FortiSOAR provides powerful bi-directional integration with Splunk. While the Splunk connector provides out-of-the-box support for scheduled data ingestion from Splunk using FortiSOAR™'s Data Ingestion Wizard, the FortiSOAR Splunk add-on can be optionally installed on the Splunk Search Head for some additional capabilities such as automatically forwarding events and alerts from Splunk to FortiSOAR™ and invoking FortiSOAR™ playbooks for investigation. The Splunk Add-on is designed to work in conjunction with normal events as well as notable events from Splunk ES. While ES is not a requirement, it is recommended since all bi-directional updates only apply to Splunk's notable events. For more information on using FortiSOAR™'s Data Ingestion Wizard to easily ingest data into FortiSOAR™ by pulling events from Splunk, see the Splunk connector documentation.
Splunk Technology Add-on Version: 4.0.1
FortiSOAR™ Version Tested on: 7.4.1-3167
Splunk connector Versions Tested on: 1.6.3
Authored By: Fortinet
Certified: Yes
The following enhancements have been made to the Fortinet FortiSOAR Splunk Add-on in version 4.0.1:
| Splunk Version | Fortinet FortiSOAR Splunk Add-on version |
|---|---|
| Splunk Cloud | 3.0.1, 4.0.1 |
| Splunk Enterprise 9.0.0.1 | 4.0.0, 4.0.1 |
| Splunk Enterprise 8.2.0 | 3.0.1 |
| Splunk Enterprise 8.1.0 | 2.7.0, 3.0.1 |
| Splunk Enterprise 8.0.7 | 2.6.0, 2.7.0 |
The Splunk Add-on is designed to work in conjunction with normal events as well as notable events from Splunk ES. While ES is not a requirement, it is recommended since all bi-directional updates only apply to Splunk's notable events.
In your Splunk Instance, click on Browse more apps and search for Fortinet FortiSOAR Add-on for Splunk App.
It is available at https://splunkbase.splunk.com/app/5392/

Log in to your Splunkbase account and install the Splunk add-on.

For steps on upgrading your Fortinet FortiSOAR Splunk Add-on, see the Upgrading the Fortinet FortiSOAR Splunk Add-on topic.
Login to your Splunkbase account and search for the Fortinet FortiSOAR Add-on for Splunk.
It is available at https://splunkbase.splunk.com/app/5392/
Download Fortinet FortiSOAR Add-on for Splunk.
Import the Splunk App TA-fortinet-fortisoar-x.x.x.tar.gz into Splunk ES Search Head.
Important: The TA-fortinet-fortisoar-4.0.1.tar.gz file can be downloaded from Splunkbase.
Configure the TA-fortinet-fortisoar-x.x.x.tar.gz.

Specify a FortiSOAR user who has permission to view and trigger FortiSOAR playbooks.
Ensure that the Splunk server has connectivity to the FortiSOAR™ server and can send requests to the FortiSOAR™ instance on port 443.
Splunk has issued a directive that all Cloud add-ons are required to include SSL certificates for external requests. All Cloud users must therefore perform the following steps to include a certificate on the Splunk server.






cat <server certificate file> <intermediate certificate file> <certificate authority certificate file> > <combined server certificate file>
root' user.# csadm certs --deployFor more information, see https://docs.splunk.com/Documentation/Splunk/9.1.1/Security/HowtoprepareyoursignedcertificatesforSplunk.
The Splunk Add-on provides the following integration points:
Splunk Inbound Alert with the api/triggers/1/splunkAlert API trigger. Ensure that the playbook is Active for automated Alert creation.Splunk Inbound Incident with the api/triggers/1/splunkIncident API trigger. Ensure that the playbook is Active for automated Incident creation.Set Up page on the Fortinet Splunk Add-on.
APPLIANCE_PRIVATE_KEY and APPLIANCE_PUBLIC_KEY, log on to FortiSOAR™ as an administrator, and click Settings > Appliances. Click Add to create a new appliance. On the New Appliance page specify the name of the appliance and select the Team(s) and Role(s). i.e., Application Administrator and Playbook Administrator roles that apply to this appliance and click Save.APPLIANCE_PRIVATE_KEY, and APPLIANCE_PUBLIC_KEY fields.
Note: The actions listed in this section are available for both notable and non-notable events.
The Splunk Add-on adds the following searches to Splunk ES. Schedule one of these searches to run every 5 minutes to enable the automated creation of FortiSOAR alerts or incidents for every Splunk notable:
macros.conf file in the Splunk Add-on. In this case, edit the macros.conf file to set the update_type macro to incident-update.Splunk Alert Update or Splunk Incident Update, whenever Status, Urgency or Assignee is updated for a notable in Splunk so that the corresponding fields are updated in the FortiSOAR module, provided that the playbooks are in the Active state.fortisoarsend<search> | fortisoarsend alert<search> | fortisoarsend incidentAdditionally, the add-on also provides an automated update of Splunk notables, if the Status, Assignee or Urgency fields are updated on the corresponding FortiSOAR module. The playbooks Update Splunk on Alert Post-Update and Update Splunk on Incident Post-Update are triggered whenever the FortiSOAR module is updated, provided the playbooks are in the Active state.
Use the Sync Splunk Users to FortiSOAR connector function in a playbook to synchronize specific Splunk users to FortiSOAR™. Synchronize only those users who are allowed to be assigned to notable events. Synchronizing the users would enable FortiSOAR™ to assign the FortiSOAR alert to the same user as the Assignee for the corresponding Splunk notables.
Note: This procedure is optional, and it enables the bidirectional update of notables. Therefore, perform this procedure, only if you require the Splunk notables to be automatically updated if the corresponding FortiSOAR™ incident or alert module is updated and vice-versa.
When a Splunk ES notable event is mapped to a FortiSOAR™ alert or incident; Status and Urgency of the event can be mapped into the equivalent fields in the FortiSOAR™ modules. The sample playbooks included with Splunk 1.5.0 and later already contain the mapping for the FortiSOAR™ incident and alert modules in their "Configuration" step. The following image is of the Configuration step in the Splunk > Inbound Alert playbook that contains the mapping:

