Splunk Content Control Tool
Project description
contentctl
contentctl Quick Start Guide
If you are already familiar with contentctl, the following common commands may be very useful for basic operations
Operation | Command |
---|---|
Create a repository | contentctl init |
Validate Your Content | contentctl validate |
Validate Your Content, performing MITRE Enrichments | contentctl validate --enrichments |
Build Your App | contentctl build |
Test All the content in your app, pausing so that you can debug a search if it fails | contentctl test --post-test-behavior pause_on_failure mode:all |
Test All the content in your app, pausing after every detection to allow debugging | contentctl test --post-test-behavior always_pause mode:all |
Test 1 or more specified detections. If you are testing more than one detection, the paths are space-separated. You may also use shell-expanded regexes | contentctl test --post-test-behavior always_pause mode:selected --mode.files detections/endpoint/7zip_commandline_to_smb_share_path.yml detections/cloud/aws_multi_factor_authentication_disabled.yml detections/application/okta* |
Diff your current branch with a target_branch and test detections that have been updated. Your current branch must be DIFFERENT than the target_branch | contentctl test --post-test-behavior always_pause mode:changes --mode.target_branch develop |
Perform Integration Testing of all content. Note that Enterprise Security MUST be listed as an app in your contentctl.yml folder, otherwise all tests will subsequently fail | contentctl test --enable-integration-testing --post-test-behavior never_pause mode:all |
Introduction
Security Is Hard
Anyone who has managed a SOC will tell you it's hard work. SOC Managers, Detection Engineers, and Cybersecurity Professionals must understand and manage countless tools and data sources while ensuring the reliability and security of their network and applications. At the same time, they must be able to detect and react to data breeches, vulnerabilities, and performance degradation in minutes - not seconds or hours. These responsibilities leave little time for writing new content - let alone documentation, maintenance, and testing of legacy content. Existing solutions like Wikis, JIRA tickets, Excel Spreadsheets, and "asking that one team member who knows everything" don't scale and spread information across various systems.
contentctl Makes It Easy Less Hard
contentctl is a single application that support the full cycle of security content development (each of the links below will redirect to the appropriate section of the README/Wiki):
- Create Content Packs - Version-Controlled collections of searches, documentation, and test data
- Add New Content - searches, macros, lookups, and other content
- Statically Validate Content Against a Well-Defined Baseline
- Building a Content Pack for your target - Use a supported output format or design your own
- Test your Content Pack on a running Splunk Instance
- Deploy your Content Pack to Splunk Cloud Instance, via REST API, or create a Splunkbase Application for manual deployment
Ecosystem
Project | Description |
---|---|
Splunk Attack Range | Easily deploy a preconfigured Splunk Environment locally or on AWS containing a Splunk Instance, Windows and Linux Machines, and Attacker Tools like Kali Linux. Automatically simulate attacks or run your own |
PurpleSharp Attack Simulation | Open source adversary simulation tool for Windows Active Directory environments (integrated into Attack Range) |
Red Canary Atomic Red Team | Library of attack simulations mapped to the MITRE ATT&CK® framework (integrated into Attack Range) |
Splunk Attack Data | Repository of Attack Simulation Data for writing and Testing Detections |
Splunk Security Content | Splunk Threat Research Team's Content included in the Enterprise Security Content Update App (ESCU) |
Splunk contentctl | Generate, validate, build, test, and deploy custom Security Content |
SigmaHQ Sigma Rules | Official Repository for Sigma Rules. These rules are an excellent starting point for new content. |
Workflow
graph TD
starting_state --contentctl init--> contentPack
newContent{new_content} --contentctl new sigma content--> contentPack
newContent{new_content} --contentctl new spl content--> contentPack
contentPack --contentctl validate--> ValidatedContent
ValidatedContent --contentctl build--> SplunkContent
ValidatedContent --contentctl docs--> WebsiteDocumentation
ValidatedContent --contentctl docs--> MITRE_mapDocumentation
SplunkContent --contentctl test via container-->TestResults
TestResults --contentctl deploy-->SplunkRESTAPI
TestResults --contentctl deploy-->SplunkbaseApp
TestResults --contentctl deploy-->SplunkCloudInstance
Installation
Requirements
Testing is run using GitHub Hosted Runners. Ubuntu22.04 is the recommended configuration.
