- About the Clearswift SECURE Email Gateway Add-on for Splunk
- Release notes
- Support and resources
- Hardware and software requirements
- Installation steps
- Deploy to single server instance
- Deploy to distributed deployment
- Deploy to distributed deployment with Search Head Clustering
- Deploy to Splunk Cloud
- Configure Clearswift SECURE Email Gateway Add-on for Splunk
- Data types
- Lookups
Author | Mikael Bjerkeland |
---|---|
App Version | 1.2.0 |
Vendor Products | Clearswift SECURE Email Gateway 3.8 or higher |
Has index-time operations | True |
Create an index | False |
Implements summarization | False |
The Clearswift SECURE Email Gateway Add-on for Splunk allows a Splunk administrator to extract and filter event information from Clearswift SECURE Email Gateway appliances. The app sets the correct sourcetype and adds fields required for CIM compliance.
No scripts or binaries are included.
Version 1.2.0 of the Clearswift SECURE Email Gateway Add-on for Splunk is compatible with:
Splunk versions | 9.x |
---|---|
CIM | 5.3, 5.2, 5.1, 4.19 |
Platforms | Platform independent |
Vendor Products | Clearswift SECURE Email Gateway |
Lookup file changes |
Clearswift SECURE Email Gateway Add-on for Splunk includes the following new features:
- Renamed message_id as internal_message_id.
Version 1.2.0 of the Clearswift SECURE Email Gateway Add-on for Splunk fixes the following issues:
- None
Version 1.2.0 of the Clearswift SECURE Email Gateway Add-on for Splunk has the following known issues:
- None known
Version 1.2.0 of the Clearswift SECURE Email Gateway Add-on for Splunk incorporates the following third-party software or libraries.
- None
**This app is community supported on a best effort basis. In case you have needs for professional support billed by the hour, please contact the author.
- Access questions and answers specific to the Clearswift SECURE Email Gateway Add-on for Splunk at https://community.splunk.com/t5/c-oqeym24965/Clearswift+SECURE+Email+Gateway+Add-on+for+Splunk+Enterprise/pd-p/2916
Clearswift SECURE Email Gateway Add-on for Splunk supports the following server platforms in the versions supported by Splunk :
- Windows 7, 8, and 8.1 (64-bit)
- Windows Server 2008, 2008 R2, 2012 and 2012 R2 (64-bit)
- Windows 7, and 8 and 8.1 (32-bit)
- Windows Server 2008 (32-bit)
- 2.6+ kernel Linux distributions (64-bit)
- 2.6+ kernel Linux distributions (32-bit)
- Solaris 10, 11 (64-bit)
- Solaris 10, 11 (SPARC)
- OSX 10.8 (Intel)
- OSX 10.9 (Intel)
- OSX 10.10 (Intel)
- FreeBSD 8, and 9 (64-bit)
- AIX 6.1, 7.1
To function properly, Clearswift SECURE Email Gateway Add-on for Splunk requires the following software:
- Optional: Splunk App for Enterprise Security
Because this add-on runs on Splunk, all of the Splunk Enterprise system requirements apply.
Download the Clearswift SECURE Email Gateway Add-on for Splunk at https://splunkbase.splunk.com/app/2916/
To install and configure this app on your supported platform, follow these steps:
- In your Splunk Enterprise web interface, click on App(s) -> Manage Apps
- Click on Install app from file
- Select the file you downloaded, Click Upload, optionally selecting Upgrade app if you are upgrading from an earlier version. Restart Splunk if required
Follow these steps to install the app in a single server instance of Splunk Enterprise:
- In your Splunk Enterprise web interface, click on App(s) -> Manage Apps
- Click on Install app from file
- Select the file you downloaded, Click Upload, optionally selecting Upgrade app if you are upgrading from an earlier version. Restart Splunk if required
Install to search head
- In your Splunk Enterprise web interface, click on App(s) -> Manage Apps
- Click on Install app from file
- Select the file you downloaded, Click Upload, optionally selecting Upgrade app if you are upgrading from an earlier version. Restart Splunk if required
Install to indexers
- In your Splunk Enterprise web interface, click on App(s) -> Manage Apps
- Click on Install app from file
- Select the file you downloaded, Click Upload, optionally selecting Upgrade app if you are upgrading from an earlier version. Restart Splunk if required
Install to forwarders
This app should not be installed on forwarders.
Follow the same steps as Install to search head.
Follow the same steps as Install to search head.
-
Install in $SPLUNK_HOME/etc/apps/TA-Clearswift_SEG
-
Create a TCP input on one of your Splunk servers or a forwarder with sourcetype set to clearswift:seg.
-
Configure your Clearswift SECURE Email Gateway appliances to send their Audit and Message syslogs to the TCP input created in step 1.
-
Restart Splunk
This app provides search-time knowledge for the following types of data from Clearswift SECURE Email Gateway:
Search-time
- clearswift:seg - Syslog events from your appliances
These data types support the following Common Information Model data models:
Source Type | CIM Data Models |
---|---|
clearswift:seg | Authentication |
The Clearswift SECURE Email Gateway Add-on for Splunk contains 1 lookup file.
clearswift_seg_actions.csv
Maps a vendor action to a CIM compliant action.
- File location: lookups/clearswift_seg_actions.csv
- Lookup fields: vendor_action, action
- Lookup contents: See the file contents