Step 1: Enable console access
Having read-only access to the interface of your technology allows Expel to dig deeper when performing incident investigations. Our device health team uses this access to investigate potential health issues with your tech.
By following these steps, you create a user account for Expel that keeps the Expel activity separate from other activity on the Splunk console.
Note: The Expel Assembler needs access to the Splunk device or instance through port 8000 (UI) and 8089 (API). For cloud instances, request enablement of rest API and allowlisting Expel through Splunk support. Expel has 6 egress IP addresses. All requests to rest API come from 1 of 6 IP addresses. We’ve designed this so it can scale significantly without Expel needing to add new IP addresses to the list.
Create an admin account
- Log into Splunk.
- Navigate to Settings > Access Controls > Users.
- Click the +Add new button.
- For Name type Expel.
- For Full name type Expel SOC.
- For E-mail type email@example.com.
- For Time Zone select GMT (or UTC).
- For Assign to roles select User.
- Set the Password.
Note: After console access is established for Expel, the remaining onboarding steps for this technology can also be performed by Expel. Reach out to your Engagement Manager if this is needed and we're happy to complete the integration!
Step 2: Configure the technology in Workbench
Now that we have the correct access configured and have noted the credentials, we can integrate Splunk with Expel.
Register device in Expel Workbench
- Go to https://workbench.expel.io/settings/security-devices?setupIntegration=splunk.
- If your installation is on premises (On-prem), then select the Assembler connected to the Splunk device. This is the assembler you set up in Step 2 of the Getting Started with Expel guide.
- Fill in the following information:
- Name: the hostname of the Splunk device.
- Location: the geographic location of the appliance.
- Username: the username created in Step 1.
- Password: the password created in Step 1.
- Leave the Splunk Enterprise Security instance? field blank. Note: Splunk ES alerts require review by Expel before enabling. Reach out to your Engagement Manager for details.
- Cloud: type the Splunk server address and port 8089. For example: https://<domainname>.splunkcloud.com:8089.
- On-prem: type the Splunk console IP address and port 8089. For example: https://10.10.10.10:8089/.
- Click Save.
After a few minutes, refresh the Security Devices page and you see your device status reporting as Healthy, or if there is an issue, you see details of what the issue may be.
To check if alerts are coming through, navigate to Alerts on the console page. Click the icon in the upper right to switch to grid view, then check the list for device alerts.