Splunk App v2.0.0 - Troubleshooting
Frequently Asked Questions
- What features are included with the new Splunk app?
- For the full list of features available in the current version of the app, view the details on SplunkBase.
- Highlights of the features in this app:
- Data Inputs
- Support for high volume, low latency Alerts, Endpoint Events and Watchlist Hits via the Data Forwarder
- Support for Alerts, Audit Logs, Live Query Results, Vulnerability Assessment data and Auth Events via a built-in input using the Carbon Black Cloud APIs
- Supported on Splunk 9.1, 9.0, 8.2, 8.1, Splunk Cloud, and Splunk ES 6.x
- Proxy and Multi-tenancy
- Enables alert actions & adaptive response to automate context gathering and remediation
- For example, if Carbon Black Cloud detects LSASS memory scraping, automatically get the logged in users and move the device to a more restrictive policy
- Data Inputs
- Is there is a way to bring in the Carbon Black Cloud audit logs to Splunk?
- Yes. See Audit Logs under the Input Configuration
- Do we have a document outlining how to install & configure the new version of Splunk for Carbon Black Cloud?
- Installation and Configuration
- Release Notes - How to Upgrade from Version 1.x
- User Guide
- A video demoing the configuration will be available soon!
- Is it a requirement to use the data forwarder?
- The Forwarder is the recommended approach for ingesting Alerts, Endpoint Events and Watchlist Hits into Splunk due to its reliability, scale, and low latency. This approach is required to ingest Endpoint Event and Watchlist Hit data.
The alternative is to use the built-in inputs packaged with the VMware Carbon Black Cloud App or Input Add-on, which leverages the Carbon Black Cloud REST APIs. This approach supports ingesting the Observations associated with relevant Alert types through an Alert Action.
- The Forwarder is the recommended approach for ingesting Alerts, Endpoint Events and Watchlist Hits into Splunk due to its reliability, scale, and low latency. This approach is required to ingest Endpoint Event and Watchlist Hit data.
- Can the VMware Carbon Black Cloud Splunk App ingest only the Alerts and not the event data or the audit information?.
- The app does not require all of the data however parts of the dashboards may not be available if it relies on data types that are not ingested.
-
What is the URL that we should be using for API configuration?
- When configuring the Carbon Black Cloud Environment URL for API Token Configuration, use the dashboard URL without the
https://
Full detail on the URLs for each environment are available here.
- When configuring the Carbon Black Cloud Environment URL for API Token Configuration, use the dashboard URL without the
- We are using an earlier Splunk TA which was last updated in 2015. Do you know if and when a new Splunk TA will be updated?
- A new VMware Carbon Black Cloud app available on SplunkBase supports distributed environments and includes new Input and Technology add-ons.
Customers who are on Splunk 8.0+ should move to the new app to take advantage of improved data ingest options and a larger range of adaptive response features. Customers on Splunk 7.0 should upgrade the version of Splunk to use the new Carbon Black Cloud app.
- A new VMware Carbon Black Cloud app available on SplunkBase supports distributed environments and includes new Input and Technology add-ons.
- Is there a limit to the number of alerts that are pulled from the API on each sync when using the built-in Input?
- Yes,
10,000
If your organization has more than 10,000 alerts each polling interval, you can:- Tune alerts to reduce overall alert volume
- CB Analytics alerts that are known-good in your environment can be tuned from the Carbon Black Cloud console using the
Close all future alerts
functionality - Follow recommendations from our Threat Research team here
- CB Analytics alerts that are known-good in your environment can be tuned from the Carbon Black Cloud console using the
- Modify the configured Alert Input
- Increase the minimum severity
- Use the Query to filter out alerts you aren’t finding value in
- Change the polling interval from the default of 300 seconds to 120 or 60 seconds.
- Switch to ingesting Alerts via the Forwarder
- Tune alerts to reduce overall alert volume
- Yes,
- Is there a limit to the number of Audit Logs that are pulled on each sync?
- Yes,
2500
.
- Yes,
- What version of Splunk is supported for Carbon Black Cloud?
- Splunk version
8.1 or higher
. If you are using Splunk version 7.x, you will need to upgrade the version of Splunk to use the new Carbon Black Cloud app.
- Splunk version
- Do we have any Splunk documentation to reference for customers that wish to ingest the Carbon Black Cloud Data Forwarder data into Splunk?
- Configuring the forwarder for Events, Alerts and Watchlist Hits is available here.
- An end-to-end configuration video is available on the Carbon Black User Exchange
- A step-by-step guide on configuring ingest from an AWS S3 bucket to Splunk
- Data Forwarder Configuration API Documentation
- Does the app use the Splunk CIM?
- Yes, it uses the
Event
andAlert
models from the Splunk CIM.
- Yes, it uses the
- Is the app certified by Splunk?
- The app has been verified by AppInspect and is under assessment for Splunk Cloud.
- What is the difference between the
Message Time
andTimestamp
field in Splunk?- Carbon Black Cloud alerts and events contain a variety of timestamps to provide insight into various stages of the data. For example, an alert will contain the timestamp of when the first event was detected as well as the most recent alert update.
The App/TA will extract the most relevant timestamp field into the standard Splunk_time
field.
Descriptions of each timestamp can be found on the Developer Network documentation:
- Carbon Black Cloud alerts and events contain a variety of timestamps to provide insight into various stages of the data. For example, an alert will contain the timestamp of when the first event was detected as well as the most recent alert update.
- I’m not seeing the data I expect to be ingested.
- Check the
Administration
–>Application Health Overview
tab in the VMware Carbon Black Cloud application for errors.
- Check the
- If you received one of the following errors:
Received error code 403
,401 Unauthorized
,User is not authenticated
orCheck your API credentials
- Check the configuration of API Token Configurations
- Check the API key Access Level is correct. From App v2.0.0 onwards, all APIs use an API key with an Access Level of type Custom.
- In the Carbon Black Cloud console, and that the correct permissions are assigned to the Access Level and that the Access Level is assigned to the API Key being used for the Splunk data input or alert action. See Authentication & Authorization for more information.
- Check the configuration of API Token Configurations
- How can I get support for problems I’m having with the App?
- The Carbon Black Cloud Splunk App is supported by Carbon Black; if you have a problem, open a support ticket like you would any other Carbon Black Cloud issue.
- The Carbon Black Cloud Splunk App is supported by Carbon Black; if you have a problem, open a support ticket like you would any other Carbon Black Cloud issue.
- If you are seeing the error message
More than 1 VMware CBC App detected
- Refer to the Deployment Guide for which Apps/Add-ons should be installed on which node and fully delete (not just disable) extra copies of VMware CBC apps/add-ons from nodes where they are not needed. Then restart Splunk on that node.
-
Received network connection error from …
Ensure the hostname configured with your API token on the
Application Configuration
->API Token Configuration
page does not includehttps://
or a trailing slash. For more details verifying your URL see the Authentication GuideAre you using a proxy?
- The Proxy tab is configured in accordance with your proxy
- The Input or Alert Action is configured to use that proxy
- Restart Splunk
If the issue persists, check your proxy logs to see if there are requests from the Splunk server.
- Command line or username not available in the Alert
- See the Investigating CB Analytics Alerts query on Tech Zone.
Support
- View all API and integration offerings on the Developer Network along with reference documentation, video tutorials, and how-to guides.
- Use the Developer Community Forum to discuss issues and get answers from other API developers in the Carbon Black Community.
- Report bugs and change requests to Carbon Black Support.
Last modified on April 29, 2024