The Nasuni Connector for Splunk enables security and operations teams to monitor, investigate, and respond to storage-related events across their Nasuni environment. By ingesting and parsing syslog data from Nasuni Edge Appliances and the Nasuni Management Console (NMC), the app normalizes and enriches events for efficient search, correlation, and integration with Splunk SOAR workflows.
Overview
The Nasuni Connector for Splunk, when installed, automatically parses matching syslog messages and assigns key names to the relevant fields. It is available for installation from Splunkbase.
Configure the Nasuni Connector for Splunk
Step 1 — Install the app from Splunkbase
Log in to your Splunk instance and navigate to Apps in the top navigation bar.
Click Find More Apps to open the Splunkbase browser, then search for Nasuni.
Select the Nasuni app from the results and click Install. Splunk prompts for your Splunkbase credentials if not already authenticated.
Once installed, restart Splunk if prompted. The app appears in your Apps list.
Step 2 — Enable the syslog listener
In Splunk, go to Settings → Data Inputs → UDP and click New Local UDP.
Enter
514or another available port number. Set the source type tosyslogand assign an appropriate index (e.g.,default).Save the input. Refer to the Splunk documentation on monitoring TCP and UDP ports for detailed guidance and platform-specific notes.
Note: On Linux, Splunk must run as root (or have elevated privileges) to bind to ports below 1024. If port 514 is already in use by the OS syslog daemon (rsyslog/syslogd), disable that service's network listener first, or configure a port redirect from 514 to a higher port such as
5514.
Step 3 — Configure the Nasuni Edge Appliance
Before proceeding, ensure the selected UDP/TCP port (for example, 514) is open between each Edge Appliance and your Splunk instance.
Enable syslog export (NMC)
Log in to the Nasuni Management Console (NMC).
Go to Filers → Filer Settings → Syslog Export Settings in the left navigation.
Select the Edge Appliance(s) you want to configure and click Edit Filers.
Under Syslog Export, enable syslog and enter the IP address or hostname of your Splunk instance as the syslog destination. If the port is not
514, specify ashost:port.Toggle on the Send Auditing Messages, Send Notification Messages, and Lowest Log Level → Info.
Save your changes. The Edge Appliance begins forwarding generic Edge and NMC events to Splunk. Refer to the Nasuni NMC Guide - Syslog Export Settings for detailed guidance.
(Optional) Enable volume auditing for filesystem audit events (NMC)
In the NMC, go to Volumes → Auditing under Volume Services.
Select the volume to audit and click Edit Volumes.
Set Auditing Enabled to On and select the event types to track. For ransomware coverage, include Delete, Rename, and Security.
Enable Send Audit messages to syslog and save. Filesystem audit events are now included in the syslog stream sent to Splunk. Refer to the Nasuni NMC Guide - File System Auditing for detailed guidance.
Note: Ransomware protection alerts and antivirus detection alerts are forwarded automatically once syslog export is enabled — no additional configuration is required for those event types.
Troubleshooting
No events appear in Splunk
Verify the UDP port for data input is enabled in Settings → Data Inputs → UDP.
Confirm Splunk is running with sufficient privileges to listen on that port (root/admin on Linux).
Check that no other process (rsyslog, syslogd) is already occupying port 514 — run
netstat -nlupon Linux to verify.Test network connectivity between the Nasuni Edge Appliance and the Splunk host over UDP/TCP (for example, port 514).
Events are arriving, but not parsing correctly
Confirm the sourcetype is set to
syslogon the UDP data input.Verify that the Nasuni app is installed on the same Splunk instance that receives the data, not just the search head.
Restart Splunk after installation if this step was skipped.
Filesystem audit events missing
Volume auditing must be enabled per volume in the NMC — confirm it is enabled for each volume you expect to see events from.
Check that Send Audit messages to syslog is enabled in the volume auditing settings.
Verify that the desired audit event types (Delete, Rename, Security, and so forth) are selected.
Ransomware or antivirus alerts are missing
Confirm syslog export is enabled and pointing to the correct Splunk IP address or hostname in NMC → Filers → Notifications.
These alerts are generated by Nasuni's Ransomware Protection engine. Verify the relevant Nasuni features (Ransomware Protection, antivirus scanning) are licensed and active on the appliance.
General checks
Ensure firewall rules allow UDP/TCP traffic on port 514 from all Edge Appliances to the Splunk instance.
If running Splunk Cloud, direct UDP inputs are not supported; a forwarder instance must be used as an intermediary to receive syslog and forward it to the cloud instance.
After any configuration change in the NMC, allow a few minutes for events to begin flowing.