Introduction to Practical Log Analysis with Splunk

Ousmane Sylla
4 min readApr 11, 2023

--

Background:

This blog post will walk you through basics of practical Log Analysis with Splunk after getting some background information. It will end with some industries specific standard retention rule and regulations.

Logs Analysis play an important Role in defense against adversaries Tactic, Technique and Procedure (TTP) when done in right way. While Security Operation Center Team (SOC), Security Engineer and Cyber Security Professional regularly deal with large amount of log, where to focus incident response and mitigation when incident happen will create difference on Incident response Team mitigation.

An incident is “an occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedure, or acceptable use policies.” Incident analysis is “the examination of acquired data for its significance and probative value to the case”

Importance of Log Analysis:

· Detection of unwanted activity

· Compliance

· Identifying behavioral patterns

· System troubleshooting

· Security Incident Response

When should logs be analyzed? This question can have multiple answers with each side arguing with supporting prove. The best practice is that log analysis is that in a proactive environment, logs should be analyzed continuously.

Types of Logs:

· Applications logs

· Firewall logs

· Intrusions logs

· Security logs

· System logs

Splunk Download and Logs Analysis

Step One: Register with Free account and validate link from your email to download Free Splunk and getting start with Log Analysis

Splunk landing Page

Step Two: Download free Splunk from Splunk official website by searching from your favorite search engine. Under Product section click download

Product Download

Step three: Now we can import our Log files by clicking on Add Data

From here we just click next until we reach done.

Importing Document into Splunk

Step four: File is successfully uploaded and we are ready to analyze some logs

Document Import completed

Step five: Click on start searching and Splunk will search for default Combined. The source file is Drupal and Host is Drupal_Webattack.log We can filter by time of Day

Combined File Search

Different Searches Parameters with Logs Files

We can ignore other part and search by Host which will give us all file related to host. This is important because we will get all files.

Search with Host

Search with Date Range with specific file and IP: We can see that IP has been access from Feb 3 to Feb 23, 2021. Then we drill down to get more information on who access this IP with Source IP addresses.

Search with Specific IP and Date of Compromised

Search applying regex, stats count and Date and time

Search with regex , count and stats

Industries specific standard retention rule and regulations:

Now we have basics knowledge of practical log analysis with Splunk, let talk about little about how few industries required keeping logs for specific timeframe for either compliance or regulatory rules. How long Logs should be retained? That will depends on industry or organizations you work with in accordance of organizational compliance policies.

· Health Insurance Portability and Accountability Act of 1996(HIPPA) specifies retention for at least six years

· National Industrial Security Program Operating Manual (NISPOM) specifies by retention of least one year

· Sarbanes –Oxley Act(SOX) specifies log retention for up to seven years

Log Analysis help Cyber Security professional to defend their Network and system from adversaries Tactic, Technique and Procedure when done on timely manner.

Ousmane Sylla

Cyber Security Analyst

Master of Sciences in Information Assurance Student at SHSU

--

--

Ousmane Sylla
Ousmane Sylla

Written by Ousmane Sylla

0 Followers

Driven GRC Analyst with a passion for risk mitigation. Mastering the art of Governance, Risk, and Compliance to fortify organizations against uncertainties.

No responses yet