Guidelines and Limitations for Splunk Integration
-
When you enable Splunk integration, your existing syslog server configuration is not migrated.
-
When migrating to Cloud-Delivered Firewall Management Center, you must repeat the Splunk integration procedure because the Splunk configuration from the On-Premises Management Center does not get migrated.
-
You cannot configure a Splunk profile to send events from both Firewall Management Center and Firewall Threat Defense device for the same event type.
-
If you set up domains in Firewall Management Center, you can configure Splunk only from leaf domains.
-
You can create a maximum of 15 Splunk profiles per domain. However, multiple domains can be configured to send syslog messages to the same or different servers.
-
Do not create duplicate profiles for the same devices because it results in devices sending duplicated events to the Splunk server.
-
Only basic TLS encryption is supported over data interfaces from devices; client and server authentication are not supported.
-
The syslog payload is sent to the Splunk server in JSON format.
-
In a high availability set up, Splunk configuration is synchronized between the Firewall Management Center HA pair. Only active unit sends the events. In the case of a failover, the new active unit will start sending the events.
-
The message header of syslog events sent through data interfaces contains only the syslog tag and not the device IP address.
-
Splunk integration does not support analytics devices managed by another Firewall Management Center, for example, cdFMC.
-
cdFMC does not support sending events from a Firewall Management Center source. Hence, cdFMC cannot have events that support only Firewall Management Center source.