Skip to content

Vendor - Dell - VMware

Product - Carbon Black Protection

Ref Link
Splunk Add-on CEF none
Splunk Add-on Source Specific https://bitbucket.org/SPLServices/ta-cef-imperva-incapsula/downloads/

Sourcetypes

sourcetype notes
cef Common sourcetype

Source

source notes
carbonblack:protection:cef Note this method of onboarding is not recommended for a more complete experience utilize the json format supported by he product with hec or s3

Index Configuration

key source index notes
Carbon Black_Protection carbonblack:protection:cef epintel none

Filter type

MSG Parse: This filter parses message content

Options

Note listed for reference processing utilizes the Microsoft ArcSight log path as this format is a subtype of CEF

Variable default description
SC4S_LISTEN_CEF_TCP_PORT empty string Enable a TCP port for this specific vendor product using a comma-separated list of port numbers
SC4S_LISTEN_CEF_UDP_PORT empty string Enable a UDP port for this specific vendor product using a comma-separated list of port numbers
SC4S_ARCHIVE_CEF no Enable archive to disk for this specific source
SC4S_DEST_CEF_HEC no When Splunk HEC is disabled globally set to yes to enable this specific source
  • NOTE: Set only one set of CEF variables for the entire SC4S deployment, regardless of how many ports are in use by this CEF source (or any others). See the “Common Event Format” source documentation for more information.

Verification

An active site will generate frequent events use the following search to check for new events

Verify timestamp, and host values match as expected

index=<asconfigured> (sourcetype=cef source="carbonblack:protection:cef")

Product - vSphere - ESX NSX (Controller, Manager, Edge)

Ref Link
Splunk Add-on None
Manual https://docs.vmware.com/en/VMware-NSX-Data-Center-for-vSphere/6.4/com.vmware.nsx.logging.doc/GUID-0674A29A-9D61-4E36-A302-E4192A3DA1A5.html

Sourcetypes

sourcetype notes
vmware:vsphere:nsx None
vmware:vsphere:esx None
vmware:vsphere:vcenter None
nix:syslog When used with a default port, this will follow the generic NIX configuration. When using a dedicated port, IP or host rules events will follow the index configuration for vmware nsx

Sourcetype and Index Configuration

key sourcetype index notes
vmware_esx vmware:vsphere:esx main none
vmware_nsx vmware:vsphere:nsx main none
vmware_vcenter vmware:vsphere:vcenter main none

Filter type

MSG Parse: This filter parses message content when using the default configuration

Setup and Configuration

  • Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
  • Refer to the Splunk TA documentation for the specific customer format required for proxy configuration
    • Select TCP or SSL transport option
    • Ensure the format of the event is customized per Splunk documentation

Options

Variable default description
SC4S_LISTEN_VMWARE_VSPHERE_TCP_PORT empty string Enable a TCP port for this specific vendor product using a comma-separated list of port numbers
SC4S_LISTEN_VMWARE_VSPHERE_UDP_PORT empty string Enable a UDP port for this specific vendor product using a comma-separated list of port numbers
SC4S_LISTEN_VMWARE_VSPHERE_TLS_PORT empty string Enable a TLS port for this specific vendor product using a comma-separated list of port numbers
SC4S_ARCHIVE_VMWARE_VSPHERE no Enable archive to disk for this specific source
SC4S_DEST_VMWARE_VSPHERE_HEC no When Splunk HEC is disabled globally set to yes to enable this specific source

Verification

An active proxy will generate frequent events. Use the following search to validate events are present per source device

index=<asconfigured> sourcetype="vmware:vsphere:*" | stats count by host

Vendor - Dell - VMware

Product - Horizon View

Ref Link
Splunk Add-on None
Manual unknown

Sourcetypes

sourcetype notes
vmware:horizon None
nix:syslog When used with a default port this will follow the generic NIX configuration when using a dedicated port, IP or host rules events will follow the index configuration for vmware nsx

Sourcetype and Index Configuration

key sourcetype index notes
vmware_horizon vmware:horizon main none

Filter type

MSG Parse: This filter parses message content when using the default configuration

Setup and Configuration

  • Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
  • Refer to the Splunk TA documentation for the specific customer format required for proxy configuration
    • Select TCP or SSL transport option
    • Ensure the format of the event is customized per Splunk documentation

Options

Variable default description
SC4S_LISTEN_VMWARE_VSPHERE_TCP_PORT empty string Enable a TCP port for this specific vendor product using a comma-separated list of port numbers
SC4S_LISTEN_VMWARE_VSPHERE_UDP_PORT empty string Enable a UDP port for this specific vendor product using a comma-separated list of port numbers
SC4S_LISTEN_VMWARE_VSPHERE_TLS_PORT empty string Enable a TLS port for this specific vendor product using a comma-separated list of port numbers
SC4S_ARCHIVE_VMWARE_VSPHERE no Enable archive to disk for this specific source
SC4S_DEST_VMWARE_VSPHERE_HEC no When Splunk HEC is disabled globally set to yes to enable this specific source

Verification

An active device will generate frequent events. Use the following search to validate events are present per source device

index=<asconfigured> sourcetype="vmware:horizon" | stats count by host