As mentioned in the Integration Points section, the actions from the FortiSOAR Splunk Add-on invokes playbooks bundled with the Splunk connector for the desired automation. If you want to customize the default behavior of the playbooks, you can either modify the existing playbook or create and invoke a new playbook. In case you are creating a new playbook, you must deactivate or delete the corresponding sample playbook and write a new playbook with the same API trigger.
The following table lists the API trigger and the corresponding default playbook for your easy reference:
| S.No. | Action | API Trigger | Default Playbook |
|---|---|---|---|
| 1 | FortiSOAR: Create Alert | api/triggers/1/splunkAlert |
Splunk > Inbound Alert |
| 2 | FortiSOAR: Create Incident | api/triggers/1/splunkIncident |
Splunk > Inbound Incident |
| 3 | For updating the FortiSOAR Alert when the corresponding notable event is updated | api/triggers/1/splunkAlertUpdate |
Splunk > Alert Update |
| 4 | For updating the FortiSOAR Incident when the corresponding notable event is updated | api/triggers/1/splunkIncidentUpdate |
Splunk > Incident Update |
| 5 | For Updating Splunk on Alert Post-Update | NA | Splunk > Alert Post-Update |
| 6 | For Updating Splunk on Incident Post-Update | NA | Splunk > Incident Post-Update |
The playbooks are installed with the FortiSOAR Splunk connector. For integrations 5 and 6 to work, ensure that you have updated the connector steps in the appropriate playbook to point to your Splunk configuration.
It is recommended that you make a copy of these playbooks and then customize them as per your requirements. Once you have a working copy, ensure that you set the state of the sample playbooks to Inactive; otherwise, both the playbooks will be triggered whenever events are forwarded from Splunk.
To upgrade the Fortinet FortiSOAR Add-on, do the following:

