Version - 3.4.0
Compatible with:
This Add-On can be set up in two ways:
1) Standalone Mode: Install the Add-on app on a single machine. This single machine would serve as a Search Head + Indexer + Heavy Forwarder for this setup.
2) Distributed Environment: Install Add-on on Search Head and Heavy Forwarde (or Cloud IDM)
* Add-on resides on search head machine need not require any configuration unless user wants to use alert action.
* If alert actions are used, configure account, proxy and logging in configuration page on Search Head.
* Add-on needs to be installed and configured on the Heavy Forwarder system.
* Execute the following command on Heavy Forwarder to forward the collected data to the indexer.
$SPLUNK_HOME/bin/splunk add forward-server <indexer_ip_address>:9997
* On the Indexer machine, enable event listening on port 9997 (recommended by Splunk).
* Add-on needs to be installed on search head for CIM mapping.
NOTE: Here $SPLUNK_HOME is the absolute path where splunk is installed.
Input Name / Alert Action | Supported Tokens / Key |
---|---|
Events (Iterator) / (Data Export) | V2 Token |
Alerts (Iterator) / (Data Export) | V2 Token |
Events (Deprecated) | V1/V2 Token (V2 Token will be used if both are configured) |
Alerts (Deprecated) | V1/V2 Token (V2 Token will be used if both are configured) |
Clients | V1 Token |
Web Transactions V2 | V2 Token |
URL List Alert Action | V1/V2 Token (V2 Token will be used if both are configured) |
File Hash Alert Action | V1 Token |
Input Name / Alert Action | Endpoint Permissions |
---|---|
Events (Iterator) / (Data Export) | /api/v2/events/data/page, /api/v2/events/dataexport/events/* |
Alerts (Iterator) / (Data Export) | /api/v2/events/data/page, /api/v2/events/dataexport/events/audit, /api/v2/events/dataexport/events/alert , /api/v2/events/dataexport/alerts/* |
Web Transactions V2 | /api/v2/events/token/transaction_events |
Deprecated inputs [ Events (Deprecated) / Alerts (Deprecated) ] | /api/v2/events/data/* |
URL List Alert Action | /api/v2/policy/* (Read & Write Both) |
Note: * Here "/api/v2/events/dataexport/events/*" means all endpoints starting with the "/api/v2/events/dataexport/events/" prefix. * To update the V2 Token permission, login to the netskope portal and then navigate to Settings > Tools > REST API v2. * V1 Token doesn't require any additional steps of adding permissions. * When configuring "Token V2" on the account page, "/api/v2/events/dataexport/events/audit" or "/api/v2/events/data/page" endpoint permissions will be required for Iterator or Deprecated inputs, respectively.
Follow the below steps for configuring Netskope Add-on for Splunk
Add
button to configure a new Account.Create New Input
button provided on the top right and select specific Input Name.Save
to save the input configuration.Base Event Type
under Add-on Settings of Configuration Section. E.g. index=main OR index=custom_index_1 OR index=custom_index_2Note:
* If token is updated in existing account then existing inputs will start using new token within 30 minutes. If you want to make it use new token, then disable and enable the existing inputs.
* If v1 & v2 both tokens are configured in selected account, then Inputs or Alert Action will first Prioritise v2 token.
* In "Alerts (Iterator)" input, select the specific alert type instead of "All" to get detailed alert events. Selecting each alert type creates a separate thread to collect alerts, which might increase resource consumption.
* The "Alerts (Iterator)" input may cause resource usage to increase if separate alert types are selected (instead of All
), since the threading mechanism will collect all types of alerts simultaneously.
* Netskope recommends using the dataexport iterator endpoints whenever possible as they provide greater reliability in log delivery and better performance overall.
* Splunk admins should not query the same event or alert data export endpoint from multiple Splunk instances. Admin can reduce HA capacity requirements by splitting endpoints up between multiple TA, each of which is solely responsible for polling those particular endpoints.
Follow the below steps for configuring Netskope Web transaction V2 * Navigate to Inputs -> Create New Input -> Web Transactions V2. * Enter the Input Name, Index & Netskope Account (which has V2 Token with rewuired permission mentioned in ## SUPPORTED TOKENS AND REQUIRED PERMISSIONS). * Click on Save.
Note: * Adding multiple ingestion pipelines, requires significant hardware resources. Reference: https://docs.splunk.com/Documentation/Splunk/9.0.3/Capacity/Referencehardware
If you are having significant input data for Web Transaction V2 input and Splunk is not able to match the ingestion rate, then follow the below steps to configure multiple ingestion pipelines in Splunk to achieve a higher ingestion rate for Web Transaction V2 Input.
1. Disable web transaction V2 input.
Note: If web transaction V2 input is not created then first create it from Inputs -> Netskope Web Transactions V2
2. From backend, navigate to $SPLUNK_HOME/etc/system/local/server.conf and modify [general] stanza to make "parallelIngestionPipelines" property value with the required parallel pipelines value (Recommended max parallel pipelines are 2).
Note: If server.conf files do not exist at the specified location then create it and apply changes.
3. From backend navigate to $SPLUNK_HOME/etc/apps/TA-NetSkopeAppForSplunk/local/inputs.conf and in [netskope_webtransactions_v2://<<web txn V2 input name>>] stanza add "parallel_ingestion_pipeline" property with same value as provided in [general] stanza in step #2.
4. In $SPLUNK_HOME/etc/apps/TA-NetSkopeAppForSplunk/local/inputs.conf there will be [batch://$SPLUNK_HOME/var/spool/splunk/webtxn1/<account_name><input_name>__web_transactions_v2.gz] stanza for the Web Transactions V2 input. Make replica of same batch stanza and its property values in same inputs.conf file.
5. In this replicated batch stanza change the directory name "webtxn1" with "webtxn2" (i.e. [batch://$SPLUNK_HOME/var/spool/splunk/webtxn1/<account_name><input_name>__web_transactions_v2.gz] to [batch://$SPLUNK_HOME/var/spool/splunk/webtxn2/<account_name>_<input_name>__web_transactions_v2.gz]). Do the same and make number of batch stanzas same as the number of ingestion pipelines.
Note: Give the names for webtxn{N} in batch stanza sequentially.
6. Restart Splunk.
Note:
* In case of editing or deleting of Web Transactions V2 input, apply the changes for all of the batch stanzas property in $SPLUNK_HOME/etc/apps/TA-NetSkopeAppForSplunk/local/inputs.conf from the backend.
Two types of Alert Actions * Netskope File Hash Alert Action * Netskope URL Alert Action
Warning:
* If you want to use API v2 token then configure API v2 token in the existing account which is used in URL list alert action. If a new account is created for the existing URL list alert action, then the old URL list will be removed & it will start filling from that point.
https://www.netskope.com/software-eula
Copyright (C) 2023 Netskope, Inc. All rights reserved.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.