Thank you for your feedback.
Form temporarily unavailable. Please try again or contact docfeedback@servicenow.com to submit your comments.
Versions
  • London
  • Kingston
  • Jakarta
  • Istanbul
  • Helsinki
  • Geneva
  • Store
Close

Get started with the Splunk- Incident Enrichment integration

Get started with the Splunk- Incident Enrichment integration

Splunk software searches, monitors, and analyzes machine-generated big data and integrates easily with Security Operations. Before you can use the Splunk - Incident Enrichment integration, you must activate the Security Operations Splunk Integration (com.snc.secops.splunk) plugin and add the appropriate API Base URL and login credentials.

Before you begin

Role required: admin
Important: If you have upgraded your instance from an earlier version, but prior to configuring the IBM QRadar - Incident Enrichment Integration, please contact ServiceNow support to manually activate the Core Automation API (com.snc.core.automation.api) plugin before attempting to configure this integration. The configuration will not function properly if this action is not taken.
Note: This procedure can be used to activate the plugin and configure the integration. You can also activate the plugin using the traditional method. If you activate the plugin using the traditional method, the Splunk- Incident Enrichment integration recognizes the installation and the integration card displays the New button. Proceed to step 5.

Procedure

  1. Access Splunk and obtain the API Key and API ID under your profile.
  2. Navigate to Security Operations > Integration Configuration.
    The available security integrations appear as a series of cards.
    Splunk - Incident Enrichment integration card
  3. In the Splunk - Incident Enrichment card, click Install Plugin.
  4. When the activation is complete, click Close & Reload Form.
    The Security Integration screen reloads, and the New button for the integration is available.
  5. Click New.
    Splunk - Incident Enrichment Configuration
  6. Fill in the fields, as needed.
    Field Description
    Name The name of this configuration.
    Splunk API Base URL The base URL you acquired from the Splunk site.
    Link URL [Optional] The Link URL that links to the Splunk web interface, when available.
    Username Your Splunk username.
    Password Your Splunk password.
    Max Rows The maximum number of rows you want to search.
    Earliest Result (days) The earliest results you want to see in number of days.
    Include raw data samples in search results Select this to include samples of raw data in your sightings search results. The amount of data returned depends on your setting in the number of rows of raw data property in Security Incident Response properties.
    MID Server Select Any to use any active MID Server, or select a specific MID Server name.
    Note: Configuring this integration activates workflows. To manage the workflows, navigate to the Workflow Editor.
  7. Click Submit.
    The integration configuration card displays.
  8. When viewing the new configuration card, you can click Configure or Delete to change or delete the configuration, respectively.
  9. To return to the original list of integration configuration cards, select No from the Show Configurations drop-down list.