Superna Data Security Edition

Download 0
Last updated Aug 9, 2025

Install Guide

Installing the Splunk App

Since the Superna Data Security Edition product supports integration via the Splunk HTTP Event Collector method, both Logpresso Cloud and Logpresso Sonar can receive the same HTTP data through the Splunk app. Therefore, to configure the Superna ZT log collector, you must first install the Splunk app. Visit the following URL and install Splunk app version 1.3.2411.3 or later.

Splunk App

https://logpresso.store/ko/apps/splunk


Installing the Superna Data Security Edition App

Install the Superna Data Security Edition app. Once installed successfully, you will see the Superna ZT logger model, which references the Splunk HEC logger type, as shown below:

Superna ZT Logger Model


Configuring Logpresso Logger

Refer to this document to add a collector. The default dashboards and datasets refer to tables starting with SUPERNA_ZT.

Superna ZT Logger Configuration

Required fields when configuring the collector:

  • Name: Enter a unique name to identify the collector
  • Interval: 5 seconds
  • Storage: Select the appropriate node according to the Logpresso platform configuration
  • Logger Model: Select Superna ZT
  • Table: Enter the table name starting with SUPERNA_ZT
  • Token: Use the token value configured for Superna ZT Alarm transmission in the previous step

Superna Defender Zero Trust Configuration

Refer to the Logpresso Sonar SIEM Superna Zero Trust Alarm document to configure your Logpresso Cloud or Logpresso Sonar instance to receive webhooks.

Superna Integration Procedure

The following procedure describes how to configure the Eyeglass virtual machine and Logpresso to integrate security events generated by Superna Defender Zero Trust into Logpresso Cloud or Logpresso Sonar.


1. Prerequisites
  • Install the Data Security Edition subscription product
  • Eyeglass OS appliance version 15.5 or later (verify with cat /etc/os-release)
  • Zero Trust API license key
  • Obtain the HEC token value of the Logpresso collector

2. Set up Python Runtime Environment on the Eyeglass VM
ssh admin@<VM-IP>
sudo -s
mkdir -p /opt/superna/cgi-bin
chown -R sca:users /opt/superna/cgi-bin
chmod -R u+rwX,g+rwX /opt/superna/cgi-bin

# Switch to SCA user
sudo -u sca -s
cd /opt/superna/cgi-bin

# Create Python virtual environment and install packages
python3 -m venv venv-logpresso
source venv-sonar/bin/activate
pip install flask boto3 requests logging
deactivate

# Create integration script files
touch logpresso.py logpresso.sh
chmod +x logpresso.py logpresso.sh

3. Create Execution Script

Create /opt/superna/cgi-bin/logpresso.sh with the following content:

#!/bin/bash
export PATH="/opt/.pyenv/bin:$PATH"
source /opt/superna/cgi-bin/venv-logpresso/bin/activate
exec python /opt/superna/cgi-bin/logpresso.py

4. Register as a systemd Service

Create /etc/systemd/system/logpresso.service:

[Unit]
Description=Webhook listener for Zero Trust API translations and integrations
After=network.target

[Service]
Type=simple
User=sca
Group=users
WorkingDirectory=/opt/superna/cgi-bin
ExecStart=/bin/bash /opt/superna/cgi-bin/logpresso.sh
Restart=always
RestartSec=5

[Install]
WantedBy=multi-user.target
systemctl daemon-reload
systemctl enable logpresso

5. Modify Python Code
  • In the provided template, replace the following with the token value and Logpresso HEC URL:

    LOGPRESSO_HEC_TOKEN = 'xxxxxxxxxxxxxxxx'
    LOGPRESSO_HEC_URL = 'https://yyyyyyyyyyyyyy/services/collector'
    
  • Save this in /opt/superna/cgi-bin/logpresso.py


7. Start and Check Service Status
systemctl start logpresso
systemctl status -l logpresso

It should show "active and running".


8. Configure Defender Zero Trust Webhook
  • In the Ransomware Defender Zero Trust tab, create a Webhook
  • URL: http://localhost:5000/webhook
  • Header: Content-Type: application/json
  • Recommended: Only configure Critical/Major events and lockout-related webhooks

9. Integration Test
  • Run the provided curl command from the Eyeglass VM
  • In the SSH terminal, confirm the "done sending event to logpresso..." message and HTTP 200 response
  • In Logpresso, run table SUPERNA_ZT to check if events are being collected

10. Operation
  • Monitor logs in real-time with journalctl -f -u logpresso
  • A successful request should return successCount 1
  • Build dashboards and triggers as needed for automated response