Splunk® Phantom App for Splunk

Use the Splunk Phantom App for Splunk to Forward Events

Acrobat logo Download manual as PDF


Splunk Phantom App for Splunk has been replaced by Splunk App for SOAR Export.
Acrobat logo Download topic as PDF

What you need to install the Splunk Phantom App for Splunk on Splunk Enterprise

Verify that your environment is ready to use the Splunk Phantom App for Splunk to integrate Splunk Phantom or Splunk SOAR with your Splunk Enterprise deployment.

Required user privileges and ports

Verify the following user privileges and ports:

  • The Splunk Phantom App for Splunk requires that a user with administrative privileges installs both the Splunk Phantom App for Splunk and Splunk software. In situations where events can't be sent from the Splunk platform to Splunk Phantom or Splunk SOAR using alert actions, adaptive response actions, or event forwarding, the events are stored in the phantom_retry KV Store collection. The Splunk Phantom App for Splunk requires the admin user to run the phantom_retry.py script every 60 seconds to try to send any events that could not be sent earlier.
  • Splunk Phantom must have TCP ports 443 and 8089 open to and from Splunk Enterprise Security (ES) search heads.
  • In your on-premises deployment, verify that you have the necessary network availability among all devices.

Splunk product compatibility requirements

The Splunk Phantom App for Splunk requires specific Splunk platform combinations. For example, Splunk ES versions 6.5.1, 6.5.x means that Splunk ES version 6.5.1 or any 6.5.x release later than 6.5.1 is required.

Verify that you are using the following product version combinations if you installing the Splunk Phantom App for Splunk on Splunk Enterprise:

Splunk Phantom App for Splunk Version Splunk Enterprise Version Splunk ES Version Splunk Phantom Version Splunk SOAR Version
4.1.73
(CIM version 4.18.0)
8.2 6.6.1, 6.6.x 5.0.1.64780, 5.0.x 5.0.0.63789, 5.0.x, 5.1.x, 5.2.x
4.1.3
(CIM version 4.18.0)
8.2 6.6.0, 6.6.x 4.10.4, 4.10.x 4.12.0.56045, 4.12.x
8.1 6.6.0, 6.6.x 4.10.4, 4.10.x 4.12.0.56045, 4.12.x
4.0.35
(CIM version 4.18.0)
8.2, 8.2.x 6.5.0, 6.5.x 4.10.1.45070, 4.10.x N/A
8.1, 8.1.x 6.2.0, 6.2.x 4.10.0.40025, 4.10.x N/A
8.1, 8.1.x 6.4.1, 6.4.x 4.10.0.40025, 4.10.x N/A
8.0 6.1.1, 6.1.x 4.10.0.40025, 4.10.x N/A
8.0 6.4.1, 6.4.x 4.10.0.40025, 4.10.x N/A
7.3 5.3.1, 5.3.x 4.10.0.40025, 4.10.x N/A
4.0.10
(CIM version 4.18.0)
8.0.3 6.1.1, 6.1.x, 6.2.0, 6.2.x 4.8.24304, 4.8.x, 4.9.39220, 4.9.x N/A
7.3.5 5.3.1, 5.3.x 4.8.24304, 4.8.x, 4.9.39220, 4.9.x N/A
7.2.10.2 5.3.1, 5.3.x 4.8.24304, 4.8.x, 4.9.39220, 4.9.x N/A
3.0.5
(CIM version 4.8.0)
8.0 6.0.0, 6.0.x 4.6.19142, 4.6.x N/A
7.3.3 5.3.1, 5.3.x 4.6.19142, 4.6.x N/A

Required apps

Make sure you have the following apps installed on your Splunk Enterprise deployment:

App Description
Splunk Phantom App for Splunk (this app) Download the Splunk Phantom App for Splunk from Splunkbase. This app is required to map event fields to CEF format, then forward those events to Splunk Phantom.
Common Information Model Download the Splunk Common Information Model (CIM) from Splunkbase. If you have Splunk Enterprise Security (ES) installed, you don't need to download this library as it is already included with Splunk ES.


This app is required for the automated mapping models in adaptive response actions on the Splunk platform to work correctly.

Last modified on 11 May, 2022
PREVIOUS
About the Splunk Phantom App for Splunk
  NEXT
Install the Splunk Phantom App for Splunk on Splunk Enterprise

This documentation applies to the following versions of Splunk® Phantom App for Splunk: 4.1.73


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters