After the future removal of the classic playbook editor, your existing classic playbooks will continue to run, However, you will no longer be able to visualize or modify existing classic playbooks.
For details, see:
Install using the Amazon Marketplace Image
Install for AWS from the AWS Marketplace in the security category.
The AMI version of is for an unprivileged installation, meaning the the application runs under the phantom user account, and not as root.
- The base installation directory for the unprivileged AMI is /opt/phantom/.
- The AMI uses a custom HTTPS port of 9999. A firewalld forwarding rule routes traffic directed to the standard HTTPS port 443 to the custom HTTPS port 9999.
Prerequisites
Your AWS instance must meet or exceed the requirements for either an evaluation system for evaluation or Proof of Value testing, or a production system for production use, and must include:
- A supported operating system. See Supported operating systems.
- Sufficient storage. See System requirements for production use.
If you need to connect your organization's on-premises infrastructure to an installation of Splunk SOAR (On-premises) hosted in AWS, consult the article Connect Your Data Center to AWS on the AWS web site.
Federal Information Processing Standard (FIPS) support
can be deployed in a FIPS compliant mode, if the operating system kernel is in FIPS mode.
- Your operating system, either RHEL or CentOS must be in FIPS mode.
- You must create a new, unprivileged deployment of , either as a single instance or as a cluster.
Information about setting up RHEL 7.x or CentOS 7.x in Federal Information Processing Standard (FIPS) mode can be found in the Red Hat Security Guide in Chapter 9.
Installation
Perform the following tasks to install :
- Log in to your AWS EC2 account.
- From your EC2 dashboard, select Launch Instance.
- In the AWS Marketplace, search for .
- On the Amazon Machine Image entry, click Select.
- Click Continue.
- Select an instance size. The default is m5.xlarge. does not support using instances smaller than t2.xlarge.
- Click Next: Configure Instance Details.
- Configure the instance according to your organization's policies.
- Click Next: Add Storage.
- Add storage.
You can increase disk size later, but you cannot decrease disk size.
- Click Next: Add Tags.
- Add tags to help identify your installation in your EC2 dashboard.
- Click Next: Configure Security Group.
- Configure Security Groups. By default, SSH, HTTP, and HTTPS are permitted from all IP addresses. Increase security by limiting access to your organization's IP addresses.
- Click Review and Launch.
- Generate or choose SSH keys.
The SSH user account is phantom. This user account has sudo access for elevating to root.
- Click Launch Instances. The installation typically takes 15 minutes to complete.
Next step: log in to verify the installation
You can log in to the web interface after the setup script completes to configure user accounts and additional settings. See Log in to the web interface.
FIPS compliance | Install as a privileged user |
This documentation applies to the following versions of Splunk® SOAR (On-premises): 5.4.0
Feedback submitted, thanks!