Configuring Splunk to receive Session Monitor for WebSphere MQ SIEM data
Enable Splunk to receive SIEM data from Session Monitor for WebSphere MQ as follows:
- In a text editor, open /opt/splunk/etc/local/default/props.conf from the environment where Splunk is installed.
Locate splunk.cpy in the /Hiperstation directory on the mainframe, then insert the contents of splunk.cpy into the props.conf file opened in step 1.
- In Splunk, perform the following:
- Under Settings, choose Indexes, then click New.
- Specify mq-appaudit for the Index name. The default values should be acceptable, but—depending on the amount of data being collected—a larger value for Max size (MB) of entire index may be specified.
- Click Save.
- Restart Splunk.
- In Splunk, perform the following:
- Under Settings, choose Data Inputs and select Add new for TCP.
- Under Select Source, enter the port that was specified on the SIEM Tool Data Generation Parameters screen. See Configure-SIEM-Data-Delivery for more information.
- Under Input Settings, select Hiperstation > hiperstation_mq for Sourcetype and mq-appaudit for Index.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*