A Swim Through Syslog

Exploring syslog monitoring and dashboarding in Splunk through a practical security lab.

Splunk Dashboard Overview

🧠 What This Project Was

This post walks through a Splunk syslog monitoring lab I built as part of my cybersecurity learning journey. The goal was to simulate a mini-SOC environment and get hands-on with log ingestion, parsing, and visualizations using Splunk.

🛠️ Tools Used

  • Splunk Enterprise (Free Trial)
  • Kali Linux VM
  • Syslog sources: /var/log/auth.log, /var/log/syslog
  • Dashboard Studio (Classic & Modern panels)

🔍 Project Goals

  • Ingest and monitor syslog + auth logs
  • Create dashboards for:
    • Failed login attempts
    • Sudo command activity
    • Event trends by source
  • Generate test log events and confirm ingestion

📸 Dashboard Panels

🔑 1. Failed Login Attempts

Bar chart showing failed logins by user and host.

Failed Login Attempts

🧾 2. Sudo Commands Executed

Table of executed sudo commands with counts.

Sudo Commands

Line graph showing syslog event frequency over time.

Event Trends

🔍 Key Search Queries

Here are the actual Splunk queries powering these panels:

🔐 Failed Logins

```spl index=* sourcetype=linux_secure “Failed password” | stats count by user, host

index=* source=”/var/log/auth.log” “sudo” | rex “COMMAND=(?.*)” | stats count by user, command

🧠 Lessons Learned Real-time log tailing helped validate pipeline setup

Regex is essential for extracting command fields

Splunk’s visualization and alerting tools are powerful once configured

Troubleshooting ingestion was the biggest time sink (auth.log visibility issues)

✅ Next Steps Add Splunk alerts for brute-force attempts

Monitor DNS or iptables logs

Export logs to another SIEM like Wazuh or Graylog

This lab was one of the most hands-on and visual parts of my security learning journey so far.