Splunk Enterprise Security

Getting F5 data into the data model of enterprise security

laurent_ripaux
New Member

The F5 logs are sent through the syslog to Splunk. However, the messages are not likely correctly cut out because many fields are populated with the "unknown" value. How can we deal with this? What should be the right configuration to correctly map the log data into the data models? Thank you for your reply. Regards, Laurent Ripaux

0 Karma

alemarzu
Motivator

Hi there @laurent.ripaux

Which app for F5 are you using ?

0 Karma

tmarlette
Motivator

that's a much more complicated question than you think it is.

field extraction is a long process in splunk using regex, and datamodel loading requires even creation, and then tagging. the 'unknown' value is equivalent to 'null', which you may not even want to load into your data model.

for instance, to generically load F5 data into the 'network' data model you'd have to create an event
eventtypes.conf

[f5_event]
search = index=network sourcetype=f5

Then tag it with 'network'. The above example assumes A LOT of other things are in place.
data models usually search for tags

0 Karma

laurent_ripaux
New Member

Thank you for this answer. We'll have to check the eventtypes.conf in place.

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...