Splunk Attack Range
This guide will create a Splunk Attack Range.
- Add the different roles to your Ludus server
 
ludus ansible roles add p4t12ick.ludus_ar_splunk
ludus ansible roles add p4t12ick.ludus_ar_windows
ludus ansible roles add p4t12ick.ludus_ar_linux
- Add and build the Ubuntu 22.04 server template
 
git clone https://gitlab.com/badsectorlabs/ludus
cd ludus/templates
ludus templates add -d ubuntu-22.04-x64-server
[INFO]  Successfully added template
ludus templates build
[INFO]  Template building started - this will take a while. Building 1 template(s) at a time.
# Wait until the templates finish building, you can monitor them with `ludus templates logs -f` or `ludus templates status`
ludus templates list
+----------------------------------------+-------+
|                TEMPLATE                | BUILT |
+----------------------------------------+-------+
| debian-11-x64-server-template          | TRUE  |
| debian-12-x64-server-template          | TRUE  |
| kali-x64-desktop-template              | TRUE  |
| win11-22h2-x64-enterprise-template     | TRUE  |
| win2022-server-x64-template            | TRUE  |
| ubuntu-22.04-x64-server-template       | TRUE  |
+----------------------------------------+-------+
- Modify your ludus config to add the 
p4t12ick.ludus_ar_splunkrole to a Ubuntu VM, thep4t12ick.ludus_ar_windowson Windows VMs and thep4t12ick.ludus_ar_linuxon Ubuntu VM. 
ludus range config get > config.yml
config.yml
ludus:
  - vm_name: "{{ range_id }}-ar-splunk"
    hostname: "{{ range_id }}-ar-splunk"
    template: ubuntu-22.04-x64-server-template
    vlan: 20
    ip_last_octet: 1
    ram_gb: 16
    cpus: 8
    linux: true
    roles:
      - p4t12ick.ludus_ar_splunk
  - vm_name: "{{ range_id }}-ar-windows"
    hostname: "{{ range_id }}-ar-windows"
    template: win2022-server-x64-template
    vlan: 20
    ip_last_octet: 3
    ram_gb: 8
    cpus: 4
    windows:
      sysprep: false
    roles:
      - p4t12ick.ludus_ar_windows
    role_vars:
      ludus_ar_windows_splunk_ip: "10.2.20.1"
  - vm_name: "{{ range_id }}-ar-linux"
    hostname: "{{ range_id }}-ar-linux"
    template: ubuntu-22.04-x64-server-template
    vlan: 20
    ip_last_octet: 2
    ram_gb: 8
    cpus: 4
    linux: true
    roles:
      - p4t12ick.ludus_ar_linux
    role_vars:
      ludus_ar_linux_splunk_ip: "10.2.20.1"
ludus range config set -f config.yml
note
Make sure that the ludus_ar_windows_splunk_ip and ludus_ar_linux_splunk_ip are set to the IP address of the Splunk server.
- Deploy the range
 
ludus range deploy
- Have fun with your Splunk Attack Range. You can access the Splunk web interface via HTTP on port 8000 (
http://10.2.20.1:8000in this example). The default username and password areadmin:changeme123!.