By following these steps, you create a user account for Expel that keeps the Expel activity separate from other activity on the Splunk console.

Note

Expel needs access to the Splunk device or instance through port 8000 (UI) and 8089 (API). For cloud instances, follow the Splunk Configure IP Allow List instructions to grant Expel these access privileges:

  • Search head API access

  • Search head UI access

Expel has 6 egress IP addresses. All requests to rest API come from 1 of 6 IP addresses. We’ve designed this so it can scale significantly without Expel needing to add new IP addresses to the list.

Caution

Make sure to add the egress IPs to your existing allow list. Otherwise, this configuration only allows access to your Splunk environment from the Expel infrastructure.

Step 1: Enable console access

Note

Expel secures all login information our SOC analysts need about your devices in an MFA password product. Access to this login information is protected using our internal MFA processes. To learn more about the IP addresses all Expel traffic comes from, go here.

  1. Log into Splunk.

  2. Navigate to Settings > Access Controls > Users.

  3. Click the +Add new button.

  4. Fill in the following information:

    • For Name type Expel.

    • For Full name type Expel SOC.

    • For Email address type soc@expel.io.

    • Set the Password.

    • For Time Zone select GMT (or UTC).

    • For Assign roles select User.

    • Clear Require password change on first login.

Tip

After console access is established for Expel, the remaining onboarding steps for this technology can also be performed by Expel. Reach out to your engagement manager if this is needed and we're happy to complete the integration!

Step 2: Configure the technology in Workbench

  1. Go to https://workbench.expel.io/settings/security-devices?setupIntegration=splunk.

  2. If your installation is on premises (On-prem), then select the Assembler connected to the Splunk device. This is the assembler you set up in How to provision Expel Assembler.

    mceclip0.png
  3. Fill in the following information:

    mceclip2.png
    • Name: the hostname of the Splunk device.

    • Location: the geographic location of the appliance.

    • Username: the username created in Step 1.

    • Password: the password created in Step 1.

      Note

      Expel manages Basic authentication by passing the Splunk username and password combination in an API request. The following code snippet shows how these values are passed:

      import splunklib.client as client
      service = client.connect(host=<host_url>, username=<username>, password=<password>, autologin=True)

      Expel also supports Splunk API tokens for non-Basic authentication support, which you can create using Splunk documentation.

    • Leave the Splunk Enterprise Security instance? field blank.

      Note

      Integration_Vendors: Splunk Enterprise Security alerts require review by Expel before enabling. Reach out to your engagement manager for details.

    • Server address:

      • Cloud: type the Splunk server address and port 8089. For example: https://<domainname>.splunkcloud.com:8089.

      • On-prem: type the Splunk console IP address and port 8089. For example: https://10.10.10.10:8089/.

  4. You can provide console access now or set it up later. Use the instructions below to set it up later.

Tip

This article was accurate at the time of writing, but changes happen. If you find the instructions are outdated, leave a description in the comment field below and let us know!