icon-unified.svg
Experience Center

Private Applications and Splunk Deployment Guide

This deployment guide provides information on configuring Private Applications and Splunk, downloading the Zscaler Splunk App and Zscaler Technical Add-On, the Zscaler Splunk App requirements, and how to add the log sources in the Splunk SIEM.

In Private Applications, the Log Streaming Service (LSS) uses a log receiver and an App Connector to stream traffic logs in real time from the log receiver to your security information and event management (SIEM), such as Splunk, enabling you to receive information about App Connectors and users.

While the LSS is used to capture log data about App Connectors and users in Private Applications using a log receiver, the Nanolog Streaming Service (NSS) resides in Internet & SaaS and allows streaming of traffic logs from the Zscaler Nanolog to your SIEM. To learn more, see Understanding Nanolog Streaming Service (NSS).

  • Step 1: Configure an LSS Log Receiver
  • Zscaler on Splunk comes in two parts: Zscaler Technical Add-On (TA) for Splunk and the Zscaler Splunk App.

    The Zscaler TA for Splunk is a required component for the Zscaler Splunk App.

    Close
  • The Zscaler Splunk App expects to find data bound to the following source types:

    Source TypeDescription
    zscalerlss-zpa-appUser Activity Logs (LSS)
    zscalerlss-zpa-web-inspectionAppProtection Logs (LSS)
    zscalerlss-zpa-auditAudit Logs (LSS)
    zscalerlss-zpa-authUser Status Logs (LSS)
    zscalerlss-zpa-bbaBrowser Access (LSS)
    zscalerlss-zpa-connectorApp Connector Logs (LSS)
    zscalerlss-zpa-psePrivate Service Edge Status Logs (LSS) for Private Applications

    To learn more about the data bound to the different log types, see Log Streaming Service (LSS).

    Your Splunk administrator might need to create aliases in these fields for data to be presented into the Zscaler Splunk App.

    The Zscaler Splunk App requires data to be in the Zscaler Index named zscaler. If your organization places Zscaler data in a different index, you can edit the base macros to reflect your setup. Zscaler requires all field names to use those that are seen in the LSS using JSON as the expected output format.

    The Zscaler Splunk App has a dependency to the Splunk Common Information Model (CIM).

    Ensure that the Web and Network Sessions data models are accelerated. This is necessary for some functions within the Zscaler Splunk App.

    Close
  • To add the Zscaler LSS as a log source:

    1. In Splunk, go to Manager > Data Inputs.
    2. Click Add new next to TCP.
    3. On the Add New page, complete the following and repeat this for each Zscaler source type you'll add in Splunk:
    • Specify the TCP port where the logs are received.
    • For Source Type, choose the Zscaler source type from the source type list. To learn more, see Source Types for Private Applications.
    • Click More Settings to expand the page.
    • For Set host, click DNS.
    • From the Index list, choose zscaler.

    1. Click Save.
    Close

If you require further assistance after deployment, contact Zscaler Support.

Related Article
Private Applications and Splunk Deployment Guide