Fortinet', which displays the 'Fortinet FortiSOAR Add-on'' row:
Update App page.Update from Splunkbase dialog, then click Accept and Continue:
Login Required dialog, then click Login and Continue:
Install Successfully dialog to configure the Fortinet FortiSOAR Add-on and auto-populate all of the fields based on your previous settings:
FortiSOAR Configuration dialog, to save the configuration and start using the Fortinet FortiSOAR Add-on:
TA-fortinet-fortisoar-x.x.x.tar logThe "Fingerprint has expired” error is seen in the ta-fortinet-fortisoar_fortisoar_common.connection.log file.
Resolution:
This issue could occur in cases where there is a difference between the time of the Splunk Search Head and the FortiSOAR™ instance. Resolve this issue by synchronizing the time of the Splunk Search Head and your FortiSOAR™ instance to a common NTP server.
NOTE: This error is applicable to FortiSOAR version 7.0.1 only.
You see the following error while running the Splunk > Alert Update:
Error message : CS-INTEGRATION-5: Error occurred while executing the connector action ERROR :: 400 Client Error: Bad Request for url: https://localhost/api/auth/users :: {'Error': 'The server encountered an error while handling the request. Please contact the administrator for assistance.'} :: Url: https://localhost/api/auth/users
Resolution:
Update the IRI of the "Get CyOPs Users" step with "/api/auth/users?loginid={{vars.event_owner}}" and enable Ignore Error for this step.
FortiSOAR provides powerful bi-directional integration with Splunk. While the Splunk connector provides out-of-the-box support for scheduled data ingestion from Splunk using FortiSOAR™'s Data Ingestion Wizard, the FortiSOAR Splunk add-on can be optionally installed on the Splunk Search Head for some additional capabilities such as automatically forwarding events and alerts from Splunk to FortiSOAR™ and invoking FortiSOAR™ playbooks for investigation. The Splunk Add-on is designed to work in conjunction with normal events as well as notable events from Splunk ES. While ES is not a requirement, it is recommended since all bi-directional updates only apply to Splunk's notable events. For more information on using FortiSOAR™'s Data Ingestion Wizard to easily ingest data into FortiSOAR™ by pulling events from Splunk, see the Splunk connector documentation.
Splunk Technology Add-on Version: 4.0.1
FortiSOAR™ Version Tested on: 7.4.1-3167
Splunk connector Versions Tested on: 1.6.3
Authored By: Fortinet
Certified: Yes
The following enhancements have been made to the Fortinet FortiSOAR Splunk Add-on in version 4.0.1:
| Splunk Version | Fortinet FortiSOAR Splunk Add-on version |
|---|---|
| Splunk Cloud | 3.0.1, 4.0.1 |
| Splunk Enterprise 9.0.0.1 | 4.0.0, 4.0.1 |
| Splunk Enterprise 8.2.0 | 3.0.1 |
| Splunk Enterprise 8.1.0 | 2.7.0, 3.0.1 |
| Splunk Enterprise 8.0.7 | 2.6.0, 2.7.0 |
The Splunk Add-on is designed to work in conjunction with normal events as well as notable events from Splunk ES. While ES is not a requirement, it is recommended since all bi-directional updates only apply to Splunk's notable events.
In your Splunk Instance, click on Browse more apps and search for Fortinet FortiSOAR Add-on for Splunk App.
It is available at https://splunkbase.splunk.com/app/5392/

Log in to your Splunkbase account and install the Splunk add-on.

For steps on upgrading your Fortinet FortiSOAR Splunk Add-on, see the Upgrading the Fortinet FortiSOAR Splunk Add-on topic.
Login to your Splunkbase account and search for the Fortinet FortiSOAR Add-on for Splunk.
It is available at https://splunkbase.splunk.com/app/5392/
Download Fortinet FortiSOAR Add-on for Splunk.
Import the Splunk App TA-fortinet-fortisoar-x.x.x.tar.gz into Splunk ES Search Head.
Important: The TA-fortinet-fortisoar-4.0.1.tar.gz file can be downloaded from Splunkbase.
Configure the TA-fortinet-fortisoar-x.x.x.tar.gz.

Specify a FortiSOAR user who has permission to view and trigger FortiSOAR playbooks.
Ensure that the Splunk server has connectivity to the FortiSOAR™ server and can send requests to the FortiSOAR™ instance on port 443.
Splunk has issued a directive that all Cloud add-ons are required to include SSL certificates for external requests. All Cloud users must therefore perform the following steps to include a certificate on the Splunk server.






cat <server certificate file> <intermediate certificate file> <certificate authority certificate file> > <combined server certificate file>
root' user.# csadm certs --deployFor more information, see https://docs.splunk.com/Documentation/Splunk/9.1.1/Security/HowtoprepareyoursignedcertificatesforSplunk.
The Splunk Add-on provides the following integration points:
Splunk Inbound Alert with the api/triggers/1/splunkAlert API trigger. Ensure that the playbook is Active for automated Alert creation.Splunk Inbound Incident with the api/triggers/1/splunkIncident API trigger. Ensure that the playbook is Active for automated Incident creation.Set Up page on the Fortinet Splunk Add-on.
APPLIANCE_PRIVATE_KEY and APPLIANCE_PUBLIC_KEY, log on to FortiSOAR™ as an administrator, and click Settings > Appliances. Click Add to create a new appliance. On the New Appliance page specify the name of the appliance and select the Team(s) and Role(s). i.e., Application Administrator and Playbook Administrator roles that apply to this appliance and click Save.APPLIANCE_PRIVATE_KEY, and APPLIANCE_PUBLIC_KEY fields.
Note: The actions listed in this section are available for both notable and non-notable events.
The Splunk Add-on adds the following searches to Splunk ES. Schedule one of these searches to run every 5 minutes to enable the automated creation of FortiSOAR alerts or incidents for every Splunk notable:
macros.conf file in the Splunk Add-on. In this case, edit the macros.conf file to set the update_type macro to incident-update.Splunk Alert Update or Splunk Incident Update, whenever Status, Urgency or Assignee is updated for a notable in Splunk so that the corresponding fields are updated in the FortiSOAR module, provided that the playbooks are in the Active state.fortisoarsend<search> | fortisoarsend alert<search> | fortisoarsend incidentAdditionally, the add-on also provides an automated update of Splunk notables, if the Status, Assignee or Urgency fields are updated on the corresponding FortiSOAR module. The playbooks Update Splunk on Alert Post-Update and Update Splunk on Incident Post-Update are triggered whenever the FortiSOAR module is updated, provided the playbooks are in the Active state.
Use the Sync Splunk Users to FortiSOAR connector function in a playbook to synchronize specific Splunk users to FortiSOAR™. Synchronize only those users who are allowed to be assigned to notable events. Synchronizing the users would enable FortiSOAR™ to assign the FortiSOAR alert to the same user as the Assignee for the corresponding Splunk notables.
Note: This procedure is optional, and it enables the bidirectional update of notables. Therefore, perform this procedure, only if you require the Splunk notables to be automatically updated if the corresponding FortiSOAR™ incident or alert module is updated and vice-versa.
When a Splunk ES notable event is mapped to a FortiSOAR™ alert or incident; Status and Urgency of the event can be mapped into the equivalent fields in the FortiSOAR™ modules. The sample playbooks included with Splunk 1.5.0 and later already contain the mapping for the FortiSOAR™ incident and alert modules in their "Configuration" step. The following image is of the Configuration step in the Splunk > Inbound Alert playbook that contains the mapping:

