You can send Cisco Secure Application security events to a Splunk deployment over the HTTP and Secure HTTP (HTTPS) protocols. When you enable a new connection with the details of the Splunk server, the vulnerability, the attack, and the observation events are sent from Cisco Secure Application to the specified Splunk instance.

The gear icon  displays the Settings option. From this option you can use the Connections option to connect to a third-party server for advanced security. 

Currently, Cisco Secure Application supports integration with Splunk only.

To create a new connection, click New Connection and specify the following in the New Connection dialog box:

  • Name: Any name to identify the connection.
  • Service Type: Splunk HTTP Event Collector.
    Currently, Cisco Secure Application supports the HTTP event collector only.
  • Endpoint: The Splunk host endpoint. 
  • Token: The token generated through Splunk.
    The value is hidden after you save the connection.

The Connections page displays the Splunk connection details with its status.You can modify the connection by using the modify icon 

After the connection is successful, Cisco Secure Application sends the events every one minute.

Currently, this connection supports Vulnerabilities. The support will extend to Attacks and Observations in later releases.

AppDynamics IP Addresses 

If your Splunk instance is blocking public IPs, ensure that you unlock the following list of IPs. All traffic originating from the Oregon environment will have one of the following source IP addresses: 

  • 34.218.183.67 

  • 52.88.49.75

  • 34.218.135.55

  • 44.224.91.190

  • 44.224.93.208

  • 100.21.44.47

  • 35.163.240.75

  • 100.21.168.150

  • 44.224.41.204

To view all IPs and their regions, see SaaS Domains and IP Ranges

Security Events

The supported agents send the security events to Cisco Secure Application to display the attacks and vulnerabilities on the UI. To use these events within Splunk, Cisco Secure Application sends the event attributes to Splunk in the required format. These are the event details: 

AttributesTypeDescription
tenantIdint32The Tenant ID of the server where the AppDynamics Controller is installed.
tenantNameStringThe name of the server on which AppDynamics Controller is installed.
applicationId int32The ID of the application that is vulnerable.
applicationname  StringThe name of the vulnerable application.
applicationUuidStringThe unique ID of the server on which the application is running.
tierIdint32The tier ID of the application that is vulnerable.
tiernameStringThe name of the application tier that is vulnerable.
tierUuidStringThe unique ID of the server on which the tier is running.
timestampStringThe time the vulnerability is first detected.
severityStringThe CVSS3 environmental severity description. 
severityNumberFloat32The risk score of the vulnerability. The higher the number, the higher the risk.
resourceStringThe source of the security events. This will show the value as Secure App, which means that the security events are sent from Cisco Secure Application.
createdAtStringThe time when the vulnerability was first detected. This value is same as the timestamp value.
lastSeenAtStringThe time when the vulnerability was last detected.
fixedAt  StringThe date of CVE remediation. This value is available only if the CVE is fixed. 
cveIdStringThe common vulnerability and exposure ID.
packageNameStringThe name of the library that the vulnerability has been detected in. 
packageVersionStringThe version of the package with the vulnerability.
fixedVersionStringThe version of the package that fixes the vulnerability. This is the remediation version.
AttributesType Description
TenantIdint32The Tenant ID of the server where the AppDynamics Controller is installed.
TenantNameStringThe name of the server on which AppDynamics Controller is installed.
ApplicationIdint32The ID of the application that is affected by the attack.
ApplicationNameStringThe name of the application that is affected by the attack.
ApplicationUuidStringThe unique ID of the application that is affected by the attack.
TimestampStringThe time when the attack is detected.
SeverityNumberfloat32The risk score of the attack. The higher the number, the higher the risk.
NameStringThe name of the attack event.
ResourceStringThe entry point of the attack. It is the webserver URL accessed by the client in the transaction that triggered the event. Based on the event type, this field may not be displayed.
CreatedAtStringThe timestamp when the attack was first detected. This is same as timestamp.
LastSeenAtStringThe time when the attack was last detected.
MaliciousIpSourceString

The name of the malicious IP list. This is available if the attack is from a client IP address that is on a known malicious IP list.

Currently, the Talos malicious IP list is supported. Therefore, this attribute displays the value Talos when the attack is from a client IP on the Talos list.