Splunk Centrify Privileged Access Service Add-on
The Splunk Centrify Privileged Access Service Add-on is provides data onboarding and parsing Centrify PAS logs into Splunk events. These parsed events can be used for adhoc queries or to create visualizations. This add-on co-exists with other Splunk add-ons without conflicts.
Apart from data onboarding and parsing, the Splunk Centrify PAS Add-on takes care of the following:
- Timestamp correction: The timestamp in Syslog is the time when logging happened and not the actual time when the event occurred, so the timestamp of the Centrify PAS event in Splunk is corrected by using the WhenOccurred field in the event payload.
- Custom sourcetype assignment: A new sourcetype called centrify_cisp_syslog is assigned to Centrify PAS events. This ensures that Centrify PAS events and other Syslog messages are not touched unintentionally.
- Applying Centrify headers: Headers such as product, category, and eventname present in the payload are assigned to Centrify PAS events in Splunk.
- CIM compliance: The add-on maps Centrify PAS Authentication events to the Authentication model of CIM.
In a distributed Splunk environment, the Splunk Universal Forwarder must be set up on the machine with the Syslog server so that the Centrify PAS events in syslog get forwarded to the Indexer.
To configure Splunk Universal Forwarder for a distributed setup:
In a terminal, navigate to the path of Splunk Universal Forwarder:
Add the Forward server in the bin folder, using the IP address of the Splunk Indexer as the <ipaddress> and the Receiver port configured on the Splunk Indexer as the <port> (usually 9997):
./splunk add forward-server <ipaddress>:<port>
Add syslog to the monitored files list:
./splunk add monitor /var/log/messages
The Splunk Add-on must be installed on the indexer and on the search head.
To install the Splunk Add-on from the Splunk Web UI:
Go to Apps > Browse , Select Centrify Identity Platform Add-on for Splunk.
To configure data input:
In a distributed Splunk environment with a Forward Server:
Open the Splunk Enterprise web UI.
Go to Settings > Forwarding and receiving > Configure Receiving > Add New.
In the Listen to Port text box, enter 9997.
Click Save to send messages from the Forward Server to port 9997.
In a stand-alone Splunk environment with a local syslog:
Go to Settings > Data Inputs > Files and Directories.
Enable /var/log/messages (this is disabled by default).
To search for Centrify PAS events, enter this command: