Splunk® Supported Add-ons

Splunk Add-on for OSSEC

Download manual as PDF

Download topic as PDF

Source types for the Splunk Add-on for OSSEC

The Splunk Add-on for OSSEC expects the source type ossec for all incoming alert event data. The add-on currently supports data from the following sources:

  • File Integrity Management (FIM) data
  • FTP data
  • su data
  • ssh data
  • Windows data, including audit and logon information

The following event types map the OSSEC data to the Splunk Common Information Model.

Source type Event type Description CIM data models
ossec ossec_alert All OSSEC data collected with this add-on maps to this event type. Alerts
ossec_file_integrity_monitoring OSSEC data with the field change_type set to "filesystem". Change Analysis
ossec_authentication OSSEC data with the field change_type set to "authentication". CIM mapping is only supported for data in the default format, not the "splunk" format. Authentication
Last modified on 23 September, 2016
About the Splunk Add-on for OSSEC
Release notes for the Splunk Add-on for OSSEC

This documentation applies to the following versions of Splunk® Supported Add-ons: released

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters