Splunk Enterprise

How to make data event correlation automatic?

Jeewan
Loves-to-Learn Lots

Hello Guys, 

I have some doubt about data event correlation. i am getting events from different different security vendors like Area1 bitdefender, crowdstrike, cloudflare.  now i wants in my splunk the event correlation should happen automatically. suppose any incident happen in any endpoint it should correlate that event with other data sources as well. not sure how to achieve this 

or i am getting the events from different vendor so in some event the IP is listed as source IP in some event it listed computer IP to normalize it for all the data sources so it will be the same for all data sources. 

any lead will be appricatebale 

Thanks 

Jeewan 

Labels (3)
0 Karma

PaulPanther
Builder

@Jeewan Regarding the data normalization part of your question you should check out Splunk Common Information Model (CIM)  Overview of the Splunk Common Information Model - Splunk Documentation

With that you should solve the first part your question.

0 Karma
Get Updates on the Splunk Community!

How to Monitor Google Kubernetes Engine (GKE)

We’ve looked at how to integrate Kubernetes environments with Splunk Observability Cloud, but what about ...

Index This | How can you make 45 using only 4?

October 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Splunk Education Goes to Washington | Splunk GovSummit 2024

If you’re in the Washington, D.C. area, this is your opportunity to take your career and Splunk skills to the ...