Vendor - Radware¶
Product - DefensePro¶
Ref | Link |
---|---|
Splunk Add-on | Note this add-on does not provide functional extractions https://splunkbase.splunk.com/app/4480/ |
Product Manual | https://www.radware.com/products/defensepro/ |
Sourcetypes¶
sourcetype | notes |
---|---|
radware:defensepro | Note some events do not contain host |
Sourcetype and Index Configuration¶
key | sourcetype | index | notes |
---|---|---|---|
radware_defensepro | radware:defensepro | netops | none |
Filter type¶
MSG Parsing
Setup and Configuration¶
Options¶
Variable | default | description |
---|---|---|
SC4S_LISTEN_RADWARE_DEFENSEPRO_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_RADWARE_DEFENSEPRO_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_RADWARE_DEFENSEPRO | no | Enable archive to disk for this specific source |
SC4S_DEST_RADWARE_DEFENSEPRO_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification¶
An active proxy will generate frequent events. Use the following search to validate events are present per source device
index=<asconfigured> sourcetype=radware:defensepro | stats count by host