Data Locks

Data LocksData LocksData Locks

Data Locks

Data LocksData LocksData Locks
  • Home
  • Ansible
  • Containers
  • K3s
  • Monitoring
  • Vulnrability Scanning
  • SIEM
  • Contact
  • More
    • Home
    • Ansible
    • Containers
    • K3s
    • Monitoring
    • Vulnrability Scanning
    • SIEM
    • Contact
  • Home
  • Ansible
  • Containers
  • K3s
  • Monitoring
  • Vulnrability Scanning
  • SIEM
  • Contact

Splunk

Security Information and Event Management (SIEM)

a data analytics platform that helps businesses collect, analyze, and visualize data. It's used for IT operations, cyber security, application management, and more...

Splunk Core Certified User

A direct view into you systems....

What is Splunk?

Splunk is designed to accept an immense amount of syslog data from almost any device on the network. You can send firewall logs, windows event  logs, switch logs, webiste logs, PowerShell queries and more.

Features

Many features of Splunk like Data Collection & Ingestion, Search & Querying, Data Indexing & Storage, Dashboards & Visualization, Alerting & Monitoring, Security & Compliance, Observability & IT Operations, Cloud & Hybrid Deployments,  Integration & Extensibility.

Architechure

Splunk's architecture is designed to handle vast amounts of machine data in real-time, providing the infrastructure necessary for data collection, indexing, searching, and analysis. The core components of this architecture include Forwarders, Indexers, and Search Heads, each playing a vital role in the overall system's efficiency and scalability. 

Why use Splunk ?

Splunk is a powerful platform for collecting, analyzing, and visualizing machine data in real-time. It helps businesses turn raw logs and events into actionable insights, improving security, IT operations, and business analytics. You can generate scheduled reports and even set alerts!

Installation Tips

When installing Splunk, selecting the right architecture is critical to ensure optimal performance and scalability. The architecture depends on factors like the volume of data, the number of users, and the desired availability. 

Basic Setup

Data Locks - Getting Splunkd

  

Taking a deeper look into Splunk and sharing some pointers. Other than the simplicity of centralized logging, real-time monitoring is the ability to try before you buy. I currently run Splunk in house using the limted free licnese. It is limited to 500MB of data per day but that’s quite a bit of information and perfect for testing or lab environments.


The setup of a basic Splunk server is quite simple; there is support for MS Windows, Linux and Containers. 


Post Installation Steps:

  • Splunk Host: Verify port 8000, 9997 & 514 is open if running a firewall 
  • Splunk Server: Verify the Forward and Receiving \ Receive Data is enabled      (9997)
  • Splunk Server: Under Data Inputs add TCP\UDP Port 514 
  • Splunk Server: You can create custom index, or items will default to "main"
  • Splunk Server: If you plan on using the free license, select that at time of installation and it will change to an auto login. The default login is "admin" and "changeme".

Note: 

  • Port 9997 is the default for the universal forwarder 
  • Port 514 is the default port for syslog traffic 
  • Port 8000 is the default port for Splunk web interface 


You can test out Splunk and run Splunk on Windows workstations or run it as a 

container on Linux which has been my preferred solution.

Making Splunk Dashboards

Check out my video...

RHEL Rsyslog Forwarding to Splunk

Splunk Index

Rsyslog Settings

Rsyslog Settings

An Index in Splunk is like a database or table. I would suggest the creation of a unique Index for each type of system

(Linux | Windows | Networking)

How to...

Rsyslog Settings

Rsyslog Settings

Rsyslog Settings

Update the rsyslog.conf

sudo nano /etc/rsyslog.conf

​

Update with Splunk IP and Port:

*.* @@192.168.254.34:514


Restart Rsyslog

sudo systemctl restart rsyslog

Splunk Query

Rsyslog Settings

Splunk Query

Once you start seeing data in the index you created you could create queries like the one below to filter on specific data send from RHEL.


 sourcetype=linux_syslog 

Windows Event Log Forwarding & Peformance Counters

Splunk Index

Universal Forwarder

Universal Forwarder

An Index in Splunk is like a database or table. I would suggest the creation of a unique Index for each type of system

(Linux | Windows | Networking)


How to...

Universal Forwarder

Universal Forwarder

Universal Forwarder

You can install the UF provided free from Splunk to setup the forwarding of your Windows servers to Splunk. Another option is to configure group policy to forward event logs. 

UF Download

Installation

Universal Forwarder

Installation

Just remember to click on the options durinig installation to select what you information to gather. It will not gather any information if you don't select it. 

How to ...

Copyright © 2025 Data Locks - All Rights Reserved.

Author: Scott W. Head

  • Ansible
  • Containers
  • K3s
  • Monitoring
  • Vulnrability Scanning
  • SIEM
  • Contact