Monitor and correlate data for the Cisco Cloud Security Umbrella Splunk Add-On

Cisco Cloud Security Umbrella Add-On For Splunk

The Cisco Cloud Security Umbrella Add-On integrates your Umbrella event data with Splunk. The add-on reads data into the Splunk platform from your configured data sources.

This guide describes how to install the Cisco Cloud Security Umbrella Add-On for Splunk on your instance of Splunk (on-premises or cloud) and configure data inputs for Umbrella.

About the Cloud Security Umbrella Add-On

In the Cisco Cloud Security Umbrella Add-On, you configure data inputs for the types of events in your Umbrella organization. Then, Splunk indexes the data for the event types and displays the events on the Umbrella dashboards in Splunk.

In the add-on, set up these data inputs:

The Cisco Cloud Security Umbrella Add-On for Splunk is available at,

https://classic.splunkbase.splunk.com/app/5557/

What's New

Updates to the Cisco Cloud Security Umbrella Add-On for Splunk.

Cisco Cloud Security Umbrella Add-On Version 1.0.33

Prerequisites

Previous Releases

Information about previous Cisco Cloud Security Umbrella Add-On for Splunk software releases.

Cisco Cloud Security Umbrella Add-On Version 1.0.28

Prerequisites

Install Cloud Security Umbrella Add-On

  1. Navigate to Splunkbase at https://splunkbase.splunk.com/.
  2. Search for Cisco Cloud Security.
  3. Download and install the Cisco Cloud Security Umbrella Add-On.
  4. Restart your Splunk instance to complete the installation of the add-on.

Install Cloud Security Umbrella Add-On in Distributed Deployments

You can install the Cloud Security Umbrella Add-On in a distributed deployment of Splunk Enterprise, or any deployment where you use forwarders to retrieve your data. Depending on your environment and preferences, and the requirements of the add-on, you can install the add-on in multiple environments.

We recommend that you only install the Cisco Cloud Security Umbrella Add-On using the Splunk heavy forwarder and Splunk indexes.

Splunk Platform Component Support
Heavy Forwarder Best Practice.
Indexer Supported if no heavy forwarders are enabled.

Create New Inputs for Umbrella

Add an input and set up the integration of event data from your own or Cisco-managed S3 bucket with Splunk. Each line in a log file is processed and written to Splunk as a single event.

Note: We recommend that you provide a unique name for each input.
  1. Navigate to Application Settings.

  2. Accept the terms and conditions, and then click Submit.

    Splunk Terms and Conditions

  3. Navigate to Inputs, and then click Create New Input.

    Create New Input

  4. Enter a Name, Interval, Index, your AWS S3 bucket settings, Default Start Date, and Event Type.

    Application Settings History

  5. Repeat steps 1–4 to configure more data inputs.

Note: If you upgrade the Cisco Cloud Security Umbrella app, you must reenter the AWS Secret Access Key. We recommend that you do not edit the Default Start Date when you reenter the AWS Secret Access Key.

View Umbrella Events in Cloud Security Umbrella App

View your configured events in the Umbrella dashboard from the Cloud Security Umbrella App. For more information, see View Umbrella Dashboard.

Support

If you have questions about the Cisco Cloud Security Umbrella Add-On, contact Cisco Umbrella Support.