By default, both Kaspersky CyberTrace Service and Kaspersky CyberTrace App use the following integration scheme. This scheme is the single-instance integration scheme.
About apps and services
The single instance integration scheme uses one app and one service:
This service matches Splunk events against Kaspersky Threat Data Feeds.
Kaspersky CyberTrace Service sends the resulting events to Splunk. Splunk stores the events from Kaspersky CyberTrace Service in the main
index.
This app contains Kaspersky CyberTrace App dashboards, alert templates, and a lookup script. The app also contains parsing rules for Kaspersky CyberTrace Service events and rules for forwarding events from Splunk to Kaspersky CyberTrace Service.
Single-instance integration scheme
In the single-instance integration scheme, Splunk Apps and Kaspersky CyberTrace Service work on the same computer by default (IP address is 127.0.0.1
). Kaspersky CyberTrace App receives input on port 3000
and forwards it to Kaspersky CyberTrace Service on port 9999
. Kaspersky CyberTrace Service then returns matches to Kaspersky CyberTrace App on port 9998
.
If you want to install Kaspersky CyberTrace Service on a separate computer, you must specify the addresses and ports used by Kaspersky CyberTrace Service and Kaspersky CyberTrace App when installing Kaspersky CyberTrace.
Single-instance integration scheme
Event format
By default, Kaspersky CyberTrace App and Kaspersky CyberTrace Service receive events in a certain format:
http://
or https://
). If URLs in the events that come from your devices do not contain protocols, you must change the regular expression.