Requirements
Software, network, and API key requirements for the Whisper Splunk add-on.
Requirements Documentation
Software requirements
Splunk platform
| Component | Minimum version | Recommended |
|---|---|---|
| Splunk Enterprise | 9.3.0 | Latest 9.x or 10.x |
| Splunk Cloud | Victoria Experience | Victoria Experience |
| Splunk Enterprise Security | 7.0 (optional) | Latest |
Python
The add-on requires Python 3.9 or later. Splunk Enterprise 9.3+ ships with Python 3.9; Splunk 10.2+ ships with Python 3.13.
| Python version | Splunk version | Status |
|---|---|---|
| 3.9 | Splunk 9.3 -- 10.1 | Supported |
| 3.11 | Splunk 10.0+ | Supported |
| 3.13 | Splunk 10.2+ | Supported |
Network requirements
Outbound connectivity
The add-on requires HTTPS (port 443) access to the Whisper Security API:
| Endpoint | Protocol | Port | Purpose |
|---|---|---|---|
graph.whisper.security | HTTPS | 443 | Knowledge Graph API |
Proxy support: If your Splunk server does not have direct internet access, configure an HTTP/HTTPS/SOCKS5 proxy in Configuration > Settings > Proxy URL.
Firewall rules
Allow outbound HTTPS (TCP 443) from:
- Search heads -- for search commands (
whisperlookup,whisperquery,whisperschema) - Search heads -- for modular inputs (health check, baseline, threat intel, watchlist)
No inbound connectivity is required. The add-on does not open any listening ports.
API key requirements
| Plan | Cost | Max depth | Features |
|---|---|---|---|
| Anonymous | Free | 2 hops | Basic enrichment, limited rate |
| Free | Free | 3 hops | Standard enrichment, SPF chain analysis |
| Professional | Paid | 5 hops | Full enrichment, CNAME chain, all macros |
Get a free API key at console.whisper.security.
Tip: You can install and test the add-on without an API key using the Anonymous plan. The
whisperlookupandwhisperquerycommands work with Anonymous access, but some macros (whisper_cname_chain,whisper_spf_chain) require higher plan tiers due to traversal depth requirements.
Splunk Cloud requirements
The add-on passes Splunk AppInspect with zero failures for both precert and cloud tag sets. Cloud-specific requirements that are already met:
- All credentials stored via
storage/passwords(encrypted) - No hardcoded file paths (uses
$SPLUNK_HOMEenvironment variable) - No prohibited
.conffiles (outputs.conf,authentication.conf, etc.) - No reserved port usage
- No shebang lines in Python files
- No
exec(),eval(), or shell execution - Uses
sc_adminrole (notadmin) for Cloud compatibility - SSL/TLS verification enabled on all network calls
Next steps
- Installation -- Install the add-on
- Configuration -- Set up your API key and connection settings