

ID of the Security Configuration applied to the request. SIEM API data format for Splunk CIM Mapping List Event Type Instead, you must disable the input, clone it, make changes to the clone, then run the new, cloned input. You need this add-on to switch retrieval mode.Īfter a data input is enabled, you can't edit that input and run it again. Tip: Akamai strongly recommends installing the Splunk add-on app Lookup File Editor from within Splunk Apps. To search for SIEM data within Splunk, use the search app: from the Splunk home page, click Search and Reporting app and enter the query sourcetype="akamaisiem".
SPLUNK CIM HOW TO
Read how to retrieve past security events. This log is also available in //var/log/splunk. In the event of a fatal error prohibiting collection of data, review the logs and take corrective action. If you don't see data, go to the menu and click Debug > Akamai Logging dashboard. You see Akamai SIEM Errors on the right: Return to the Splunk home page and click Akamai SIEM. If you see data that means that setup was successful: If it takes more than 60 seconds to fetch the data, increase the interval value to the amount of seconds needed to complete the task. In that case, leave the Interval field blank. Enter 60 unless you have entered values in both the Initial Epoch Time and Final Epoch Time fields to retrieve security events for a set time period. Number of seconds between fetch requests. For example, if you have a problem with the connector, use DEBUG to get more detailed messages that will help you troubleshoot.

Log level. Specifies the message types that are logged. By default, the log level is set to INFO, but you can change it to WARN, ERROR, FATAL, or DEBUG to get more data for certain situations. If not specified, the API retrieves a maximum of 150,000 records per call. To limit the number of security events pulled with each API call, enter an integer value here. If you encounter an issue with event delivery, you can use these fields to retrieve security event data for a specific time period (continue reading to learn how to do this).
SPLUNK CIM INSTALL
KVStore is installed on the host machine where you want to install your connector.Java is installed on the host running Splunk Enterprise.
SPLUNK CIM SOFTWARE
Download the latest from the Oracle Java site (Java Platform, Standard Edition) or install it from a software distribution package on Linux. Akamai’s Splunk Connector requires Oracle JRE 1.8+.Install Splunk connector System Requirements The Splunk instance then analyzes high volumes of data by indexing it. The Splunk add-on converts security event data from JSON into CIM format.

The sample Splunk connector is a Splunk add-on that captures security events from the Akamai Security Events Collector, which exposes a RESTful API that lets the connector pull events in JSON format. Watch the Analytics-driven Cloud Security at Scale with Splunk and Akamai video to learn more. Combine Splunk and Akamai to gain insights into attacks.
