{"title": "Splunk setup for Workbench", "url": "https://support.expel.io/hc/en-us/articles/1500002872702-Splunk-setup-for-Workbench", "date": "2021-02-17T20:44:48Z", "contents": "By following these steps, you create a user account for Expel that keeps the\nExpel activity separate from other activity on the Splunk console.\n\n### Note\n\nExpel needs access to the Splunk device or instance through port 8000 (UI) and\n8089 (API). For cloud instances, follow the Splunk Configure IP Allow List\ninstructions to grant Expel these access privileges:\n\n * Search head API access\n\n * Search head UI access\n\nExpel has 6 egress IP addresses. All requests to rest API come from 1 of 6 IP\naddresses. We’ve designed this so it can scale significantly without Expel\nneeding to add new IP addresses to the list.\n\n * 34.75.13.114/32\n\n * 34.75.152.7/32\n\n * 35.243.190.98/32\n\n * 104.196.158.205/32\n\n * 34.75.81.28/32\n\n * 34.75.210.18/32\n\n#### In this article\n\n * Step 1: Enable console access\n\n * Step 2: Configure the technology in Workbench\n\n * Step 3: Edit the device to add console access\n\n## Step 1: Enable console access\n\nHaving read-only access to the interface of your technology allows Expel to\ndig deeper during incident investigations. Our device health team uses this\naccess to investigate potential health issues with your tech.\n\n### Note\n\nExpel secures all login information our SOC analysts need about your devices\nin a MFA password product. Access to this login information is protected using\nour internal MFA processes. To learn more about the IP addresses all Expel\ntraffic comes from, go here.\n\n 1. Log into Splunk.\n\n 2. Navigate to Settings > Access Controls > Users.\n\n 3. Click the +Add new button.\n\n 4. Fill in the following information:\n\n * For Name type Expel.\n\n * For Full name type Expel SOC.\n\n * For Email address type soc@expel.io.\n\n * Set the Password.\n\n * For Time Zone select GMT (or UTC).\n\n * For Assign roles select User.\n\n * Clear Require password change on first login.\n\n 5. Click Save.\n\n### Tip\n\nAfter console access is established for Expel, the remaining onboarding steps\nfor this technology can also be performed by Expel. Reach out to your\nengagement manager if this is needed and we're happy to complete the\nintegration!\n\n## Step 2: Configure the technology in Workbench\n\nNow that we have the correct access configured and noted the credentials, we\ncan integrate your tech with Workbench.\n\n 1. Go to https://workbench.expel.io/settings/security-devices?setupIntegration=splunk.\n\n 2. If your installation is on premises ( **On-prem** ), then select the Assembler connected to the Splunk device. This is the assembler you set up in How to provision Expel Assembler.\n\n![mceclip0.png](https://support.expel.io/hc/article_attachments/6758580851987/uuid-1d7afaa0-708c-fc08-e069-46708fc1fe20.png)\n\n 3. Fill in the following information:\n\n![mceclip2.png](https://support.expel.io/hc/article_attachments/6758682390675/uuid-9683d0bc-8faa-9a5a-d373-c47b87f27c83.png)\n\n * Name: the hostname of the Splunk device.\n\n * Location: the geographic location of the appliance.\n\n * Username: the username created in Step 1.\n\n * Password: the password created in Step 1.\n\n * Leave the Splunk Enterprise Security instance? field blank.\n\n### Note\n\nIntegration_Vendors: Splunk Enterprise Security alerts require review by Expel\nbefore enabling. Reach out to your engagement manager for details.\n\n * Server address:\n\n * Cloud: type the Splunk server address and port 8089. For example: https://.splunkcloud.com:8089.\n\n * On-prem: type the Splunk console IP address and port 8089. For example: https://10.10.10.10:8089/.\n\n 4. Click Save.\n\n 5. You can provide console access now or set it up later. Use the instructions below to set it up later.\n\nYou can see if the device is healthy on the Security Devices page. It may take\na few minutes to see the device listed as healthy.\n\nTo check if alerts are coming through, navigate to the Alerts Analysis page.\nScroll to the device you want to check and click View alerts. Switch to grid\nview, then check the list for device alerts. It can take 36 to 72 hours for\nalerts to appear after setup, as we tune your device.\n\n## Step 3: Edit the device to add console access\n\nExpel needs console access to your device to allow our SOC analysts to dig\ndeeper during incident investigations. Additionally, our engineering teams use\nthis access to investigate potential health issues, including proper alert\ningestion.\n\n### Note\n\nExpel secures all login information our SOC analysts need about your devices\nin a MFA password product. Access to this login information is protected using\nour internal MFA processes. To learn more about the IP addresses all Expel\ntraffic comes from, go here.\n\n 1. Open Workbench. Go to Organization Settings > Security Devices. Next to the device you just connected, click the down arrow and click Edit.\n\n 2. In the Console Login area, type these details:\n\n * Console URL: type the console URL from the Server address in the Connection Settings area above. At the end of the URL, type **/login**.\n\n * Username: type the user name you created above.\n\n * Password: type the password you created above.\n\n * Two-factor secret key (32-character code): depending on how your organization enforces log-ins, this field may not apply to you. In these cases, you can leave it blank. This field is optional and if you have questions or concerns, reach out to your engagement manager or to support.\n\n 3. Click Save.\n\n### Tip\n\nThis article was accurate at the time of writing, but changes happen. If you\nfind the instructions are outdated, leave a description in the comment field\nbelow and let us know!\n\n"}