Integrations

Splunk SIEM Integration Guide Nile

13min

Overview

The Nile Service Block (NSB) integrates with Splunk via Splunk’s HTTP Event Collector (HEC), to export NSB security events – audit logs and user device events – to Splunk for log analysis and archiving by the customer.

Prerequisites

  • Cloud Splunk instance, or an on-premises Splunk instance, with access from Nile cloud.
  • Administrative log in to Spunk instance.
  • Administrative log in to Nile Portal.

Nile Service Block supports only signed SSL certificates, or HTTP access with no SSL. Self-signed HTTPS certificates are not acceptable.



Splunk Configuration:

Create Splunk HTTP Event Collector

Log in to Splunk instance as an administrator.

Document image


Navigate to Settings then Select Data inputs from the DATA section.

Document image


Click on the + Add new link to create a new HTTP event collector (HEC).



Document image


Type a descriptive name for the collector – in this example, we will use “nile_test”.Keep all other values at their default value (“optional”). The, click the Next button

Document image


Keep the Source Type as Automatic;Keep the index as “main”.NOTE: HEC data will be stored at by default in the main index; you can create a specific index by clicking on the Create a new index This can be changed at any time. This example uses the main index; in production, use a sandbox index first then change the setting later.

The, click the Review button.



Document image


Verify the HTTP Event Collector configuration. Then, click the  Submit button.

Document image


Copy the contents of Token Value, and save it in a text file for later use in the Nile Portal settings.(Example here is “55344676-48db-4a9a-a522-23b95C”.), then Click the Start Searching button.

Document image


Enter a search string; in this example,source=”http_test” (index=”main”)

Document image


Configure the Splunk HTTP Event Collector

After creating the HTTP Event Collector, enable the Collector, and configure the URL port and SSL options.

From the Data section, click the Data inputs link, then click on HTTP Event Collector link.

Document image


In the HTTP Event Collector page, click on Global Settings button.

Document image


Enter these values into the formAll Tokens:   click on EnabledEnable SSL:   check (HTTPS) or uncheck (HTTP) the checkboxHTTP Port Number:   8088 (default).Keep all other settings in their default value.

Click the Save button.

Document image


This example shows that SSL is disabled, and the port number is the default value.

Important Note: The SSL and Port Number setting is a global setting, and will affect all HTTP Event Collectors.

Nile Portal Configurations:

Add Splunk collector to Nile Portal

Login to Nile portal — https://u1.nile-global.cloud/ — using an admin account. Then, Navigate to (Settings button) → Global Settings tab →  Integration subtab.

Document image


Click on ⊕; a new popup window will open, then click on Splunk.



Document image


Fill out Splunk information:

  • Token:   Copy and paste the token saved when creating the  Splunk HEC
  • URL:   Enter the Splunk cloud URL plus the port number

Click the Next button.

Document image


Select, by clicking on the checkboxes, if Audit, User Device Events, and/or Alerts need to be sent to Splunk.

Document image


Click the Save button to save the settings.Click on Splunk, then click on ↔, to test the connection

Document image

Document image

Document image


If the test is successful, the collector status will change to UP (Green). if it fails it will show up as DOWN (red).

Document image


To modify Splunk URL or Token, click on (pen); to delete Splunk integration, click on (trash)

Verify Nile Events under Splunk Search and Report:

  • Login to Splunk instance as administrator.
  • In the top menu, click on Search elementUse the HEC name as a source,the index name for the specific index, andthe filter for searching for specific data.For this example, the HEC name is “nile_test”, the index name is “main”, and  the filter is:                source=”http_test” (index=”main”)



Document image


Use a topic name to display only audits or user device events

Examples:source=”http_test” (index=”main” , topic”audit”)source=”http_test” (index=”main” , topic”userdeviceevents”)