コンテンツにスキップ

Splunk

Splunkは、ログ、イベント、その他の運用およびビジネスデータなど、マシン生成データの検索、監視、解析のためのプラットフォームです。Wallarmを使用してSplunkにアラートを送信するように設定できます。

統合の設定

Splunk UIにて:

  1. SettingsAdd DataMonitorを開いてください。

  2. HTTP Event Collectorオプションを選択し、統合名を入力してNextをクリックしてください。

  3. Input Settingsページでデータタイプの選択をスキップし、Review Settingsに進んでください。

  4. 設定内容を確認し、Submitをクリックしてください。

  5. 表示されたトークンをコピーしてください。

Wallarm UIにて:

  1. Integrationsセクションを開いてください。

  2. Splunkブロックをクリックするか、Add integrationボタンをクリックしてSplunkを選択してください。

  3. 統合名を入力してください。

  4. コピーしたトークンをHEC tokenフィールドに貼り付けてください。

  5. HEC URIおよびSplunkインスタンスのポート番号をHEC URI:PORTフィールドに貼り付けてください。例: https://hec.splunk.com:8088

  6. 通知をトリガーするイベントタイプを選択してください。

    Splunk integration

    利用可能なイベントの詳細:

    • Hits detected except for:

    • System related:

      • User changes (newly created, deleted, role change)
      • Integration changes (disabled, deleted)
      • Application changes (newly created, deleted, name change)
    • Vulnerabilities detected, all by default or only for the selected risk level(s) - high, medium or low.
    • Rules and triggers changed (creating, updating, or deleting the rule or trigger)
    • Scope (exposed assets) changed: updates in hosts, services, and domains
    • (Requires AASM Enterprise) Security issues detected, all or only for the selected risk level(s):
      • Critical risk
      • High risk
      • Medium risk
      • Low risk
      • Info risk
    • On an hourly basis, you can get a notification with the number of requests processed during the previous hour
  7. Test integrationをクリックして、設定の正確性、Wallarm Cloudの可用性、および通知形式を確認してください。

    JSON形式でSplunk通知のテスト:

    {
        summary:"[Test message] [Test partner(US)] New vulnerability detected",
        description:"Notification type: vuln
    
                    New vulnerability was detected in your system.
    
                    ID: 
                    Title: Test
                    Domain: example.com
                    Path: 
                    Method: 
                    Discovered by: 
                    Parameter: 
                    Type: Info
                    Threat: Medium
    
                    More details: https://us1.my.wallarm.com/object/555
    
    
                    Client: TestCompany
                    Cloud: US
                    ",
        details:{
            client_name:"TestCompany",
            cloud:"US",
            notification_type:"vuln",
            vuln_link:"https://us1.my.wallarm.com/object/555",
            vuln:{
                domain:"example.com",
                id:null,
                method:null,
                parameter:null,
                path:null,
                title:"Test",
                discovered_by:null,
                threat:"Medium",
                type:"Info"
            }
        }
    }
    
  8. Add integrationをクリックしてください。

Wallarm Cloud IP addresses

To provide Wallarm Cloud access to your system, you may need a list of its public IP addresses:

35.235.66.155
34.102.90.100
34.94.156.115
35.235.115.105
34.94.85.217
34.94.51.234
34.102.59.122
34.94.238.72
34.141.230.156
34.91.138.113
34.90.114.134
35.204.127.78

追加アラートの設定

Besides the notifications you have already set up through the integration card, Wallarm triggers allow you to select additional events for notifications:

For condition detailing, you can add one or more filters. As soon, as condition and filters are set, select the integration through which the selected alert should be sent. You can select several integrations simultaneously.

Choosing an integration

イベントをダッシュボードに整理する

To get Wallarm events organized into a ready-to-use dashboard in Splunk 9.0 or later, you can install the Wallarm application for Splunk.

This application provides you with a pre-configured dashboard that is automatically filled with the events received from Wallarm. In addition to that, the application enables you to proceed to detailed logs on each event and export the data from the dashboard.

Splunk dashboard

To install the Wallarm application for Splunk:

  1. In the Splunk UI ➝ Apps find the Wallarm API Security application.

  2. Click Install and input the Splunkbase credentials.

If some Wallarm events are already logged in Splunk, they will be displayed on the dashboard, as well as further events Wallarm will discover.

In addition, you can fully customize the ready-to-use dashboard, e.g. its view or search strings used to extract data from all Splunk records.

統合の無効化と削除

You can delete or temporarily disable the integration. While deleting stops sending notificatioins and completely deletes all configuration, disabling just stops sending notifications which you can at any moment re-enable with the same settings.

If for the integration the System related events are selected to trigger notifications, Wallarm will notify about both of these actions.

システム利用不可および統合パラメータの誤り

Notifications to the system are sent via requests. If the system is unavailable or integration parameters are configured incorrectly, the error code is returned in the response to the request.

If the system responds to Wallarm request with any code other than 2xx, Wallarm resends the request with the interval until the 2xx code is received:

  • The first cycle intervals: 1, 3, 5, 10, 10 seconds

  • The second cycle intervals: 0, 1, 3, 5, 30 seconds

  • The third cycle intervals: 1, 1, 3, 5, 10, 30 minutes

If the percentage of unsuccessful requests reaches 60% in 12 hours, the integration is automatically disabled. If you receive system notifications, you will get a message about automatically disabled integration.