On the Splunk search head, when configuring the app to search SOAR searchable content, what are the two requirements to complete the app setup?
When configuring the Splunk app on the search head to search SOAR (Splunk's Security Orchestration, Automation, and Response) searchable content, two key components are required:
User Accounts: The user accounts are necessary to authenticate and authorize users who are accessing SOAR data through the Splunk app. These accounts manage permissions and access levels to ensure the proper users can search and interact with the data coming from SOAR.
HTTP Event Collector (HEC) Token: The HEC token is crucial because it allows the Splunk app to receive data from Splunk SOAR. SOAR sends events and other data to the Splunk platform via HEC. This token is used for secure communication and authentication between Splunk and SOAR. The token must be configured in the Splunk app to allow it to collect and search SOAR data seamlessly.
Other options like syslog, REST API, or a universal forwarder are commonly used methods for ingesting data into Splunk but are not specific requirements for setting up the Splunk app to search SOAR content. The HTTP Event Collector is the primary method for this setup, along with the correct user accounts.
Splunk Documentation on HTTP Event Collector and SOAR Integration.
Splunk SOAR App Setup Guide for Splunk Search Head Configuration.
Shasta
2 months agoThaddeus
2 months agoDavida
3 months agoFrancoise
3 months agoLinn
3 months agoAlpha
3 months agoAngelo
4 months agoLaurene
4 months agoTerry
4 months agoMaia
4 months agoLewis
4 months agoBerry
4 months agoLeanna
5 months agoTula
5 months agoBreana
5 months agoJeannine
5 months agoBernardo
5 months agoNorah
2 months agoDahlia
2 months agoCasie
2 months agoSuzan
2 months agoMarla
5 months agoJacinta
5 months agoAmie
7 months ago