icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading CloudKnox Add-on for Splunk
SHA256 checksum (cloudknox-add-on-for-splunk_100.tgz) 355412b073dd304196c21a7c91f209ae49ddf8cc3479f65d08ee6ae1bc87c701
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

CloudKnox Add-on for Splunk

Splunk AppInspect Passed
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
Overview
Details
CloudKnox Security created an App for Splunk, which helps enterprises eliminate the #1 risk to cloud infrastructure – accidental misuse and malicious exploitation of high-risk permissions.

On average, human and nonhuman identities use less than 1% of permissions granted. This dangerous, ever-expanding, delta, known as the Cloud Permissions Gap, causes unnecessary stress to IAM and cloud infrastructure teams. The CloudKnox Cloud Permissions Management Platform helps organizations reduce this gap, and improve their MTTR, by quickly identifying permissions, roles and activity across multi-cloud or hybrid cloud infrastructure.

The CloudKnox Add-on for Splunk collects "Permission Analytics Report" data from the CloudKnox platform. To visualize this data in Splunk dashboards, please install CloudKnox App for Splunk.

CloudKnox Add-on for Splunk

This is an add-on powered by the Splunk Add-on Builder.

OVERVIEW

The CloudKnox Add-on for Splunk collects "Permission Analytics Report" data from the CloudKnox platform. To visualize this data in Splunk dashboards, please install CloudKnox App for Splunk.

  • Author - CloudKnox, Inc.
  • Version - 1.0.0
  • Build - 21
  • Creates Index - False
  • Prerequisites - This application requires appropriate credentials for collecting data from CloudKnox
  • Compatible with:
    • Splunk Enterprise version: 7.3.x and 8.0.x
    • CloudKnox API v2
    • OS: Platform independent
    • Browser: Safari, Chrome and Firefox

RECOMMENDED SYSTEM CONFIGURATION

  • Standard Splunk configuration

TOPOLOGY AND SETTING UP SPLUNK ENVIRONMENT

  • This app has been distributed in two parts.

    1. CloudKnox Add-on for Splunk, which collects data from CloudKnox using REST API calls.
    2. CloudKnox App for Splunk, which adds dashboards to visualize the CloudKnox data
  • This app can be set up in two ways:

    1. Standalone Mode:
      • Install the CloudKnox App for Splunk and CloudKnox Add-on for Splunk.
      • The CloudKnox App for Splunk uses the data collected by CloudKnox Add-on for Splunk and builds dashboards on it.
    2. Distributed Environment:
      • Install the CloudKnox App for Splunk and CloudKnox Add-on for Splunk on the search head. User does not need to configure an account or create an input in CloudKnox Add-on for Splunk on search head.
      • Install only CloudKnox Add-on for Splunk on the heavy forwarder. User needs to configure account and needs to create data input to collect data from CloudKnox.
      • User needs to manually create an index on the indexer (No need to install CloudKnox App for Splunk or CloudKnox Add-on for Splunk on indexer).

INSTALLATION

CloudKnox Add-on for Splunk can be installed through UI using "Manage Apps" > "Install app from file" or by extracting tarball directly into $SPLUNK_HOME/etc/apps/ folder.

CONFIGURATION

1. Add CloudKnox Credentials

Navigate to CloudKnox Add-on for Splunk, click on "Configuration", go to "CloudKnox Credentials" tab, fill in the details asked and click "Save". Field descriptions are as below:

Field Name Field Description
CloudKnox URL* CloudKnox server URL
Service Account ID* CloudKnox service account ID
Access Key* Service account access key
Secret Key* Service account secret key

Note: * denotes required fields

2. Configure Proxy (Optional)

Navigate to CloudKnox Add-on for Splunk, click on "Configuration", go to "Proxy" tab, fill in the details asked and click "Save". Field descriptions are as below:

Field Name Field Description
Enable Enable/Disable proxy
Proxy Type* Type of proxy
Host* Hostname/IP Address of the proxy
Port* Port of proxy
Username Username for proxy authentication (Username and Password are inclusive fields)
Password Password for proxy authentication (Username and Password are inclusive fields)

Note: * denotes required fields

After enabling proxy, re-visit "CloudKnox Credentials" tab, fill in the details and click on "Save" to verify if proxy is in working state.

3. Configure Logging (Optional)

Navigate to CloudKnox Add-on for Splunk, click on "Configuration", go to "Logging" tab, select the prefered "Log level" value from the dropdown and click "Save".

4. Create Data Input

Navigate to CloudKnox Add-on, click on "Inputs", click on "Create New Input", fill in the details asked and click "Add". Field descriptions are as below:

Field Name Field Description
Name* Unique name for the data input
Interval* Time interval of input in seconds
Index* Index where data will be stored
Auth System Type* Auth system type to collect data from
Auth Systems* List of auth systems to collect data from

Note: * denotes required fields

OPEN SOURCE COMPONENTS AND LICENSES

Some of the components included in "CloudKnox Add-on for Splunk" are licensed under free or open source licenses. We wish to thank the contributors to those projects.

TROUBLESHOOTING

  • To troubleshoot CloudKnox Add-on for Splunk please check $SPLUNK_HOME/var/log/CloudKnox/*.log and $SPLUNK_HOME/var/log/splunk/ta_cloudknox.log log files.
  • To check the data collected by modinput in index use query like "index=<your_index_name> source=cloudknox"

UNINSTALL & CLEANUP STEPS

  • Remove $SPLUNK_HOME/etc/apps/TA-CloudKnox/
  • Remove $SPLUNK_HOME/var/log/TA-CloudKnox/
  • Remove $SPLUNK_HOME/var/log/splunk/ta_cloudknox.log
  • To reflect the cleanup changes in UI, Restart Splunk Enterprise instance

SUPPORT

Copyright (c) 2020 CloudKnox, Inc.

Release Notes

Version 1.0.0
Aug. 5, 2020

18
Installs
28
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.