Security Monitoring and Log Analysis with Splunk

Configured Splunk on Linux Ubuntu to ingest logs, analyze access patterns, and monitor system logs in real time for security events.

Steps

Step 1: Ingested access.log into Splunk and wrote search queries to identify the top 10 operating systems accessing the system.

Step 2: Calculated the average byte transfer per date and hour using Splunk search queries to identify usage trends.

Step 3: Configured Splunk to monitor local syslog continuously and alert on suspicious security events.Also displayed results that show authentication failure.

Tools

Splunk Enterprise, Linux Ubuntu, Syslog

Frameworks

Security Information and Event Management (SIEM), Log Analysis

Standards

NIST CSF (DE.CM – Security Continuous Monitoring), ISO 27001 (A.12.4 – Logging and Monitoring)