Splunk as SIEM
Last updated
Last updated
Splunk is a highly scalable, versitile data aggregation solution known for it's ability to ingest large data and visualize massive amounts of machine data.
Splunk Enterprise consists of several layers that work together to collect, index, search, analyze, and visualize data.
Forwarders: Responsible for data collection.
Universal Forwarder (UF): Individual, lightweight, software packages that collect data and forwards it to Splunks indexers.
Heavy Forwarders (HF): Uses for intensive data aggreagation. Typically depoyed as dedicated nodes. They exclusively support Splunk enterprise.
Indexers: Receives data from forwarders, organizes it, and stores it in indexes. Creates directories categorizes by age.
Search Heads: Coordinates search jobs, dispatching them to indexers and merging results.
Deployment Server: Manages configuration for forwarders, distributing apps and updates.
Cluster Master: Coordinates activities of indexers in a clustered environment.
License Master: Manages license details.
There are 3 types of users on Splunk web.
Admin: The highest privilege level.
Power: This role can edit all shared objects and alerts, tag events, and other similar tasks.
User: This role can create and edit its own saved searches, run searches, edit preferences, create and edit event types, and other similar tasks.
Apart from the overall architecture of Splunk, it can best be categorized by the following four components:
Splunk Web Interface: Graphical User Interface in which users can interact with Splunk.
Search Processing Language: The query language for Splunk. Allows users to search, query, and manipulate the indexed data.
Knowledge Objects: Fields, tags, events, lookups, macros, data models, and alerts that enhance the data in Splunk.
Apps and Add-ons: Ready made addons can be found on . Kind of like Burpsuite add-ons.