LogoLogo
WebsiteBlogLogin
  • Onum Docs
  • Use Cases
  • Videos
  • Release Notes
  • Welcome
  • Getting Started
    • About Onum
    • Architecture
    • Deployment
    • Getting Started with Onum
    • Understanding The Essentials
      • Cards and Table Views
      • Data Types
      • Graph Calculations
      • The Time Range Selector
    • Key Terminology
  • THE WORKSPACE
    • Home
    • Listeners
      • Cloud Listeners
      • Listener Integrations
        • Amazon SQS
        • Amazon S3
        • Apache Kafka
        • Azure Event Hubs
        • Cisco NetFlow
        • Google Pub/Sub
        • HTTP
        • HTTP Pull
        • Microsoft 365
        • OpenTelemetry
        • Syslog
        • TCP
      • Labels
    • Pipelines
      • Building a Pipeline
        • AI Assistant
          • AI Pipeline Assistant
          • AI Action Assistant
      • Listeners
      • Actions
        • Advanced
          • Anonymizer
          • Bring Your Own Code
          • Field Generator
          • For Each
          • Google DLP
          • HTTP Request
          • Redis
        • Aggregation
          • Accumulator
          • Group By
        • AI
          • Amazon GenAI
          • BLIP-2
          • Cog
          • Google GenAI
          • Llama
          • Replicate
        • Detection
          • Sigma Rules
        • Enrichment
          • Lookup
        • Filtering
          • Conditional
          • Sampling
        • Formatting
          • Message Builder
        • Transformation
          • Field Transformation
            • Field Transformation Operations
              • Arithmetic / Logic
                • Divide Operation
                • Median
                • Multiply Operation
                • Subtract Operation
                • Sum Operation
              • Code tidy
                • JSON Minify
              • Control characters
                • Escape String
                • Unescape String
              • Conversion
                • Convert Area
                • Convert Data Units
                • Convert Distance
                • Convert Mass
                • Convert Speed
                • List to String
                • String to List
              • Data format
                • From Base
                • From Base64
                • From Hex
                • To Base
                • To Base64
                • To Hex
              • Date / Time
                • From Unix Timestamp
                • To Timestamp
                • To Unix Timestamp
                • Translate Datetime Format
              • Encoding / Decoding
                • From Binary
                • To Binary
                • To Decimal
              • Encryption / Encoding
                • JWT Decode
              • File system permissions
                • Parse Unix file permissions
              • Format conversion
                • CSV to JSON
                • JSON to CSV
              • Hashing
                • Keccak
                • MD2
                • MD4
                • MD5
                • SHA0
                • SHA1
                • SHA2
                • SHA3
                • Shake
                • SM3
              • Networking
                • Defang IP Address
                • Defang URL
                • Extract IP Address
                • Fang IP Address
                • Fang URLs
                • IP to Hexadecimal
                • Parse URI
                • URL Decode
                • URL Encode
              • Other
                • Parse Int
              • String
                • Length
              • Text sample adding
                • Pad Lines
              • Utils
                • Byte to Human Readable
                • Count Occurrences
                • CRC8 Checksum
                • CRC16 Checksum
                • CRC24 Checksum
                • CRC32 Checksum
                • Credit Card Obfuscator
                • Filter
                • Find and Replace
                • Regex
                • Remove Whitespace
                • Reverse String
                • Shuffle
                • Sort
                • Substring
                • Swap Case
                • To Lower Case
                • To Upper Case
          • Flat JSON
          • JSON Transformation
          • JSON Unroll
          • Math Expression
          • Parser
            • PCL (Parser Configuration Language)
        • Utils
          • Unique
      • Data sinks
      • Bulk Changes
      • Publishing & Versioning
      • Test your Pipeline
    • Data sinks
      • Data sink Integrations
        • Amazon S3
        • Amazon SQS
        • Azure Blob Storage
        • Azure Event Hubs
        • Devo
        • Google BigQuery
        • Google Cloud Storage
        • Google Pub/Sub
        • HTTP
        • Jira
        • Mail
        • Null
        • OpenTelemetry
        • PagerDuty
        • Pushover
        • Qradar
        • Relational Databases
        • ServiceNow
        • Slack
        • Splunk HEC
        • Syslog
        • TCP
        • Telegram
        • Twilio
    • Alerts
  • YOUR VAULT
    • Enrichment
    • Data History
    • Actions
  • ADMINISTRATION
    • Tenant Menu
    • Global Settings
      • Your Account
      • Organization Settings
        • Secrets Management
      • Tenant
        • Authentication
        • Users
        • Activity Log
  • MARKETPLACE
    • Onum Marketplace
      • Pulling Pipelines
        • Netskope Events Alert
        • OKTA System Log API
        • Sophos Connector SIEM
Powered by GitBook
On this page
  • Overview
  • Data Sink Configuration
  • Metadata
  • Metrics display
  • Configuration
  • Pipeline configuration
  • Output configuration
  • Splunk metadata

Was this helpful?

