icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading CCX Add-on for AWS Products
SHA256 checksum (ccx-add-on-for-aws-products_126.tgz) 5129b13d2c7979f5033c0751aff947b74069a3b371c5c55158ae07ad24108104 SHA256 checksum (ccx-add-on-for-aws-products_125.tgz) d6de4e1734165da4b0dcb2290aca963e357aa60b1d5aea5ca309da0c3b82f973 SHA256 checksum (ccx-add-on-for-aws-products_124.tgz) 751bcae8af18f03e54fced934f6d661fcee1d7ceda1223bdd9107ed1132c55b6 SHA256 checksum (ccx-add-on-for-aws-products_123.tgz) f86106a1f0314e4d04ed1fa330ca177c6f8a7fd38fc2b3cbbd823ac0c1de1b53 SHA256 checksum (ccx-add-on-for-aws-products_122.tgz) 595c1937c3535071226abde8c343c8c6126008f7c259a873126b0a99e719b0e1 SHA256 checksum (ccx-add-on-for-aws-products_121.tgz) dc7c501a9d55f3c2f89c448f3ad9bbd478d69a767e503a0769630fab33ed7dd9 SHA256 checksum (ccx-add-on-for-aws-products_120.tgz) 8b128e2995e222c7c545e41faf0c216c38e95852527150e8f6610997269959ad SHA256 checksum (ccx-add-on-for-aws-products_110.tgz) d249031b6b307e55b2ddf8bc3c07aa8bf070b72345467e4f2e8b44f21bd3af82 SHA256 checksum (ccx-add-on-for-aws-products_100.tgz) 4de66946864e6a80143e58f7c78794407bfecd7b33d1095e01b861b4cd0b822f
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

CCX Add-on for AWS Products

Splunk Cloud
Overview
Details
About Us:
CyberCX is Australia’s greatest force of cyber security experts. Our highly skilled professional services team operates a 24x7 on-shore security operations centre (SOC) servicing corporate and public sector organisations across Australia and New Zealand, specialising in Security Operations services leveraging Splunk.

Description:
CCX Security Operations has taken it upon ourselves to develop a CCX Add-on for AWS Products to provide further CIM compliance coverage not only for logs ingested via 'Splunk Add-on for AWS'.
This TA was built using a large dataset and endeavours to be the most CIM compliant comprehensive field extraction for AWS various products listed.
The Technical Addon is designed for ingest based on an SQS-Based S3 "Custom Data Type" via the Splunk Add-on for AWS or Syslog and is to be used on Search Heads.

Listed products supported:
- AWS Network Firewall
- AWS Web Application Firewall
- AWS S3 VPC Flow
- AWS Macie
- AWS API Gateway Access Logs
- AWS Security Hub Custom (HEC|JSON)

Features:
- This TA currently supports logtypes tagged under the following CIM datamodels: Alert, Change, Network Traffic and Web.

Description:

CCX Security Operations has taken it upon ourselves to develop a CCX Add-on for AWS Products to provide further CIM compliance coverage not only for logs ingested via 'Splunk Add-on for AWS'.
This TA was built using a large dataset and endeavours to be the most CIM compliant comprehensive field extraction for AWS various products listed.
The Technical Addon is designed for ingest based on an SQS-Based S3 "Custom Data Type" via the Splunk Add-on for AWS or Syslog and is to be used on Search Heads.

Listed products supported:

  • AWS Network Firewall
  • AWS Web Application Firewall
  • AWS S3 VPC Flow
  • AWS Macie
  • AWS API Gateway Access Logs
  • AWS Security Hub Custom (HEC|JSON)

Features:

  • This TA currently supports logtypes tagged under the following CIM datamodels: Alert, Change, Network Traffic and Web.

