Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
Hi everyone,
I’m working on integrating Qlik Sense audit logs with a SIEM (Splunk), and I’m looking for guidance from anyone who has done this before. Our main goal is to monitor access-related events so we can detect any access that shouldn’t have happened.
I’d like to understand:
How to structure the ingestion of Qlik Sense audit logs into Splunk for access auditing.
Whether there are any recommended regex patterns, parsing strategies, or field extractions for the audit log format.
Practical examples of Splunk searches or dashboards used to monitor user access to apps, streams, or the hub.
Any insights or examples would be greatly appreciated.
Thanks!
António Mendes
Integrating Qlik Sense audit logs (found in ProgramData\Qlik\Sense\Log\Audit\, typically in JSON format) into Splunk for access auditing involves using a Splunk Universal Forwarder on the Qlik server to monitor the log directory and ingest the files, setting a specific sourcetype (e.g., qlik:sense:audit). Since the logs are JSON, Splunk automatically extracts key fields like UserId, EventType (Login, AccessApp), Object_Name, and Result (Success/Failure), which e-zpassme are crucial for auditing. Recommended Splunk searches focus on these fields, such as sourcetype=qlik:sense:audit EventType="AccessApp" Result="Failure" to detect and dashboard unauthorized access attempts to applications.
Hi James,
and how can we transform the logs from Qlik into JSON format, because the logs that we have doesn't have JSON format or structure.
To help us understand this better, could you please share one sample line from your Qlik Sense audit log?
(You can remove or mask any sensitive details such as usernames or app IDs.)
Also, please let us know which Qlik Sense version you’re currently using.
Hi @svg ,
The version is QlikSense Enterprise on Windows November 2024 Patch 8.
Here it is one line of example:
1111 IPxxx.xxx.xx 20251212T140901.798+0000 XXXX 9e352d4a-6cc8-4866-aea2-acd499638caf Command=Open app;Result=0;ResultText=Success c0dedc8a-2172-bdfc-37be-f242420f5740 0 0 DOMAIN USER 2abec419-dd03-4aa4-9acf-776a1a7809fc HR Global Recruitment - WORK Repository AppAccess /qrs/app/2abec419-dd03-4aa4-9acf-776a1a7809fc/open/full Open app 0 Success (HTTP code: 200) 9e352d4a-6cc8-4866-aea2-acd499638caf