- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
CIM data model for Azure activity logs in Splunk
bsanjee
Explorer
10-04-2019
02:02 AM
Hello,
I have onboarded activity logs from an azure subcription to splunk using Azure monitor addon for splunk, https://splunkbase.splunk.com/app/3534/#/details , and the logs are parsed into below sourcetypes,
amal:administrative
amal:serviceHealth
amal:resourceHealth
amal:security
amal:ascRecommendation
amal:ascAlert
Is there a CIM model for these sourcetypes? If not, how should CIM compliance be validated?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
ssadh_splunk

Splunk Employee
11-27-2019
09:55 AM
Take a look at these apps:
https://splunkbase.splunk.com/app/2968/
https://splunkbase.splunk.com/app/2962/
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

HiroshiSatoh
Champion
10-07-2019
04:27 AM
This APP is not CIM compliant. You need to ask the creator, or associate yourself with CIM.
Good luck!
