Knowledge Management

CIM data model for Azure activity logs in Splunk

bsanjee
Explorer

Hello,

I have onboarded activity logs from an azure subcription to splunk using Azure monitor addon for splunk, https://splunkbase.splunk.com/app/3534/#/details , and the logs are parsed into below sourcetypes,

amal:administrative
amal:serviceHealth
amal:resourceHealth
amal:security
amal:ascRecommendation
amal:ascAlert

Is there a CIM model for these sourcetypes? If not, how should CIM compliance be validated?

0 Karma

ssadh_splunk
Splunk Employee
Splunk Employee
0 Karma

HiroshiSatoh
Champion

This APP is not CIM compliant. You need to ask the creator, or associate yourself with CIM.
Good luck!

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...