Splunk Enterprise Security

Which Splunk for Enterprise Security Dashboard contains "databases" logs?

MinaMina
New Member

Hello,

In Splunk Enterprise Security ES, I'm looking for dashboards where I can see sql server and oracle databases logs.

According to http://docs.splunk.com/Documentation/ES/3.3.0/Install/Dashboards , I can't find the mapping of ES dashboard to the "databases" datamodel, even if this one exists in CIM datamodel http://docs.splunk.com/Documentation/CIM/4.2.0/User/Datastore

Do you have any idea ?

Thx,

0 Karma
1 Solution

koshyk
Super Champion

CIM is more generic data framework. Splunk Enterprise Security (ES) only implements the security aspect of CIM. So when you say "Oracle" database logs, Splunk ES considers only the security events within the database logs as relevant (eg. authentication, vulnerability etc..)

But of course, Splunk ES has a "Search" option (Search -> Search). That's a generic search on all your indexes (Permissions allowing). But that's same as Search App

View solution in original post

koshyk
Super Champion

CIM is more generic data framework. Splunk Enterprise Security (ES) only implements the security aspect of CIM. So when you say "Oracle" database logs, Splunk ES considers only the security events within the database logs as relevant (eg. authentication, vulnerability etc..)

But of course, Splunk ES has a "Search" option (Search -> Search). That's a generic search on all your indexes (Permissions allowing). But that's same as Search App

MinaMina
New Member

Thank you for your answer !

0 Karma
Get Updates on the Splunk Community!

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...

Detecting Remote Code Executions With the Splunk Threat Research Team

REGISTER NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If ...