Getting Data In

Logging practices for security logging.

misteryuku
Communicator

I would like to create log messages that would be used for log analysis using Splunk such as checking for occurence of Denial of Service attacks. What would be the best logging practices for that as in what are the most important information that i should be displaying in the log messages???

Tags (2)
0 Karma

elusive
Splunk Employee
Splunk Employee

Hi. The link you have provided above does not work anymore. It seems like the pages has changed. Can you provide the link again? thanks!

0 Karma

gjanders
SplunkTrust
SplunkTrust

The common information model has it's own manual in particular you may wish to refer to using the CIM and the examples of using the CIM

0 Karma

ziegfried
Influencer

This is a good place for getting started:

In addition, naming field according to the CIM (Common Information Model) would be a good idea:

misteryuku
Communicator

Okay. i see...

0 Karma

ziegfried
Influencer

something like allowed/blocked or success/failure. whatever is more reasonable.

0 Karma

misteryuku
Communicator

What does the action field for the network protection/traffic represent? Does it represent the action of the packet??

0 Karma

ziegfried
Influencer

Yup. Network Protection/Traffic might be the best choice.

0 Karma

misteryuku
Communicator

Lets say if i want to monitor the traffic of the network as in detecting Denial of service attacks, the log message should contain the fields under the network protection category of the Common Information Model. Is that true?

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

  Ready to master Kubernetes and cloud monitoring like the pros?Join Splunk’s Growth Engineering team for an ...

Wrapping Up Cybersecurity Awareness Month

October might be wrapping up, but for Splunk Education, cybersecurity awareness never goes out of season. ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

🗣 You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...