Syslog and WebTx Plugins with Splunk for Log Shipper

Syslog and WebTx Plugins with Splunk for Log Shipper

This document explains how to ingest Netskope Alerts, Events, and web transaction logs in CEF format from Netskope Tenant to Splunk using Cloud Exchange via the Log Shipper Syslog and WebTx plugins.

Prerequisites

To complete this configuration, you need:

  • A Netskope tenant (or multiple, for example, production and development/test instances) that is already configured in Cloud Exchange.
  • A Netskope Cloud Exchange tenant with the Log Shipper module already configured.
  • A Splunk instance.
Sizing Recommendations

Refer to System requirements for different configurations. It is recommended to use the system with the medium specification if your data volume ranges to 100k EPM.

Syslog Plugin Support
Event SupportYes
Alert SupportYes
WebTx SupportYes
Logs SupportYes

All Netskope events, alert logs, and web transaction logs will be shared.

Note

  • Incident event type is supported from Core version 4.1.0.
  • CTEP alert type will be supported from Core version 4.2.0
Compatibility

CE version: v4.1.0 and v4.2.0.

API Details

The plugin uses a logging third-party library to push the data to the Syslog collector.

Refer to the official documentation for more information on the logging library:https://docs.python.org/3/library/logging.html

Performance Matrix
Logs IngestedTime Taken
99400002 hours
Stack SizeLarge
RAM: 32GB
Core: 16
Alerts/Events~ 6 MBps
WebTx~ 6 MBps

Workflow

  1. Create a Data Collector on Splunk.
  2. Configure the Syslog Plugin for the Splunk integration.
  3. Configure the WebTx Plugin for the Splunk integration.
  4. Configure a Log Shipper Business Rule for the Splunk integration.
  5. Configure Log Shipper SIEM Mappings for the Splunk integration.
  6. Configure the WebTx Mappings (optional).
  7. Validate the Splunk integration.

Click play to watch a video.

 

Create a Data Collector on Splunk

If you do not have a Splunk instance, follow these steps to install Splunk.

  1. Log in to your Splunk instance.
    image1.png
  2. From the dashboard, go to Settings > Data inputs.
    image2.png
  3. Click Add new for the TCP input.
    image3.png
  4. Add your port and click Next.
    image4.png
  5. Select the source type if you already have any, or click New to create a new source type.
  6. Enter the source type. Select the Source Type Category based on your requirements, or keep it as is.
    image5.png
  7. Scroll down to Index. If you already have any index that you want to use, select it from the Index dropdown. Otherwise, click Create a new index, add an Index Name, click Save, and then click Review.
    image6.png
  8. Review the details and click Submit.
    image7.png
  9. Click Start searching.

Configure the Syslog Plugin for the Splunk Integration

  1. Go to Settings > Plugins. Search for and select the Syslog CLS plugin box.
  2. Add a Plugin configuration name, select a mapping file from the dropdown, and then click Next.
  3. Disable the first toggle button if you want to ingest your alerts and events in the JSON format. Keep it as it enabled if you want to ingest your data into CEF format.

    Note

    Use this mapping file to send all the fields.

  4. Click Next.
  5. Enter these parameters:
    1. Syslog server: The IP address of the Splunk instance.
    2. Syslog Protocol: The protocol used to create the Data input on Splunk TCP.
    3. Syslog Port: The port used to create the Data input configuration on Splunk.
  6. Click Save.

Configure the WebTx Plugin for the Splunk Integration

Your Subscription Key and Subscription Endpoint are needed to configure the WebTx plugin. To get your Subscription Key and Subscription Endpoint parameters, follow these steps.

  1. In Cloud Exchange, go to Settings > Plugins, and then search for and select the Netskope WebTx CLS plugin box.
    image8.png
  2. Enter a configuration name and click Next.
    image9.png
  3. Enter your Subscription Key and Subscription Endpoint, and then click Save.
    image10.png

Configure a Log Shipper Business Rule for the Splunk Integration

Go to Log Shipper > Business Rule. The default business rule filters all alerts and events. If you need to filter out any specific type of alert or event, click Create New Rule and configure a new business rule by adding a rule name and specific filters.

image14.png

Configure Log Shipper SIEM Mappings for the Splunk Integration

  1. Go to Log Shipper > SIEM Mappings and click Add SIEM Mapping.
  2. Select the Source plugin (Netskope CLS plugin), Destination plugin (Syslog plugin), and a business rule, and then click Save.
    image15.png
  3. Click Add SIEM Mapping, select the Source plugin (Netskope WebTx plugin), Destination plugin (Syslog plugin), and a business rule, and then click Save.
    image16.png
Configure the WebTx Mapping

Use this configuration only when it is necessary to send specific WebTx fields in JSON format to the destination platform.

  1. Go to Settings > Log Shipper > Mapping.
  2. Clone the Syslog Default Mappings file.
  3. Enter the name of mapping file.
  4. Select the Editor view radio button.
  5. Scroll down to the “webtx” and enter the specific webtx fields inside the square brackets in double quotes (For example-”sc-status”). In case of multiple fields, use the comma-separated format.

    Note

    Refer the Format 3 fields from here to add fields in the webtx.

  6. Go back to the configured plugin and edit the Mapping file.
  7. Disable the toggle button as we want to send data in JSON format.
  8. Configure the SIEM mapping.
  9. Click Save.

Validate the Splunk Integration

Validate in Netskope Cloud Exchange

  1. Go to Logging.
  2. Search for ingested alerts with the filter “message contains ingested”. The ingested logs will be filtered.
  3. To search ingested events search “<message Like “events” && message Like “ingested”>”.
  4. To search ingested WebTx logs search “<message Like “ingested” && message Like “webtx”>”.

Validate in Spunk

  1. Log in to the Splunk UI.
  2. Go to Search and Reporting.
  3. Insert a query with source, index, and sourcetype.
  4. Click on the search button. Ingested data will be displayed on the platform.
Share this Doc

Syslog and WebTx Plugins with Splunk for Log Shipper

Or copy link

In this topic ...