Splunk Phantom Validated Architectures
Splunk Phantom Validated Architectures
Version 2.0
Product Best Practices
SSVAs - 1 – v2.0
SSVAs - 2 – v2.0
Table of Contents
SSVAs - 3 – v2.0
Introduction
Splunk SOAR Validated Architectures (SSVAs) are proven reference architectures for stable, efficient, and
repeatable Splunk SOAR deployments. Many of Splunk's existing customers have experienced rapid adoption
and expansion, leading to certain challenges as they attempt to scale. New Splunk SOAR customers are
increasingly looking for guidelines and certified architectures to ensure that their initial deployment is built on a
solid foundation. SSVAs have been developed to help our customers with these growing needs.
Whether you are a new or existing Splunk SOAR customer, SSVAs will help you build an environment that is
easier to maintain and simpler to troubleshoot. SSVAs are designed to provide you with the best possible results
while minimizing your total cost of ownership. Additionally, your entire Splunk SOAR foundation will be based on a
repeatable architecture which will allow you to scale your deployment as your needs evolve over time.
SSVAs offer topology options that consider a wide array of organizational requirements, so you can easily
understand and find a topology that is right for your requirements. The Splunk SOAR Validated Architectures
selection process will help you match your specific requirements to the topology that best meets your
organization's needs. If you are new to Splunk SOAR, we recommend implementing a Validated Architecture for
your initial deployment. If you are an existing customer, we recommend that you explore the option of aligning
with a Validated Architecture topology. Unless you have unique requirements that make it necessary to build a
custom architecture, it is very likely that a Validated Architecture will fulfill your requirements while remaining cost
effective.
This white paper will provide you with an overview of SSVAs. Within this whitepaper, you will find the resources
you need to go through the SSVA selection process, including the requirements questionnaire, deployment
topology diagrams, design principles, and general guidelines.
If you need assistance implementing a Splunk SOAR Validated Architecture, contact Splunk Professional
Services (https://www.splunk.com/en_us/support-and-services/splunk-services.html).
Document Structure
SSVAs are broken into three major content areas:
1. Automation and Case Management Tier
Automation and Case Management covers the architecture tier that provides the Splunk SOAR functionality –
front-end interface, playbook automation, and data storage.
2. Integrations Tier
The Integrations Tier section guides you in choosing the right integrations to meet your requirements.
3. Design Principles and Best Practices
Design Principles and Best Practices apply to your architecture as a whole and will help you make the correct
choices when working out the details of your deployment.
SSVAs - 4 – v2.0
Reasons to Use Splunk SOAR Validated Architectures
Implementing a Validated Architecture will empower you to design and deploy Splunk SOAR more confidently.
SSVAs will help you solve some of the most common challenges that organizations face, including:
Performance
● Organizations want to see improvements in performance and stability.
Complexity
● Organizations sometimes run into the pitfalls of custom-built deployments, especially when they have grown
too rapidly or organically. In such cases, unnecessary complexity may have been introduced into the
environment. This complexity can become a serious barrier when attempting to scale.
Efficiency
● To derive the maximum benefits from the Splunk deployment, organizations must improve the efficiency of
operations and accelerate time to value.
Cost
● Organizations are seeking ways to reduce total cost of ownership (TCO), while fulfilling all of their
requirements.
Agility
● Organizations will need to adapt to change as they scale and grow.
Maintenance
● Optimization of the environment is often necessary in order to reduce maintenance efforts.
Scalability
● Organizations must have the ability to scale efficiently and seamlessly.
Verification
● Stakeholders within the organization want the assurance that their Splunk deployment is built on best
practices.
The system meets The system can The system is The system is The system is
customer maintain an designed to scale designed to centrally operable
continuity optimal level of on all tiers, protect data, and manageable
requirements is service under allowing you to configurations, across all tiers.
able to recover varying usage handle increased and assets while
from planned and patterns. workloads continuing to
unplanned outages effectively. deliver value.
or disruptions.
These pillars are in direct support of the Platform Management & Support Service in the Splunk Center of
Excellence model.
SSVAs - 5 – v2.0
● Deployment technologies, such as operating systems and server hardware, are considered implementation
choices in the context of SSVAs. Different customers will have different choices, so a generalization is not
easily possible.
● Deployment sizing requires an evaluation of data ingest volume, data types, file volumes, and playbook use
cases, which tend to be very customer-specific and generally have no bearing on the fundamental
deployment architecture itself.
● Customer should engage with Professional Services to ensure that proper sizing and adequate loading is
configured. Currently, there is no formal sizing guides for Splunk SOAR. There is a recommended single
instance sizing for productions systems located here for on premise systems:
https://docs.splunk.com/Documentation/Phantom/latest/Install/ProdRequirements
Clustered and non-clustered Implementation choices (OS, bare metal vs. virtual vs. Cloud etc.).
deployment options.
Deployment sizing.
Diagrams of the reference
architecture. A prescriptive approval of your architecture. Note: SSVAs provide
recommendations and guidelines, so you can ultimately make the right
Guidelines to help you select decision for your organization.
the architecture that is right for you
A topology suggestion for every possible deployment scenario. In
Tier-specific recommendations. some cases, unique factors may require a custom architecture to be
developed. Splunk experts are available to help with any custom
Best practices for building out solutions you need. If you are an existing customer, reach out to your
your Splunk SOAR deployment Splunk Account Team. If you are new to Splunk, you can reach us here
(https://www.splunk.com/en_us/talk-to-sales.html).
Consultants Responsible for providing services for Splunk architecture, design, and implementation.
Splunk SOAR Responsible for managing the Splunk SOAR product lifecycle.
Specialists
Managed Service Entities that deploy and run Splunk as a service for customers.
Providers
SSVAs - 6 – v2.0
1.4 Overview of the Splunk SOAR Validated Architectures Selection
Process
The Splunk SOAR Validated Architectures selection process will help you identify the simplest and most
streamlined architecture that meets all of your organization's needs.
Step 2: Choose a Topology Choose a ● You'll choose a topology that best meets your
for: topology that requirements.
meets
Automation and Case ● Keep things simple and in accordance with the
identified
Management SSVA, so you can appreciate the easier path to
requirements.
scalability.
For diagrams and descriptions of topology options,
refer to Step 2 below.
Step 3: Apply Design Prioritize your ● Each design principle reinforces one or more of
Principles and Best design the pillars of Splunk SOAR Validated
Practices principles and architectures.
review tier-
● You'll prioritize design principles in accordance
specific
with the needs of your organization.
implementation
best practices. ● Tier-specific recommendations will guide your
topology implementation.
For a breakdown of design principles, refer to Step
3 below.
D Category "D" indicates a distributed Splunk SOAR deployment across two sites configured in
Warm Standby Mode. Warm Standby is not supported with externalized shared services.
C Category "C" indicates the need for a clustered automation and case management tier (data
replication and high capacity for automation is required). Clustered SOAR deployments always
require externalized shared services.
SSVAs - 8 – v2.0
Instance Requirements Categories
Category Explanation
Number
0 Category "0" indicates a Software as a Service model and no physical hardware is required.
2 Category "2" indicates the need for multiple hardware/virtual instances minimum of 3 and up to 8
separate hardware instances per site
* Instance is defined as a single-instance appliance (virtual or on physical hardware), single-instance with external
shared components, a SaaS tenant, or a single SOAR cluster
Integration Tier Categories
Category Explanation
Code
E Category “E” indicates that SOAR will leverage an external Splunk instance for custom reporting
capability
E+ Category “E+” indicates that SOAR will leverage one or all of the optional customer provided load
balancers, NFS, or utilize AWS Services
CE Category “CE” indicates that SOAR will leverage an external Splunk Cloud Enterprise instance
for custom reporting capability or ingestion source.
CE+ Category “CE+” indicates that SOAR will leverage an external Splunk Cloud Enterprise instance
for custom reporting capability and AWS Services
SSVAs - 9 – v2.0
# Core
Platform Instance
Question Considerations Impact on Topology Topology Requirements
SSVAs - 10 – v2.0
# Core
Platform Instance
Question Considerations Impact on Topology Topology Requirements
SSVAs - 11 – v2.0
1.5.2.2 Questionnaire 1: Define your requirements for integrations:
# Question Considerations Impact on Topology Integration
Requirements
4 Do you require the If you are using Splunk Requires the use of CE
ability to integrate Cloud or Cloud ES and Splunk SOAR in the
Splunk Cloud yet want SOAR on- DMZ or VPC
Infrastructure with premises only. connections to provide
customer provided cloud to premise
infrastructure (on connectivity.
premise)
5 Do you require the If the customer wants to Custom reporting and CE+
ability to integrate provide separate file dashboards require an
Splunk Cloud services or database external Splunk
Infrastructure with services. instance to act as the
customer provided or SOAR Reporting Tier
If you are using Splunk
other Cloud
Cloud or Cloud ES and
infrastructure
yet want to integrate
SOAR
SSVAs - 12 – v2.0
Example #1
Let's say you answered "yes" to questions #4, #5 and #7, and you need custom reporting requirements (1b.