Export as PDF
  1. THE WORKSPACE
  2. Data sinks
  3. Data sink Integrations

Splunk HEC

Most recent version: v1.0.0

PreviousSlackNextSyslog

Last updated 8 days ago

Was this helpful?

See the changelog of this Data Sink type .

Overview

Splunk HEC is an interface that allows applications to send event data to Splunk directly via HTTP or HTTPS. Suppose you have an application that generates log events. Instead of writing these events to a log file and having Splunk read from there, you can configure Onum to send these events directly to Splunk HEC. The application makes an HTTP POST request to Splunk HEC with the events in JSON format and the authentication token. Splunk receives these events in real-time, indexes them, and makes them available for immediate analysis.

Select Splunk HEC from the list of Data Sink types and click Configuration to start.

Data Sink Configuration

Now you need to specify how and where to send the data, and how to establish a connection with Splunk HEC.

Metadata

Enter the basic information for the new Data Sink.

Parameters
Description

Name*

Enter a name for the new Data Sink.

Description

Optionally, enter a description for the Data Sink.

Tags

Add tags to easily identify your Data Sink. Hit the Enter key after you define each tag.


Metrics display


Configuration

Now, add the configuration to establish the connection.

Parameter
Description

Splunk instance URL*

Add the URL to connect to your Splunk instance:

  • For on-premises deployments, this will be <protocol>://<host>

  • In Cloud deployment setups, this will be <protocol>://http-inputs-<host>.splunkcloud.com

Find all your instances in My Splunk > Instances.

URL port number*

Connection port. If not specified, port 8088 is used by default.

Authentication method

Choose how to authenticate:

Parameter
Description

Basic

The username is the same as the one used to log in to the instance via the browser, and the password is the token value you'll use.

Token

Event format

Choose the format of the message to send:

Parameter
Description

JSON

Choose this option if you want to send your events in JSON format.

Raw

Choose this option if you want to send your events in raw format. Set the following parameters:

    • Choose manual if you don't have a specific source type to use.

    • Select none to add a custom source type in the Custom source type* field that appears.

Advanced configuration

Optionally, you may configure the following advanced settings:

Parameter
Description

Bulk configuration

Activate the Bulk configuration toggle if you want to allow bulk sending. Configure the following parameters:

  • Event time limit* - If the bulk amount is not reached, enter the maximum time lapse between sends (in seconds). The minimum value is 1.

Now, set the conditions to trigger bulk sending:

  • Event amount - Enter the maximum number of events per batch. The minimum value is 1.

  • Event size - Enter the maximum number of bytes in each batch. The minimum value is 1 and the default value is 5000000.

TLS configuration

Activate the TLS configuration toggle if you want to set a TLS connection. Configure the following parameters:

  • Minimum TLS version* - Choose the minimum TLS version required for incoming connections.

By default, the Skip TLS validations toggle is activated. Deactivate it to configure the following:

  • Subject Alternative Name - Optionally, enter a Subject Alternative Name (SAN) for your TLS connection.

Proxy configuration

If your organization uses proxy servers, activate the Proxy configuration toggle and establish the connection here:

  • Scheme* - Choose the required proxy scheme (HTTP or HTTPS).

  • Host* - Set the required proxy address.

  • Port* - Set the required proxy port.

  • Username - Enter your proxy username.

Gzip compression

Activate the Gzip compression toggle to allow using this type of compression.

Pipeline configuration

Output configuration

Parameter
Description

Raw message*

Select the field to include in the output message. The data type must be string.

Splunk metadata

Optionally, you may include the following metadata:

Parameter
Description

Host

Select the field that contains the host information. The data type must be string.

Source

Select the field that contains the source information. The data type must be string.

Index

Select the field that contains the index information. The data type must be string.

Onum supports integration with .

Decide whether or not to include this Data Sink info in the metrics and graphs of the area.

For Basic authentication, enter your Username* and Password*. Select your password from the list of your tenant's or create a new one.

For Token authentication, choose the required Token*. Select your token from the list of your tenant's or create a new one.

Learn how to create and manage your Splunk tokens in .

Channel* - Indicate the ID of the channel used to send events. This helps streamline event searches on the server. Learn more about channels in .

Source type* - Select the required source type to parse your data from the dropdown list.

Learn how to create new source types .

Certificate* - Select your CA certificate from the list of your tenant's or create a new one.

Private key* - Select your private key from the list of your tenant's or create a new one.

CA chain* - CA chain used by the Data Sink to verify client certificates. Choose it from the list of your tenant's or create a new one.

Password - Select your proxy password from the list of your tenant's or create a new one.

When it comes to using this Data Sink in a , you must configure the following output parameters. To do it, simply click the Data Sink on the canvas and select Configuration.

Splunk HEC (HTTP Event Collector)
Home
Pipeline
Secrets
Secrets
this article
this article
See here for a comprehensive list.
here
Secrets
Secrets
Secrets
Secrets
here