You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Index-Based Ingestion Configuration (Required for Saved Searches)
164
164
165
-
The add-on can expose OpenCTI indicators to the Splunk Enterprise Security (ES) Threat Intelligence Framework by populating an ES-compliant lookup called `opencti_threatintel`.
165
+
When using **Index mode** ingestion, OpenCTI data is first written to a Splunk index and then synchronized into KV Store collections via saved searches.
166
+
This section explains **how to define the index**, **configure macros**, and **enable the required saved searches**.
166
167
167
-
At a high level:
168
-
169
-
1. The modular input writes OpenCTI events into a Splunk index (for example, `opencti_stream`).
170
-
2. Normalization searches populate a catalog of indicators in the `opencti_indicators` KV store.
171
-
3. A scheduled search maps `opencti_indicators` into an ES-friendly lookup named `opencti_threatintel`.
172
-
4. ES is configured to treat `opencti_threatintel` as a threat intelligence source.
168
+
---
173
169
174
-
> **Note:** The `opencti_threatintel` lookup can be defined either in this add-on **or** in the ES app (`SA-ThreatIntelligence`).
175
-
> A saved search running in the OpenCTI app can populate it as long as:
176
-
>
177
-
> - The lookup definition is shared **Global**, and
178
-
> - There is no other lookup with the same name shadowing it in the OpenCTI app.
170
+
## 1. Choose or Create a Splunk Index
179
171
180
-
### Prerquisites
172
+
By default, the add-on **does not assume a fixed index name**.
181
173
182
-
- Splunk Enterprise Security installed on the search head where this add-on is installed.
183
-
- The OpenCTI modular input is configured and successfully ingesting data.
184
-
- The `opencti_indicators` KV store lookup is populated
185
-
- You have admin (or equivalent) permissions in Splunk and ES.
174
+
### Recommended default index
175
+
```
176
+
opencti_data
177
+
```
178
+
### Create a dedicated index (recommended)
186
179
187
-
### 1. Create the `opencti_threatintel` KV Store lookup
180
+
In Splunk Web:
188
181
189
-
1. In Splunk Web, go to **Settings ▸ Lookups ▸ Lookup definitions**.
190
-
2. Click **Add new** and create a KV Store lookup:
191
-
-**Destination app:**`SA-ThreatIntelligence`
192
-
-**Name:**`opencti_threatintel`
193
-
-**Type:** KV Store
194
-
-**KV store collection name:**`opencti_threatintel`
3. After saving, click on the **Permissions** link for the `opencti_threatintel` lookup definition:
197
-
- Set **Sharing** to **Global** so ES (in apps like `TA-opencti-for-splunk-enterprise`) can read it.
182
+
1. Go to **Settings ▸ Indexes**
183
+
2. Click **New Index**
184
+
3. Set:
185
+
-**Index name:**`opencti_data`
186
+
- Leave other settings at defaults (or align with your data retention policy)
187
+
4. Save
198
188
199
-
> If you prefer to manage collections via config files, you can instead define this collection in `collections.conf` and the lookup in `transforms.conf`.
189
+
> ⚠️ If you choose a **custom index name**, you must update the OpenCTI macro configuration (see below).
200
190
201
191
---
202
192
203
-
### 2. Verify the `opencti_indicators` lookup
204
-
205
-
The shipped searches in this add-on maintain a canonical indicator lookup in the `opencti_indicators` KV store. ES integration builds on top of this lookup.
193
+
## 2. Configure the OpenCTI Modular Input (Index Mode)
206
194
207
-
To verify it has data:
195
+
When creating a modular input:
208
196
209
-
1. Open **Search & Reporting**.
210
-
2. Run:
197
+
| Field | Value |
198
+
|----------------|-------|
199
+
|**Input Type**|`Index entry`|
200
+
|**Index**|`opencti_data` (or your custom index) |
201
+
|**Stream ID**| OpenCTI Live Stream ID |
202
+
|**Interval**|`0` (continuous) |
211
203
212
-
```spl
213
-
| inputlookup opencti_indicators
214
-
| head 10
215
-
```
204
+
Once enabled:
205
+
- Each **OpenCTI stream event** is written as a **Splunk event**
206
+
- Events are **append-only**
207
+
- The same indicator may appear multiple times as it evolves over time
216
208
217
-
3. You should see one row per OpenCTI indicator, with fields such as id, name, pattern, value, score, confidence, main_observable_type, etc.
209
+
### Event metadata
218
210
219
-
If this lookup is empty, review your OpenCTI inputs and the “Update OpenCTI Indicators Lookup” / “Nightly Rebuild OpenCTI Indicators Lookup” saved searches before proceeding.
211
+
| Field | Value |
212
+
|------|------|
213
+
|`source`|`opencti`|
214
+
|`sourcetype`|`opencti:indicator`, `opencti:report`, etc. |
220
215
221
216
---
222
217
223
-
###3. Enable the Update Enterprise Security Threat Intelligence saved search
218
+
## 3. Configure the OpenCTI Index Macro (Required)
224
219
225
-
The OpenCTI add-on ships with a saved search called `Update Enterprise Security Threat Intelligence` that transforms the opencti_indicators catalog into the ES Threat Intelligence schema and writes it into the opencti_threatintel KV Store lookup.
220
+
All shipped saved searches rely on a macro to locate OpenCTI data.
Run these searches to confirm everything is working:
316
300
301
+
### Index ingestion
317
302
```
318
-
| inputlookup opencti_indicators
319
-
| stats count
303
+
`opencti_index`
304
+
| stats count by sourcetype
320
305
```
321
306
322
-
- Check the job history of `Update Enterprise Security Threat Intelligence` for errors.
323
-
- Confirm that opencti_threatintel has rows:
307
+
### KV Store population
324
308
325
309
```
326
-
| inputlookup opencti_threatintel
327
-
| stats count
310
+
| inputlookup opencti_indicators
311
+
| head 10
328
312
```
329
-
330
-
- Verify that ES has a Threat Intelligence source configured for opencti_threatintel.
331
-
332
-
Permission or lookup issues
333
-
Ensure: - opencti_indicators KV Store lookup is shared Global. - opencti_threatintel KV Store lookup is defined in SA-ThreatIntelligence and shared Global. - Verify that the roles used by ES and the OpenCTI add-on have read/write access to these lookups.
334
-
335
-
With these steps completed, OpenCTI becomes a first-class Threat Intelligence provider for Splunk Enterprise Security via the opencti_threatintel KV Store, maintained by the `Update Enterprise Security Threat Intelligence` saved search.
0 commit comments