This is an add-on powered by the Splunk Add-on Builder
Run the following cURL command:
curl -X 'GET' 'https://<tenant-name>.goskope.com/api/v2/events/token/transaction_events?regenerate=false&decode=false' -H 'accept: application/json' -H 'Netskope-Api-Token: <API-V2-Token>'
Example command: curl -X 'GET' 'https://splunk-demo.goskope.com/api/v2/events/token/transaction_events?regenerate=false&decode=false' -H 'accept: application/json' -H 'Netskope-Api-Token: a12b34cde56f7g89h0ij12k345678lmn'
This Add-On can be set up in two ways:
1) Standalone Mode: Install the Add-on app on a single machine. This single machine would serve as a Search Head + Indexer + Heavy Forwarder for this setup.
2) Distributed Environment: Install Add-on on Search Head and Heavy Forwarde (or Cloud IDM)
* Add-on resides on search head machine need not require any configuration unless user wants to use alert action.
* If alert actions are used, configure account, proxy and logging in configuration page on Search Head.
* Add-on needs to be installed and configured on the Heavy Forwarder system.
* Execute the following command on Heavy Forwarder to forward the collected data to the indexer.
$SPLUNK_HOME/bin/splunk add forward-server <indexer_ip_address>:9997 * On the Indexer machine, enable event listening on port 9997 (recommended by Splunk). * Add-on needs to be installed on search head for CIM mapping.
NOTE: Here $SPLUNK_HOME is the absolute path where splunk is installed.
Ensure you are configuring inputs or alert actions with an account configured with tokens as shown below.
Event types: Connection, Application, Network, Audit, Infrastructure, Incident, Endpoint
Alert Types: compromisedcredential, ctep, dlp, malsite, malware, policy, quarantine, remediation, securityassessment, uba, watchlist
| Input Name / Alert Action | Supported Tokens / Key |
| ---------------------------- | ---------------------------------------------------------- |
| Events (Iterator) | V2 Token |
| Alerts (Iterator) | V2 Token |
| Clients | V1 Token |
| Web Transactions V2 | V2 Token |
| URL List Alert Action | V1/V2 Token (V2 Token will be used if both are configured) |
| File Hash Alert Action | V1 Token |
| Quarantine File Alert Action | Azure RBAC of 'Contributor' role |
If V2 Token is configured, ensure it has sufficient endpoint permissions for respective inputs or alert actions as listed in the table.
Input Name / Alert Action | Endpoint Permissions |
---|---|
Events (Iterator) | /api/v2/events/dataexport/events/* |
Alerts (Iterator) | /api/v2/events/dataexport/events/audit, /api/v2/events/dataexport/events/alert , /api/v2/events/dataexport/alerts/* |
Web Transactions V2 | /api/v2/events/token/transaction_events |
URL List Alert Action | /api/v2/policy/* |
Note: * Here "/api/v2/events/dataexport/events/*" means all endpoints starting with the "/api/v2/events/dataexport/events/" prefix. * To update the V2 Token permission, login to the netskope portal and then navigate to Settings > Tools > REST API v2. * V1 Token doesn't require any additional steps of adding permissions. * When configuring "Token V2" on the account page, "/api/v2/events/dataexport/events/audit" or "/api/v2/events/data/page" endpoint permissions will be required for Iterator or Deprecated inputs, respectively. * A valid STMP server configuration is required to use the "Email Notification" feature. * To use the "Email Notification" feature with a personal Gmail account, an app password is required for that Gmail account. To setup the App Password, follow these steps: https://support.google.com/accounts/answer/185833?hl=en
Note: Webtx2 input is not supporting HTTPS_PROXY. * This component is required and must be addressed before installing the Netskope TA. * The TA only supports polling Netskope events at 10,000 items per page for events, alerts or clients input. * Upgrading is supported within the 2.x version chain. If you are upgrading from TA v1.x, please remove it before installing version 2.x. * If Splunk is stopped or input is disabled or some intermediate error occurs from API while TA is collecting data, then it might result in data duplication during that period.
Follow the below steps for configuring Netskope Add-on for Splunk
Follow the below steps for configuring Netskope Web transaction V2 * Navigate to Inputs -> Create New Input -> Web Transactions V2. * Enter the Input Name, Index & Netskope Account (which has V2 Token with rewuired permission mentioned in ## SUPPORTED TOKENS AND REQUIRED PERMISSIONS). * Click on Save.
Note: * Adding multiple ingestion pipelines, requires significant hardware resources. Reference: https://docs.splunk.com/Documentation/Splunk/9.0.3/Capacity/Referencehardware
If you are having significant input data for Web Transaction V2 input and Splunk is not able to match the ingestion rate, then follow the below steps to configure multiple ingestion pipelines in Splunk to achieve a higher ingestion rate for Web Transaction V2 Input.
Disable web transaction V2 input.
Note: If web transaction V2 input is not created then first create it from Inputs -> Netskope Web Transactions V2
From backend, navigate to $SPLUNK_HOME/etc/system/local/server.conf and modify [general] stanza to make "parallelIngestionPipelines" property value with the required parallel pipelines value (Recommended max parallel pipelines are 2).
Note: If server.conf files do not exist at the specified location then create it and apply changes.
From backend navigate to $SPLUNK_HOME/etc/apps/TA-NetSkopeAppForSplunk/local/inputs.conf and in [netskope_webtransactions_v2://<<web txn V2 input name>>] stanza add "parallel_ingestion_pipeline" property with same value as provided in [general] stanza in step #2.
In $SPLUNK_HOME/etc/apps/TA-NetSkopeAppForSplunk/local/inputs.conf there will be [batch://$SPLUNK_HOME/var/spool/splunk/webtxn1/<account_name><input_name>__web_transactions_v2.gz] stanza for the Web Transactions V2 input. Make replica of same batch stanza and its property values in same inputs.conf file.
In this replicated batch stanza change the directory name "webtxn1" with "webtxn2" (i.e. [batch://$SPLUNK_HOME/var/spool/splunk/webtxn1/<account_name><input_name>__web_transactions_v2.gz] to [batch://$SPLUNK_HOME/var/spool/splunk/webtxn2/<account_name>_<input_name>__web_transactions_v2.gz]). Do the same and make number of batch stanzas same as the number of ingestion pipelines.
Note: Give the names for webtxn{N} in batch stanza sequentially.
Restart Splunk.
Note:
Warning: * If you want to use API v2 token then configure API v2 token in the existing account which is used in URL list alert action. If a new account is created for the existing URL list alert action, then the old URL list will be removed & it will start filling from that point.
https://www.netskope.com/software-eula
Copyright (C) 2024 Netskope, Inc. All rights reserved.
Updated Splunk Add-on builder version v4.2.0 to support cloud compatibility.
Added compatibility with Python 3.9.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.