All Apps and Add-ons

What is the best way to export data from splunk to Rsa security analytics?

Splunker6789
Explorer

From splunk to RSA security Analytics .

0 Karma
1 Solution

gcusello
Esteemed Legend

Hi Splunker6789,
there are many ways to send logs to Security Analytics, we used syslogs for one of our customers.

The choice is related to the use that you want to do of logs in Splunk:

Bye.
Giuseppe

View solution in original post

0 Karma

gcusello
Esteemed Legend

Hi Splunker6789,
there are many ways to send logs to Security Analytics, we used syslogs for one of our customers.

The choice is related to the use that you want to do of logs in Splunk:

Bye.
Giuseppe

0 Karma

Splunker6789
Explorer

Hi Giuseppe ,

Can you explain process of sending all logs from splunk to RSA .That will be helpful!

0 Karma

gcusello
Esteemed Legend

Hi Splunker6789,
It's described in the link:
you have to configure in your outputs.conf the destination syslog

[syslog]
defaultGroup=syslogGroup

[syslog:syslogGroup]
server = x.x.x.x:514

After edit props.conf and transforms.conf to specify the filtering criteria:
props.conf

[my_sourcetype]
TRANSFORMS-my_sourcetype = send_to_syslog

transforms.conf

[send_to_syslog]
REGEX = .
DEST_KEY = _SYSLOG_ROUTING
FORMAT = my_syslog_group

Bye.
Giuseppe

0 Karma

Splunker6789
Explorer

I have a question .We are on boarding data from splunk to Rsa .Actually the data was in splunk indexers.So I wonder how will we be on-board from indexers.

0 Karma

Splunker6789
Explorer

Thanks Cusello really appreciate .

0 Karma
Get Updates on the Splunk Community!

Splunk Cloud | Empowering Splunk Administrators with Admin Config Service (ACS)

Greetings, Splunk Cloud Admins and Splunk enthusiasts! The Admin Configuration Service (ACS) team is excited ...

Tech Talk | One Log to Rule Them All

One log to rule them all: how you can centralize your troubleshooting with Splunk logs We know how important ...

Splunk Security Content for Threat Detection & Response, Q1 Roundup

Join Principal Threat Researcher, Michael Haag, as he walks through:An introduction to the Splunk Threat ...