Splunk
Splunk Integration Guide
Introduction
Splunk action will allow you to send detailed data to be used in SOC when the action will be called.
Prerequisites
Splunk Cloud Or Splunk Enterprise Account user with Admin access.
To Generate API key:
1. Go to your Splunk instance -> Click Settings -> Data Inputs.
2. Click HTTP Event Collector.
Note: Make Sure Indexer acknowledgment on the token is disabled.
Note: If required, whitelist perimeters IP - 52.45.176.119
Integrating Splunk in your account
Log in to your Perimeters account and navigate to the "Integrations" section. Select "Splunk" from the list of available integrations and click on “Add Application”
"Account Type" -
Select the account type from Dropdown - Either ENTERPRISE OR CLOUD. Splunk Cloud is a great option for those who prefer a managed cloud solution, while Splunk Enterprise is better suited for organizations that need to tailor the platform to their specific requirements.
"HOST" -
<host> is the Splunk Cloud Platform instance that runs HTTP Event Collector
"PORT" -
Enter the appropriate Port.
"API KEY" -
Copy the API key generated from Splunk as mentioned under Prerequisites.
Click Finish button to complete the integration process.
Last updated