Configuring Splunk

March 5, 2024

ID 220780

For better parsing of Kaspersky Scan Engine events in CEF format, install CEF Extraction Add-on to your Splunk instance.

To configure Splunk:

  1. Open the Splunk web interface.
  2. Go to Settings > Data inputs.

    Splunk "Settings" menu.

    Selecting Settings > Data inputs

  3. In Local inputs, locate the TCP element in the list, and then click Add new.
  4. Fill out the form that opens:
    • Port. Specify the port to which Kaspersky Scan Engine must send logs. For example, 9998.
    • Source name override. Specify scanengine.

    Port = 9998, Source name override = scanengine.

    Adding a new TCP input

    Click Next.

  5. In the next window in Select Source Type, specify the source type:

    "cefevents" selected.

    Selecting cefevents

    • Specify syslog if you did not install CEF Extraction Add-on for Splunk.

    You can specify the App Context and Index fields according to your needs. For example, you can specify the index of the events sent by Kaspersky Scan Engine.

  6. Click Review to check the settings, and then click Submit.

After Kaspersky Scan Engine is configured, you can check if the Splunk configuration is correct.

To check if Splunk is configured correctly:

  1. In the Splunk web interface, open Search & Reporting.
  2. Specify the search parameters as follows:
    • If you specified cefevents in Source Type earlier, enter the following search string:

      source="scanengine" sourcetype="cefevents"

    • If you specified syslog in Source Type earlier, enter the following search string:

      source="scanengine" sourcetype="syslog"

    • Time filter: specify All time (real-time)
  3. Run search.

If Splunk is configured correctly, it displays events sent by Kaspersky Scan Engine in real time.

Kaspersky Scan Engine events search form and search results.

Events sent by Kaspersky Scan Engine

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.