icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading CloudPassage App for Splunk Enterprise
SHA256 checksum (cloudpassage-app-for-splunk-enterprise_350.tgz) d7a6a83f20e9322cb09ef32d6fb9f297727020cf2a9d084f540d038b394e7b46 SHA256 checksum (cloudpassage-app-for-splunk-enterprise_331.tgz) 4e444a0cf68d38495f6ed264c2986f5f9c6d893c1ec23e0c158ec61b6605869d SHA256 checksum (cloudpassage-app-for-splunk-enterprise_320.tgz) cc4a8a893eb50319c5f1536eaf584d8506fca0f16bc985e3c6ce68e4ff16b513 SHA256 checksum (cloudpassage-app-for-splunk-enterprise_31.tgz) 20c9c3f7edaba9a8fc0f8c155737a0ca427087f09fbbf8c9e8d46b4f46f3cccb SHA256 checksum (cloudpassage-app-for-splunk-enterprise_30.tgz) ebef50b1cb4edd9d55afe229dc49b575824a026ecaeb6bfce7b688cec16b80ec SHA256 checksum (cloudpassage-app-for-splunk-enterprise_21.tgz) 56b39944f67cfb453bc0b3948c9d6aea9d0eb1b705c679d83e7139bf96445d24 SHA256 checksum (cloudpassage-app-for-splunk-enterprise_20.tgz) ef7043247253eac635c62fda32cd98547300de933ad6f5b7cf3a329aadd2decc SHA256 checksum (cloudpassage-app-for-splunk-enterprise_19.tgz) 0c62d04af0cef4cf854dc7b6ba46213129fef7915a3d6bb0520e1346500c2834 SHA256 checksum (cloudpassage-app-for-splunk-enterprise_18.tgz) 8cad188e3f594e55f093ba473271f7886afa2e10bd13a923d65057739cbc4447 SHA256 checksum (cloudpassage-app-for-splunk-enterprise_17.tgz) 2453c0d1dafeb8e40bb7ced051146829a387836d5f8124382487088c4739a27b SHA256 checksum (cloudpassage-app-for-splunk-enterprise_16.tgz) d9325927341b7835ea9a004a33b5bdbde6481c449f3f9626b69fba2a7c320725 SHA256 checksum (cloudpassage-app-for-splunk-enterprise_15.tgz) 5d8f4a7912b57b45fc99cdba80f463808b8d9e89ebb2cd5ea5097b7e3c11bb7e SHA256 checksum (cloudpassage-app-for-splunk-enterprise_14.tgz) a0a11481617de2471ee5b551806b285abf125bbd5c2a1300db008a6b9354e3cc SHA256 checksum (cloudpassage-app-for-splunk-enterprise_13.tgz) 8442db2a83c930a364668f9c9472a29c5b5328116dd9f08af765ad438b678360 SHA256 checksum (cloudpassage-app-for-splunk-enterprise_12.tgz) 933e00e085f858d0e5747a305e4be0dab7c20fe6d99a8ae7de730f94429be2a8 SHA256 checksum (cloudpassage-app-for-splunk-enterprise_11.tgz) 359adbbda596f2332464826006eb5b25f8bd28081124ad6e24003b1f871dc30d SHA256 checksum (cloudpassage-app-for-splunk-enterprise_10.tgz) 6b39242f67dbf919ca29e2ec912b12246e74c67a63b2ce54aed1c78b43e94665
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

CloudPassage App for Splunk Enterprise

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
The CloudPassage App for Splunk Enterprise is a solution to help detect security violations and look for threats across your complex cloud infrastructure, through analysis of massive volumes of Halo event data.

CloudPassage’s Halo platform records over eighty different types of security events about your Halo-managed infrastructure, whether you deploy into public cloud environments or your private data center. These events deliver information about your infrastructure and include critical security alerts for firewall changes, access changes, configuration changes, and file integrity changes, and more.

The CloudPassage App for Splunk Enterprise leverages the security visibility provided by CloudPassage's Halo platform with Splunk's correlation and visualization capabilities to deliver a security reporting and analysis tool. This app enables security operators and administrators to correlate security events across their Halo-managed infrastructure.