Operating System | Supported | Passing Intregration Tests |
---|---|---|
Windows 10 | Yes | Not tested yet |
Windows 11 | Yes | Not tested yet |
Ununtu 20.04 LTS | Yes | YES (locally + GitHub Actions) |
*Ubuntu 22.04 LTS | Yes | YES (locally + GitHub Actions) |
macOS Montery 12 | Yes | Not tested yet |
macOS Ventura 13 | Yes (Intel and Apple Silicon) | Yes (locally) |
Requirement | Supported | Description | Passing Integration Tests |
---|---|---|---|
Python 3.11+ | Yes | contentctl tool is written in Python | Yes (locally + GitHub Actions) |
Docker (local) | Yes | A running Splunk Server is required for Dynamic Testing. contentctl can automatically create, configure, and destroy this server as a Splunk container during the lifetime of a test. | (locally + GitHub Actions) |
Docker (remote) | Planned | A running Splunk Server is required for Dynamic Testing. contentctl can automatically create, configure, and destroy this server as a Splunk container during the lifetime of a test. | No |
Because contentctl uses a large number of dependencies, it's recommended to install contentctl in a virtual environment.
The instructions below using "poetry" ALSO follow this recommendation. Poetry will automatically create a new virtual environment for you.
It is typically recommended to install poetry to the Global Python Environment.
Install via pip (recommended):
python3.11 -m venv .venv
source .venv/bin/activate
pip install contentctl
From Source (advanced)
git clone https://github.com/splunk/contentctl
cd contentctl
python3.11 -m pip install poetry
poetry install
poetry shell
contentctl --help
Usage
contentctl init
Creates a new Content Pack in the current directory as well as a configuration file called contentctl.yml which contains a number of important configuration options. The content pack contains a wide variety of content types:
- detections - A piece of content that wraps and enriches a Splunk Search. Example Detection
- baselines - This content is not currently supported.
- lookups - Static files, such as CSVs, that can be loaded into Splunk for use in lookup commands. Example Lookup
- macros - Common code that is re-used across a wide set of detections. Example Macro
- stories - Analytic Stories Allow a developer to tie together a group of detections, for example detections that all relate to Ransomware. Example Analytic Story
contentctl validate
Performs static validation on all of the content in this Content Pack. Writing validation is extremely complex. Each piece of content can one or dozens of fields ranging from free text to numbers to references to other content. contentctl's build in validation ensures that a number of conditions are met:
- Required fields in content are defined
- Values in fields are appropriate. For example, if content references a Datamodel, then that Datamodel must be valid. Similarly, numeric values that must fall within a certain range must be validated.
- If a piece of content references other content, then it exists. For example, if a detection makes use of a macro then the existence and correctness of the macro must be validated.
- There are no conflicts between content. For example, two detections cannot have the same name. If any of these conditions are not met, then a descriptive error will be printed and contentctl will return a nonzero exit code. This makes it suitable for running in an automated workflow or other CICD context. Instead of exiting on the first error, contentctl validate will continue validating all content so that it can present all relevant error before exiting.
contentctl build
Generates Content Packs in the output format defined in the contentctl.yml configuration file. These outputs may include {splunk_app, api, ba}. When contentctl build runs, it first performs a contentctl validate in order to ensure that a valid app is generated. Note that it is NOT required or recommended to run contentctl validate separately if the intention is to build a Content Pack.
contentctl report
This section is under active development. It will allow you to a MITRE Map showing your coverage of MITRE Techniques. The link here shows the generation of that MITRE Map using the content in Splunk's security_content repo.
