Getting Data In

How to send AWS and non-AWS logs from S3 bucket to Splunk

adnankhan5133
Communicator

Hello,

We have a variety of different AWS logs (i.e. CloudWatch, Cloudtrail, Config, VPC Flow, Aurora) and non-AWS logs (i.e. Palo Alto, Trend Micro) routed to S3 buckets today. There are a total of 15 S3 buckets (5 per AWS account).

Upon recently purchasing and configuring an on-premise Splunk ES (distributed deployment w/ index clustering, no SH clustering yet), our goal is to begin forwarding these logs to our Splunk deployment.

What are some considerations that we should keep in mind? Since we're going with a push approach, we're planning to do the following - Could someone confirm if this looks right? I'm open to suggestions.

  1. Send the logs from the S3 bucket to Amazon Kinesis Firehouse

  2. Firehose writes a batch of events to Splunk via HEC.

  3. Since indexers are not in an AWS VPC (they reside in a separate Oracle Cloud instance), I'm assuming that an SSL certificate needs to be installed on each indexer? We have 1 index cluster in a Production environment and a separate one in our Disaster Recovery environment.

  4. Assign DNS name that resolves to the set of indexers which shall collect data from Kinesis Firehose.

  5. Install Splunk Add-on for Amazon Kinesis on Enterprise and ES Search Head, as well as Cluster Master

  6. Ensure new index is created for AWS logs (1 sourcetype for each AWS log source) and existing indexes are used for the Palo Alto and Trend Micro logs. If new indexes are needed for Palo Alto and Trend Micro logs, I'm assuming that they would still adhere to the appropriate Splunk ES data models.

  7. Configure HEC and create new HEC Token. There will be a unique HEC token per sourcetype.

  8. Configure Amazon Kinesis Firehouse to send data to Splunk.

  9. Ensure all events are backed up to S3 bucket until it is confirmed that all events are processed by Splunk

  10. Search for data by source type to confirm that it is being indexed and visible.

Labels (1)
Tags (2)
0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...