Splunk Enterprise Security

How to get IIS events into Enterprise Security App

asonenthal
New Member

Splunkers,

I am trying to get IIS log W3C log events into Enterprise Security App. I made the IIS events an eventtype with tag: web, and made the following field aliases:

c_ip as src
cs_Cookie as cookie
cs_Referer as http_referrer
cs_User_Agent as http_user_agent
cs_bytes as bytes_in
s_ip as dest
cs_method as http_method
cs_uri_stem as uri_path
s_sitename as site
sc_bytes as bytes_out
sc_status as status
cs_username as user

I made the permissions as wide as possible, but after a reboot ESA still does not see the data as for example the ESA HTTP User Agent Analysis remains blank. What am I doing wrong?

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

As mentioned, you need to have these events tagged for web and proxy for ES. You should refer to the documentation for ES's dashboards for how your data should be tagged to appear in these correctly.

http://docs.splunk.com/Documentation/ES/3.2.1/User/MoreNetworkdashboards

http://docs.splunk.com/Documentation/CIM/4.1.0/User/Web

0 Karma

MinaMina
New Member

Hello,
I also need to get IIS logs into Splunk ES app, which add-on did you used ?
Thx,

0 Karma

LukeMurphey
Champion

The web data model was intended for use with proxy log and thus requires two tags: web and proxy.

First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...