contentctl new [--type TYPE]
Choose TYPE {detection, story} to create new content for the Content Pack. The tool will interactively ask a series of questions required for generating a basic piece of content and automatically add it to the Content Pack.
contentctl inspect
This section is under development. The inspect action performs a number of post-build validations. Primarily, it will enable the user to perform an appinspect of the content pack in preparation for deployment onto a Splunk Instance or via Splunk Cloud. It also compares detections in the new build against a prior build, confirming that any changed detections have had their versions incremented (this comparison happens at the savedsearch.conf level, which is why it must happen after the build). Please also note that new versions of contentctl may result in the generation of different savedsearches.conf files without any content changes in YML (new keys at the .conf level which will necessitate bumping of the version in the YML file).
contentctl deploy
The reason to build content is so that it can be deployed to your environment. However, deploying content to multiple servers and different types of infrastructure can be tricky and time-consuming. contentctl makes this easy by supporting a number of different deployment mechanisms. Deployment targets can be defined in contentctl.yml.
- Deploy via API - Using the REST API, individual pieces of content are deployed to a running server. This is a great way to deploy all of the content in a content pack, but can also be used to deploy individual peices of content.
- Deploy to Splunk Cloud via ACS - Using the Automated Private App Vetting (APAV) Feature of the Admin Config Service (ACS), Splunk Cloud customers can easily deploy custom apps to their environments.
contentctl docs
This section is under active development. It will allow you to easily generate verbose web-based documentation from all of your content. The link here shows the generation of that documentation using the content in Splunk's security_content repo.
contentctl test
The static validation performed by contentctl validate can only take you so far. While it's powerful, and fast, it can only tell determine if the content is syntactically correct. contentctl test can test your content on real Splunk Infrastructure to ensure there are no errors in your SPL, raw data can be properly ingested/processed/accelerated on your server, your search finds the event(s) you're looking for in raw data, and even provides high-level runtime performance metrics about your searches. As part of this workflow, a large number of apps will be installed by default. You can see, and edit, the list of apps in the app_default.yml file. We plan on making this even easier to update in the future, so stay tuned for updates. The following diagram shows this workflow at a high level.
graph TD
SplunkContainer--start-->SplunkInstance
SplunkServer-->SplunkInstance
SplunkInstance--Install Apps-->ConfiguredInstance
SplunkInstance--Configure Settings-->ConfiguredInstance
ContentPack--Deploy-->ConfiguredInstance
ConfiguredInstance--Start Test-->Testing
Testing--Test Detection-->Detection
Detection--Replay Raw Data-->Result
subgraph Test Indidivual Detection
Detection--Execute Search-->Result
end
Result--Cleanup-->Testing
Testing--Cleanup-->TestResults
Testing Modes
There are a number of different testing modes that control which content will be tested. This can be controlled with the --mode {}
option at the command line
- all - This will test all of the content in the content pack. Please note that by default only detections marked production will be tested (detections marked as deprecated or experimental, for example, will be ignored).
- selected - Detections whose relative paths are provided on the command line will be tested. This is particularly useful if you would like to troubleshoot or update just a handful of detections and can save a significant amount of time. For example, to test two detections use the following command
contentctl test --mode selected --detections_list detections/detection_one.yml detections/detection_two.yml
- changes - (not currently supported) If you have a large number of detections and use a branching workflow to create new content or update content, then this is an easy way to automatically find and test only that content automatically. This prevents you from needing to explicitly list the subset of content to test using "selected"
Testing Behavior
contentctl test's default mode allows it to quickly test all content with requiring user interaction. This makes it suitable for local tests as well as CI/CD workflows. However, users often want to troubleshoot a test if it fails. contentctl allows you to change the tool's behavior if and/or when a test fails:
- --behavior never_pause - The default behavior. If a test does not pass, the tool begins the next test immediately
- --behavior pause_on_failure - If a test fails, then additional information about that test, and the raw SPL of the test, is printed to the terminal. A user may then click (or CMD+Click) the "LINK" to begin interactively debugging the failed test on the Splunk Server. Note that the credentials for the server are printed out at the very beginning of the test. After you have finished debugging the failure, hit "Return" in the terminal to move on to the next test. The attack_data for this test remains loaded on the server for debugging until the user moves on to the next test.
