We installed the App, added a Splunk Heavy Forwarder and configured it through the App to forward logs, but the Log Source for the incoming events remains unknown.
The App documentation ends with how to forward the logs to QRadar but it doesn't say anything about the Log Source Configuration on QRadar.
As I understood, the Logs should appear as if they were sent from the original device.
Therefore I would like to know if I need to configure the Log Sources manually and if yes, how?
Like, do I need to follow this instruction, even for non-Windows events:
https://www.ibm.com/support/knowledgecenter/en/SS42VS_DSM/t_DSM_guide_Splunk_logsource.html ?
Or should I configure a Syslog Redirect Log Source?
If yes, I don't see any point in using the Splunk Forwarding App except for configuring Splunk, which we would prefer to do manually anyway.
Also, in another test scenario, the Splunk Indexer did not receive any logs anymore because the forwarder forwarded them only to QRadar.
Is there a way to forward them to both the Indexer and QRadar?
Is it possible to forward the Logs from the Indexer?
Thank you.
Best Regards,
------------------------------
Artur Gazda
------------------------------
Original Message:
Sent: 02-13-2019 11:01 AM
From: Nico de Smidt
Subject: Splunk Integration
So what are your issues with it?
Sent from mobileTenzij hierboven anders aangegeven: / Unless stated otherwise above:
IBM Nederland B.V.
Gevestigd te Amsterdam
Inschrijving Handelsregister Amsterdam Nr. 33054214
Original Message------
Hello,
Does someone have a working deployment with Splunk forwarding Logs to QRadar?
With or without the Splunk App...
I would like to know how to make it work.
Thank You in advance!
Regards,
------------------------------
Artur Gazda
------------------------------