CloudPassage App for Splunk Enterprise

Getting Started With the CloudPassage App

This document describes the CloudPassage App for Splunk Enterprise and explains how to set up, configure, and get started using the App.

How the CloudPassage App Works

The purpose of the CloudPassage App for Splunk Enterprise is to import Halo event data into Splunk Enterprise and allow it to be manipulated by Splunk users and displayed on Halo-specific pages within Splunk Enterprise. The App includes several Halo specific event display screens for reporting event results and summaries.

For event import, the App uses the script-based Modular Input tool. The Modular Input script retrieves event data from a CloudPassage Halo account and imports it into Splunk Enterprise for further processing.

Retrieving events. The script is designed to execute repeatedly, keeping Splunk up-to-date with Halo events as time passes and new events occur:
The first time the script runs, it by default retrieves all logged events within the past 90 days from a single Halo account. Then the script creates a file, writes the timestamp of the last-retrieved event in it, and saves it as a checkpoint. You may find the checkpoint file in /Splunk/var/lib/splunk/modinputs.
Every subsequent time the script runs, it retrieves only those events that were created after the timestamp stored in the checkpoint.
During any script run, if no new events have occurred since the last run, no events are retrieved or imported into Splunk.

Output formats. The script receives event data from Halo in Halo's native JavaScript Object Notation (JSON) format, which you can view in Splunk after the data has been imported.

Authentication to the Halo API. CloudPassage Halo requires the Modular Input script to pass a valid Halo API key pair in order to obtain event data. You can find the Halo API key pair in CloudPassage Halo Portal. We recommend using an auditor (read-only) API key pair with the necessary server group scope.

Prerequisites

To get started, you must have the following:

  • An active CloudPassage Halo subscription. If you don't have one, Register for CloudPassage to receive your credentials and further instructions by email.

  • Access to your CloudPassage API key. Best practice is to create a new read-only key specifically for use with this script.

  • Splunk Enterprise Server 7.0 or later. You can download Splunk Enterprise Server from here.

A. Install the CloudPassage App

You can obtain the CloudPassage app through Splunkbase.

Get the App from Splunk Apps

To install the CloudPassage App for Splunk Enterprise, first log into Splunk Enterprise. After you have successfully logged in, click on the gear icon next to Apps on the top left of your screen then click on Browse more apps, this will take you to the Splunk Apps page.

On the Splunk Apps page, search for “CloudPassage” to find the “CloudPassage App for Splunk Enterprise”. Click Install to install the app.

Verify the Installation

Regardless of how you install the CloudPassage App, once you are successful it appears in the Splunk Enterprise dashboard, like this:

Create cloudpassage Index

All events will be written to an index named "cloudpassage". Make sure to create the index via the Splunk GUI before activating the CloudPassage App.

For Splunk Cloud:

For Splunk Enterprise:

The index name must be "cloudpassage", all other parameters is up to the user to decide.

B. Configure and Activate the CloudPassage App

After installing the CloudPassage App, configure it by obtaining required Halo information, specifying the Modular Input configuration settings in a configuration file, and entering additional data input settings within Splunk Enterprise. Once you have done that, execution of the App is automatic.

Retrieve and save your CloudPassage API key

The Modular Input is a python script that makes calls to the CloudPassage API. The script is required to authenticate itself to Halo during every session; therefore, you (as a Halo user) need to make your CloudPassage API Key available to the script.

  1. To retrieve your CloudPassage API key, log into the CloudPassage Portal and navigate to Environment > Settings > Site Administration and click the API Keys tab. (If you haven’t generated an API key yet, do so by clicking Actions > New Api Key.)

If you do create an API key, we recommend that, as a best practice, you create a read-only key. A read-only key is all that you need to be able to retrieve Halo event data.

  1. Retrieve both the Key ID and the Secret Key values for the API key. Click Show for your key on the API Keys tab to display both values.

Configure the App in Splunk

Now integrate your installed CloudPassage App into Splunk Enterprise.

