Splunk Enterprise Security

Entreprise Seurity Not Generating Notables

fedayn05
Path Finder

Hello Team,

I have integrated Linux Hosts with my Splunk. I installed the splunk add-on for Linux , and it gaves me 3 source types (linux_secure, linux_messages_syslog and linux_audit) . 

This is my inputs.conf on Splunk Forwarder : 

[monitor:///var/log/auth.log]
disabled = false
sourcetype = linux_secure
index = linux_hosts

[monitor:///var/log/syslog]
disabled = false
sourcetype = linux_messages_syslog
index = linux_hosts

[monitor:///var/log/audit/audit.log]
disabled = false
sourcetype = auditd
index = linux_hosts

The First issue i have is that The Endpoint Data Model doesn't accept thoses source types except for linux_secure, so Correlation searches are not bringing any notables.

The second issue is regarding Notables , i changed the source type from linux_audit to auditd. And i took a correlation search as an axample , I run its SPL on search and it brings result , but On the Entreprise security no notable is generated.

Could you please help me fix This.

Thank you for your time.

 

 

 

PickleRick
SplunkTrust
SplunkTrust

OK. Of those three locations only the audit.log contains fairly standardized data.

But.

There are several different types of events there.

1. SELinux alerts

2. PAM events

3. auditd logs

Usefulness of SELinux alerts depends on your SELinux policy (and whether SELinux is enabled at all).

Auditd must be explicitly configured with audit rules to produce meaningful output.

So this single file can be tricky to configure.

And the two other files can contain plethora of various event formats from different daemons on your system depending on what you have installed and how your system is configured. I assume it's some debian-based distro because normal RH-based one doesn't even have /var/log/syslog.

So it's a bit more complicated than just installing "something" and having it work.

Sysmon is... well, that's a completely different story. I'd be very cautious about it since it's a very low-level external tool and requires a decent configuration to produce meaningful output but not overstress the system.

0 Karma

azadsarker
Explorer

Hello,

Thank you for sharing the details of your configuration. Based on your description, there are two separate issues related to data model compatibility and notable event generation in Splunk Enterprise Security.

  1. Endpoint Data Model Not Recognizing Sourcetypes

The Endpoint Data Model in Splunk Enterprise Security expects specific sourcetypes defined in the CIM (Common Information Model). While the Splunk Add-on for Unix and Linux provides sourcetypes such as:

  • linux_secure
  • linux_messages_syslog
  • linux_audit

only some of these are mapped to the Endpoint data model by default.

In your configuration:

/var/log/auth.log -> linux_secure
/var/log/syslog -> linux_messages_syslog
/var/log/audit/audit.log -> auditd

The main issue is that linux_messages_syslog and auditd are not automatically mapped to the Endpoint data model unless CIM field mappings and tags are properly applied.

Recommended actions:

  1. Verify CIM compliance using the CIM Data Model Audit dashboard.
  2. Check if the events contain the required CIM fields such as:
    • user
    • src
    • dest
    • process
    • action
  3. Ensure proper event tags are applied (for example: authentication, process, change, etc.).
  4. If necessary, create field aliases or eventtype mappings to align the sourcetypes with the Endpoint data model.

For example, verify whether your events appear in the data model:

| datamodel Endpoint Authentication search

If no results appear, the events are not mapped correctly to CIM.

fedayn05
Path Finder

Hello,

Thank you for your time and reply.

After further verification, it turns out that linux syslog logs don't generate deep logs about the filesystem and processes, so the logs will never trigger those correlation searches as the required data are not sent.

what i found on reddit is some people recommending the installation of Sysmon, as it monitors and logs the required data. i did install Sysmon and i installed Sysmon add-on for linux on Splunk and used the sysmon-linux sourcetype. 

This really helped and now the correlation searches are being perfectly triggered.

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...