Splunk

This is a combined document for enabling the Dropzone AI Data Source and Alert Source for Splunk.

The Dropzone AI Platform integrates with Splunk Enterprise, a SIEM tool. Dropzone can perform analysis of Splunk-generated alerts, and/or use Splunk data as part of investigation analysis. Many customers ingest other alert sources into Splunk (e.g. IDPs) and integrate Dropzone into Splunk rather than the source systems.

Dropzone communicates to Splunk Enterprise using the Dropzone Connector.

There are two methods to integrate with Dropzone AI: creating a Splunk User or configuring an API token. To create an API token, follow instructions in Splunk's documentation.

Create a Splunk User

To create a Splunk user, do the following:

  • In the Home Menu of Splunk Enterprise, navigate to Settings > Users

Navigate to Users
  • Click "New User"

Click New User
  • Name the user something memorable, such as Dropzone AI, and create a password. Save them for use later in the Dropzone UI where they are called "Username" and "Password" respectively

  • In the "Assign Roles" section, assign the user the "User" role

You may need to add capabilities to this role depending on the level of access you want Dropzone to have. If you would like to limit the indexes Dropzone has access to, you will need to create a custom role with inherited permissions from the user role. See the Splunk documentation for more information on creating custom roles.

  • If two-factor authentication is enabled, provide the Duo username

Fill out fields for New User
  • Click "Create"

Create new user

Enable the Dropzone Data Source Integration

You'll need the following information:

Dropzone Field
Source

Server

The hostname or IP address of your Splunk server, e.g splunk.corp.example.net

Password

The username of the Splunk user you created earlier

Password

The password of the Splunk user you created earlier

If you chose to create an API token instead of a Splunk user, you will need to use the API token instead.

To enable the Data Source integration, do the following:

  • Navigate to your Dropzone AI tenant home page e.g. https://mycompany.dropzone.app

  • In the bottom left hand corner, navigate to Settings > Integrations

Integrations Dropdown
  • Click "Available"

Click Available
  • In the Search bar, search Splunk, then click "Configure"

The Splunk Tile
  • Input your Splunk Server and port

The Splunk data source configuration (pt 1)
  • If you created a Splunk User, under "Authentication Method," select Password. If you created an API token, select Token

The Splunk data source configuration (pt 2)
  • Input your authentication details

The Splunk data source configuration (pt 3)
  • If you wish for Dropzone to only investigate specific indexes, click "Add Item" in the Index Allow List section. Input the list of Splunk indexes you want Dropzone to investigate. Otherwise, leave blank

The Splunk data source configuration (pt 4)
  • If you want to further customize Dropzone's query configuration, check the box next to "Enable" in the "Advanced: Query Configuration" section. Then input your desired index selection tips, query tips, query examples, and macro configuration

The Splunk data source configuration (pt 5)
  • Click "Test & Save" to finish

If you have any errors or questions, engage your Dropzone AI support representative.

Enable the Dropzone Alert Source Integration

In addition to data source integration, Dropzone can be configured to monitor and investigate specific incident types from Splunk.

You'll need the following information:

Dropzone Field
Source

Server

The hostname or IP address of your Splunk server, e.g splunk.corp.example.net

Password

The username of the Splunk user you created earlier

Password

The password of the Splunk user you created earlier

If you chose to create an API token instead of a Splunk user, you will need to use the API token instead.

To enable the Alert Source integration, do the following:

  • Navigate to your Dropzone AI tenant home page e.g. https://mycompany.dropzone.app

  • In the bottom left hand corner, navigate to Settings > Integrations

Integrations Dropdown
  • Click "Available"

Click Available
  • In the Search bar, search Splunk, then click "Configure"

The Splunk Tile
  • Input your Splunk Server and port

The Splunk alert source configuration (pt 1)
  • If you created a Splunk User, under "Authentication Method," select Password. If you created an API token, select Token

The Splunk alert source configuration (pt 2)
  • Input your authentication details

The Splunk alert source configuration (pt 3)
  • In the "Alert Queries" section, under "Splunk Alert Search," you must input a Splunk SPL search query to identify alerts to investigate

  • Input your desired poll interval and lookback

The Splunk alert source configuration (pt 4)
  • Click "Test & Save" to finish

If you have any errors or questions, engage your Dropzone AI support representative.

Last updated

Was this helpful?