Requirements

Software, network, and API key requirements for the Whisper Splunk add-on.

Updated April 2026Splunk Integration

Requirements Documentation

Software requirements

Splunk platform

ComponentMinimum versionRecommended
Splunk Enterprise9.3.0Latest 9.x or 10.x
Splunk CloudVictoria ExperienceVictoria Experience
Splunk Enterprise Security7.0 (optional)Latest

Python

The add-on requires Python 3.9 or later. Splunk Enterprise 9.3+ ships with Python 3.9; Splunk 10.2+ ships with Python 3.13.

Python versionSplunk versionStatus
3.9Splunk 9.3 -- 10.1Supported
3.11Splunk 10.0+Supported
3.13Splunk 10.2+Supported

Network requirements

Outbound connectivity

The add-on requires HTTPS (port 443) access to the Whisper Security API:

EndpointProtocolPortPurpose
graph.whisper.securityHTTPS443Knowledge Graph API

Proxy support: If your Splunk server does not have direct internet access, configure an HTTP/HTTPS/SOCKS5 proxy in Configuration > Settings > Proxy URL.

Firewall rules

Allow outbound HTTPS (TCP 443) from:

  • Search heads -- for search commands (whisperlookup, whisperquery, whisperschema)
  • Search heads -- for modular inputs (health check, baseline, threat intel, watchlist)

No inbound connectivity is required. The add-on does not open any listening ports.

API key requirements

PlanCostMax depthFeatures
AnonymousFree2 hopsBasic enrichment, limited rate
FreeFree3 hopsStandard enrichment, SPF chain analysis
ProfessionalPaid5 hopsFull enrichment, CNAME chain, all macros

Get a free API key at console.whisper.security.

Tip: You can install and test the add-on without an API key using the Anonymous plan. The whisperlookup and whisperquery commands work with Anonymous access, but some macros (whisper_cname_chain, whisper_spf_chain) require higher plan tiers due to traversal depth requirements.

Splunk Cloud requirements

The add-on passes Splunk AppInspect with zero failures for both precert and cloud tag sets. Cloud-specific requirements that are already met:

  • All credentials stored via storage/passwords (encrypted)
  • No hardcoded file paths (uses $SPLUNK_HOME environment variable)
  • No prohibited .conf files (outputs.conf, authentication.conf, etc.)
  • No reserved port usage
  • No shebang lines in Python files
  • No exec(), eval(), or shell execution
  • Uses sc_admin role (not admin) for Cloud compatibility
  • SSL/TLS verification enabled on all network calls

Next steps