

On most systems these days the syslog flags are configured in the /etc/sysconfig/syslog file. Step one, configure syslog to “listen” to incoming messages.Run Splunk on your receiver and you’re done.Īs an example, lets say we have a Linux deployment. If you have a medium scale deployment where you have lots of servers, you can configure syslog to listen to remote syslog hosts. Often this is /var/log or /var/adm depending on a Linux or Solaris installation. You would just configure Splunk to use the Monitor input and point it to the target directory that you are storing your syslog log files in. If you only deal with single line events then syslog is fine. Setting Splunk up to handle syslog inputs is trivial. Most, if not all systems come with syslog built in. “What are you currently running in your infrastructure? Do you have a log archive? What are you comfortable configuring?” I often get asked, which is better for Log Management Syslog, Syslog-ng or Splunk Forwarders… More information can be found in our blog post, here.
SPLUNK INPUTS.CONF UPDATE
Configure Monitoring through Splunk WebĬonfigure a file monitoring input on your data collection node for the Symantec DLP syslog file.I mportant Update as of : Splunk has released Splunk Connect for Syslog (SC4S) and solution for syslog data sources. If you use a syslog aggregator, you can create a file monitor input to monitor the files generated by the aggregator.

To configure the Splunk platform to monitor the syslog file generated by the Symantec DLP server, you can use either Splunk Web to create the monitor input or configure nf directly. Note: For information about timestamp processing options for syslog events, see Syslog and timestamps in Splunk Add-ons.
SPLUNK INPUTS.CONF HOW TO
For example, if you are using Symantec DLP 12.0 or earlier, instead of using policy="$POLICY$" you would use policy="$POLICY_NAME$".įor instructions on how to create response rules, see "Response rule actions" in the Symantec Data Loss Prevention Administration guide. Note: You need to use the variable names that correspond with the version of Symantec DLP you are using. Incident_id="$INCIDENT_ID$", blocked="$BLOCKED$", policy="$POLICY$", recipients="$RECIPIENTS$", rules="$POLICY_RULES$", sender="$SENDER$", severity="$SEVERITY$", subject="$SUBJECT$" A list of variables for specific types of detection can be found in the DLP Admin Guide under "Response Action Variables." Specify each variable you would like to extract from your Symantec DLP system using the format above, separating each key/value pair with a comma or a space. Set up a response rule in the Symantec DLP server using the following format: You also need to use a specific format required by the Splunk add-on for Symantec DLP. You need to enable syslog in Symantec DLP in order to send events to the Splunk platform through syslog. Configure Symantec DLP to send syslog data:.
SPLUNK INPUTS.CONF INSTALL
Install the Splunk Add-on for Symantec DLP, a high-level overview and installation walkthroughs can be found here.Download the add-on from Splunkbase here.
