Vendor - Wallix
Product - Bastion
Ref |
Link |
Splunk Add-on |
https://splunkbase.splunk.com/app/3661/ |
Sourcetypes
sourcetype |
notes |
WB:syslog |
note this sourcetype includes program:rdproxy all other data will be treated as nix |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
WB:syslog |
infraops |
main |
none |
Filter type
MSG Parse: This filter parses message content
Variable |
default |
description |
SC4S_LISTEN_WALLIX_PROXY_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_WALLIX_PROXY_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_WALLIX_PROXY |
no |
Enable archive to disk for this specific source |
SC4S_DEST_WALLIX_PROXY_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
An active proxy will generate frequent events. Use the following search to validate events are present per source device
index=<asconfigured> sourcetype=WB:* | stats count by host