Splunk SIEM
Splunk Enterprise is a security information and event management (SIEM) platform that can be used with Bitwarden organizations. Organizations can monitor event activity with the Bitwarden app on their Splunk Enterprise dashboard.
note
The Bitwarden Splunk integration is currently supported for Splunk Enterprise on-premises.
Installing the Bitwarden app on Splunk Enterprise requires an account with Splunk Base.
Once you have a Splunk Base account, the next step is to install Splunk Enterprise. Follow the Splunk documentation to complete an install of the self-hosted Enterprise software.
note
The Bitwarden app is currently supported on Splunk Enterprise's Linux x64 architecture.
Before connecting your Bitwarden organization to Splunk Enterprise, create an index that will maintain Bitwarden data.
1. Open the Settings menu located on the top navigation bar and select Indexes.
2. Once you are on the indexes screen, select New Index.
3. A window will appear for you to create a new index for your Bitwarden app.

4. In the Index Name field, enter bitwarden_events
.
note
The only required field for the index creation is Index Name. The remaining fields can be adjusted as needed.
5. When you are finished, select Save.
After your Bitwarden index has been created, navigate to the Splunk Enterprise dashboard.
1. Select the cog icon next to Apps.

2. Select Browse more apps located at the top-right on the screen.
.png?eu=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&a=w%3D213%26h%3D41%26fm%3Dpng%26q%3D75&cd=2023-04-26T11%3A56%3A43.445Z)
3. Search Bitwarden Event Logs in the app catalogue. Select Install for the Bitwarden Event Logs - Linux x64 app.
.png?eu=ddd806e6b59cfc83596ea3853a243660b13a54a2ab0264853f37b2ad4bad9b822da71a5724c07db27f6f5bdd82e94aef31927f6310e7d38fc0b84ba7eb64ff0f518458ec65e67a5f156f84bdbaea191c35974d0de29d9b4cf53c3197b0f7f46e47055834af38e6d2aaf33432b8de6835f5b3df640786df2fa05b0526ab7273fd15deea807b4c94d1e118ebe2baaf5fcbceb32803488afb67227e184b5cef25eeadb602716c28490d2aadfc1a9234c8f56443254c5c5f01f47a3ad448f9695e92a094a243dd7f65e0a0a6510de9acaceff35af27d&a=w%3D88%26h%3D30%26fm%3Dpng%26q%3D75&cd=2023-04-26T11%3A56%3A43.396Z)
3. In order to complete the installation, you will need to enter your Splunk Base account. Your Splunk Base account may not be the same credentials used to log into your self-hosted Splunk Enterprise instance.

4. After you have entered your information, select Agree and Install.
note
You may need to restart Splunk following the Bitwarden app install.
Once the Bitwarden Event Logs app has been installed in your Splunk Enterprise instance, you can connect your Bitwarden organization using your Bitwarden API key.
1. Go to the dashboard home and select the Bitwarden Event Logs app.
.png?eu=8c8d04e4ebc1fdd65b6bf1d66b27323ce33954f8fd5835d66932e3af48fccf8326a64a01249279e72d6c5388d0b546ee609078671cbbd3d2c6ef1dfce93caf0a5ad50fed33e2760e527e97f6b6f407446b951d5da987c859f56d7a82e1e1be211308586fe839b29ef3f06835e7d66c2cb9f2f07f2681fe3ca30c00018f0776be3ae8d6843248e693f718f0e286df4c8adbbb7747328caf6a657f3b5c098449e8c5ad06713c21490d639cf950c3359eb06f4d332b5d0a51a5636bd055ad6863c5e7f3be3e8a382eb4f68a692fc2acac80ef19b12a75facd23c6d37f150f13ae14b3be7b98b21969618345e4d512e5&a=w%3D213%26h%3D75%26fm%3Dpng%26q%3D75&cd=2023-04-26T11%3A56%3A43.382Z)
2. Next select Setup from the top navigation menu. This is where you will add your Bitwarden organization's information.

3. Keep this screen open, on another tab, access your Bitwarden web vault. Open your organization and navigate to Settings, Organization info, and View API key. You will be asked to re-enter your master password in order to access your API key information.

2. Copy and paste the client_id
and client_secret
values into their respective locations on the Splunk setup page.
Complete the additional fields as follows:
Field | Value |
---|---|
Index | Select the index that was created previously in the guide: |
Server URL | For self-hosted Bitwarden users, input your self-hosted URL. Be sure that the URL does not include any trailing forward slashes at the end of the URL " |
warning
Your organization API key enables full access to your organization. Keep your API key private. If you believe your API key has been compromised, select the Rotate API key button on this screen. Active implementations of your current API key will need to be reconfigured with the new key before use.
3. Select Submit.
4. Once you have completed the setup, restart Splunk Enterprise. To do this, head to Settings → Server controls → Restart Splunk.
To start reviewing data, you can set up a search macro. A Splunk search macro is a reusable search query that can be applied to your dashboard.
1. To add a search macro go to Settings on to top navigation bar. Then, select Advanced Search.
.png?eu=898b51b3b5c1ad800d3af2853d70343ab23b02a2f95332823f62b1fd4ba8cb8320fa190073902eb5786d0e8dd5e216ef6fc47d614feb81d3c8e94df0b837ae00518009ec65e17651592e97f9b7a455413994120df3869d59a16e73dcb3b5e5754d061673ec3ef8c2e6b62a3dedd27867a9a8f56a3393e83bb5561d4a954d35e363f9ce8d7544ef98b842a8e1f1ab4ca7f4e6510440ad913d630c1819518b5abcecc7656e3e21125c37cbfa0ec33095b4341b6525580d57a234388507f23860c4b6f3a95ac61928a3fd9c6f33de9ceaefef1aae296be7cc3aab8a542b4a62a50dacbe65f4d10b7773ee45f8fa52f25d52&a=w%3D213%26h%3D39%26fm%3Dpng%26q%3D75&cd=2023-04-26T11%3A56%3A43.358Z)
2. Next, select + Add new. Once you are on the create macro screen, complete the following fields:
Field | Definition |
---|---|
Destination app | The app that this macro will be applied. The Bitwarden destination app is |
Name | The name of the macro. The macro you are using takes arguments appended to the name of the macro. The macro name for Bitwarden is |
Definition | This field will contain the string that the search macro expands upon when it is referenced in searches. Included arguments will be enclosed in dollar signs, such as $arg$. Input |
Arguments | Input arguments in a comma-delimited string of argument names. Argument names may only contain alphanumeric, "_", and "-" characters. This field is not required for creating the macro. |
Validation Expression | Enter an eval or boolean expression that runs over macro arguments. This field is not required for creating the macro. |
Validation Error Message | Enter a message to display when the validation expression returns This field is not required for creating the macro. |
3. Once you have input all information into the macro forum, select Save.
Next, setup which user roles will have permission to use the macro:
1. View macros by selecting Settings → Advanced Search → Search macros.
.png?eu=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&a=w%3D213%26h%3D101%26fm%3Dpng%26q%3D75&cd=2023-04-26T11%3A56%3A43.416Z)
2. Select Permissions on the macro you would like to edit.
.png?eu=898957e3b1cdfc870d68a6d03a73613fe26b57ffff543084396de6ad1ef9cb8572f5115d73c47fb92a600b88d7e611b267ce7f3510b8d08cc7e910f2e964fe5e5a820eef60b57851522d92feb6a607166a941b5ef280cc08a9353690a5f0bd6f0609417aff2ffb9fbfed6335f3c07a76a9a8f87b21ddac3abe41180eca4e79a123bc8fdd6779b0afc3698be6a6ee55b9c0bc7c4d279bf3426668194a5aeb2ebbadb602703a21400835cafb0ac2649fe5354930265c0a02a5366ecf36a82e6496bab8f9029d1579e1aaca2c7085deac88824be84572f9cc25b7863a156e70c37cafd365b78c33&a=w%3D113%26h%3D62%26fm%3Dpng%26q%3D75&cd=2023-04-26T11%3A56%3A43.366Z)
3. Edit the following permissions:
Field | Description |
---|---|
Object should appear in | In order to use the macro in event searching, select This app only. The macro will not apply if Keep private is selected. |
Permissions | Select the desired permissions for user roles with Read and Write access. |
4. Once you have edited your desired permissions, select Save.
note
Only one search macro will be functional on the app at a given time.
The Dashboard will provide several options for monitoring and visualizing Bitwarden organizational data. The three primary categories of data monitoring include:
Bitwarden authentication events
Bitwarden vault item events
Bitwarden organization events
The data displayed on the dashboards will provide information and visualization for a broad variety of searches. More complex queries can be completed by selecting the Search tab at the top of the dashboard.
While searching from the Search page or Dashboards, searches can be designated to a specific timeframe.
.png?eu=dfdd03e5e1cca8850f6ff2866e77606de26951adfe5035813a36e3a74ffdcd8f20a24f5024977cb27a695dd786e613eb6fc67a6918ebd6dac2b41da7ee31fb0c5b875cef6deb34431168cee1afac5b143f935946f2c79e59e02e2790a6ade9255d4f1b69f629fedbedff3d39f7843078b3fcc26d2d98d8059b4e2a50af700da13db9f5b42c1fbbc7e119bdb2e8a85dc49de22e0347dff33073711e4e50bc28eaf0e1007168362308779bfa068439c9f2531e61215d4203f37a3bd33aaa285ec0faf9a543db721481d5a65e72e9ddeedeba&a=w%3D172%26h%3D139%26fm%3Dpng%26q%3D75&cd=2023-04-26T11%3A56%3A43.470Z)
The following timeframes are supported for Bitwarden event logs searches:
Month to date
Year to date
Previous week
Previous business week
Previous month
Previous year
Last 30 days
All time
Setup specific searches by including search queries. Spunk utilizes its search processing language (SPL) method for searching. See Splunk's documentation for additional details on searches.
Search structure:
search | commands1 arguments1 | commands2 arguments2 | ...
An example of a standard search result object:

The fields shown in the standard search object can be included in any specific search. This includes all of the following values:
Value | Example result |
---|---|
| The email of the user performing the action. |
| Unique id of user performing action. |
| Name of the user performing an action. |
| Date of event displayed in |
| Numerical number to identify the device that the action was performed on. |
| Splunk computed data hash. Learn more about Splunk's data integrity here. |
| The ip address that performed the event. |
| Email of the organization member that the action was directed towards. |
| Unique id of the organization member that the action was directed towards. |
| Name of organization member that action was directed towards. |
| The event type code that represents the organization event that occurred. See a complete list of event codes with descriptions here. |
Search all:
sourcetype="bitwarden:events" type=*
Filter results by a specific field
In the following example, the search is looking for actingUserName
with a *
wildcard which will display all results with actingUserName
.
sourcetype="bitwarden:events" actingUserName=*
The AND operator is implied in Splunk searches. The following query will search for results containing a specific type
AND actingUserName.
sourcetype="bitwarden:events" type=1000 actingUserName="John Doe"
Include multiple commands by separating with |
. The following will show results with the top value being ipAddress
.
sourcetype="bitwarden:events" type=1115 actingUserName="John Doe" | top ipAddress
Set user roles
Manage users roles to allow individuals to perform specific tasks. To edit user roles:
1. Open the Settings menu on the top navigation bar.
2. Select Users from the bottom right corner of the menu.
3. From the users screen, locate the user that you wish to edit permissions for and select Edit.
.png?eu=d8dc06e0b7caa9805c68a5873e246260e13c52f8ad543f843d62ecfd46adccd423f01d5121962be0793b5ed8dae04ae833ce293011bfd3dbc4ed4ba5e334aa0e55870fba35e22551037acea6f4b1460662d90501fcd29f5de0732190b3e2f4334c145f35f62ffc9eebeb6b37f6d92e64e2ebe1297ac7d82684581914935917a93aeaf29b351de68bd64096f9efac08989eee285612daa63524211d4b5dee2bb2ade002753178130863cbaf58d802c5f469493f6006004798653ad256e66c35dee5f8ce0c9d1572ffacc12f748eacdffd8275ae4568a79170&a=w%3D113%26h%3D123%26fm%3Dpng%26q%3D75&cd=2023-04-26T11%3A56%3A43.390Z)
From this screen, details for the user can be filled out. Permission such as admin
, power
, and can_delete
can be individually assigned here as well.
Delete data
Delete Bitwarden search data by clearing the index with SSH access. Data may need to be cleared in instances such as changing the organization being monitored.
1. Access the Splunk directory and stop
Splunk processes.
2. Clear the bitwarden_events
index with -index
flag.
3. Restart Splunk processes.