Version 3.2.2
Version 3.2.1
Version 3.2.0
Version 3.1.0
Version 3.0.0
Version: 2.3.0
Version: 2.2.2
Version: 2.2.1
Version: 2.2.0
Version: 2.1.0
Version: 2.0.2
Version: 2.0.1
Version: 2.0.0
This app has been distributed in two parts.
1) Add-on app, which listens for Syslog messages from Illumio PCE and collects Illumio metadata using REST API Calls.
2) The main app for visualizing Illumio PCE data.
This App can be set up in two ways:
1) Standalone Mode:
Install the main app and Add-on app.
2) Distributed Environment:
a) With heavy forwarder
Install the main app and Add-on app on search head. Add-on app on heavy forwarder.
* Configure Add-on app on heavy forwarder.
* The main app on search head uses the received data and builds dashboards on it.
b) With Splunk Universal Forwarder
Install the main app and Add-on app on search head. Add-on app on universal forwarder and indexer.
1. Configure Splunk Universal Forwarder to collect data from Illumio Server.
* TCP SSL configuration
* Create TCP-SSL stanza in $SPLUNK_HOME/etc/system/local/inputs.conf file.
```
[tcp-ssl://<PORT>]
index=<INDEX-NAME>
sourcetype=illumio:pce
```
* Then Create a SSL stanza in $SPLUNK_HOME/etc/system/local/inputs.conf file.
```
[SSL]
serverCert = <path>
sslPassword = <password>
```
* To use Splunk default certificate add
```
[SSL]
serverCert = $SPLUNK_HOME/etc/auth/server.pem
sslPassword can be found in $SPLUNK_HOME/etc/system/local/server.conf or $SPLUNK_HOME/etc/system/default/server.conf under [sslConfig]
stanza
```
* Restart Splunk.
* If you are using on-prem Splunk instance and you want to configure TCP instead of TCP-SSL follow below steps:
* Remove -SSL from TCP-SSL stanza in $SPLUNK_HOME/etc/system/local/inputs.conf file.
* Restart Splunk.
2. Configure the Splunk Universal Forwarder to send the data to Splunk Indexer.
* Execute below command on SUF.
* $SPLUNK_HOME/bin/splunk add forward-server <IP>:<PORT> (Splunk Indexer IP and Listening Port)
3. Configure Splunk Indexer to receive data from SUF.
* Create below stanza in $SPLUNK_HOME/etc/system/local/inputs.conf file.
```
[splunktcp://<PORT>]
```
This app can be installed through UI using "Manage Apps" or from the command line using the following command:
sh
$SPLUNK_HOME/bin/splunk install app $PATH_TO_SPL/TA-Illumio.spl/
User can directly extract SPL file into $SPLUNK_HOME/etc/apps/ folder.
To collect sample data, the user needs to place eventgen.conf at the following location:
To get the required eventgen.conf, contact over provided support email below.
For TCP SSL configuration follow the below steps:
1) Create a SSL stanza in $SPLUNK_HOME/etc/apps/<app_name>/local/inputs.conf file.
[SSL]
serverCert = <path>
sslPassword = <password>
2) To use Splunk default certificate add
[SSL]
serverCert = $SPLUNK_HOME/etc/auth/server.pem
sslPassword can be found in $SPLUNK_HOME/etc/system/local/server.conf or $SPLUNK_HOME/etc/system/default/server.conf under [sslConfig]
stanza
3) Restart Splunk.
If you want to configure TCP instead of TCP-SSL follow below steps:
1) Remove -SSL from TCP-SSL stanza in $SPLUNK_HOME/etc/system/local/inputs.conf file.
2) Restart Splunk.
If you want to collect data over secure network with certificate check follow below steps:
Steps to get root certificate:
1) Copy the URL of Illumio and paste it into your browser. These instructions are for Firefox.
2) Click View Page Info > Security > View Certificate > Details.
3) Click on the root certificate.
4) Export PEM file and use it in the configuration.
NOTE : Some dashboards/panels in the Illumio app may not populate when input is configured with SaaS PCE. Please refer to App's readme to check the list of affected dashboards.
Follow the below steps to check the connection with Illumio Server.
To uninstall an add-on, user can follow below steps: SSH to the Splunk instance -> Go to folder apps ($SPLUNK_HOME/etc/apps) -> Remove the TA-Illumio folder from apps directory -> Restart Splunk
Copyright 2021 Illumio, Inc. All rights reserved.
Fix SaaS Supercluster validation error introduced in 3.2.0 on /health API enpoint, resulting in missing content for
/opt/splunk/etc/apps/TA-Illumio/local/inputs.conf
/opt/splunk/etc/apps/IllumioAppForSplunl/local/inputs.conf
-Removed "eventgen.conf" file, which was used to generate dummy data Splunk for demos.
Illumio Add-on For Splunk v3.1.0
Made TCP-SSL as a default to resolve the Splunk Cloud issue
Added python.version flag to resolve the Splunk Cloud issue
Modified data collection code to handle 503 errors changes
Removed extra forward slash from the API call
* Compatibility with Illumio v20.1, v19.3.2 and 18.2.5
Splunk v8 Support
Made Add-on Python23 compatible
Changed Illumio API version from v1 to v2
Added support of ingesting data from S3
Added two API calls, services and ip_lists, for Alert Configuration dashboard
Added some field extraction for Alert Configuration dashboard
Changed time extraction and used timestamp field for _time
Fixed the issue with saving the new data input on Data Inputs page.
Extracted pce_fqdn field for "illumio:pce:metadata" source type
Removed "IP Adress of PCE Node" field from Data Inputs page
Added "Hostname of PCE Node" field on Data Inputs page
Extracted new fields for source and destination labels
Added encryption for "API Secret"
Added Validation for "Allowed port scanner Source IP addresses"
Removed "dnslookup" custom command
Added support of both string and integer for PD field
Documented steps of configuration for SUF
Certified Addon/App with Illumio v18.3.1 and v19.1
Added support of JSON data format for Illumio Cloud data
Added test script to check the connection with Illumio server
Updated the search time of single value panels to last 60 minutes with a trend line of 24 hours in Security Operations dashboard
Minor Bug Fixes in the panels "Top Workloads with" and "Managed VEN by Operating System"
Fixed the bug related to label filter not considering label type while searching for traffic data in Security Operations dashboard
Fixed the issue of fqdn in host_details_lookup table when PCE URL contains special characters.
Support for PCE versions 18.1 and 18.2
Adaptive Response Action
Accept Public/Private IPs of PCE as Modular Input.
PCE Hostnames now available with Syslog Data.
App cert Failure Update for Checking the batch input
PCE V17.2 Support
Minor Bug Fixes
Alert Action
The Illumio Technology Add-On for Splunk enriches Illumio Policy Compute Engine (PCE) data with Common Information Model (CIM) field names, event types and tags.
This add-on enables Illumio PCE data to be used with Splunk Enterprise Security, Splunk App for PCI Compliance, etc.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.