Integrate Reveal(x) 360 with Splunk

This integration enables you to view network threat detections and behavioral insights from Reveal(x) 360 in Splunk.

To configure this integration, you must create Splunk credentials and then add them to the configuration of the ExtraHop Add-On for Splunk.

System requirements

ExtraHop Reveal(x) 360

  • Your user account must have privileges on Reveal(x) 360 for System and Access Administration.
  • Your Reveal(x) 360 system must be connected to an ExtraHop sensor with firmware version 8.8 or later.
  • Your Reveal(x) 360 system must be connected to ExtraHop Cloud Services.

Splunk

  • You must have Splunk version 8.1 or later.

Create Splunk integration credentials

  1. Log in to Reveal(x) 360.
  2. Click the System Settings icon and then click Integrations.
  3. Click the Splunk tile.
  4. Click Create Credential.
    The page displays the generated ID and secret.
  5. Copy and store the ID and secret, which you will need to configure the ExtraHop Add-On for Splunk.
  6. Click Done.
The credential is also added to the ExtraHop REST API Credentials page where you can view the credential status, copy the ID, or delete the credential.

Install and configure the ExtraHop Add-On for Splunk

  1. Download the ExtraHop Add-On for Splunk from the SplunkBase site.
  2. Install and configure the add-on according to the following documentation:
  3. In the following configuration fields, enter the credentials you created and copied for the Splunk integration:
    • Client ID
    • Client Secret

Next steps

Export Reveal(x) 360 detections and metrics and view them in Splunk according to the instructions in the ExtraHop Add-On for Splunk Details.
Last modified 2023-11-07