Question #2). You will end up with a topology category of "C1E", indicating the need for a clustered indexing tier
with an external reporting server.
Example #1
Let's say you answered "yes" to questions #4, #5 and #7, and you need custom reporting requirements (1b.
Question #2). You will end up with a topology category of "C1E", indicating the need for a clustered indexing tier
with an external reporting server(s).
SSVAs - 13 – v2.0
1.6.2 Non-clustered deployment options
Below you will find the following the available topology options:
Type of Deployment Topology Category Code(s)
SSVAs - 14 – v2.0
1.6.2.1 Single Server Deployment (S0)
SOAR
Automation Broker
This deployment topology provides you with a very cost-effective ● Scalability provided by Splunk
solution if your environment meets all the following criteria: managed infrastructure
a) you have requirements to provide high-availability or automatic ● Constrained to regional
disaster recovery for your Splunk SOAR Deployment, deployments
b) your daily event ingestion is < 750 events per day, and ● Limited to Internet accessible
integrations or Automation
c) you have approximately 20 concurrent users in your environment
Broker integrations
d) suitable for a production environment
The primary benefits of this topology include easy manageability, good
search performance for smaller ingest and concurrent user count.
This topology is commonly used in production environments and the
primary benefits of this topology include easy manageability and a
fixed TCO.
SSVAs - 15 – v2.0
1.6.2.2 Single Server Deployment (S0E)
SOAR
Automation Broker
Reporting Tier
Splunk
This deployment topology provides you with a very cost-effective ● Scalability provided by Splunk
solution if your environment meets all the following criteria: managed infrastructure
a) you have requirements to provide high-availability or automatic ● Ingestion and reporting are
disaster recovery for your Splunk SOAR Deployment, mostly provided by Splunk
Integrations
b) your daily event ingestion is < 750 events per day, and
● Splunk forwarding will need
c) you have approximately 20 concurrent users in your environment
access to the public internet
d) suitable for a production environment
● Constrained to regional
The primary benefits of this topology include easy manageability, good deployments
search performance for smaller ingest and concurrent user count.
Common integration with SaaS and hybrid cloud integrations
This topology is commonly used in production environments and the
primary benefits of this topology include easy manageability and a
fixed TCO.
SSVAs - 16 – v2.0
1.6.2.3 Single Server Deployment (S0E+)
SOAR
Automation Broker
Reporting Tier
Splunk
This deployment topology provides you with a very cost-effective ● Scalability provided by Splunk
solution if your environment meets all the following criteria: managed infrastructure
a) you have requirements to provide high-availability or automatic ● Ingestion and reporting are
disaster recovery for your Splunk SOAR Deployment, mostly provided by Splunk
Integrations
b) your daily event ingestion is < 750 events per day, and
● Splunk forwarding will need
c) you have approximately 20 concurrent users in your environment
access to the public internet
d) suitable for a production environment
● Constrained to regional
The primary benefits of this topology include easy manageability, good deployments
search performance for smaller ingest and concurrent user count.
Common integration with SaaS and hybrid cloud integrations
This topology is commonly used in production environments and the
primary benefits of this topology include easy manageability and a
fixed TCO.
SSVAs - 17 – v2.0
1.6.2.4 Single Server Deployment (S0CE)
SOAR
Automation Broker
Reporting Tier
Splunk
This deployment topology provides you with a very cost-effective ● Scalability provided by Splunk
solution if your environment meets all the following criteria: managed infrastructure
a) you have requirements to provide high-availability or automatic ● Ingestion and reporting are
disaster recovery for your Splunk SOAR Deployment, mostly provided by Splunk
Cloud Integrations
b) your daily event ingestion is < 750 events per day, and
● Constrained to regional
c) you have approximately 20 concurrent users in your environment
deployments
d) suitable for a production environment
The primary benefits of this topology include easy manageability, good
search performance for smaller ingest and concurrent user count.
Common integration for SaaS to SaaS Splunk Components
This topology is commonly used in production environments and the
primary benefits of this topology include easy manageability and a
fixed TCO.
SSVAs - 18 – v2.0
1.6.2.5 Single Server Deployment (S1)
This deployment topology provides you with a very cost-effective ● No High Availability
solution if your environment meets all the following criteria:
● Scalability limited by hardware
a) you do not have any requirements to provide high-availability or capacity
automatic disaster recovery for your Splunk SOAR Deployment,
● Reporting limited to standard
b) your daily event ingestion is < ~100 events per day, and SOAR reports and/or API usage
c) you have a small number of users.
d) suitable for development environment
The primary benefits of this topology include easy manageability, good
search performance for smaller ingest and concurrent user count.
This topology is commonly used in development environments and the
primary benefits of this topology include easy manageability and a
fixed TCO.
SSVAs - 19 – v2.0
1.6.2.6 SOAR Server Deployment (S1E)
gFS DB
Reporting Tier
Splunk
This deployment topology provides you with a ● No High Availability for ingestion/automation/reporting
very cost-effective solution if your environment
● Scalability limited by hardware capacity
meets all of the following criteria:
a) you do not have any requirements to provide
high-availability or automatic disaster recovery
for your Splunk SOAR Deployment,
b) your daily event ingestion is < ~100 events
per hour, and
c) you have a small number of users.
d) suitable for development environment
and for developing external SOAR reporting
Externalizing the reporting tier facilitates the
creation of dashboards and custom reports in a
separate Splunk instance.
This topology should be leverage for small
environment that want a simple deployment but
still want the robust and flexible reporting
capabilities that an external reporting tier can
provide.
SSVAs - 20 – v2.0
1.6.2.7 SOAR Single Server deployment with external Shared Services and Internal Reporting (X1)
Automation & Case Management Tier
Splunk
SOAR
Reporting
This deployment topology provides you with a very cost- ● No High Availability for ingestion/automation
effective solution if your environment meets all of the
● Automation scalability limited by hardware
following criteria:
capacity
a) you do not have any requirements to provide high-
● Reporting limited to standard SOAR reports
availability or automatic disaster recovery for your Splunk
SOAR deployment, and/or API usage
SSVAs - 21 – v2.0
1.6.2.8 SOAR Single Server deployment with external Shared Services and Internal Reporting (X1E)
Automation & Case Management Tier
SOAR Node
This deployment topology provides you with a very cost- ● No High Availability for ingestion/automation
effective solution if your environment meets all of the
● Automation scalability limited by hardware
following criteria:
capacity
a) you do not have any requirements to provide high-
availability or automatic disaster recovery for your Splunk
SOAR deployment,
b) your daily data ingest is over ~100 events/hour, and
c) you have a less than 10 users with non-critical use
cases.
This topology is typically used for smaller, non-business-
critical use-cases (often departmental in nature).
By externalizing the shared services, some additional
flexibility in scaling is provided by distributing load across
multiple services.
Externalizing the reporting tier facilitates the creation of
dashboards and custom reports in a separate Splunk
instance.
SSVAs - 22 – v2.0
1.6.2.9 Distributed SOAR Deployment with Warm Standby and Internal Reporting (D1)
Site A Site B
Automation & Case Management Tier Automation & Case Management Tier
Splunk gFS DB Splunk gFS DB
This architecture is suitable for most organizations requiring full ● Limited High Availability
disaster recovery with high availability and multi-regional support.
● Scalability limited by hardware
Automation tier may need to move to a more resilient topology for capacity
environments where recovering from disaster scenarios is of high
importance. In this instance, the SOAR Warm Standby Deployment is
recommended. This architecture maintains the simplicity of keeping all ● Reporting limited to standard
of the SOAR services contained on one server while providing an SOAR reports and/or API usage
additional instance for failover in the event of a primary outage disaster
with recovery in minutes.
This topology is commonly used in production environments and the
primary benefits of this topology include easy manageability and a
fixed TCO.
SSVAs - 23 – v2.0
1.6.2.10 Distributed SOAR Deployment with Warm Standby and Internal Reporting (D2E)
Site A Site B
Automation & Case Management Tier Automation & Case Management Tier
gFS DB gFS DB
This architecture is best suitable for most organizations requiring ● Limited High Availability
full disaster recovery with high availability and multi-regional support.
● Scalability limited by hardware
This supports customers using Splunk SOAR case management
capacity
capabilities.
Automation tier may need to move to a more resilient topology for
environments where recovering from disaster scenarios is of high
importance. In this instance, the SOAR Warm Standby Deployment is
recommended. This architecture maintains the simplicity of keeping all
of the SOAR services contained on one server while providing an
additional instance for failover in the event of a primary outage or site-
level disaster with recovery in minutes.
Optional configurations with a customer provided load balancer will
provide automated failover within seconds.
This automation tier topology is commonly used in production
environments and the primary benefits of this topology include easy
manageability and a fixed TCO.
Externalizing the reporting tier facilitates the creation of dashboards
and custom reports in a separate Splunk instance.
SSVAs - 24 – v2.0
1.6.3.1 High Capacity Clustered Deployment - Single Site (C1E)
SOAR Cluster
This architecture is suitable for organizations that need High Capacity ● No High Availability for SOAR
and high availability for actions and ingestion. Customers should have platform search
an independent regional replication architecture with a recovery time
● No automatic DR capability in
objective of hours and minutes.
case of data center outage
This topology introduces automation high available and high capacity
processing in conjunction with no failover processes. This provides
high availability of data in case of automation peer node, database,
and file services failures. However, you should be aware that this
applies only to the automation tier and does not protect against search
head failure or provide for customized reporting.
A high availability proxy is provided that ensures ensure proper load
balancing of users across the site.
Note: If your category code is C/M1 (i.e., you intend to deploy Splunk
SOAR without any external Splunk instance), a single dedicated
search head is deployed with the appliance and will need to be
externalized also. However, this will only impact global searching on
the platform.
SSVAs - 25 – v2.0
1.6.3.2 Distributed Clustered Deployment - Multiple Site (M2E)
Site A Site B
Automation & Case Management Tier Automation & Case Management Tier
Reporting Tier Shared Services Tier Reporting Tier Shared Services Tier
Splunk Splunk
gFS HA Proxy Cluster DB gFS HA Proxy Cluster DB
This architecture is best suitable for organizations that require High ● No automatic replication
Capacity and Availability requirements and don't have data persistence between sites
or case management requirements for Splunk SOAR and require near
● No automatic DR capability in
instantaneous recovery time objectives.
case of data center outage
This topology introduces automation high available and high capacity
● Limited HA with provided
processing in conjunction with regional failover processes. This
provides high availability of data in case of automation peer node, Splunk components
database, and file services failures. However, you should be aware that
this applies only to the automation tier and does not protect against
search head failure or provide for customized reporting.
Customer provided load balancers and CICD procedures can
provide automated failover with necessary application and playbook
replication between sites.
Note: No event data will be replicated between sites. Distributed
Splunk core architectures can support consistent and multi-site
reporting and data visibility.
SSVAs - 26 – v2.0
1.6.3.3 Distributed Clustered Deployment - Multiple Site (M2CE)
Site A Site B
Automation & Case Management Tier Automation & Case Management Tier
Reporting Tier Shared Services Tier Reporting Tier Shared Services Tier
Splunk Splunk
gFS HA Proxy Cluster DB gFS HA Proxy Cluster DB
This architecture will require consultation with your Splunk Architect ● No automatic replication
for a custom solution. between sites
There are workarounds for limitations with Splunk and customer ● No automatic DR capability in
provide infrastructure case of data center outage
SSVAs - 27 – v2.0
1.6.3.4 Distributed Clustered Deployment - Multiple Site (M2CE+)
Site A Site B
Automation & Case Management Tier Automation & Case Management Tier
Reporting Tier Shared Services Tier Reporting Tier Shared Services Tier
Splunk Splunk
gFS HA Proxy Cluster DB gFS HA Proxy Cluster DB
This architecture will require consultation with your Splunk Architect ● No automatic replication
for a custom solution. between sites
There are workarounds for limitations with Splunk and customer ● No automatic DR capability in
provide infrastructure case of data center outage
SSVAs - 28 – v2.0
1.7 Step 3: Apply Design Principles and Best Practices
SSVAs - 29 – v2.0
S0 - Single Tenant Deployment using Software as a Service with Splunk managed infrastructure
Intentionally left blank for diagram below
SSVAs - 30 – v2.0
Min 4 Cores 8 GBs
SpVA: S0
Automation
Recommended 8 Cores 16 GBs
Broker Sizing
Analyst, Admins
PROS:
Least Administrative overhead
Infrastructure and upgrades managed for customer
Automation Broker Incoming
Port Purpose
CONS:
Used to receive activation notifications from Splunk SOAR Cloud via the gRPC tunnel. This is a
Performance constrained by number of users registration process from the Automation Broker to Spacebridge and provides secure transport to
TCP 443
Automation Broker. gRPC is a end to end encryption via TLS 1.2 from Cloud SOAR to Automation
Broker
Comments: REVISIONS
Standalone Instance
DRAWN Port Purpose
Architect
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
S0E - Single Tenant Deployment using Software as a Service with Splunk managed infrastructure with
Splunk Integrations with on premise integration
Intentionally left blank for diagram below
SSVAs - 31 – v2.0
Min 4 Cores 8 GBs
SpVA: S0E
Automation
Recommended 8 Cores 16 GBs
Broker Sizing
Forwarders
Search Head
Analyst, Admins
Indexers
Splunk
AB TCP 443
Internet
Splunk Infrastructure
Spacebridge
TCP 443 Automation
REST App TCP TCP gRPC Broker
APIs 80, 443 443
Data Firewall TCP 443 HTTP
Splunk> cloud (or custom ports)
SOAR Data
Comments: REVISIONS
External Splunk Instance
REV DESCRIPTION DATE APPROVED Port Purpose
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
1.0 Initial Build 6 Aug 18 TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Standalone Instance
DRAWN Port Purpose
Architect
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
S0E+ - Single Tenant Deployment using Software as a Service with Splunk managed infrastructure with
Splunk Integrations either bring your own cloud
Intentionally left blank for diagram below
SSVAs - 32 – v2.0
Min 4 Cores 8 GBs
SpVA: S0E+
Automation
Recommended 8 Cores 16 GBs
Broker Sizing
Search Head
Cloud infrastructure
Splunk TCP 443
AB
Internet
TCP 443 Automation
Spacebridge gRPC Broker
Comments: REVISIONS
External Splunk Instance
REV DESCRIPTION DATE APPROVED Port Purpose
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
1.0 Initial Build 6 Aug 18 TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Standalone Instance
DRAWN Port Purpose
Architect
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
S0CE - Single Tenant Deployment using Software as a Service with Splunk managed infrastructure and
Splunk Cloud Integrations
Intentionally left blank for diagram below
SSVAs - 33 – v2.0
Min 4 Cores 8 GBs
SpVA: S0CE
Automation
Recommended 8 Cores 16 GBs
Broker Sizing
Search Head
Analyst, Admins
Indexers Splunk> cloud TCP 8088,
Splunk 8089, 9996-7
Mobile TCP 443 Or custom ports
Forwarders
Cloud infrastructure
Splunk TCP 443
AB
Internet
TCP 443 Automation
Spacebridge gRPC Broker
Port Purpose
Used to receive activation notifications from Splunk SOAR Cloud via the gRPC tunnel. This is a
registration process from the Automation Broker to Spacebridge and provides secure transport to
TCP 443
Automation Broker. gRPC is a end to end encryption via TLS 1.2 from Cloud SOAR to Automation
PROS: Broker
Least Administrative overhead
Infrastructure and upgrades managed for customer
Automation Broker Outbound
Comments: REVISIONS
External Splunk Instance
REV DESCRIPTION DATE APPROVED Port Purpose
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
1.0 Initial Build 6 Aug 18 TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Standalone Instance
DRAWN Port Purpose
Architect
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
S1 - Single Server Deployment using embedded Splunk Integration
Intentionally left blank for diagram below
SSVAs - 34 – v2.0
Splunk Phantom Stand-Alone Sizing Chart
Instance Type
Large
Workloads with
active playbooks
32
Memory GB
64
SpVA: S1
hour
Medium 16 32
Up to 7000 events
per hour Default OVA Build Based on size (GB): 200
Device Mountpoint Size (GB)
Small
Up to 4000 events
8 16 Recommended /dev/mapper/centos-var / 40
Development ONLY
per hour Sizing /dev/mapper/centos-opt_phantom_vault
/dev/mapper/centos-opt_phantom_data
/opt/phantom/vault*
/opt/phantom/data*
45
45
Tiny 8 8 /dev/mapper/centos-tmp /tmp 10
< 4000 events per
Development ONLY hour /dev/mapper/centos-var /var 15
/dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1
/dev/mapper/centos-var_tmp /var/tmp 15
/dev/mapper/centos-home /home 20
Analyst, Admins
TCP 443, 22
Internet
REST App
TCP 80, 443
APIs Phantom
Data
Firewall
TCP 443
(or custom ports)
HTTP
Data
PROS:
Least Administrative overhead
Least TCO going towards production
CONS:
Performance constrained by number of available connections
Backup and Recover is customer responsibility
No failover mechanisms
Comments: REVISIONS
Standalone Instance
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
S1E - Single Server Deployment using Splunk Enterprise Integration
Intentionally left blank for diagram below
SSVAs - 35 – v2.0
Splunk Phantom Stand-Alone Sizing Chart
Instance Type
Large
Workloads with
active playbooks
32
Memory GB
64
SpVA: S1E
hour
Medium 16 32
Up to 7000 events
Production Build Recommend Drive Mappings Based on size (GB): 1024
per hour Device Mountpoint Size (GB)
Small
Up to 4000 events
8 16 Recommended /dev/mapper/centos-root / 204.8
Development ONLY /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 245.8
per hour Sizing /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 307.2
Tiny 8 8 /dev/mapper/centos-tmp /tmp 51.2
< 4000 events per
Development ONLY /dev/mapper/centos-var /var 51.2
hour /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 5.1
/dev/mapper/centos-var_tmp /var/tmp 51.2
/dev/mapper/centos-home /home 102.4
Total: 1018.9
Standalone
Internet Phantom
Forwarders
REST App TCP
APIs 80, 443
Data
Firewall
Indexers
TCP 443
(or custom ports)
Splunk
Search Head
REST
Analyst, Admins
Data
PROS:
Least Administrative overhead with improved UI performance
NFS Server
Least number of resource contention
Easiest to manage and gradual expansion increase process Port Purpose
TCP 2049 NFS Service
CONS: UDP 111 Portmapper service, needed for NFS
TCP 111 Portmapper service, needed for NFS
Performance constrained by number of available connections
No failover mechanisms
External Splunk Instance
Comments: This is our Default PS Recommendation for Single Instance deployments Port Purpose
REVISIONS
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
REV DESCRIPTION DATE APPROVED TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Initial Build capable for most loads < 1500 events per day and for teams using
1.0 6 Aug 18
Case Management and Headless usage
Standalone Instance
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
X1 - Single Server Deployment using external Shared Services with embedded Splunk
Intentionally left blank for diagram below
SSVAs - 36 – v2.0
Splunk Phantom Stand-Alone Sizing Chart
Instance Type
Large
Workloads with
active playbooks
32
Memory GB
64
SpVA: X1
hour
Medium 16 32
Up to 7000 events
per hour Default OVA Build Based on size (GB): 200
Small
Up to 4000 events
8 16 Recommended Device
/dev/mapper/centos-var
Mountpoint
/
Size (GB)
40
per hour Sizing /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 45
Tiny 8 8
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 45
< 4000 events per /dev/mapper/centos-tmp /tmp 10
hour /dev/mapper/centos-var /var 15
/dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1
/dev/mapper/centos-var_tmp /var/tmp 15
REST /dev/mapper/centos-home /home 20
Data
TCP 443
(or custom ports)
Standalone
Internet Phantom
External
PostgrSQL
Database
PROS:
Least Administrative overhead with improved UI performance
Least number of resource contention External Splunk Instance
Easiest to manage and gradual expansion increase process Port Purpose
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
CONS: TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
Performance constrained by number of available connections TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
No failover mechanisms
POSTGRES Instance
Comments: This model is only used for prior to clustering and single instance support REVISIONS
without warm standby. Port Purpose
TCP 22 Used for administering the OS that POSTGRES is running on
REV DESCRIPTION DATE APPROVED TCP 5432 PostgreSQL Service. Can be blocked if the DB server is a different host than the shared services node.
Initial Build capable for most loads < 1500 events per day and for teams using
1.0 6 Aug 18
Case Management and Headless usage
Standalone Instance
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
TCP 80
DRAWN only to redirect connections to TCP 443. Can be blocked.
Architect
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
X1E - Single Server Deployment using external Shared Services with Splunk Enterprise Integration
Intentionally left blank for diagram below
SSVAs - 37 – v2.0
Splunk Phantom Stand-Alone Sizing Chart
Instance Type
Large
Workloads with
active playbooks
32
Memory GB
64
SpVA: X1E
hour
Medium 16 32
Up to 7000 events
per hour Default OVA Build Based on size (GB): 200
Small
Up to 4000 events
8 16 Recommended Device
/dev/mapper/centos-var
Mountpoint
/
Size (GB)
40
per hour Sizing /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 45
Tiny 8 8 External Splunk Instance /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 45
< 4000 events per /dev/mapper/centos-tmp /tmp 10
hour /dev/mapper/centos-var /var 15
/dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1
/dev/mapper/centos-var_tmp /var/tmp 15
REST /dev/mapper/centos-home /home 20
Data
Forwarders
TCP 443
(or custom ports)
Indexers
Standalone
Internet Phantom
Splunk
REST App TCP Search Head
APIs 80, 443
Data
External
PostgrSQL
Database
PROS:
Least Administrative overhead with improved UI performance
Least number of resource contention External Splunk Instance
Easiest to manage and gradual expansion increase process Port Purpose
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
CONS: TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
Performance constrained by number of available connections TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
No failover mechanisms
POSTGRES Instance
Comments: This model is only used for prior to clustering and single instance support REVISIONS
without warm standby. Port Purpose
TCP 22 Used for administering the OS that POSTGRES is running on
REV DESCRIPTION DATE APPROVED TCP 5432 PostgreSQL Service. Can be blocked if the DB server is a different host than the shared services node.
Initial Build capable for most loads < 1500 events per day and for teams using
1.0 6 Aug 18
Case Management and Headless usage
Standalone Instance
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
TCP 80
DRAWN only to redirect connections to TCP 443. Can be blocked.
Architect
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
D2 - Distributed Warm Standby Deployment using embedded Splunk integration
Intentionally left blank for diagram below
SSVAs - 38 – v2.0
Splunk Phantom Stand-Alone Sizing Chart
SpVA: D2
Instance Type Workloads with CPU Memory GB
active playbooks cores
Large 32 64
>7000 events per
hour
Medium
Up to 7000 events
16 32 Recommended Production Build Recommend Drive Mappings Based on size (GB): 1024
per hour Sizing Device Mountpoint Size (GB)
Small 8 16 /dev/mapper/centos-root / 204.8
Up to 4000 events
Development ONLY
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 245.8
per hour /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 307.2
Tiny 8 8 /dev/mapper/centos-tmp /tmp 51.2
< 4000 events per
Development ONLY
/dev/mapper/centos-var /var 51.2
hour /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 5.1
/dev/mapper/centos-var_tmp /var/tmp 51.2
/dev/mapper/centos-home /home 102.4
Total: 1018.9
Syncronization
Primary
Failover (Prior Standby)
DNS Event
Balancer
Phantom
Primary Syncronization
DC 2
Primary Standby
Analyst, Admins
PROS:
Least number of resources NFS Server
Native multi-site redundancy and high availability Port Purpose
Easiest to manage and gradual expansion increase process TCP 2049 NFS Service
UDP 111 Portmapper service, needed for NFS
CONS: TCP 111 Portmapper service, needed for NFS
Performance constrained by number of available connections
Failover is scripted and can be semi-automated or manual
External Splunk Instance
Comments: This is our Default PS Recommendation for Multiple Site Survivability Port Purpose
REVISIONS
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
REV DESCRIPTION DATE APPROVED TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Initial Build capable for most loads < 1500 events per day and for teams using
1.0 3 MAR 19
Case Management
Standalone Instance
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Customer
TO Company Company Confidential
D2E - Distributed Warm Standby Deployment using embedded Splunk with customer provided
Infrastructure
Intentionally left blank for diagram below
SSVAs - 39 – v2.0
Splunk Phantom Stand-Alone Sizing Chart
SpVA: D2E
Instance Type Workloads with CPU Memory GB
active playbooks cores
Large 32 64
>7000 events per
hour
Medium
Up to 7000 events
16 32 Recommended Production Build Recommend Drive Mappings Based on size (GB): 1024
per hour Sizing Device Mountpoint Size (GB)
Small 8 16 /dev/mapper/centos-root / 204.8
Up to 4000 events
Development ONLY
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 245.8
per hour /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 307.2
Tiny 8 8 /dev/mapper/centos-tmp /tmp 51.2
< 4000 events per
Development ONLY
/dev/mapper/centos-var /var 51.2
hour /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 5.1
/dev/mapper/centos-var_tmp /var/tmp 51.2
External Splunk Instance /dev/mapper/centos-home /home 102.4
Total: 1018.9
Syncronization
Indexers
Internet Warm-Standby Phantom Server
Primary Failover
REST HTTP RSync
App TCP Event
postgreSQL Standby
APIs 80, 443
DB Transaction (Prior Primary)
Data Data Splunk
Search Head
TCP 443 TCP 22, 5432
Firewall (or custom
ports) Syncronization
Primary
Failover (Prior Standby)
DNS Event
Balancer
Phantom
Primary Syncronization
DC 2
Primary Standby
Analyst, Admins
PROS:
Least number of resources NFS Server
Native multi-site redundancy and high availability Port Purpose
Easiest to manage and gradual expansion increase process TCP 2049 NFS Service
UDP 111 Portmapper service, needed for NFS
CONS: TCP 111 Portmapper service, needed for NFS
Performance constrained by number of available connections
Failover is scripted and can be semi-automated or manual
External Splunk Instance
Comments: This is our Default PS Recommendation for Multiple Site Survivability Port Purpose
REVISIONS
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
REV DESCRIPTION DATE APPROVED TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Initial Build capable for most loads < 1500 events per day and for teams using
1.0 3 MAR 19
Case Management
Standalone Instance
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Customer
TO Company Company Confidential
D2E+ - Distributed Warm Standby Deployment using embedded Splunk with customer provided
Infrastructure
Intentionally left blank for diagram below
SSVAs - 40 – v2.0
Splunk Phantom Stand-Alone Sizing Chart
SpVA: D2E+
Instance Type Workloads with CPU Memory GB
active playbooks cores
Large 32 64
>7000 events per
hour
Medium
Up to 7000 events
16 32 Recommended Production Build Recommend Drive Mappings Based on size (GB): 1024
per hour Sizing Device Mountpoint Size (GB)
Small 8 16 /dev/mapper/centos-root / 204.8
Up to 4000 events
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 245.8
per hour /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 307.2
Tiny 8 8 /dev/mapper/centos-tmp /tmp 51.2
< 4000 events per
/dev/mapper/centos-var /var 51.2
hour /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 5.1
/dev/mapper/centos-var_tmp /var/tmp 51.2
External Splunk Instance /dev/mapper/centos-home /home 102.4
Total: 1018.9
Syncronization
TCP 443
Indexers
Internet (or custom
ports) Warm-Standby Phantom Server
Primary Failover
REST HTTP RSync
App TCP Event
postgreSQL Standby
APIs 80, 443
DB Transaction (Prior Primary)
Data Data Splunk
Search Head
Firewall TCP 22, 5432
Syncronization
Primary
Failover (Prior Standby)
DNS Event
Balancer
Phantom
Primary Syncronization
DC 2
NFS Server
Vault Mount
Point Primary Standby
Analyst, Admins
PROS:
Least number of resources NFS Server
Native multi-site redundancy and high availability Port Purpose
Easiest to manage and gradual expansion increase process TCP 2049 NFS Service
UDP 111 Portmapper service, needed for NFS
CONS: TCP 111 Portmapper service, needed for NFS
Performance constrained by number of available connections
Failover is scripted and can be semi-automated or manual
External Splunk Instance
Comments: This is our Default PS Recommendation for Multiple Site Survivability Port Purpose
REVISIONS
TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
REV DESCRIPTION DATE APPROVED TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Initial Build capable for most loads < 1500 events per day and for teams using
1.0 3 MAR 19
Case Management
Standalone Instance
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Customer
TO Company Company Confidential
D2CE - Distributed Warm Standby Deployment with Splunk Cloud Integration
Intentionally left blank for diagram below
SSVAs - 41 – v2.0
SpVA: D2CE
Splunk Phantom Single Instance Sizing for Amazon Web Services
Instance Type Workloads with an EC2 Instance
active playbook Sizing
Large c5.12xlarge
>7000 events per hour
Medium
Recommended Production from
Up to 7000 events per
c5.4xlarge Recommended
Production Build Recommend Drive Mappings Based on size (GB): 1024
public website hour Sizing Device Mountpoint Size (GB)
Small c5.2xlarge /dev/mapper/centos-root / 204.8
Up to 4000 events per
Recommended Development from /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 245.8
public website hour
Bare minimum from configuration
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 307.2
/dev/mapper/centos-tmp /tmp 51.2
Tiny c5.2xlarge /dev/mapper/centos-var /var 51.2
< 4000 events per
Development ONLY /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 5.1
hour
/dev/mapper/centos-var_tmp /var/tmp 51.2
/dev/mapper/centos-home /home 102.4
Total: 1018.9
External Splunk Instance
Search Head
Phantom
Standby Warm Standby Process Site A Site B
DC 1
Phantom Server
Standby
Inside
Firewall
Syncronization
TCP
443, 22
Indexers Splunk> cloud
TCP Analyst, Admins
Phantom Server
Elastic Load Primary Failover
8088, 8089, 9996-7
Balancers Event
Forwarders Standby
Warm-Standby (Prior Primary)
Syncronization
Default access to Phantom on Internal infrastructure. Splunk Cloud must have the Standalone Instance
1.2 26 NOV 19
Phantom app and API access. Phantom is in the DMZ or DMZ like
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
1.3 Updated ports and localized External Splunk architecture 27 APR 20 TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Customer
TO Company Company Confidential
D2CE+ - Distributed Warm Standby Deployment with Splunk Cloud Integration
Intentionally left blank for diagram below
SSVAs - 42 – v2.0
SpVA: D2CE+
Splunk Phantom Single Instance Sizing for Amazon Web Services
Instance Type Workloads with an EC2 Instance
active playbook Sizing
Large c5.12xlarge
>7000 events per hour
Medium
Recommended Production from
Up to 7000 events per
c5.4xlarge Recommended
Production Build Recommend Drive Mappings Based on size (GB): 1024
public website hour Sizing Device Mountpoint Size (GB)
Small
Up to 4000 events per
c5.2xlarge /dev/mapper/centos-root / 204.8
Recommended Development from /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 245.8
public website hour
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 307.2
Bare minimum from configuration
/dev/mapper/centos-tmp /tmp 51.2
Tiny c5.2xlarge /dev/mapper/centos-var /var 51.2
< 4000 events per
Development ONLY /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 5.1
hour
/dev/mapper/centos-var_tmp /var/tmp 51.2
/dev/mapper/centos-home /home 102.4
Total: 1018.9
External Splunk Instance Phantom
Search Head Standby
DC 1
Warm Standby Process Site A Site B
Phantom Server
Standby
Inside
Firewall
Syncronization
TCP
TCP 443, 22
Indexers Splunk> cloud 8088, 8089, Elastic Load
9996-7 Balancers Phantom Server
Analyst, Admins Primary Failover
Forwarders Standby Event
Warm-Standby (Prior Primary)
Syncronization
TCP 443/22
(or custom Inside Analyst, Admins
ports) Firewall
Primary Standby
Phantom
Primary PROS: NFS Server
DC 2 Least number of resources
Port Purpose
Native multi-site redundancy and high availability TCP 2049 NFS Service
Easiest to manage and gradual expansion increase process UDP 111 Portmapper service, needed for NFS
TCP 111 Portmapper service, needed for NFS
CONS:
Performance constrained by number of available connections
Failover is scripted and can be semi-automated or manual External Splunk Instance
Port Purpose
Comments: This is our Default PS Recommendation for Splunk Phantom and Cloud TCP 443 Used for sending Alerts to Phantom from Splunk> Cloud Phantom Add-On
REVISIONS
implementations. Phantom can be internalized (inside the DMZ), however some features will TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
be reduced. TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
REV DESCRIPTION DATE APPROVED TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Initial Build capable for most loads < 1500 events per day and for teams using
1.0 3 MAR 19
Case Management
Default access to Phantom on Internal infrastructure. Splunk Cloud must have the Standalone Instance
1.2 26 NOV 19
Phantom app and API access. Phantom is in the DMZ or DMZ like
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
1.3 Updated ports and localized External Splunk architecture 27 APR 20 TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Customer
TO Company Company Confidential
C1 - High Capacity Clustered Deployment
Intentionally left blank for diagram below
SSVAs - 43 – v2.0
Splunk Phantom Cluster Sizing Plan
Cluster Type Workloads with
active playbooks
DB/
Common
Node
CPU
DB/Common
Node Memory
GB
Phantom
Node CPU
cores
Phantom
Node Memory
GB
Number of
Phantom
Nodes SpVA: C1
cores
XLarge 32 64 16-32 32 8
>50,000
Production Node Drive Mappings Based on size (GB): 200
Large 16 64 8 16 8 Device Mountpoint Size (GB)
Up to
/dev/mapper/centos-root / 40.0
25,000-50,000 per /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 20.0
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 100.0
hour
/dev/mapper/centos-tmp /tmp 10.0
/dev/mapper/centos-var /var 10.0
Medium 16 32 8 16 5
Up to 25,000 /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1.0
/dev/mapper/centos-var_tmp /var/tmp 10.0
events per hour
/dev/mapper/centos-home /home 20.0
Small
Up to 10,000
8 32 4 8 3 Recommended Total: 211.0
/dev/mapper/centos-root / 307.2
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 0.0
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 460.8
/dev/mapper/centos-tmp /tmp 76.8
TCP 443, /dev/mapper/centos-var /var 76.8
8088-89 /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 7.7
9996-97 /dev/mapper/centos-var_tmp /var/tmp 76.8
Phantom
Node /dev/mapper/centos-home /home 153.6
Splunk Total: 1159.7
Embeded
Production File Drive Mappings Based on size (GB): 1536
Device Mountpoint Size (GB)
<glusterfs_hostname>:/apps /<phantom_install_dir>/apps 153.6
<glusterfs_hostname>:/app_states /<phantom_install_dir>/apps 153.6
Internet <glusterfs_hostname>:/scm /<phantom_install_dir>/local_data/app_states 153.6
HAProxy
<glusterfs_hostname>:/tmp /<phantom_install_dir>/scm 153.6
<glusterfs_hostname>:/tmp /<phantom_install_dir>/tmp/shared 153.6
REST App TCP 80, <glusterfs_hostname>:/vault /<phantom_install_dir>/vault 768.0
APIs 443 Total: 1536.0
Phantom NFS Server
Data Node
NFS Server
Firewall
TCP 4369,5671, Port Purpose
8300,8301,8302, TCP 2049 TCP 2049 NFS Service
UDP 111 Portmapper service, needed for NFS
15672, 25672 UDP/TCP 111
TCP 443 TCP 111 Portmapper service, needed for NFS
(or custom ports)
TCP 22
TCP 5432 External Splunk Instance
POSTGRES Port Purpose
Phantom Database TCP 443 Use for Sending Notables to Phantom
Master Cluster TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
REST TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
TCP
Analyst, Admins
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Data
PROS:
Future Proofed for performance and no additional configuration required
Highest capacity design possible POSTGRES Instance
Port Purpose
TCP 22 Used for administering the OS that POSTGRES is running on
CONS: TCP 5432 PostgreSQL Service. Can be blocked if the DB server is a different host than the shared services node.
Complicated implementation
Requires a lot of unused resource until load is realized
Cluster Message Queue
Site to Site Sync isn’t possible data is single homed to the regional infrastructure
Data is single homed to the sent site. Port Purpose
TCP 4369 RabbitMQ / Erlang port mapper. All cluster nodes must be able to talk to each-other on this port.
TCP 5671 RabbitMQ service. All cluster nodes must be able to talk to each-other on this port.
TCP 8300 Consul RPC services. All cluster nodes must be able to talk to each-other on this port.
Comments: REVISIONS TCP 8301 Consul internode communication. All cluster nodes must be able to talk to each-other on this port.
TCP 8302 Consul internode communication. All cluster nodes must be able to talk to each-other on this port.
RabbitMQ admin UI and HTTP api service. UI is disabled by default. All cluster nodes must be able to
REV DESCRIPTION DATE APPROVED TCP 15672
talk to each-other on this port.
TCP 25672 RabbitMQ internode communications. All cluster nodes must be able to talk to each-other on this port.
1.0 Initial Build 6 Aug 18
Cluster Node
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
C1E - High Capacity Clustered Deployment with Splunk Enterprise Integration
Intentionally left blank for diagram below
SSVAs - 44 – v2.0
Splunk Phantom Cluster Sizing Plan
Cluster Type Workloads with
active playbooks
DB/
Common
Node
CPU
DB/Common
Node Memory
GB
Phantom
Node CPU
cores
Phantom
Node Memory
GB
Number of
Phantom
Nodes SpVA: C1E
cores
XLarge 32 64 16-32 32 8
>50,000
Production Node Drive Mappings Based on size (GB): 200
Large 16 64 8 16 8 Device Mountpoint Size (GB)
Up to
/dev/mapper/centos-root / 40.0
25,000-50,000 per /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 20.0
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 100.0
hour
/dev/mapper/centos-tmp /tmp 10.0
/dev/mapper/centos-var /var 10.0
Medium 16 32 8 16 5
Up to 25,000 /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1.0
/dev/mapper/centos-var_tmp /var/tmp 10.0
events per hour
/dev/mapper/centos-home /home 20.0
Small
Up to 10,000
8 32 4 8 3 Recommended External Splunk Instance Total: 211.0
/dev/mapper/centos-root / 307.2
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 0.0
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 460.8
/dev/mapper/centos-tmp /tmp 76.8
TCP 443, /dev/mapper/centos-var /var 76.8
Forwarders /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 7.7
8088-89
Phantom 9996-97 /dev/mapper/centos-var_tmp /var/tmp 76.8
Node /dev/mapper/centos-home /home 153.6
Total: 1159.7
Indexers
Production File Drive Mappings Based on size (GB): 1536
Device Mountpoint Size (GB)
<glusterfs_hostname>:/apps /<phantom_install_dir>/apps 153.6
Splunk <glusterfs_hostname>:/app_states /<phantom_install_dir>/apps 153.6
Internet <glusterfs_hostname>:/scm /<phantom_install_dir>/local_data/app_states 153.6
HAProxy Search Head
<glusterfs_hostname>:/tmp /<phantom_install_dir>/scm 153.6
<glusterfs_hostname>:/tmp /<phantom_install_dir>/tmp/shared 153.6
REST App TCP 80, <glusterfs_hostname>:/vault /<phantom_install_dir>/vault 768.0
APIs 443 Total: 1536.0
Phantom NFS Server
Data Node
NFS Server
Firewall
TCP 4369,5671, Port Purpose
8300,8301,8302, TCP 2049 TCP 2049 NFS Service
UDP 111 Portmapper service, needed for NFS
15672, 25672 UDP/TCP 111
TCP 443 TCP 111 Portmapper service, needed for NFS
(or custom ports)
TCP 22
TCP 5432 External Splunk Instance
POSTGRES Port Purpose
Phantom Database TCP 443 Use for Sending Notables to Phantom
Master Cluster TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
REST TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
TCP
Analyst, Admins
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Data
PROS:
Future Proofed for performance and no additional configuration required
Highest capacity design possible POSTGRES Instance
Port Purpose
TCP 22 Used for administering the OS that POSTGRES is running on
CONS: TCP 5432 PostgreSQL Service. Can be blocked if the DB server is a different host than the shared services node.
Complicated implementation
Requires a lot of unused resource until load is realized
Cluster Message Queue
Site to Site Sync isn’t possible data is single homed to the regional infrastructure
Data is single homed to the sent site. Port Purpose
TCP 4369 RabbitMQ / Erlang port mapper. All cluster nodes must be able to talk to each-other on this port.
TCP 5671 RabbitMQ service. All cluster nodes must be able to talk to each-other on this port.
TCP 8300 Consul RPC services. All cluster nodes must be able to talk to each-other on this port.
Comments: REVISIONS TCP 8301 Consul internode communication. All cluster nodes must be able to talk to each-other on this port.
TCP 8302 Consul internode communication. All cluster nodes must be able to talk to each-other on this port.
RabbitMQ admin UI and HTTP api service. UI is disabled by default. All cluster nodes must be able to
REV DESCRIPTION DATE APPROVED TCP 15672
talk to each-other on this port.
TCP 25672 RabbitMQ internode communications. All cluster nodes must be able to talk to each-other on this port.
1.0 Initial Build 6 Aug 18
Cluster Node
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
C1E+ - High Capacity Clustered Deployment with AWS Integrations or customer provided infrastructure
Intentionally left blank for diagram below
SSVAs - 45 – v2.0
Splunk Phantom Cluster Sizing for Amazon Web Services
Cluster
Type
Workloads with an
active playbook
DB/
Common
Node RDS
Phantom
Node AWS
EC2 size
Number of
Phantom
Nodes
SpVA: C1E+
size
XLarge >50,000 db.m5.16xla c5.4xlarge 8
Production Node Drive Mappings Based on size (GB): 200
rge Device Mountpoint Size (GB)
/dev/mapper/centos-root / 40.0
Large Up to 25,000-50,000 db.m5.4xlar c5.2xlarge 8 /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 20.0
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 100.0
per hour ge /dev/mapper/centos-tmp /tmp 10.0
/dev/mapper/centos-var /var 10.0
Medium Up to 25,000 events db.r4.8xlarg c5.2xlarge 5 External Splunk Instance
/dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1.0
/dev/mapper/centos-var_tmp /var/tmp 10.0
per hour e /dev/mapper/centos-home /home 20.0
Total: 211.0
Small Up to 10,000 events db.m5.2xlar c5.xlarge 3 Recommended Production Database Drive Mappings Based on size (GB): 1536
ge
per hour Sizing Device
/dev/mapper/centos-root
Mountpoint
/
Size (GB)
307.2
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 0.0
Forwarders /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 460.8
Phantom /dev/mapper/centos-tmp /tmp 76.8
Node TCP 443 /dev/mapper/centos-var /var 76.8
8088, 8089 /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 7.7
TCP 9996-7 Indexers /dev/mapper/centos-var_tmp /var/tmp 76.8
/dev/mapper/centos-home /home 153.6
TCP 2049 Total: 1159.7
UDP/TCP 111
Elastic Load Production File Drive Mappings Based on size (GB): 1536
Splunk
Balancers Device Mountpoint Size (GB)
Search Head
<glusterfs_hostname>:/apps /<phantom_install_dir>/apps 153.6
<glusterfs_hostname>:/app_states /<phantom_install_dir>/apps 153.6
<glusterfs_hostname>:/scm /<phantom_install_dir>/local_data/app_states 153.6
<glusterfs_hostname>:/tmp /<phantom_install_dir>/scm 153.6
<glusterfs_hostname>:/tmp /<phantom_install_dir>/tmp/shared 153.6
Load <glusterfs_hostname>:/vault /<phantom_install_dir>/vault 768.0
Balancer Phantom Elastic File Total: 1536.0
Node Services
Cluster Node
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
Splunk Phantom Cluster Sizing Plan
Cluster Type Workloads with
active playbooks
DB/
Common
Node
CPU
DB/Common
Node Memory
GB
Phantom
Node CPU
cores
Phantom
Node Memory
GB
Number of
Phantom
Nodes SpVA: C1E+
cores
XLarge 32 64 16-32 32 8
>50,000
Production Node Drive Mappings Based on size (GB): 200
Large 16 64 8 16 8 Device Mountpoint Size (GB)
Up to /dev/mapper/centos-root / 40.0
25,000-50,000 per /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 20.0
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 100.0
hour /dev/mapper/centos-tmp /tmp 10.0
/dev/mapper/centos-var /var 10.0
Medium 16 32 8 16 5 /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1.0
Up to 25,000
/dev/mapper/centos-var_tmp /var/tmp 10.0
events per hour /dev/mapper/centos-home /home 20.0
Small
Up to 10,000
8 32 4 8 3 Recommended External Splunk Instance Total: 211.0
Sizing
Production Database Drive Mappings Based on size (GB): 1536
events per hour Device Mountpoint Size (GB)
/dev/mapper/centos-root / 307.2
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 0.0
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 460.8
/dev/mapper/centos-tmp /tmp 76.8
TCP 443 /dev/mapper/centos-var /var 76.8
Forwarders /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 7.7
8088, 8089
Phantom TCP 9996-7 /dev/mapper/centos-var_tmp /var/tmp 76.8
Node /dev/mapper/centos-home /home 153.6
Total: 1159.7
Indexers
Production File Drive Mappings Based on size (GB): 1536
Customer
Device Mountpoint Size (GB)
Provided Customer <glusterfs_hostname>:/apps /<phantom_install_dir>/apps 153.6
Provided <glusterfs_hostname>:/app_states /<phantom_install_dir>/apps 153.6
Splunk
Internet Search Head <glusterfs_hostname>:/scm /<phantom_install_dir>/local_data/app_states 153.6
<glusterfs_hostname>:/tmp /<phantom_install_dir>/scm 153.6
<glusterfs_hostname>:/tmp /<phantom_install_dir>/tmp/shared 153.6
REST App TCP
Load <glusterfs_hostname>:/vault /<phantom_install_dir>/vault 768.0
APIs 80,443 Total: 1536.0
Balancer Phantom
Data
Node
NFS Server NFS Server
Firewall
TCP 4369,5671, Port Purpose
8300,8301,8302, TCP 2049 NFS Service
UDP 111 Portmapper service, needed for NFS
15672, 25672 TCP 2049 TCP 111 Portmapper service, needed for NFS
UDP/TCP 111
Cluster Node
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
C1CE - High Capacity Clustered Deployment with Splunk Cloud
Intentionally left blank for diagram below
SSVAs - 46 – v2.0
Splunk Phantom Cluster Sizing Plan
Cluster Type Workloads with
active playbooks
DB/
Common
Node
CPU
DB/Common
Node Memory
GB
Phantom
Node CPU
cores
Phantom
Node Memory
GB
Number of
Phantom
Nodes SpVA: C1CE
cores
XLarge 32 64 16-32 32 8
>50,000
Production Node Drive Mappings Based on size (GB): 200
Large 16 64 8 16 8 Device Mountpoint Size (GB)
Up to /dev/mapper/centos-root / 40.0
25,000-50,000 per /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 20.0
/dev/mapper/centos-opt_phantom_data /opt/phantom/data* 100.0
hour /dev/mapper/centos-tmp /tmp 10.0
/dev/mapper/centos-var /var 10.0
Medium 16 32 8 16 5 /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1.0
Up to 25,000
/dev/mapper/centos-var_tmp /var/tmp 10.0
events per hour /dev/mapper/centos-home /home 20.0
Small
Up to 10,000
8 32 4 8 3 Recommended Total: 211.0
Sizing
Production Database Drive Mappings Based on size (GB): 1536
events per hour Device Mountpoint Size (GB)
/dev/mapper/centos-root / 307.2
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 0.0
External Splunk Instance /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 460.8
Search Head /dev/mapper/centos-tmp /tmp 76.8
/dev/mapper/centos-var /var 76.8
TCP 443, /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 7.7
8088-89 /dev/mapper/centos-var_tmp /var/tmp 76.8
9996-97 /dev/mapper/centos-home /home 153.6
Phantom
Node Total: 1159.7
Splunk
Embeded Production File Drive Mappings Based on size (GB): 1536
Device Mountpoint Size (GB)
<glusterfs_hostname>:/apps /<phantom_install_dir>/apps 153.6
<glusterfs_hostname>:/app_states /<phantom_install_dir>/apps 153.6
<glusterfs_hostname>:/scm /<phantom_install_dir>/local_data/app_states 153.6
Indexers Splunk> cloud HAProxy <glusterfs_hostname>:/tmp /<phantom_install_dir>/scm 153.6
<glusterfs_hostname>:/tmp /<phantom_install_dir>/tmp/shared 153.6
<glusterfs_hostname>:/vault /<phantom_install_dir>/vault 768.0
Forwarders Total: 1536.0
Phantom NFS Server
Internet Node NFS Server
Port Purpose
REST App TCP TCP 4369,5671, TCP 2049 NFS Service
TCP 2049 UDP 111 Portmapper service, needed for NFS
APIs 80,443 8300,8301,8302,
TCP 111 Portmapper service, needed for NFS
Data 15672, 25672 UDP/TCP 111
TCP 443
(or custom ports)
Firewall TCP 22 External Splunk Instance
TCP 5432
Port Purpose
POSTGRES TCP 443 Use for Sending Notables to Phantom
Phantom Database TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
Cluster TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
Master
REST TCP
9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
Analyst, Admins
Data PROS:
Future Proofed for performance and no additional configuration required
Highest capacity design possible POSTGRES Instance
Port Purpose
TCP 22 Used for administering the OS that POSTGRES is running on
CONS: TCP 5432 PostgreSQL Service. Can be blocked if the DB server is a different host than the shared services node.
Complicated implementation
Requires a lot of unused resource until load is realized
Cluster Message Queue
Site to Site Sync isn’t possible data is single homed to the regional infrastructure
Data is single homed to the sent site. Port Purpose
TCP 4369 RabbitMQ / Erlang port mapper. All cluster nodes must be able to talk to each-other on this port.
TCP 5671 RabbitMQ service. All cluster nodes must be able to talk to each-other on this port.
TCP 8300 Consul RPC services. All cluster nodes must be able to talk to each-other on this port.
Comments: This is our Default PS Recommendation REVISIONS TCP 8301 Consul internode communication. All cluster nodes must be able to talk to each-other on this port.
TCP 8302 Consul internode communication. All cluster nodes must be able to talk to each-other on this port.
RabbitMQ admin UI and HTTP api service. UI is disabled by default. All cluster nodes must be able to
REV DESCRIPTION DATE APPROVED TCP 15672
talk to each-other on this port.
TCP 25672 RabbitMQ internode communications. All cluster nodes must be able to talk to each-other on this port.
1.0 Initial Build 6 Aug 18
Cluster Node
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
C1CE+ - High Capacity Clustered Deployment with Splunk Cloud and AWS Integrations
Intentionally left blank for diagram below
SSVAs - 47 – v2.0
Splunk Phantom Cluster Sizing for Amazon Web Services
Cluster
Type
Workloads with an
active playbook
DB/
Common
Node RDS
Phantom
Node AWS
EC2 size
Number of
Phantom
Nodes
SpVA: C1CE+
size
XLarge >50,000 db.m5.16xla c5.4xlarge 8
rge Production Node Drive Mappings Based on size (GB): 200
Device Mountpoint Size (GB)
/dev/mapper/centos-root / 40.0
Large Up to 25,000-50,000 db.m5.4xlar c5.2xlarge 8 /dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 20.0
per hour ge /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 100.0
/dev/mapper/centos-tmp /tmp 10.0
/dev/mapper/centos-var /var 10.0
Medium Up to 25,000 events db.r4.8xlarg c5.2xlarge 5 /dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 1.0
per hour e /dev/mapper/centos-var_tmp /var/tmp 10.0
/dev/mapper/centos-home /home 20.0
ge
per hour Sizing Production Database Drive Mappings
Device Mountpoint
Based on size (GB):
Size (GB)
1536
/dev/mapper/centos-root / 307.2
/dev/mapper/centos-opt_phantom_vault /opt/phantom/vault* 0.0
External Splunk Instance /dev/mapper/centos-opt_phantom_data /opt/phantom/data* 460.8
Search Head /dev/mapper/centos-tmp /tmp 76.8
/dev/mapper/centos-var /var 76.8
/dev/mapper/centos-opt_phantom_keystore /opt/phantom/keystore 7.7
Phantom TCP 2049
/dev/mapper/centos-var_tmp /var/tmp 76.8
Node UDP/TCP 111
/dev/mapper/centos-home /home 153.6
Total: 1159.7
Elastic Load Production File Drive Mappings Based on size (GB): 1536
Balancers Device Mountpoint Size (GB)
<glusterfs_hostname>:/apps /<phantom_install_dir>/apps 153.6
<glusterfs_hostname>:/app_states /<phantom_install_dir>/apps 153.6
Elastic File <glusterfs_hostname>:/scm /<phantom_install_dir>/local_data/app_states 153.6
Indexers Splunk> cloud Services <glusterfs_hostname>:/tmp /<phantom_install_dir>/scm 153.6
<glusterfs_hostname>:/tmp /<phantom_install_dir>/tmp/shared 153.6
Load <glusterfs_hostname>:/vault /<phantom_install_dir>/vault 768.0
Balancer Phantom
Forwarders Total: 1536.0
Node
Internet NFS Server
TCP 4369,5671, Port Purpose
8300,8301,8302, TCP 2049 NFS Service
REST App TCP 15672, 25672 UDP 111 Portmapper service, needed for NFS
APIs 80,443 TCP 111 Portmapper service, needed for NFS
Data TCP 22
TCP 5432
Firewall RDS postgres External Splunk Instance
SQL Database
Port Purpose
Phantom TCP 443 Use for Sending Notables to Phantom
Master TCP 8088 Used as the HTTP Event Collector (HEC) and provides searching capabilities
TCP 443 TCP 8089 Used for the REST endpoint to send information to the Splunk Instances
TCP
(or custom ports) TCP 9996-9997 Used for Universal Forwarder to either a forwarder or direct to the indexers
443,22
PROS:
Future Proofed for performance and no additional configuration required
Highest capacity design possible POSTGRES Instance
Port Purpose
REST TCP 22 Used for administering the OS that POSTGRES is running on
CONS: TCP 5432 PostgreSQL Service. Can be blocked if the DB server is a different host than the shared services node.
Data Complicated implementation
Analyst, Admins
Requires a lot of unused resource until load is realized
Cluster Message Queue
Site to Site Sync isn’t possible data is single homed to the regional infrastructure
Data is single homed to the sent site. Port Purpose
TCP 4369 RabbitMQ / Erlang port mapper. All cluster nodes must be able to talk to each-other on this port.
TCP 5671 RabbitMQ service. All cluster nodes must be able to talk to each-other on this port.
TCP 8300 Consul RPC services. All cluster nodes must be able to talk to each-other on this port.
Comments: This is our Default PS Recommendation REVISIONS TCP 8301 Consul internode communication. All cluster nodes must be able to talk to each-other on this port.
TCP 8302 Consul internode communication. All cluster nodes must be able to talk to each-other on this port.
RabbitMQ admin UI and HTTP api service. UI is disabled by default. All cluster nodes must be able to
REV DESCRIPTION DATE APPROVED TCP 15672
talk to each-other on this port.
TCP 25672 RabbitMQ internode communications. All cluster nodes must be able to talk to each-other on this port.
1.0 Initial Build 6 Aug 18
Cluster Node
Port Purpose
Used for administering the OS that Phantom is running on. Can be limited to authorized administration
TCP 22
networks, or blocked if you wish to use the OS console exclusively.
Convenience port for users who do not specify HTTPS when connecting to Phantom instance. Exists
DRAWN TCP 80
Architect only to redirect connections to TCP 443. Can be blocked.
BY HTTPS interface for the web UI for Phantom, as well as REST access. Must be exposed to anything
TCP 443
ISSUED accessing the Phantom services.
Approver
TO Company Name
M2E - High Capacity Clustered Deployment - Consult your Splunk Architect for a custom solution
Intentionally left blank for diagram below
SSVAs - 48 – v2.0
M2CE – Consult your Splunk Architect for a custom solution
M2CE+ - Consult your Splunk Architect for a custom solution
SSVAs - 49 – v2.0
1.7.2 Aligning Your Topology with Best Practices
You will need to keep your requirements and topology in mind in order to select the appropriate design principles
and best practices for your deployment. Therefore, you should consider best practices only after you have
completed Steps 1 and 2 of the Splunk SOAR Validated Architectures selection process above.
MANAGEABILITY
PERFORMANCE
AVAILABILITY
SCALABILITY
(Your requirements will determine which practices apply to you)
SECURITY
1 Consider using SSDs for data volumes
SSDs have reached economical prices and remove any possible IO
limitations that are often the cause for unsatisfactory search
performance.
2 Keep automation tier close (in network terms) to the user base
Lowest possible network latency will have positive effect on user
experience when using case management.
SSVAs - 50 – v2.0
Splunk provides you with a monitoring console that provides key
performance metrics on how your automation tier is performing. This
includes disk usage, CPU and memory utilization, as well as detailed
metrics of internal Splunk components (processes, process utilization,
and queues).
SSVAs - 51 – v2.0
Summary & Next Steps
This white paper provided a general introduction to Splunk SOAR Validated Architectures and ensures that your
organization's requirements are being met in the most cost-effective, manageable, and scalable way
possible. SSVAs offer best practices and design principles built upon the following foundational pillars:
● Availability
● Performance
● Scalability
● Security
● Manageability
This white paper has also covered the 3-step Splunk SOAR Validated Architectures selection process:
1) Definition of requirements,
2) Choosing a topology, and
3) Applying design principles and best practices.
Now that you are familiar with the multiple benefits of Splunk SOAR Validated Architectures, we hope you are
ready to move forward with the process of choosing a suitable deployment topology for your organization.
Happy Splunking!
SSVAs - 52 – v2.0
Appendix
This section contains additional reference information used in the SSVAs.
Performance The ability to effectively use available 1. Add hardware to improve performance;
resources to maintain optimal level of compute, storage, memory.
service under varying usage patterns.
2. Eliminate bottlenecks 'from the bottom up'
3. Exploit all means of concurrent
processing
4. Exploit locality (i.e. minimize distribution of
components)
5. Optimize for the common case (80/20
rule)
6. Avoid unnecessary generality
7. Time shift computation (pre-compute,
lazily compute, share/batch compute)
8. Trade certainty and accuracy for time
(randomization, sampling)
Scalability The ability to ensure that the system is 1. Scale vertically and horizontally
designed to scale on all tiers and handle
2. Separate functional components that
increased workloads effectively.
need to be scaled individually
3. Minimize dependencies between
components
4. Design for known future growth as early
as possible
5. Introduce hierarchy in the overall system
design
Security The ability to ensure that the system is 1. Design for a secure system from the start
designed to protect data as well as
2. Employ state-of-the art protocols for all
configurations/assets while continuing to
communications
deliver value.
3. Allow for broad-level and granular access
to event data
4. Employ centralized authentication
5. Implement auditing procedures
6. Reduce attack or malicious use surface
area
SSVAs - 53 – v2.0
Manageability The ability to ensure the system is 1. Provide a centralized management
designed to be centrally operable and function
manageable across all tiers.
2. Manage configuration object lifecycle
(source control)
3. Measure and monitor/profile application
(Splunk) usage
4. Measure and monitor system health
Shared Gluster File Gluster file server Gluster file servers provide file storage
Services Server provides an open- activities for the case management
(gFS) source secure file capabilities or playbook automation.
server.
SSVAs - 54 – v2.0
clustered
environments.
Reporting Search The search head Search heads are dedicated Splunk
Head (SH) provides the UI for instances in distributed deployments.
Splunk users and Search heads can be virtualized for
coordinates easy failure recovery, provided they
scheduled search are deployed with appropriate CPU
activity. and memory resources.
SSVAs - 56 – v2.0