Skip to Content

Integrate SSH Jump server with splunk for SIEM

How to forward SSH Jump Server logs to Splunk?


Splunk is a software platform designed for searching, monitoring, and analyzing machine-generated data in real time. It provides insights into various data sources, including logs, events, and metrics, allowing organizations to gain information and troubleshoot efficiently. Splunk is widely used for log management, security information and event management (SIEM), and business analytics.


 We are configuring Splunk HTTP Event Collector (HEC) which allows Ezelogin logs to be streamed to Splunk

  1. Log in to Splunk and refer to the steps to create an index for Ezeelogin.

Click on Settings > Indexes

add index

2. Click on New Index to create a new index.

3. Enter the Index Name and Save it. We need to add the following indexes for streaming Ezeelogin Logs

       authlog

      ezsh_activity

      sshlogs

      web_activity

      server_activity

      parallel_shell

      rdplogs

      web_proxy

      web_proxy_activity

      scplogs

 Add all the above indexes one by one as follows.

4 . Create HTTP Event Collector and enable Global Settings
A) Click on Settings > Data inputs 
 
B) Click on  HTTP Event Collector
 
C) Enable Global Settings
click on Global Settings
 
D) Click Enabled > Enable SSL (optional) >Specify HTTP Port Number (8088) > Save
 
Create HEC Token
A) Click on New Token to create a security token.

B) 
Enter Name ( Ezeelogin ) > Description (optional) click  Next
 
C) Select and Add the Indexes which created for Ezeelogin  "  authlog,  ezsh_activity, sshlogs,  web_activity,  server_activity,  parallel_shell,  rdplogs,  web_proxy,  web_proxy_activity,  scplogs " > Click Review.
 
D) Review and make sure that you have selected all the indexes created for Ezeelogin and click Submit.
 
You can view a success message  "Token has been created successfully." on the next window. You can find a Token and copy the Token Value from the window.
 
You can also view the tokens created from Settings > Data Inputs > HTTP Event Collector
 
5) Log in to Ezeelogin GUI to configure the  Splunk settings in Ezeelogin.
 
Login to Ezeelogin GUI > Settings > SIEM >  Enable SIEM, Web Activity Logs, Server Activity Logs, SSH Logs, RDP logs, Web Proxy Activity, Authentication Logs, Gateway Activity Logs, SCP Logs, Parallel Shell, Web Proxy Logs > Save.

Splunk Settings
Add HTTP Event Collector URL: https://mysplunkserver:8088/services/collector/event (Replace "mysplunkserver:8088" with the URL and Port of your Splunk server)
Add HTTP Event Collector Token: 9e642baa-84f0-4194-a346-f83f8e2c0367 (you can find the HTTP Event Collector Token from your Splunk server Settings > Data Inputs > HTTP Event Collector)

 
Now you can view the Ezeelogin logs on Splunk. 
For example: Ezeelogin Authentication logs can be viewed by searching the index="authlog"
 
 
You can create visualizations from the data using the "Visualization" feature
Click on Visualization then click Pivot

You can create different types of Visualizations from the data 

  • Top user access to Ezeelogin shell

Successful Login attempts to the Ezeelogin gateway per day
 

  • Failed Login attempts to the Ezeelogin shell 

  • Top Daily access from IP address

 

Related Article