In the distributed deployment scheme, you must install Forwarder App and Search Head App on the basis of the organization of your distributed Splunk environment. For more information about how to choose the computers where the apps must be installed, see the section about the distributed integration scheme.
Forwarder App is installed from the following files:
%service_dir%/integration/splunk/Kaspersky-CyberTrace-App-for-Splunk_Forwarder.tar.gz
%service_dir/integration/splunk/Kaspersky-CyberTrace-App-for-Splunk_Universal-Forwarder.tar.gz
Search Head App is installed from the %service_dir%/integration/splunk/Kaspersky-CyberTrace-App-for-Splunk_Search-Head.tar.gz
file.
Installing the apps
Forwarder App for Heavy Forwarder and Search Head App are installed from Splunk Web. The only difference in the installation process is the application file name.
Forwarder App for Universal Forwarder is installed directly on the host, since Splunk Universal Forwarder has no Splunk Web interface.
To install Forwarder App for Heavy Forwarder or Search Head App:
Manage Apps button
Install app from file button
Choose File button
Upload button
This step can be skipped, depending on the Splunk version. If Splunk does not display the Restart required window, skip this step.
Restart Splunk button
Kaspersky Search Head App for Splunk in the list of apps
To install Forwarder App for Universal Forwarder:
Make sure that the %SPLUNK_HOME%/etc/apps/Splunk_TA_Kaspersky-CyberTrace-App-for-Splunk-Universal-Forwarder directory contains default, metadata, and static directories, and the README.txt file.
If the file %SPLUNK_HOME%/etc/system/local/inputs.conf already exists, make configurations manually.
By default, the name for this group is default-autolb-group. You can see the actual name for the indexers groups in the %SPLUNK_HOME%/etc/system/local/outputs.conf file. The default inputs.conf settings provide forwarding the Splunk Universal Forwarder internal logs to all sources, including Kaspersky CyberTrace. The steps above allow forwarding the Splunk logs only to indexers.
An example of the %SPLUNK_HOME%/etc/system/local/inputs.conf file content is as follows:
[monitor://%SPLUNK_HOME%/var/log/splunk/splunkd.log] _TCP_ROUTING = default-autolb-group index = _internal
[monitor://%SPLUNK_HOME%/var/log/splunk/metrics.log] _TCP_ROUTING = default-autolb-group index = _internal |
%SPLUNK_HOME%/bin/splunk restart
If the file does not exist, create a new one.
This step is necessary, as Universal Forwarder cannot parse events and the parsing settings from props.conf will not run on Universal Forwarder. In this case, events will be parsed directly on Indexer.
%SPLUNK_HOME%/bin/splunk restart