You can configure the Network Security service so that it sends the IPS events that
it generates to a Splunk server. Before starting this procedure, ensure that you have
the Splunk application for Network Security installed. Learn more.
![]() |
NoteYour Network Security virtual appliances must use version 2020.10.0 or later to
use unencrypted TCP.
|
Procedure
- From the All Appliances page, select the appliance whose events you want Splunk to collect and analyze.
- On the appliance's properties page, select the Splunk tab.
- Click the Edit
icon.
- In the Splunk Configuration dialog, configure the Syslog State to Enabled.
- In the Server field, specify an IP address or hostname for your Splunk server. For
example,
remoteSyslogHostname
. - In the Port field, specify a port between 1 and 65535. The default is
8516
. - If you want the server to use encryption, enable the Certificate option and specify a CA certificate.
Note
If you require CA certificate validation, add the CA certificate before you configure your Splunk server.
What to do next
The Splunk server will receive a notification for any filter set with
+Notify actions. Manually created action sets that specify
notifications to the “management console” will also be sent to the Splunk
server.
The Network Security service sends data in Common Event Format (CEF) format. For
example:
CEF:0|TippingPoint|vTPS Cloud|5.3.0.10200|164|ICMP: Echo Request
(Ping)|1|dvchost=i-0a6821719d0f05bb1 dvc=192.0.2.2 cat=IpsBlock
deviceFacility=IPS act=Block cs2=6b5f2632-12bd-11ea-bfc7-981b3f1b1c15
cs2Label=Policy UUID cs3=00000001-0001-0001-0001-000000000164 cs3Label=Signature
UUID proto=ICMP src=10.100.3.94 dst=10.100.2.253 start=Nov 29 2019 16:25:33+0000
cnt=1 deviceInboundInterface=1B deviceOutboundInterface=1A cs1=l3
cs1Label=Virtual Segment cn2=0 cn2Label=SSL Flag c6a1=10.100.3.94
c6a1Label=Client IPv4 host = 10.100.1.102source = udp:8514sourcetype =
syslog
When you click Save, the All Appliances page displays your appliance's
Splunk status as
Pending
while the virtual appliance tries to
establish a connection. Return to the Splunk Configuration dialog and click the
Status Refresh button. When your virtual appliance has connected to
Splunk successfully, the status changes to Connection Successful
.
If an error occurs that prevents the connection, the status changes to
Connection Failed
and an error message provides insight for the
failure. Additionally, you can use the root command show log-file
to view more information behind the failure in the system log.![]() |
NoteA
Connection Successful status means that a connection has been
established to a syslog server. It does not necessarily mean that events are
being logged. If your Splunk connection status shows frequent connection and
disconnection events, make sure that the server's IP and port correspond to a
supported syslog destination. |
The Network Security appliance uses TCP and/or TCP input over SSL. Because the
Network Security interface does not enable you to configure a TCP input over SSL,
refer to your Splunk documentation for information on how to configure this. You can
refer to the following topics to learn more about configuring SSL settings on
Splunk:
To clear your Splunk configuration, click the Trash icon
.
Your appliance's Splunk state changes to
Disabled
.Connect to Splunk through an API
Refer to the remote syslog APIs in the API
Reference for information on connecting to an external Splunk
server.
To verify your Splunk connection using an API, use the
GET /api/appliances/{ID}/remotesyslogs/{remotesyslogID}
call.