Step 1: Enable console access
Having read-only access to the interface of your technology allows Expel to dig deeper when performing incident investigations. Our device health team uses this access to investigate potential health issues with your tech.
By following these steps, you create a user account for Expel that keeps the Expel activity separate from other activity on the Splunk console.
Note: The Expel Assembler needs access to the Splunk device or instance through port 8000 (UI) and 8089 (API). For cloud instances, request enablement of rest API and allowlisting Expel through Splunk support. Expel has 6 egress IP addresses. All requests to rest API come from 1 of 6 IP addresses. We’ve designed this so it can scale significantly without Expel needing to add new IP addresses to the list.
Create an admin account
- Log into Splunk.
- Navigate to Settings > Access Controls > Users.
- Click the +Add new button.
- For Name type Expel.
- For Full name type Expel SOC.
- For E-mail type firstname.lastname@example.org.
- For Time Zone select GMT (or UTC).
- For Assign to roles select User.
- Set the Password.
Note: After console access is established for Expel, the remaining onboarding steps for this technology can also be performed by Expel. Reach out to your Engagement Manager if this is needed and we're happy to complete the integration!
Step 2: Configure the technology in Workbench
Now that we have the correct access configured and have noted the credentials, we can integrate Splunk with Expel.
Register device in Expel Workbench
- In a new browser tab, log into https://workbench.expel.io.
- On the console page, navigate to Settings and click Security Devices.
- At the top right of the page, select Add Security Device.
- Search for and select Splunk.
- (Optional) Select an Assembler from the list with connectivity to the Splunk device. Select the assembler you set up in Step 2 of the Getting Started with Expel guide.
- For Name type the hostname of the Splunk device.
- For Location enter the geographic location of the appliance.
- For Username and Password enter the credentials used in Step 1.
- Leave the Es field blank. Splunk ES alerts require review by Expel before enabling. Reach out to your Engagement Manager for details.
- For Splunk on-premises enter the Splunk console IP address and port 8089. For example: https://10.10.10.10:8089/.
- For Splunk Cloud enter the Splunk server address and port 8089. For example: https://<domainname>. splunkcloud.com:8089.
- Click Save.
After a few minutes, refresh the Security Devices page and you see your device status reporting as Healthy, or if there is an issue, you see details of what the issue may be.
To check if alerts are coming through, navigate to Alerts on the console page. Click the icon in the upper right to switch to grid view, then check the list for device alerts.