The Barracuda NG Firewall (BNG) team is pleased to announce that we have launched our first Splunk app for the BNG on the Splunk marketplace. You can view the release here.
Splunk is software that indexes data from any app, server, or network device. It creates searchable data out of logs, config files, messages, alerts, scripts, metrics, and more. The Barracuda NG Firewall Splunk app shows information on matched access rules, detected applications, and applied URL filter polices on various fixed and real-time timelines. Data is imported into Splunk via syslog streaming of the Firewall activity log.
- Configure syslog streaming on Barracuda NG Firewall
- Verify the Data Input entries on Splunk
- Enable SSL Encryption for Barracuda NG Firewall Splunk App (optional)
- Enable application logging in the Barracuda NG Firewall
Now you can use the Barracuda NG Firewall Splunk app to query the data generated by the device.
For more detailed instructions on configuring Splunk integration, take a look at the technical documentation here. For more on the Barracuda NG Firewall and to order a 30-day risk-free demo unit, visit the product site here.
Christine Barry is Senior Chief Blogger and Social Media Manager at Barracuda. In this role, she helps bring Barracuda stories to life and facilitate communication between the public and Barracuda internal teams. Prior to joining Barracuda, Christine was a field engineer and project manager for K12 and SMB clients for over 15 years. She holds several technology credentials, a Bachelor of Arts, and a Master of Business Administration. She is a graduate of the University of Michigan.
Connect with Christine on LinkedIn here.