Splunk¶
Chronicle supports ingesting log data from Splunk. Splunk queries are created that can be targeted to pull specific logs into a Chronicle Forwarder. The queries are run on a configurable time interval to pull current data into Chronicle.
Requirements¶
- Chronicle Forwarder / CYCLOPS
Query Examples¶
Using Splunk's Query Language, identify queries which will query data from choice data sources.
Windows Security Log¶
Log type: WINEVTLOG
search index=wineventlog source="WinEventLog:Security
Windows System Log¶
Log type: WINEVTLOG
search index=wineventlog source="WinEventLog:System”
Windows Defender¶
Log type: WINDOWS_DEFENDER_ATP
search index=wineventlog source="WinEventLog:Microsoft-Windows-Windows Defender/Operational"
Windows DHCP¶
Log type: WINDOWS_DHCP
search index=wineventlog sourcetype=dhcpsrvlog
Gather Information¶
Provide the following information to Cyderes to complete implementation:
- Splunk API user - credentials for a Splunk user with access to the
Search
API