Log into your Splunk Enterprise installation. Choose Data Inputs from the Settings menu.

Click on CloudPassage Splunk Connector dialog box opens.

You add new types of data to Splunk Enterprise by telling it about them. There are a number of ways you can specify a data input, either in terms of its type or by its source. The Modular Input script is a source that collects data for Splunk by connecting to the CloudPassage Grid and using the Halo Event API. That is the source type that you will select.
Click on the Add new dialog box opens:

Fill in these fields:

  • Name: Enter a display name for your App, such as "CloudPassage Halo". This name appears on the App's data input summary page.
  • CloudPassage Halo API Key: Copy your saved Halo API key ID and paste it into this field.
  • CloudPassage Halo API Secret: Copy your saved Halo API key secret and paste it into this field.
  • Starting Date/Time: Optionally enter the starting date-time of events to be retrieved from your Halo account. Use ISO-8601 format; for example 2013-09-19T17:34:28.808886Z. All events newer than this date-time will be retrieved the first time the script runs; on each subsequent run, only events newer than the newest previously retrieved event will be retrieved.Putting a value in this field is optional; if you leave it blank, the first execution of the script will retrieve all defined events from your Halo account within 90 days prior.
    Please Note:
    • If checkpoint exists, it will take precedence. You can find the checkpoint in /Splunk/var/lib/splunk/modinputs.
    • CloudPassage Halo has a 90 days data retention period.
  • API Hostname: By default this is set to api.cloudpassage.com. If your CloudPassage API hostname is different from the default setting, please specify here.
  • Proxy Host: Copy your proxy host ip address and paste it into this feild. (Optional)
  • Proxy Port: Copy your proxy port and paste it into this field. (Optional)
  • Set sourcetype. Choose "Manual".
  • Select source type from list. Select the source type value that you specified in the Splunk props.conf file (for example, [cp_halo]; see Set up props.conf).

Click Save.

When it has finished adding the new data source, Splunk displays a success message:
You're done! The Modular Input script is now running, automatically providing events to Splunk for indexing.

C. View Halo Events in Splunk

The CloudPassage App provides several interactive pages that allow you to view and manipulate your Halo data from many different perspectives. Once the script runs successfully and is incorporating event data into Splunk, you will see Halo events such as the following appear in your CloudPassage App within Splunk Enterprise.You're done! The Modular Input script is now running, automatically providing events to Splunk for indexing.

The Halo Dashboard page:

120510

The Violation Dashboard page:

120509

Release Notes

Version 3.5.0
May 16, 2018

CS-537: add per_page as modular input, default=100, max=500
CS-538: fix Not supported proxy scheme None

Version 3.3.1
Feb. 21, 2018
Version 3.2.0
Jan. 23, 2018
Version 3.1
Jan. 22, 2018
Version 3.0
Jan. 19, 2018
Version 2.1
May 12, 2017

Read api hostname from data input

Version 2.0
May 11, 2017

Fixed issue where latest event duplicates on interval runs.

Version 1.9
May 1, 2017

Added SDK retry logic into App.
Delayed retry up to 5 times if grid returns a 500 on Api request.

Version 1.8
Jan. 31, 2017

Able to retrieve all events from 90 days ago.
Does not have 5000 event daily limit count.

Version 1.7
April 17, 2015

The CloudPassage App for Splunk is now proxy-aware. If you connect outbound via a proxy server in your environment, you can now specify the IP address or FQDN of the proxy server for Splunk to connect to.

Version 1.6
Feb. 22, 2015

The CloudPassage Halo Secret key input field is now asterisked and not in clear text.

Version 1.5
Dec. 9, 2014

Minor bug fixes.

Version 1.4
April 18, 2014

Fixed issue while trying to regenerate authentication token.

Version 1.3
Jan. 7, 2014

Fixed issue where the Halo Event Search dashboard was not displaying drill-downs correctly for all event types.

Version 1.2
Jan. 7, 2014

Fixed an issue where Halo Event Search was not displaying events correctly on drill-down.

Version 1.1
Dec. 31, 2013
Version 1.0
Nov. 7, 2013

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.