Skip to main content

Quarterback AI

Splunk Enterprise

Splunk Enterprise is software that enables you to search, analyze, and visualize data gathered from the components of your IT infrastructure or business.

Supported Actions and Example Prompts

The following table lists the supported actions and prompt examples for an action:

Action Name

Description

Prompt Example

Custom Search

This action searches using a custom query in the Splunk Enterprise application. For more information, see Action: Custom Search.

Search for search index=_internal source=*/metrics.log', '| inputlookup co_table' between the timestamps 2023-10-15T07:30:00 and 2023-10-15T08:00:00 in Splunk Enterprise.

Search Events

This action searches for events using Search ID (SID) in the Splunk Enterprise application. For more information, see Action: Search Events.

Search events for SID 011f117a9f3002002920bde8132e7020 in Splunk Enterprise.

Search Splunk Event Database

This action can be used to look up IOCs in the Splunk Database. For more information, see Action: Search Splunk Event Database.

Search for the IOCs 203.95.8.98 and 203.95.9.54 in the Splunk Database.

Install and Configure the App

Install and configure the required apps to enable Quarterback AI to perform various security-related tasks and provide relevant responses. After installing an app, you must create an instance that will be used to communicate with the app endpoints. An app can have multiple instances, and you can set a default instance from the configured instance list.

Before you Start

Ensure that you have the API token to authenticate with the Splunk Enterprise app.

Steps

To install and configure an app, follow these steps:

  1. Go to the application, in the left pane, select Quarterback AI.

  2. In Apps, select Splunk Enterprise and click Install.

  3. After the app is installed, click Configure and enter the following details to create an instance:

    • Instance Name: Enter a name for the instance.

    • Instance Description: Enter a description for the instance.

    • Expiry: Select an expiry date for the instance.

    • Set as default instance: Select this option to set this instance as the default instance. By default, this instance will be used to perform actions from this app.

    • Base URL: Enter the base URL to access the Splunk Enterprise application. For example, https://splunkdomain.com/.

    • Username: Enter the username to access Splunk.

    • Password: Enter the password to authenticate with Splunk.

    • Version: Enter the Splunk Enterprise version being used. For example, 8.0.0.

    • Auth Token: Enter the API token for authorization.

    • Verify: Select this option to verify SSL while making requests. It is recommended to select this option to ensure a secure connection. By default, this option is not selected.

    • Timeout: Enter the timeout value in seconds. This is the number of seconds that requests will wait to establish a connection with Splunk Enterprise. You can enter values between 15 - 120 seconds. By default, 15 seconds is set.

  4. Click Done.

The instance is created, and you can view it in Instances. To create another instance, click Add Instance.

Action: Search Events

This action searches for events using the search ID (SID) in the Splunk Enterprise application.

Note

This action is supported by Splunk Enterprise version 9.0.1 onwards.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

SID 

Enter the search ID (SID) as input to be searched for.

Example:

011f117a9f3002002920bde8132e7020

Text

Required

Example Request

[
    {
        "sid": "011f117a9f3002002920bde8132e7020"
    }
]

Action Response Parameters

Parameter

Field Type

Description

{app_instance}

JSON Object

This parameter indicates the ID of the app instance configured in Orchestrate from which the response is retrieved.

app_instance/results/meta/fieldOrder/field

String

The order of fields in the results

app_instance/results/result/field[@k='arch']/value/text

String

The architecture type, e.g., 'i686'

app_instance/results/result/field[@k='build']/value/text

String

The build number, e.g., '98164'

app_instance/results/result/field[@k='connectionType']/value/text

String

The type of connection, e.g., 'cooked'

app_instance/results/result/field[@k='date_hour']/value/text

Integer

The hour part of the date, e.g., '19'

Action: Search Splunk Event Database

This action looks up for IOCs in the Splunk Database.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

IOCs

Enter the list of IOCs to look up in the Splunk database. 

Example: 

[203.95.8.98, 203.95.9.54]

List

Required

Accepted ioc value type: sha1, sha512, sha224, sha384, sha256, md5, domain, ipv4, ipv6, url

Earliest Time

Enter the timestamp to start the query run. 

Example:

-30d

Text

Optional

Index Name

Enter the index name to search for IOCs in a specific index.

Example:

sample_index_name

Text

Optional

Example Request

[
    {
        "iocs": [
            "203.95.8.98",
            "203.95.9.54"
        ],
        "earliest": "-60d",
        "index_name": "sample_index_name"
    }
]

Action Response Parameters

Parameter

Type

Description

app_instance_init_offset

Integer

Initial offset value

app_instance.messages

Array

An array of message objects.

app_instance.messages.text

String

The text content of the message.

app_instance.messages.type

String

Type of the message.

Example:

DEBUG

app_instance.preview

Boolean

Indicates a preview

app_instance.results

Array

An array of result objects.

app_instance.results.index

String

Index name of the result.

app_instance.results.source

String

Source path of the result.

app_instance.results.sourcetype

String

Source type of the result.