About the distributed integration scheme
April 11, 2024
ID 166123
Kaspersky CyberTrace supports distributed Splunk environments. The integration scheme for distributed Splunk environments is called the distributed integration scheme.
About the apps and services used in the distributed integration scheme
In the distributed integration scheme, Kaspersky CyberTrace is divided into two apps and one service:
- Kaspersky CyberTrace Service
This service matches Splunk events against Kaspersky Threat Data Feeds.
Kaspersky CyberTrace Service sends the resulting events to a single indexer that keeps the index with events from Kaspersky CyberTrace.
This service can be installed on a separate computer.
- Kaspersky CyberTrace App Search Head (or Search Head App)
This app contains Kaspersky CyberTrace App dashboards, alert templates, and the lookup script.
This app is intended for installation on a Splunk instance that acts as a search head and sends search requests to the indexer that keeps the index with events from Kaspersky CyberTrace.
- Kaspersky CyberTrace App Forwarder (or Forwarder App)
This app contains rules for forwarding events from Splunk to Kaspersky CyberTrace Service. It also receives events from Kaspersky CyberTrace Service.
This app is intended for installation on Splunk instances that must forward events to Kaspersky CyberTrace Service.
Kaspersky CyberTrace App Forwarder is divided into two apps, depending on the type of Splunk forwarder used in your distributed integration scheme:
- App for Heavy Forwarder.
- App for Universal Forwarder.
About the integration scheme variants
The following variants of the distributed integration scheme demonstrate a general approach to integrating Kaspersky CyberTrace with your distributed Splunk environment. Depending on how your distributed Splunk environment is organized, you may have to change or combine these variants.
One indexer, multiple forwarders variant
One indexer, multiple forwarders
In the one indexer, multiple forwarders variant, several Heavy or Universal forwarders receive and forward events directly to Kaspersky CyberTrace Service. These forwarders must use Forwarder App (for the respective forwarder type). One of the forwarders receives matches from Kaspersky CyberTrace Service. The forwarder sends the matches to the indexer that stores them in the main index used by Kaspersky CyberTrace for Splunk Search Head App.
Multiple indexers, multiple forwarders variant
In the multiple indexers, multiple forwarders variant, several Heavy or Universal forwarders receive and forward events directly to Kaspersky CyberTrace Service. These forwarders must use Forwarder App (for the respective forwarder type). One of the forwarders receives matches from Kaspersky CyberTrace Service. The forwarder sends the matches to the indexers that store them in the main index used by Kaspersky CyberTrace App.
Default ports and addresses
By default, Forwarder App and Kaspersky CyberTrace Service are configured to use certain addresses and ports for forwarding events and receiving matches. You must change these addresses and ports based on the organization of your distributed Splunk environment.
You must change the default addresses and ports that are used by Forwarder App and Kaspersky CyberTrace Service.
By default, Forwarder App:
- Receives events at
:3000
port. - Receives events from Kaspersky CyberTrace at
:9998
port. These events are stored in themain
index. - Forwards events to
127.0.0.1:9999
.
By default, Kaspersky CyberTrace Service does the following:
- Receives events at
127.0.0.1:9999
. - Sends its own events to
127.0.0.1:9998
.
Event format
By default, Kaspersky CyberTrace App and Kaspersky CyberTrace Service are configured to receive events in a certain format:
- Kaspersky CyberTrace Service parses events with regular expressions defined in its configuration file (the regular expressions are also displayed in Kaspersky CyberTrace Web). These regular expressions are created for a specific format of inbound data. For example, the default regular expression for URLs will match a URL containing the protocol (for example, HTTP, HTTPS). If the URLs in the events generated by your devices do not contain the protocol, change the regular expression accordingly.
- The lookup script that comes with Kaspersky CyberTrace App (or Search Head App in the case of the distributed integration scheme) sends events to Kaspersky CyberTrace Service in a format that matches the regular expressions used by Kaspersky CyberTrace Service.