Splunk® SOAR (On-premises)

Install and Upgrade Splunk SOAR (On-premises)

The classic playbook editor will be deprecated in early 2025. Convert your classic playbooks to modern mode.
After the future removal of the classic playbook editor, your existing classic playbooks will continue to run, However, you will no longer be able to visualize or modify existing classic playbooks.
For details, see:
This documentation does not apply to the most recent version of Splunk® SOAR (On-premises). For documentation on the most recent version, go to the latest release.

General system requirements

requires certain minimum system requirements. Your environment must meet or exceed these requirements. This section details operating systems, web browsers, system storage, Linux file systems, and other requirements for operating .

Supported operating systems

supports these operating systems and versions:

  • Red Hat Enterprise Linux 7.6 through 7.9
  • Red Hat Enterprise Linux 8.0 and any of the minor versions of 8.
    You can use the most recent minor release of RHEL 8 that is available at the time of the Splunk SOAR (On-premises) release.
  • Amazon Linux 2
  • Oracle Linux 8

Splunk SOAR (On-premises) cannot be installed inside of a Docker or Podman container.

Federal Information Processing Standard (FIPS) support

can be deployed in a FIPS compliant mode, if the operating system kernel is in FIPS mode.

  • Your operating system, either RHEL or CentOS must be in FIPS mode.
  • You must create a new, unprivileged deployment of , either as a single instance or as a cluster.

You can learn more about setting your operating system to use FIPS mode from the operating system vendor's websites:

Supported browsers

requires a web browser that supports HTML 5, SVG graphics, and TLS.

Use the latest, fully patched version of one of the following browsers:

  • Google Chrome
  • Mozilla Firefox
  • Microsoft Edge
  • Apple Safari

Operating system accounts

On unprivileged deployments, only a single operating system user account, phantom, is created and used.

Supported file systems and required directories

supports any file system where the user account running the application can be given write permissions.

In a clustered environment, implements GlusterFS for its file shares. If your organization requires a different file system for your cluster, make sure that the user account running has write permissions to the required directories.

Required directories for an installation as an unprivileged user:

  • <phantom_install_dir>/apps
  • <phantom_install_dir>/local_data/app_states
  • <phantom_install_dir>/scm
  • <phantom_install_dir>/vault
  • <phantom_install_dir>/tmp/shared

File permissions

is installed:

  • On an unprivileged deployment - the home directory of the user account that will run , also called <PHANTOM_HOME>.

The installer expects a umask of 0022 during installation. Applying a different umask may lead to unexpected behavior.

In general, you should not modify file permissions for . Changing the file permissions can cause errors, or prevent from working.

You can check to see if an access control list has been applied using the Linux getfacl command, clear any access control list which is incorrectly being applied using the setfacl -b command, or apply correct permissions to a file with the chmod command. If you have changed file permissions, you will need to restart .

Directory Permissions
(symbolic)
Permissions
(numeric)
Owner Group Notes
/opt/phantom drwxr-xr-x 755 phantom phantom This is the default 'root' directory.
On an unprivileged deployment, it changes to be the user account that runs .
Referred to as <PHANTOM_HOME> in the documentation.
/opt/phantom/apps drwxrwxr-x 775 phantom phantom Required to allow the web-based UI to install apps.
Apps installed by the web-based UI will be owned by nginx in the phantom group.
/opt/phantom/local_data drwxrwxr-x 775 phantom phantom
/opt/phantom/local_data/

app_states

drwxrwxr-x 775 phantom phantom
/opt/phantom/scm drwxrwx--- 770 phantom phantom Allows for non-nginx users of to have write access to playbooks.
/opt/phantom/spool drwxrwxr-x 775 phantom phantom Allows the nginx user of the phantom group to have access to create items, such as the uwsgi sub-directory.
/opt/phantom/tmp drwxrwx--- 770 phantom phantom Allows non-root users of the phantom group to have write access.
/opt/phantom/vault drwxrwxr-x 775 phantom phantom Allow non-phantom user of phantom group, such as the nginx user, to have the write access to add the file to vault, to create reports, and so on.
/opt/phantom/var/log drwxr-xr-x 755 phantom phantom Allows the web-based UI and other tools to create and write log files for actions. You should not modify the permissions for this directory. If logs cannot be written, app installation or other actions may fail.
/opt/phantom/var/log/

phantom/app_install.log

-rw-rw-r-- 664 phantom phantom Allows the web-based UI to write to the app_install.log and other tools to read it. You should not modify the permissions for this file. If this log cannot be written to, the web-based UI displays the error message "internal server error."
/opt/phantom/var/log/

phantom/app_interface.log

-rw-rw---- 660 phantom phantom Contains logs from the app-interface module, REST handlers, and apps that provide custom views.
Last modified on 25 November, 2024
Uninstall   System requirements for evaluation use

This documentation applies to the following versions of Splunk® SOAR (On-premises): 6.3.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters