This repository contains Splunk Apps/Add-on packages
- Download the Splunk Add-on locally from the repo using the link below:
https://github.com/threatworx/splunk_packages/blob/master/packages/add_on/TA-threatworx-add-on-1.0.0.spl
Note that Splunk package files have a ".spl" extension but are ".tgz" files. You can rename the file to change the extension and unzip the file. - Install the Splunk Add-on from "Apps --> Manage --> Install app from file"
- Create an index for ThreatWorx data from "Settings --> Indexes"
- Open the "ThreatWorx Add-on"
- Configure the Add-on by navigating to "Configuration --> Add-on Settings"
- Configure a new input by navigating to "Inputs --> Create New Input"
You are all set.
Note if you have a distributed Splunk environment (comprising of multiple Splunk Indexers, Splunk Heavy Forwarders, Splunk Search Head Clusters) you will want to update props.conf on the Splunk Search Head to avoid double JSON extraction at search time as below:
$ cat $SPLUNK_HOME/etc/apps/my_TA_threatworx/local/props.conf [threatworx:vulnerability:impact] KV_MODE = none AUTO_KV_JSON = false