Release Notes

Version 1.2.6
Aug. 7, 2025

Requirements:
- To retrieve AWS Network Firewall logs based on an SQS-Based S3 "Custom Data Type" is required additional Add-on 'Splunk Add-on for AWS' version 7.10.0 or higher (https://splunkbase.splunk.com/app/1876/).
- This Add-on is intended to be installed on Search Heads and where 'Splunk Add-on for AWS' inputs are configured.
- The AWS S3 VPC Flow logs ingested via syslog has the field extractions dependencies on Add-on 'Splunk Add-on for AWS' version 7.10.0 or higher (https://splunkbase.splunk.com/app/1876/) and it is required to be installed along 'CCX Add-on for AWS Products'

Version 1.2.5
Aug. 7, 2025

Requirements:
- To retrieve AWS Network Firewall logs based on an SQS-Based S3 "Custom Data Type" is required additional Add-on 'Splunk Add-on for AWS' version 7.10.0 or higher (https://splunkbase.splunk.com/app/1876/).
- This Add-on is intended to be installed on Search Heads and where 'Splunk Add-on for AWS' inputs are configured.
- The AWS S3 VPC Flow logs ingested via syslog has the field extractions dependencies on Add-on 'Splunk Add-on for AWS' version 7.10.0 or higher (https://splunkbase.splunk.com/app/1876/) and it is required to be installed along 'CCX Add-on for AWS Products'

Version 1.2.4
Aug. 1, 2025

Requirements:
- To retrieve AWS Network Firewall logs based on an SQS-Based S3 "Custom Data Type" is required additional Add-on 'Splunk Add-on for AWS' version 7.10.0 or higher (https://splunkbase.splunk.com/app/1876/).
- This Add-on is intended to be installed on Search Heads and where 'Splunk Add-on for AWS' inputs are configured.
- The AWS S3 VPC Flow logs ingested via syslog has the field extractions dependencies on Add-on 'Splunk Add-on for AWS' version 7.10.0 or higher (https://splunkbase.splunk.com/app/1876/) and it is required to be installed along 'CCX Add-on for AWS Products'

Version 1.2.3
Feb. 16, 2025
  • Optimized AWS Macie configuration for better performance
    • Through props.conf config as well as regex parsing
Version 1.2.2
Dec. 10, 2024

Added support for
- Application Load Balancer Access Logs
- API Gateway Access Logs

Version 1.2.1
April 17, 2024
  • Added support for AWS Macie logs through sourcetype "ccx:aws:macie"
Version 1.2.0
Jan. 4, 2024

Requirements:
- To retrieve AWS Network Firewall logs based on an SQS-Based S3 "Custom Data Type" is required additional Add-on 'Splunk Add-on for AWS' version 5.0.3 or higher (https://splunkbase.splunk.com/app/1876/).
- This Add-on is intended to be installed on Search Heads and where 'Splunk Add-on for AWS' inputs are configured.
- The AWS S3 VPC Flow logs ingested via syslog has the field extractions dependencies on Add-on 'Splunk Add-on for AWS' version 5.0.3 or higher (https://splunkbase.splunk.com/app/1876/) and it is required to be installed along 'CCX Add-on for AWS Products'

Version 1.1.0
Oct. 4, 2022

Listed products supported:
- AWS Network Firewall
- AWS Web Application Firewall

Requirements:
- To retrieve AWS Network Firewall logs based on an SQS-Based S3 "Custom Data Type" is required additional Add-on 'Splunk Add-on for AWS' version 5.0.3 or higher (https://splunkbase.splunk.com/app/1876/).
- This Add-on is intended to be installed on Search Heads and where 'Splunk Add-on for AWS' inputs are configured.

Version 1.0.0
Aug. 4, 2022

Requirements:
- To retrieve AWS Network Firewall logs based on an SQS-Based S3 "Custom Data Type" is required additional Add-on 'Splunk Add-on for AWS' version 5.0.3 or higher (https://splunkbase.splunk.com/app/1876/).
- This Add-on is intended to be installed on Search Heads.

Installation:
- To retrieve AWS Network Firewall logs based on an SQS-Based S3 "Custom Data Type" is required additional Add-on 'Splunk Add-on for AWS' version 5.0.3 or higher (https://splunkbase.splunk.com/app/1876/) installed where "inputs" is to be configured.
- This Add-on is intended to be installed on Search Heads.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.