Skip to content

Splunk TA for alert action to TheHive-project

License

Notifications You must be signed in to change notification settings

steoleary/TA-thehive

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TA-thehive

This add-on is designed to add alert action on Splunk to create alerts in The Hive

Installation

This app is designed to run on Splunk Search Head(s) on Linux plateforms

  1. Download this file which is the Splunk TA ( it is an archive containing the sub-directory TA-thehive)
  2. Install the app on your Splunk Search Head(s): "Manage Apps" -> "Install app from file"
  3. A custom endpoint has been defined so you need to restart Splunk (for later updates, you may skip this step)
  4. At next logon, you should be invited to configure the app (if not go to Manage Apps > TA-thehive > Set up)
    • provide the url to the API of your instance;
    • provide the authkey.
    • check the box to verify cert
    • check the box to use a proxy
    • (optional) provide proxy settings
  5. the configuration is saved in local/thehive.conf and in one row of lookups/thehive_instances.csv
  6. lookups/thehive_instances.csv can be edited to add other TheHive instances. You can select them in the alert configuration form by providing the instance name.

Use Cases

Here some activities you may carry out more easily with this app.

Hunting in Splunk logs

saved searches in Splunk > on match create an alert on TheHive or (later) any security incident response platform of your choice.

Usage

Splunk alerts to create TheHive alerts

Credits

The alert_action for TheHive is inpired by this Splunk app

Licence

This app TA-thehive is licensed under the GNU Lesser General Public License v3.0.

About

Splunk TA for alert action to TheHive-project

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 81.7%
  • HTML 18.3%