Getting Data In

Vendor api token, but no add-on

mikefg
Communicator

I have a vendor that will provide an api token so I can retrieve SIEM event data. There is no add-on available for this vendor that I can find. I will also want to make this data available to Splunk Enterprise Security.

The data will be available from the vendor using a path like this.
   https://siem.vendor.com/authapi/api/siem

The event data is intended to be used with a SIEM so it will be in fields like this.
   event_id=message source=threat ip=127.0.0.1

I'm assuming I will need to create an add-on, but have not done this before. Or is this a use case for the HTTP Event Collector?

0 Karma

mikefg
Communicator

It looks like HEC is the wrong way to go since it sends data from an application to Splunk. Is creating my own add-on the right way to go? 

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...