared against Threat Intel from public databases 3 Internet
  • 36. 39 Flow Visualization Designed to show limited Client->Server interaction for IPv4 address space. Overview and Detail views Can be used in real-time, interactive, and forensic modes Bubble chart that animates as flows appear (Detail view only) 3
  • 37. 40 Flow Visualization Detail View 4 Horizontal Trends show your externally-accessible hosts The Bubbles animate in real-time or in play- back mode Vertical Trends illustrate your internal host address space
  • 40. 43 FAQ • Yes. The app enables capture of only the relevant network/wire data for analytics, through filters and aggregation rules • Select or deselect protocols and associated attributes with fine-grained precision within the app interface Can I limit the amount of data collected with Stream? • Data volume can vary based upon the number of selected protocols, attributes and the amount of network traffic • Use Stream Estimate to understand the indexing impact How can I estimate my indexing volume? • Stream can be installed on any physical or virtual host running supported OS, on premises or in the cloud • It can be installed off of TAP and SPAN ports • It can be deployed in combination with TAP aggregation or visibility switches Where is Stream typically installed?

Editor's Notes

  • #2: Customer facing deck
  • #5: With this app, Splunk customers deep insights about can capture application transaction times, transaction paths, network performance, and even database queries. Correlating wire data with other application and infrastructure data in Splunk software such as logs, metrics and events, As a result users are getting insights about app, service or network availability, performance and usage of their servicesVisualize application and database insights including applications transactions, HTTP error codes, response times, top URIs database queries needing deep instrumentation or impact on monitoring system As a software solution, the Splunk App for Stream can be deployed on any type of cloud (in a VM). Our customers start gaining immediate insights into apps and cloud dinfrastrctucture without the deep instrumentation . This provides real-time visibility into any public, private or hybrid cloud infrastructure through insights from wire data. Additionally, customers can now securely decrypt SSL encrypted data for data completeness. As the nature of the apps runjning in the cloud is ephemeral, you can tailor your data collection easily. This can be achieved through temporary streams or fine grain monitoring. Lastly, can be rapidly deployed to collect streaming network data to everyone,
  • #25: We will cover just three examples in this section. There are many more – please refer to presentation titles Stream Customer Success Examples.
  • #33: This section covers the important features from the older releases. Skip, if the customer is familiar with the older releases.
  • #42: We will cover just three examples in this section. There are many more – please refer to presentation titles Stream Customer Success Examples.
  • #43: Thank you. Open up for Questions
  • #45: Thank you. Open up for Questions