Splunk app for Wazuh

Wazuh app for Splunk offers an UI to visualize Wazuh alerts and API data. Wazuh helps you to gain deeper security visibility into your infrastructure by monitoring hosts at an operating system and application level.

Installation

  1. Download the latest Splunk app for Wazuh:
curl -o SplunkAppForWazuh.tar.gz https://packages.wazuh.com/3.x/splunkapp/v3.3.0_7.1.1.tar.gz
  1. Install the Splunk app for Wazuh:

The app uses the /SplunkAppForWazuh/default/indexes.conf file to create an index named ‘wazuh’ and /SplunkAppForWazuh/default/inputs.conf file to listen to forwarded data on port 9997.

Warning

In case you have an Indexer cluster, first delete indexes.conf and inputs.conf files to avoid index creation in the current instance, then install the app on the Search Head and configure a ‘wazuh’ index following the Splunk official documentation .

  1. CLI mode:
# /opt/splunk/bin/splunk install app SplunkAppForWazuh.tar.gz
# /opt/splunk/bin/splunk restart
  1. Web GUI:
Apps -> Manage apps -> install app from file
  1. Open Splunk in your desired browser and click on the Wazuh app icon:
../../_images/appconf-0.png
  1. Fill in the Username and Password fields with your credentials; you can get more information about how to do this at Securing the Wazuh API. Enter http(s)://MANAGER_IP for the URL where MANAGER_IP is the Wazuh manager IP address and use “55000” for the Port:

You can check the connection by pressing ‘Check connection’ button below the API list. A successful message appears in the right bottom corner:

Now that you’ve finished installing Splunk app for Wazuh, you can setup forwarders following the next page.