Splunk® Supported Add-ons

Splunk Add-on for Check Point OPSEC LEA

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Hardware and software requirements for the Splunk Add-on for Check Point OPSEC LEA

Operating system requirements for the Splunk Add-on for Check Point OPSEC LEA

These operating system requirements apply to Splunk forwarders only. Search heads and indexers can be hosted on any Splunk supported platform.

  • Linux (RHEL/CentOS)
  • Linux kernel version 2.6.32 or later (x86_64)
  • Bash, version 3 or later.
  • GNU C library (glibc.i686 32-bit). For example, install using yum install glibc.i686
  • PAM shared libraries (pam.i686 32-bit). For example, install using yum install pam.i686

Check Point OPSEC LEA setup requirements

For Check Point server authentication to work, the $HOME directory must be writable by the Linux account that Splunk is running as.

Make sure ports 18184 and 18210 are open to Splunk. 18184/tcp: is used to retrieve FW/AUDIT logs from the Check Point API and 18210/tcp: is used for a one time connection to pull the certificate.

Sizing guidelines

It is important that your Splunk Add-on for Check Point OPSEC LEA deployment includes sufficient heavy forwarder and indexer capacity to handle the incoming load. An insufficient number of heavy forwarders or indexers can negatively impact performance.

A heavy forwarder can handle up to 13,000 events per second (EPS). If you are collecting more than 13,000 EPS from your OPSEC LEA connections, you can add additional heavy forwarders and spread the inputs across the heavy forwarders. If you use indexer clustering, you can use light forwarders for data collection and spread the parsing and indexing tasks among the indexers in your cluster.

See Where to install this add-on for information about which Splunk tiers to install the add-on to.

Splunk platform requirements

Because this add-on runs on the Splunk platform, all of the system requirements apply for the Splunk software that you use to run this add-on.

  • For Splunk Enterprise system requirements: see System Requirements in the Splunk Enterprise Installation Manual.
  • If you plan to run this add-on entirely in Splunk Cloud, there are no additional Splunk platform requirements.
  • For Splunk Light system requirements: see System Requirements in the Splunk Light Installation Manual.
  • If you are managing on-premises forwarders to get data into Splunk Cloud, see System Requirements in the Splunk Enterprise Installation Manual, which includes information about forwarders.

The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.

For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.

Last modified on 04 January, 2021
PREVIOUS
Release history for the Splunk Add-on for Check Point OPSEC LEA
  NEXT
Installation and configuration overview for the Splunk Add-on for Check Point OPSEC LEA

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters