Skip to content

Splunk plugin

Vulners Splunk plugin enables Splunk to be used as a vulnerability assessment platform and a security scanner.


  • Current Distro was created on a single machine environment. It was tested in a simple installation with one indexer and search head on a single machine as well. The result is a complete package with parts for all three Splunk components: forwarder, indexer, and search head.
  • Despite Splunk's official documentation for AppInspect claiming no indexes, this package still has one (/vulners-lookup/default/indexes.conf) for easier use in a single machine installation. Note that you will have to delete the file and create a new index with the same name on your indexer if you are using a separate one (see the installation process below).
  • The following installation process is straightforward for cases without indexers, and it uses the provided package as is. The package has, however, been tested against generating deployment units, see generate DU for a quick reference.


Dashboard app


In Splunk dashboard search head go to

Apps -> Install app from file -> choose [vulners-lookup-*.tar.gz](

Then restart Splunk

Add Vulners API key

  • get API key from

  • add API key to Vulners Splunk dashboard

Create vulners index

Since the forwarder app forwards data to the index named vulners, it has to be present in the system.

Settings -> Indexes -> New Index

Add receiving port

If you are using Splunk for the first time, don't forget to set data receiver

Settings -> Forwarding and receiving -> Configure receiving -> New Receiving port

Forwarder app


Unpack vulners_lookup.tar.gz into $SPLUNK_FORWARDER_HOME/etc/apps/

Python libs

Install the following Python libs on forwarder machines

pip3 install distro getmac ifaddr futures
and restart Splunk forwarder

Add forward server

If you are installing forwarder for the first time, you have to add forward-server


Seach for packages collected by forwarder

By default, the forwarder sends information about packages hourly or right after restart. To see collected packages run search


Run Vulners audit

Vulners application runs audit script automatically at 9 o'clock in the morning. Alternatively, you can select saved search

| savedsearch vulners_report 

Using slim

NB: The process of DU creation has been tested and should work without issues. However no tests have been conducted regarding the use of the deployment server. Any feedback on that would be appreciated.

  • Install slim as in the instructions (take note of this bug though)
  • Create a package slim package -o result/ ./vulners-lookup/
  • Partition the package into deployment units slim partition -o deployment-units/ vulners-lookup-0.0.3.tar.gz
  • Use your deployment server for installation
Back to top