Configuring HTTPS Log Settings with Splunk

Axonius has the capability to send activity logs to a centralized log server. This can help with auditing and user and entity behavioral analytics (UEBA). Let's review how to accomplish this with Splunk.

Prerequisites - Splunk

The first step is configuring an HTTP Event Forwarder in Splunk. You can follow the instructions here:

Set up and use HTTP Event Collector in Splunk Web - Splunk Documentation

After running through this documentation, we should have a Token Value for our event collector. 

Next, we need to know how to send data to our new HTTP Event Collector on either Splunk Cloud or Splunk Enterprise.

Axonius sends JSON formatted events, so for our tests, I will use the following endpoint:

We can test with curl to confirm

$ curl <> -H "Authorization: Splunk bd8c4fa2-15f8-4fe5-82ff-aeeec0412d3e" -d '{"event": "hello world"}'
> {"text":"Success","code":0}

We can see our event in Splunk. 

Configuring in Axonius

Let’s enable HTTPS Logs Settings and review the configuration

HTTPS logs host will be the endpoint we validated above

We can leave Port empty.

As for the Authorization header, we need to supply our Token Value from Splunk. The format in Axonius will be in the following:

Splunk bd8c4fa2-15f8-4fe5-82ff-aeeec0412d3e

As for the remaining settings, we can leave them as is or adjust them accordingly if using a proxy.

From here, our activity logs should now be flowing into Splunk from Axonius

Now that we have this configured, we can also perform other actions, such as using the Enforcement Center to push asset data from Axonius to perform SIEM enrichment.



1 comment
  • Awesome Bryce!  Good stuff!


Please sign in to leave a comment.

Didn't find what you were looking for?

New post