The Illumio Add-on for Splunk integrates with the Illumio Policy Compute Engine (PCE). It enriches Illumio data with Common Information Model (CIM) fields for compatibility with other Splunk products and add-ons.
Supported Splunk versions
* 9.3.x
* 9.2.x
* 9.1.x
* 9.0.x
* 8.2.x
* 8.1.x
Supported versions of the Illumio Policy Compute Engine (PCE)
* 21.5.x
* 22.2.x
* 22.5.x
* 23.2.x
* 23.5.x
* 24.2.x
* Illumio SaaS PCE (latest)
Supported Splunk Common Information Model (CIM) versions
* 4.x
* 5.x
Supported Splunk versions
* 8.1.x
* 8.2.x
* 9.0.x
* 9.1.x
Supported versions of the Illumio Policy Compute Engine (PCE)
* 21.5.x
* 22.2.x
* 22.5.x
* 23.2.x
* Illumio SaaS PCE (latest)
Supported Splunk Common Information Model (CIM) versions
* 4.x
* 5.x
The TA-Illumio
add-on can be installed in either a standalone or distributed Splunk environment.
Note: Recommendations for the configuration and topology of a distributed Splunk environment are outside the scope of this document. See the documentation on Splunk Validated Architectures for suggestions on topology for distributed deployments.
For a standalone deployment, install and configure the TA as described in the Installation section below.
For a distributed environment, install the TA to a Splunk Heavy Forwarder.
Note: The
TA-Illumio
add-on cannot be installed on a Universal Forwarder.
http://
PCE URLs to meet Splunk Cloud compatibility criteriaillumio_workloads
collection and lookup definitionsillumio_quarantine_workload
role definition from the app to the TAIMPORTANT: Due to this change, the search-time extractions and transforms for version 4.0.0 are incompatible with data indexed by previous versions of the TA. See the v4.0.0 upgrade steps above for more detailed instructions for upgrading from an earlier version.
New Features
[tcp]
or [tcp-ssl]
when creating a new TCP stanza for receiving syslog eventsImprovements
markquarantine
alert action has been renamed illumio_quarantine
, and can now be configured with any number of label dimensionsIllumio
input accepts a list of label key:value pairs that form the quarantine policy scope on the PCE. See the workload quarantine action section above for detailsRemoved Features
passwords.conf
now happens via the Splunk REST API when saving the inputillumio.conf
custom configuration file has been removedTA-Illumio/bin
:IllumioUtil.py
- replaced with illumio_pce_utils.py
and illumio_splunk_utils.py
get_data.py
- the TA now uses the illumio
python library for the PCE API clientlib/
and splunklib/
- python libs have been moved under TA-Illumio/lib
markquarantine.py
- renamed illumio_quarantine.py
as the markquarantine
action has been renamed illumio_quarantine
Note: By default, KV store replication is disabled for these object stores. It is up to the Splunk administrators to determine if replication is necessary for their environments, and override the local collections.conf with
replicate = true
* Similarly, port scan details are written to the **illumio_port_scan_settings** collection rather than being indexed as events
$SPLUNK_HOME/var/log/TA-Illumio
log directory has been removed. TA logs are now sent to splunkd.log
per Splunk best practices for modular inputsSee the EULA document on the Illumio Integrations docs site.
Copyright 2023 Illumio, Inc. All rights reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
This version is aimed to support copying kvstore across to search heads on Splunk Enterprise.
IMPORTANT: In v4.0.0/4.0.1, syslog prefixes are stripped at index-time for JSON-formatted events. Due to this change, search-time extractions and transforms for v4.0.x are incompatible with data indexed by previous TA versions. See [v4.0.0 upgrade steps] in the README for details.
http://
PCE URLs to meet Splunk Cloud compatibility criteriaillumio_workloads
collection and lookup definitionsillumio_quarantine_workload
role definition from the App to the TA[tcp]
or [tcp-ssl]
when creating a new TCP stanza for receiving syslog eventsVersion 3.2.3
* Update Splunk SDK version to latest (1.7.3)
Version 3.2.2
* Added support for SaaS PCE.
Version 3.2.1
* Removed eventgen.conf from "Illumio Add-on for Splunk" package.
Version 3.2.0
* Modified data collection code to support the supercluster.
* Added supercluster_members.conf file to add members of the supercluster.
* Added "leader_fqdn" field in events only if configured PCE is part of the supercluster.
* Made port number field to be optional during input configuration..
* Enhanced CIM field extractions.
Fix SaaS Supercluster validation error introduced in 3.2.0 on /health API enpoint, resulting in missing content for
/opt/splunk/etc/apps/TA-Illumio/local/inputs.conf
/opt/splunk/etc/apps/IllumioAppForSplunl/local/inputs.conf
-Removed "eventgen.conf" file, which was used to generate dummy data Splunk for demos.
Illumio Add-on For Splunk v3.1.0
Made TCP-SSL as a default to resolve the Splunk Cloud issue
Added python.version flag to resolve the Splunk Cloud issue
Modified data collection code to handle 503 errors changes
Removed extra forward slash from the API call
* Compatibility with Illumio v20.1, v19.3.2 and 18.2.5
Splunk v8 Support
Made Add-on Python23 compatible
Changed Illumio API version from v1 to v2
Added support of ingesting data from S3
Added two API calls, services and ip_lists, for Alert Configuration dashboard
Added some field extraction for Alert Configuration dashboard
Changed time extraction and used timestamp field for _time
Fixed the issue with saving the new data input on Data Inputs page.
Extracted pce_fqdn field for "illumio:pce:metadata" source type
Removed "IP Adress of PCE Node" field from Data Inputs page
Added "Hostname of PCE Node" field on Data Inputs page
Extracted new fields for source and destination labels
Added encryption for "API Secret"
Added Validation for "Allowed port scanner Source IP addresses"
Removed "dnslookup" custom command
Added support of both string and integer for PD field
Documented steps of configuration for SUF
Certified Addon/App with Illumio v18.3.1 and v19.1
Added support of JSON data format for Illumio Cloud data
Added test script to check the connection with Illumio server
Updated the search time of single value panels to last 60 minutes with a trend line of 24 hours in Security Operations dashboard
Minor Bug Fixes in the panels "Top Workloads with" and "Managed VEN by Operating System"
Fixed the bug related to label filter not considering label type while searching for traffic data in Security Operations dashboard
Fixed the issue of fqdn in host_details_lookup table when PCE URL contains special characters.
Support for PCE versions 18.1 and 18.2
Adaptive Response Action
Accept Public/Private IPs of PCE as Modular Input.
PCE Hostnames now available with Syslog Data.
App cert Failure Update for Checking the batch input
PCE V17.2 Support
Minor Bug Fixes
Alert Action
The Illumio Technology Add-On for Splunk enriches Illumio Policy Compute Engine (PCE) data with Common Information Model (CIM) field names, event types and tags.
This add-on enables Illumio PCE data to be used with Splunk Enterprise Security, Splunk App for PCI Compliance, etc.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.