Integrate with Splunk

In this topic, you will learn how to send Portnox™ Cloud alerts to the Splunk Enterprise or Splunk Cloud SIEM solution.

Create a HTTP Event Collector in Splunk

In this section, you will learn how to add a HTTP Event Collector in Splunk, so that it can receive data via HTTPS from Portnox™ Cloud.

  1. Open your Splunk dashboard in the browser.
  2. In the Explore Splunk pane, click on the Add Data icon.

  3. On the What data do you want to send to the Splunk platform? screen, click on the Monitor icon.

  4. On the first page of the Add Data wizard, click on the HTTP Event Collector option in the left-hand side menu.

  5. In the right-hand side pane, enter a name for the HTTP Event Collector, and then click on the Next button.

    In this example, we used the name Portnox but you can use any name you like.

  6. In the Input Settings step of the Add Data wizard, click on the add all link above the list of available indexes, and then click on the Review button.

  7. In the Review step of the Add Data wizard, click on the Submit button.

  8. In the Done step of the Add Data wizard, click on the Token Value field to highlight it, and then copy the value (for example, using Ctrl+C on Windows).

    Paste and save the copied value in a text file. You will need this value to configure Portnox Cloud.

Result: The HTTP Event Collector is active. You can check it here: Settings > Data inputs > HTTP Event Collector.

Configure Portnox Cloud

In this section, you will learn how to configure Portnox™ Cloud to send alert data to the Splunk collector.

  1. In the Cloud portal top menu, click on the Settings option.

  2. In the Cloud portal left-hand menu, click on the INTEGRATION SERVICES tile.

  3. In the right-hand side pane, find and click on the SIEM INTEGRATION SERVICE heading.

    More options appear under the SIEM INTEGRATION SERVICE heading and description.

  4. Create a new SIEM integration with Splunk.
    1. In the SIEM INTEGRATION SERVICE section, click on the Add new SIEM link.

      The NEW SIEM INTEGRATION section opens.

    2. In the Type field, select the Custom option.

    3. In the Name field, enter the name for the new integration.

      In this example, we used the name Splunk but you can use any name you like.

    4. In the Status field, select the Enabled option.

    5. In the Protocol type field, select the HTTPS option.

    6. In the Endpoint url field, paste the following HTTP source URL depending on whether you use Splunk Cloud or on-premises Splunk Enterprise:
      • Splunk Cloud:

        https://http-inputs-your_instance_name.splunkcloud.com:443/services/collector/event

        where your_instance_name is your unique tenant name.

        Note: The URL and port may be different if you use Splunk Cloud trial or Splunk hosted on Google Cloud or AWS. For more information about such cases, consult Splunk documentation.
      • Splunk Enterprise (on-premises):

        https://your_server:8088/services/collector/event

        where your_server is your on-premises server.

        Note: The standard port is 8088 but you can configure a different port in Splunk: Settings > Data inputs > HTTP Event Collector > Global Settings > HTTP Port Number.
        Note: By default, Splunk Enterprise uses its own self-signed certificates, which don’t work with Portnox Cloud. To set up a valid certificate in Splunk, consult Splunk documentation. Alternatively, if you’re just testing the integration in a lab environment, you can temporarily turn off SSL support (Settings > Data inputs > HTTP Event Collector > Global Settings > Enable SSL) and use http:// in the URL.
    7. In the Authentication token field, paste the token that you copied earlier when setting up the Splunk collector.

    8. In the Data format field, select the JSON option.

    9. Click on the Save button to add the integration.

    10. Optional: Test the configuration by clicking on the Test button.

  5. Optional: To configure the types of alerts sent to your SIEM solution, see the following topic: Portnox Cloud alerts.
    Note: To learn more about the content and format of alert messages sent to SIEM solutions, see the following topic: Format and content of alert information for SIEM.

    You can also send all of the Portnox Cloud activity log (activities performed by administrators in Portnox Cloud) to your SIEM solution. To do this, go to Troubleshooting > ACTIVITY LOG > Log Settings, activate the Activity log switch, and click on the Save button.

Result: Splunk is receiving alerts from Portnox Cloud.

You can confirm the integration, for example, by running a query source="http:collector_name" where collector_name is the name that you used for the HTTP Event Collector.