- --behavior always_pause - Similar to pause_on_failure, but this pauses after every test regardless of whether it passes or fails.
- init - Initilialize a new repo from scratch so you can easily add your own content to a custom application.
- new - Creates new content (detection, story)
- validate - Validates written content
- build - Builds an application suitable for deployment on a search head using Slim, the Splunk Packaging Toolkit
- deploy - Deploy the security content pack to a Splunk Server
- docs - Create documentation as Markdown
- reporting - Create different reporting files such as a Mitre ATT&CK overlay
Shell tab-complete
Leveraging the tab completion featureset of the CLI library we're using, you can generate tab completions for contentctl
automatically, for zsh, bash, and tcsh. For additional details, you can view the docs for the library here.
Zsh
If you already have a location for your ZSH tab completions, you only need to run the generation line and can skip the folder creation, configuring the rest to fit with your shell config.
mkdir -p ~/.zfunc
contentctl --tyro-write-completion zsh ~/.zfunc/_contentctl
echo "fpath+=~/.zfunc" >> ~/.zshrc
echo "autoload -Uz compinit && compinit" >> ~/.zshrc
source ~/.zshrc
Bash
completion_dir=${BASH_COMPLETION_USER_DIR:-${XDG_DATA_HOME:-$HOME/.local/share}/bash-completion}/completions/
mkdir -p $completion_dir
contentctl --tyro-write-completion bash ${completion_dir}/_contentctl
Acronyms
Acronym | Meaning | Description |
---|---|---|
SOC | Security Operation Center | Description of a SoC |
DaC | Detection as Code | A systematic approach applying DevOps priciples to Detection Engineering. DaC enables Continuous Integration and Continuous Delivery of Detectionsa via automated validation, testing, and deployment |
CICD | Continuous Integration/Continuous Delivery | A modern DevOps practice that encourages users to make small, frequent changes which are automatically tested and deployed. This contrasts with legacy approaches that emphasize large changes which may be manually tested an infrequently deployed. |
ACS | Admin Config Service | The Splunk Admin Config Service is a cloud-native API that provides programmatic self-service administration capabilities for Splunk Cloud Platform. One of its features, Automated Private App Vetting (APAV) enables the installation of custom app on Splunk Cloud instances. |
APAV | Automated Private App Vetting | Automated Private App Vetting enables admins to use the ACS API to install, upgrade, and uninstall apps directly on your Splunk Cloud Platform deployment without assistance from Splunk Support. |
License
Copyright 2023 Splunk Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file contentctl-4.4.5.tar.gz
.
File metadata
- Download URL: contentctl-4.4.5.tar.gz
- Upload date:
- Size: 226.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.8.4 CPython/3.11.10 Linux/6.5.0-1025-azure
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | aac43e4ca4d73209c80a58d174b3ffa39ad01d99c77b54cc92ca800e18b35b67 |
|
MD5 | e5d352d3a47e02d4d5cd94cc7af9f6a3 |
|
BLAKE2b-256 | 9eefefb4c20971d27e7a21a9b21db844d4e1e42423c746e437649ec850d0c7b1 |
File details
Details for the file contentctl-4.4.5-py3-none-any.whl
.
File metadata
- Download URL: contentctl-4.4.5-py3-none-any.whl
- Upload date:
- Size: 279.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.8.4 CPython/3.11.10 Linux/6.5.0-1025-azure
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2edaaa1d6fe6a3f541f037f3245cec393156bb427678189d1889a79e5add889b |
|
MD5 | 9967f534823fff734b0b8252cc385616 |
|
BLAKE2b-256 | 087ff1829db93e1d54e889cbc4f5cdc126fee5c476b2045616698be2cd91c864 |