Splunk SOAR

Subject: Alerts Not Reaching Splunk SOAR via App-to-App Connection from Splunk

Ramachandran
Explorer

Hi everyone,

I'm working on integrating Splunk Enterprise with Splunk SOAR using the Splunk App for SOAR Export, and I'm running into an issue where alerts sent from Splunk aren't appearing in SOAR.

Setup Details:

  • Using App-to-App connection (not direct API/port 443)

  • SOAR server is configured and marked active in the Splunk App for SOAR Export

  • SOAR user has the observer and automation roles

  • SSL verification is disabled (self-signed cert)

  • Splunk and SOAR are on the same VPC/subnet with proper connectivity

Test Alert Sent from Search & Reporting:

| makeresults | eval foo="helloo" | eval src_ip="1.1.1.1" | table _time, foo, src_ip

The Issue:

  • No events are appearing in SOAR

  • Nothing listed in Event Ingest Status or as Ad hoc search result

  • No errors in the Splunk Job Inspector

What I Need Help With:

  • Are there any extra steps required in the new SOAR UI to allow data from Splunk’s App for SOAR Export?

  • Any known limitations or misconfigurations I might be missing?

Any guidance would be greatly appreciated!

Thanks in advance. 🙏

Labels (1)
0 Karma

kiran_panchavat
SplunkTrust
SplunkTrust

@Ramachandran 

  1. Create a Correlation Search in Splunk

    • Define the logic to detect specific patterns or threats.

    • Schedule the search to run periodically.

  2. Set an Alert Action for the Correlation Search

    • Choose the action as Send to Phantom (Splunk SOAR).

    • Ensure proper configuration for communication between Splunk and Phantom.

  3. Create a Label in SOAR (Phantom)

    • Create a label in SOAR that matches the label used in the Splunk alert.

    • This label helps route and categorize the incoming events properly.

  4. Test the Workflow

    • Trigger the correlation search manually or wait for a scheduled run.

    • Verify that the alert is sent to Phantom and is processed with the correct label.

Refer the docs:

https://lantern.splunk.com/Security/Product_Tips/SOAR/Sending_events_from_the_Splunk_platform_to_SOA... 

Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!
0 Karma
Get Updates on the Splunk Community!

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...

Stay Connected: Your Guide to October Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...