The Reach Security App For Splunk works with your Reach security products and can be instantly deployed on top of your Splunk implementation, allowing you to easily collect and share the information with Reach. The information collected enables Reach to help you and your team answer key strategic questions regarding risk in the organization and how best to configure and operate your current security investments to mitigate risk facing the organization.
Here is the functionality you can expect to find when using the Reach Security App For Splunk:
* Search, anonymize and export specific identity and security event logs from Splunk to Reach.
* Choose to download identify and security event logs from Splunk as a csv zip archive locally to be shared with the Reach product
This application can be set up in two ways:
1) Standalone Mode: Install the App on a single machine. This single machine would serve as a Search Head + Indexer + Heavy forwarder for this setup
2) Distributed Environment: Install App on search head for executing the search functionality.
Follow the below-listed steps to install an Add-on from the bundle:
1) Download the App package.
2) From the UI navigate to Apps->Manage Apps
.
3) In the top right corner select Install app from file
.
4) Select Choose File
and select the App package.
5) Select Upload
and follow the prompts.
6) We recommend you restart Splunk. Once Splunk has been restarted you may enjoy your new app!
Follow the below steps when upgrading from Reach Security App For Splunk
1) From the UI navigate to Apps->Manage Apps
.
2) In the top right corner select Install app from file
.
3) Select Choose File
and select the App package.
4) Check the upgrade option.
5) Select Upload
and follow the prompts.
6) Restart Splunk.
index="_internal" source="*reach*"
and check the results.$SPLUNK_HOME/var/log/splunk/reach_single_execution.log
or $SPLUNK_HOME/var/log/splunk/reach_periodic_execution.log
.To uninstall app, user can follow below steps: SSH to the Splunk instance Go to folder apps($SPLUNK_HOME/etc/apps) Remove the reach_security_app_for_splunk folder from apps directory Restart Splunk
Copyright (C) 2020 Reach Security, Inc. All rights reserved.
To search, anonymize and export specific identity and security event logs from Splunk
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.