The ExtraHop Add-On for Splunk enables you to export ExtraHop wire data metrics as Splunk events. You can export metrics about any devices, device groups, applications, and networks from an ExtraHop Discover or Command appliance.
The ExtraHop Add-On for Splunk collects metrics through the ExtraHop REST API. Dataset metrics are collected for 5th, 25th, 50th, 75th, and 95th percentiles. All events collected by the ExtraHop Add-On for Splunk are assigned the extrahop source type.
Note: The Extrahop Add-On for Splunk v2.3.0 requires a minimum of v9.1.2 of the Extrahop Appliance to perform the data collection, Splunk app’s upgrade steps are mentioned in Readme.md
(NOTE: This version changes how device data is indexed in Splunk's KV Store.
It may be useful to clean the "TA_extrahop_oiddev" collection,
but it is not necessary. This can be done by running the following command:
$SPLUNK_HOME/bin/splunk clean kvstore -app TA-extrahop_addon -collection TA_extrahop_oiddev
)
This app can be set up in two ways:
ExtraHop Add-On for Splunk can be installed through UI using "Manage Apps" > "Install app from file" or by extracting tarball directly into $SPLUNK_HOME/etc/apps/ folder.
To configure ExtraHop account, navigate to ExtraHop Add-On for Splunk, click on "Configuration", go to "Accounts" tab, click on "Add" button and fill in the details asked and click "Add". Field descriptions are as below:
Field Name | Field Description |
---|---|
Account Name* |
Unique name for your account |
Instance Type * |
Instance type for data collection |
Hostname* |
Hostname of your ExtraHop account |
API Key | API Key corresponding to your ExtraHop On-Prem Account |
Client ID | Client ID corresponding to your ExtraHop Cloud Account |
Client Secret | Client Secret corresponding to your ExtraHop Cloud Account |
Navigate to ExtraHop Add-On for Splunk, click on "Configuration", go to the "Proxy" tab, fill in the details asked and click "Save". Field descriptions are as below:
Field Name | Field Description |
---|---|
Enable | Enable/Disable proxy |
Proxy Type* |
Type of proxy |
Host* |
Hostname/IP Address of the proxy |
Port* |
Port of proxy |
Username | Username for proxy authentication (Username and Password are inclusive fields) |
Password | Password for proxy authentication (Username and Password are inclusive fields) |
Remote DNS resolution | Check this box if you want to use Remote DNS resolution |
Note: *
denotes required fields
You must create data inputs that collect information from an ExtraHop appliance to retrieve wire data metrics.
You must create data inputs that collect information from an ExtraHop appliance to retrieve detections.
Follow the steps mentioned below in order to upgrade your ExtraHop Add-On for Splunk v2.2.0:
This add-on provides the index-time and search-time knowledge for the following types of data from the ExtraHop system:
ExtraHop wire data metrics
All ExtraHop wire data metrics have a sourcetype of extrahop.
ExtraHop detections
All Extrahop detections have a sourcetype of extrahop:detection.
The ExtraHop Add-On for Splunk contains a KV store lookup: the extrahop_deviceoid_lookup
The extrahop_deviceoid_lookup adds display names, MAC addresses, and IP addresses to ExtraHop events to Splunk.
You can configure the Splunk Event Generator to create sample ExtraHop events through the ExtraHop Add-On for Splunk . Sample event generation is configured through the eventgen.conf file. Sample events retrieve data from the samples directory of the Splunk Event Generator package. For more information about the Splunk Event Generator, see see the Eventgen GitHub page.
Some of the components included in "ExtraHop Add-On for Splunk" are licensed under free or open source licenses. We wish to thank the contributors to those projects. Version 2.1.0 of the ExtraHop Add-On for Splunk incorporates the following third-party software or libraries:
index=_internal sourcetype="taextrahop:log"
Note: $SPLUNK_HOME denotes the path where Splunk is installed. Ex: /opt/splunk
Note: $SPLUNK_HOME denotes the path where Splunk is installed. Ex: /opt/splunk
Contact ExtraHop Support for assistance with this app at https://www.extrahop.com/support/
Copyright ExtraHop Networks 2022
Upgraded Add-on Builder framework version to v4.1.3.
Added the support of Extrahop Appliance v9.1.2.
Optimized the detections input data collection.
Note: The Extrahop Add-On for Splunk v2.3.0 requires a minimum of v9.1.2 of the Extrahop Appliance to perform the data collection, Splunk app’s upgrade steps are mentioned in Readme.md
$SPLUNK_HOME/etc/apps/TA-extrahop_addon/local/ta_extrahop_addon_settings.conf
and add validate_ssl_certificates = 0
under additional_parameters
stanza.As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.