As mentioned in the Integration Points section, the actions from the FortiSOAR Splunk Add-on invokes playbooks bundled with the Splunk connector for the desired automation. If you want to customize the default behavior of the playbooks, you can either modify the existing playbook or create and invoke a new playbook. In case you are creating a new playbook, you must deactivate or delete the corresponding sample playbook and write a new playbook with the same API trigger.
The following table lists the API trigger and the corresponding default playbook for your easy reference:
| S.No. | Action | API Trigger | Default Playbook |
|---|---|---|---|
| 1 | FortiSOAR: Create Alert | api/triggers/1/splunkAlert |
Splunk > Inbound Alert |
| 2 | FortiSOAR: Create Incident | api/triggers/1/splunkIncident |
Splunk > Inbound Incident |
| 3 | For updating the FortiSOAR Alert when the corresponding notable event is updated | api/triggers/1/splunkAlertUpdate |
Splunk > Alert Update |
| 4 | For updating the FortiSOAR Incident when the corresponding notable event is updated | api/triggers/1/splunkIncidentUpdate |
Splunk > Incident Update |
| 5 | For Updating Splunk on Alert Post-Update | NA | Splunk > Alert Post-Update |
| 6 | For Updating Splunk on Incident Post-Update | NA | Splunk > Incident Post-Update |
The playbooks are installed with the FortiSOAR Splunk connector. For integrations 5 and 6 to work, ensure that you have updated the connector steps in the appropriate playbook to point to your Splunk configuration.
It is recommended that you make a copy of these playbooks and then customize them as per your requirements. Once you have a working copy, ensure that you set the state of the sample playbooks to Inactive; otherwise, both the playbooks will be triggered whenever events are forwarded from Splunk.
To upgrade the Fortinet FortiSOAR Add-on, do the following:

Fortinet', which displays the 'Fortinet FortiSOAR Add-on'' row:
Update App page.Update from Splunkbase dialog, then click Accept and Continue:
Login Required dialog, then click Login and Continue:
Install Successfully dialog to configure the Fortinet FortiSOAR Add-on and auto-populate all of the fields based on your previous settings:
FortiSOAR Configuration dialog, to save the configuration and start using the Fortinet FortiSOAR Add-on:
TA-fortinet-fortisoar-x.x.x.tar logThe "Fingerprint has expired” error is seen in the ta-fortinet-fortisoar_fortisoar_common.connection.log file.
Resolution:
This issue could occur in cases where there is a difference between the time of the Splunk Search Head and the FortiSOAR™ instance. Resolve this issue by synchronizing the time of the Splunk Search Head and your FortiSOAR™ instance to a common NTP server.
NOTE: This error is applicable to FortiSOAR version 7.0.1 only.
You see the following error while running the Splunk > Alert Update:
Error message : CS-INTEGRATION-5: Error occurred while executing the connector action ERROR :: 400 Client Error: Bad Request for url: https://localhost/api/auth/users :: {'Error': 'The server encountered an error while handling the request. Please contact the administrator for assistance.'} :: Url: https://localhost/api/auth/users
Resolution:
Update the IRI of the "Get CyOPs Users" step with "/api/auth/users?loginid={{vars.event_owner}}" and enable Ignore Error for this step.