Overview

About the DB Cybertech Splunk App

The DB Cybertech DB-Security appliance uses syslog to provide event reporting to a central Security Information and Event Management (SIEM) system and to report general system health information. Syslog output is encoded in the Common Event Format (CEF), which allows easy integration into a number of common security information and event management (SIEM), and log-analysis tools. DB Cybertech Splunk App is an add-on for Splunk that installs custom dashboards to monitor the important events that these logs generates. These includes Service/Client/User Discovery, Application Security Events, Insider Threat Events, and Vital Health Counters.

For better performance and early sourcetyping, the DB Cybertech Add-on for Splunk is required for installing DB Cybertech Splunk App.

About the Add-on

The DB Cybertech Splunk Add-on manages the early grooming of DB Cybertech syslog messages into formats the Splunk Core more intuatively understands. This includes segmenting sourcetypes, parsing CEF headers, and creating the key/value pairs which power the Splunk App.

Authors: - Gerald Cortez (App) – Email - Splunk Answers - Github - Brandon Kirklen (Add-On) – Email - Splunk Answers - Github

Splunk/DBN Version Compatibility

Splunk Version AddOn Version App Version DBN Version
Splunk 6.5.2 1.0.0   2.2.14
Splunk 6.6.1 2.0.0   3.0.0
Splunk 7.0.0 2.0.0 1.0.2 4.2.4
Splunk 7.1.0 2.1.1 2.0.1 4.2.4

Install From Github

These projects are avalible on SplunkBase at the links below.

Or if you want the most up to date code, you can clone github repo into your $SPLUNK_HOME/etc/apps folder and then restart Splunk Enterprise either though the UI or CLI.

Clone::

git clone https://github.com/DBCyberTech/App-DB_CyberTech App-DB_CyberTech
git clone https://github.com/DBCyberTech/TA-DB_CyberTech TA-DB_CyberTech