Install add-ons
The Splunk App for Enterprise Security solution includes a number of predefined add-ons to work with the data you want to monitor. The add-ons provide the feeds to get data from different sources, and also provide search-time knowledge maps to normalize the data for use within the app. Add-ons ensure that the data is correctly consumed by the Splunk App for Enterprise Security.
Steps for installing add-ons
Use the Splunk Apps manager to configure or add add-ons to your deployment.
Find an add-on
To find an add-on to add:
- Click Splunk in the upper-left corner of the dashboard to go to Splunk Home.
- Click Apps next to Splunk in the menu bar.
- From the drop-down menu, select Manage Apps.
- Select Find more apps online. Browse the list of apps; many can be can be installed for free.
- Select the app to be installed.
- In the Upload an app panel, browse for the location of the app, select it, and click Upload.
Note: Before you install a new add-on, be sure that the add-on is compatible with the Splunk App for Enterprise Security.
Add an add-on from a local file
To add an add-on locally:
- Click Splunk in the upper-left corner of the dashboard to go to Splunk Home.
- Click Apps next to Splunk in the menu bar.
- From the drop-down menu, select Manage Apps.
- Select Install app from file.
- In the Upload an app panel, browse for the location of the app, select it, and click Upload.
Edit an existing add-on
To edit an existing add-on:
- Click Splunk in the upper-left corner of the dashboard to go to Splunk Home.
- Click Apps next to Splunk in the menu bar.
- From the drop-down menu, select Manage Apps.
- Select the app from the list of apps available.
- Click Edit Properties for the app you want to configure. When you are finished, click Save.
Using Manage Apps allows you to modify properties commonly found in the app.conf
file for the app. You cannot modify any other .conf
files associated with the app in this section.
Note: Do not click Create app on the Manage Apps > Apps page. Apps for the Splunk App for Enterprise Security need to be created and configured slightly differently.
To create a custom add-on to capture and map your data, see the Data Source Integration Manual.
Add a custom add-on to an app
The Splunk App for Enterprise Security includes a modular input to update your add-ons or add custom add-ons with unique naming conventions. There are a couple of ways to update or add add-ons in your deployment:
Run setup to update the list of add-ons
When you run setup on the Splunk App for Enterprise Security from Manage Apps, the module automatically imports any add-ons with the following the naming conventions:
TA-* Splunk_TA_*
- Go to Apps > Manage Apps > Enterprise Security > Setup.
- Click OK.
- Restart Splunk to incorporate the changes.
Imports are transitive
App imports are transitive; meaning than an app (A) that imports another app (B), also imports all of the apps (C) imported by that app.
In other words:
- If app A imports B,
- and app B imports C,
- then A imports C.
Since supporting add-ons import each other, you may see only one supporting add-on with an updated local.meta
file. This is usually SA-AccessProtection
, since it is the first supporting add-on in the list of apps.
View current app imports
View the current app imports by using the "rest
" search command.
Note: You need to have administrator permissions to run the command.
This example views the imports for the SA-EndpointProtection
application:
| rest /servicesNS/nobody/system/apps/local/SA-EndpointProtection/import | fields import
Modify this code sample to view the imports of another app.
Import add-ons with a different naming convention
To add a new add-on's naming convention, you need to modify the regular expression (regex) used by the app import updater. To do this:
1. Edit or create the app_regex
field in $SPLUNK_HOME/etc/apps/SplunkEnterpriseSecuritySuite/local/inputs.conf
for the "app_imports_update://update_es
" stanza.
2. Make the necessary changes in your app_imports_update://update_es
stanza.
For example, the app "test" has been added to this stanza:
[app_imports_update://update_es]
app_regex = (TA-.*)|(Splunk_TA_.*)|(sideview_utils)|(SplunkEnterpriseSecuritySuite)|(DA-.*)|(SA-.*)|(test)3. Save your changes.
4. Restart Splunk to incorporate the changes.
Remove an add-on from app import
To remove an add-on from app import:
1. Edit SplunkEnterpriseSecuritySuite/local/inputs.conf
and use a regex string that filters away the imported add-on.
For example, here you block Splunk_TA_windows by adding a "w":
[app_imports_update://update_es]
app_regex = (TA-.*)|(Splunk_TA_w.*)|(sideview_utils)|
(SplunkEnterpriseSecuritySuite)|(DA-.*)|(SA-.*)|(test)
2. Restart Splunk to incorporate the changes.
Determine which add-ons to deploy
Not all add-ons must be installed on the indexers, only those that perform operations at index time. Review the README ($SPLUNK_HOME/etc/apps/TA-<vendor/product>/README
) associated with the add-on you are deploying to determine if it includes index-time operations. If it does not include index-time operations, then no further action is necessary.
If there are index-time operations that require the add-on, deploy it with the deployment server, using the instructions found in "About deployment server" in the Distributed Deployment Manual, part of the core Splunk documentation.
Note: If there is no README, you can look at the configuration files. An add-on includes index-time operations if any of the following appear in the default/props.conf
file in the apps directory:
* SHOULD_LINEMERGE * LINE_BREAKER * TIME_PREFIX * TIME_FORMAT * TZ * TRANSFORMS-<x>=<y>
Install the app manually | Steps to configure |
This documentation applies to the following versions of Splunk® Enterprise Security: 3.0, 3.0.1
Feedback submitted, thanks!