Salem Cyber Doc Site
  • 🏠Documentation Home
  • ✨Initiation Guides
    • Quickstart: Deploy Salem
    • Admin Guide
    • Installing Teams App
    • Feature Overview
  • ✨General Guides
    • Managing Alerts
    • Managing Questions
    • Threat Notification Management
    • Uploading Files
    • Logical Operations
  • ✨Configurations Specification
    • Configuration Home
    • Action Conf
      • "match" ActionConfs
      • "webhook" ActionConfs
      • "llm" ActionConfs
    • Action Definition
      • Azure Log Analytics
      • Microsoft Graph API
      • Splunk Search
      • Bring Your Own LLM
    • Parsing Conf
      • Summary Details
    • Report Conf
    • LLM Configuration
  • 💾Changelog
    • Dec 5th '24: Get cracking on your holiday shopping list
    • July 18th, ’24: Beat the heat and the hackers
    • Apr 17th, '24: Alert showers make analysts sour... no longer with Salem!
    • Mar 5, '24: They're after me (and your) secure systems! We're na-tur-ally suspicious
    • Jan 31, '24: New year, new me... and a new way to extract data from your alerts
    • Dec 21, '23: Jingle bells, WannaCry smells, your escalated alert just laid an egg
    • Nov 14, '23: Stuff the turkey or stuff cyber alerts with context... Why not both?
    • Oct 25, '23: Llama, llama on the wall which alert is scariest of them all
    • Sept 19, '23: Context building via true positive/false positive workflow
    • Sept 1, '23: Alert report UI, webhook actions, and question upgrades
Powered by GitBook
On this page
  • Splunk - Webhook Action
  • Configuring Splunk Search
  • 1. Id
  • 2. Disabled
  • 3. Splunk URL
  • 4. Credentials/Authentication
  • 5. Static Keys
  • 6. Input Keys - User input
  • 7. polling_params - HTTP requests
  1. Configurations Specification
  2. Action Definition

Splunk Search

PreviousMicrosoft Graph APINextBring Your Own LLM

Last updated 1 year ago

Splunk captures a wide variety of security data, including system logs, network traffic, security events, application logs, cloud logs, vulnerability scanner data, and threat intelligence feeds. Once configured, Salem can access this data using user-created queries, further customization of the integration can be managed in the Splunk ActionDefinition.

Description: In the default case, Salem retrieves data from a Splunk endpoint by authenticating using a secret stored in a digital key vault and returning data based on a user-defined query. The user can then process the output using an to build Salem .

The ActionDefinition name must be the the name referenced by a corresponding ActionConf, or the request will fail.

A 1 or 0 value for whether the action is currently in operation. By default, the ActionConf is disabled (value of "1") and must be updated by a Salem admin.

The target Splunk endpoint to integrate with Salem.

By default, the Splunk ActionDefinition expects a key vault resource that contains a client secret. This secret is passed as part of the poll_request. To match this configuration, create a secret value in a key vault resource Salem can access.

In the default case, the Splunk ActionDefinition expects only one parameter, output_mode, which will most likely take the value of json.

The default Splunk ActionDefinition includes 3 fields for the user to define as part of the request generation:

  • search - Splunk search string, should begin with the key word 'search', or a '|' if using a command such as '|inputlookup'

  • earliest_time - how far Splunk should look back for matching events

  • latest_time - latest search time, typically set to 'now'

The polling_params dictate how the request will be made to Splunk and how the response will be handled.

✨
1. Id
2. Disabled
3. Splunk URL
4. Credentials/Authentication
5. Static Keys
6. Input Keys - User input
7. polling_params - HTTP requests
ActionConfs
Splunk - Webhook Action
Configuring Splunk Search
eval string