Duo Splunk Connector allow administrators to easily import their Duo logs into their Splunk environment.
The Duo Splunk Connector 1.2.0 supports Splunk 8.0 and later versions with Python 3. Refer to the Splunk documentation for information about Python 2 to Python 3 migration in Splunk.
This document takes you through installing and configuring the Duo Splunk Connector in your Splunk environment. Once configured, the connector automatically pulls in the following Duo logs for the last 30 days:
The connector comes populated with default dashboards for the above logs. Administrators can create new dashboards or manipulate the existing dashboards.
Role required: Owner
Sign up for a Duo account. Duo Splunk Connector requires a Duo Premier, Duo Advantage, or Duo Essentials plan.
Log in to the Duo Admin Panel as an administrator with the Owner role and navigate to Applications.
Click Protect an Application and locate the entry for Admin API in the applications list. Click Protect to the far-right to configure the application and get your integration key, secret key, and API hostname. You'll need this information to complete your setup. See Protecting Applications for more information about protecting applications in Duo and additional application options.
Under the "Settings" section for this application locate the "Permissions" section and check the boxes next to Grant read information, Grant read log, and Grand read resource. Do not check the boxes next to any other permissions.
You may also rename the Admin API application under the "Settings" section.
Click Save.
You can view your integration key, secret key, and API hostname at the top of the new Admin API application's page.
The Duo Splunk Connector has been tested in multiple deployment scenarios; use the directions below based on your deployment.
In a Splunk single instance environment where there is only one Splunk server present and it is acting as both the Indexer and a Search Head you should install and configure the Duo Splunk Connector app on this server.
In a scenario where you have multiple Indexers that do not communicate with each other but do communicate with all your Search Heads install and configure Duo Splunk Connector on one Indexer. Install but do not configure Duo Splunk Connector on all Search Heads.
In any of the above scenarios if you've configured a Splunk server to act as a forwarder, install and configure Duo Splunk Connector on the Forwarder and only install Duo Splunk Connector on the servers mentioned above.
Configure the Duo Security app context to be forwarded from the Forwarder to one Indexer.
You can choose to install Duo Splunk Connector from Splunkbase or with our manual steps.
Log into your Splunk deployment as an Administrative user.
While on the home screen click the + icon located under the "Apps" section on the left-hand side of the page. You'll be taken to the "Browse More Apps" page.
Type Duo Splunk Connector into the search field. Click Install on the Duo Splunk Connector app.
You'll be asked to sign in with your Splunk.com account information and accept the Splunk Software License Agreement. Once you've entered the required information click Login and Install.
Duo Splunk Connector will automatically install and prompt you to restart Splunk once it is completed. Click Restart Splunk.
Once Splunk restarts log back into the site and return to your home screen.
Download the Duo Splunk Connector.
Log into your Splunk deployment as an Administrative user.
While on the home screen click the gear icon located next to "Apps".
On the "Apps" page click Install app from file.
On the "Upload an app" page click Choose File and select the duo_splunkapp_1.2.2.spl file you downloaded earlier (n.n.n in the image below is a placeholder for your actual file's version).
Click Upload. Splunk must restart after installation. Click Restart Splunk when prompted.
Once Splunk restarts log back into the site and return to your home screen.
In Splunk, navigate to Settings → Indexes and click New Index.
Enter the following information in the "New index" form:
Field | Value |
---|---|
Index Name | Enter duo or another descriptive name. |
Max Size of Entire Index | Set to 500 GB. |
App | Select Duo Security from the list. |
You can leave the other fields at their default values.
Click Save to create the index.
Click on the new Duo Security app under the "Apps" section on the left hand side of the screen.
Review the directions on the "Duo Overview" page and then click Configure Duo when done.
On the "Add Data" page on the right-hand side of the screen you'll be asked to enter in Duo Admin API information. For the Name field type Duo Logs.
Paste the Duo Integration Key for the Admin API application you created earlier from the Duo Admin Panel into the Integration Key field.
Paste the Duo Secret Key for the Admin API application you created earlier from the Duo Admin Panel into the Secret Key field.
Paste the Duo Host for the Admin API application you created earlier from the Duo Admin Panel into the Host field.
Click the checkbox next to More settings.
Use the Index drop-down to select the index you created for Duo (called duo in the example).
By default the Duo Splunk Connector queries Duo for new data every 120 seconds. You can change this time by changing the value in the Interval field.
Do not change any other values under "More settings" or this may cause the connector to not function correctly. Please see Advanced Configuration for more options.
When you've entered all required information click the Next > button at the top of the screen.
You'll be taken to a page saying that the data input was configured successfully. It may take some time for Duo Logs data to be pulled down.
Return to the Duo Security application to view the default dashboards.
For more information on the data included in the logs or the format of the logs please visit the Admin API docs page.
If you are using our manual install steps you can follow these directions to download the latest spl file and upgrade your Splunk.
Log into your Splunk deployment as an Administrative user.
While on the home screen click the gear icon located next to "Apps".
On the "Apps" page click Install app from file.
On the "Upload an app" page click Choose File and select the duo_splunkapp_1.2.2.spl file you downloaded earlier (n.n.n in the image below is a placeholder for your actual file's version).
Check the box next to Upgrade app and then click Upload.
Splunk must restart after installation. Click Restart Splunk when prompted.
Once Splunk restarts the upgrade is complete.
In a scenario where you have multiple Indexers clustered together, install and configure Duo Splunk Connector on one Indexer. Install but do not configure Duo Splunk Connector on all other Indexers and Search Heads.
On each server that you install the Duo Splunk Connector you'll need to make a small modification so that Splunk knows to replicate the index:
Go to $SPLUNK_HOME/etc/apps/duo_splunkapp/local
. Create the local
directory if it does not exist.
Open indexes.conf in an editor and add the following line to the end of the [duo]
section:
repFactor = auto
If you named your index something other than duo
when you created it, look for a section in the file with the name you used instead.
Save the file.
Restart Splunk.
You can change the index used by the Duo connector by reconfiguring the connector and then updating the macro to match the new index name.
On the "Add Data" page click the checkbox next to More settings and select the drop-down next to Index. Select the index where you would like to store your Duo logs.
When you've entered all required information click the Next > button at the top of the screen.
Click Settings in the top right-hand corner of the screen. A drop-down will appear. Click Advanced search.
On the "Advanced search" page click Search macros.
On the "Search marcos" page click duo_index.
In the Definition field you will see the current index defined as index=duo
if you used that name when you first created the index. Update this value to use the custom index you chose in step 1.
Example: If your index was "CUSTOMINDEX" the field should be changed to index=CUSTOMINDEX.
Click Save.
Return to the Duo Security application to view the default dashboards.
Need some help? Take a look at our Splunk Connector Knowledge Base articles or Community discussions. For further assistance, contact Support.