Skip to content

Log Forwarding - Splunk

Overview

Splunk is a very common and powerful SIEM that is used by many companies. Valtix supports Log Forwarding to Splunk to send Security Events and Traffic Log information for processing, storage, access and correlation. The information sent is in a semi-structured JSON format where the attribute-value pairs can be accessed and processed.

Requirements

In order to forward logs to Splunk, the following information is required:

  • Splunk account
  • Splunk Collector URL
  • Event Collector Key
  • Index Name

Tip

For information on the Splunk Event Collector, refer to Splunk HTTP Event Collector

Profile Parameters

Parameter Deonticity Default Description
Profile Name Required A unique name to use to reference the Profile
Description Optional A description for the Profile
Destination Required Datadog The SIEM used for the Profile
Skip Verify Certificate Optional Unchecked Whether to skip verifying the authenticity of the certificate
Endpoint Required The URL used to access the HTTP Event Collector
Token Required The Splunk Token to allow Valtix to communicate with Splunk
Index Required main The name of the Splunk index used to store events