All Apps and Add-ons

SA-ldapsearch / Active Directory issue

frankbezemer
New Member

I am having issues with the Active Directory/ldapsearch app.
I have the ldap.conf configured properly I think.

When I click on one of the security audit reports I see that LDAP is being used.
I ran a wireshark on the windows server and as a test I used unsecure LDAP.
I see the splunk server authenticating fine, I see LDAP returning a bunch of data, but then nothing shows up in Splunk.
I do get two bars at the top with:
[subsearch]: No matching fields exist
No matching fields exist

I thought maybe it only works with SSL enabled, so I tried that too, but same effect.
The other issue (might be related) is that the debug=t doesn't seem to do anything for the ldapsearch. Nothing is written in the debug log.

I can use other LDAP browsers and connect to LDAP no problem.

Splunk is running on Linux and I am monitoring a Windows Advanced 2008 R2 server.

The rest of the app seems to be running fine.

Tags (1)
0 Karma

ahall_splunk
Splunk Employee
Splunk Employee

If there is an event in the time period you are looking at for the user in question in eventtype=msad-failed-user-logons and the LDAP record is returning correctly, then you should not see the subsearch error as it is returning information. Something else must be going wrong.

If you have a support contract, then escalate this through our support department since we need to take a closer look. If you don't have a support contract, then first off, you need one for exactly this sort of problem. Secondly, take a look at the underlying XML data and pull out the search that is causing the error, then break it down into its component parts to determine which bit is not working.

0 Karma

ahall_splunk
Splunk Employee
Splunk Employee

If you are evaluating Splunk, then please contact your friendly Splunk sales rep for assistance.

0 Karma

frankbezemer
New Member

No, I am evaluating splunk, so we don't have a support agreement (yet).
What XML do you mean exactly? I have tried the search of one of the failed ones, and I can't really find it. It seems every LDAP query fails.

0 Karma

ahall_splunk
Splunk Employee
Splunk Employee

Based on the above, the app is not seeing the audit trail stored in the Windows Security Event Log. Try the following:

  1. Ensure that splunk_TA_Windows is installed on your domain controller forwarders
  2. Ensure you have set up the DC audit (per the documentation on http://docs.splunk.com)
  3. Run a search for:

    eventtype=msad-failed-user-logons

and ensure it is returning information for the user that you are searching for (assuming you are testing audit_user)

0 Karma

frankbezemer
New Member

OK, thanks for your help.

Yes, I have the splunk_ta_windows on my DC.
I have set it up according to documentation on the website.

When I run a search for "eventtype=msad-failed-user-logons" events do show up.
Anything else you can think of that might be wrong?

0 Karma

ahall_splunk
Splunk Employee
Splunk Employee

It would be helpful to understand which dashboard (url) and which panel within the dashboard that is having the issue. We can then look at the individual searches and see if you have some commonality.

0 Karma

frankbezemer
New Member

Hi, thanks for your help.

All the ones in security > audit
/app/Splunk_for_ActiveDirectory/audit_computer
/app/Splunk_for_ActiveDirectory/audit_user
/app/Splunk_for_ActiveDirectory/audit_group
/app/Splunk_for_ActiveDirectory/audit_gpo

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...