Configure Splunk to forward alerts to Radiant Security
Overview
Splunk is a big data solution that provides security information and event management (SIEM) capabilities for on-premises and cloud environments. After the completion of this guide, Radiant Security will receive alerts configured in your Splunk environment and later on triage them.
To do this, you’ll need to complete the following steps:
Prerequisites
- Splunk Enterprise, Splunk Enterprise Security, or Splunk Cloud
- Admin or Power User access level
Add the data connector in Radiant Security
Configure the webhook allow list
In this step, you will configure an allow list depending on whether you use Splunk Enterprise or Splunk Cloud.
Splunk Enterprise
- In
$SPLUNK_HOME/etc/system/local
, edit the alert_actions.conf file. If the alert_actions.conf file does not exist, you can create it. - In the
[webhook]
section, add the following entry for Radiant Security:[webhook]
allowlist.webhook1 = ^https:\/\/.*blastradius.*
enable_allowlist = true
Splunk Cloud
- In Splunk Web, click Settings > Server settings > Webhook allow list.
- Enter a label for the endpoint (e.g.
radiant_connector
). - Enter the following regex pattern for the URI:
blastradius
Configure alert actions
- Navigate to Apps > Search & Reporting > Alerts.
- For each rule you want to forward notifications to Radiant Security, do the following:
- Click Edit > Edit Alert.
- Scroll down to Trigger Actions.
- Click Add Actions and select Webhook.
- On the Webhook action, for URL enter the Webhook URL that you copied from Radiant Security’s page.
- Click Save.
We value your opinion. Did you find this article helpful? Share your thoughts by clicking here or reach to our Product and Customer Success teams at support@radiantsecurity.ai
Last updated: 2024-08-23