SigSentrySigSentry

Splunk

Connect Splunk Enterprise or Splunk Cloud to SigSentry using a search head and authentication token

The Splunk adapter queries Splunk Enterprise and Splunk Cloud deployments via the REST search API. You'll need a reachable search head URL and an authentication token.

Prerequisites

NeedNotes
Splunk search head URLe.g. https://splunk.company.com:8089 (REST port, usually 8089)
Authentication tokenGenerated under Settings → Tokens
IndexesThe Splunk indexes SigSentry should query

Setup walkthrough

Generate a Splunk authentication token

In Splunk Web, go to Settings → Tokens → New Token. Set:

FieldValue
UserA user with search capability and read access to the relevant indexes
Audiencesigsentry (informational, helps with auditing)
ExpirationSet a real expiration; rotate periodically

Copy the token — it's shown only once.

Tokens must be enabled at the system level under Settings → Tokens → Token Settings → Enable Token Authentication. If tokens are disabled in your deployment, ask an admin to enable them.

Add the log source in SigSentry

Project → Log Sources → Add log source. Pick Splunk and name it descriptively, e.g. splunk-prod.

Enter connection details

FieldValue
HostSplunk REST URL, e.g. https://splunk.example.com:8089
TokenThe auth token you just generated

Add indexes

Paste the indexes you want SigSentry to query, one per line:

main
prod_app_logs
api_gateway

Or use Splunk search expressions for finer scoping:

index=prod_app_logs sourcetype=json
index=api_gateway sourcetype=access_combined

Test and save

Click Test connection. You should see Connected plus sample lines from a small recent window. Click Save.

What you'll see in results

Each Splunk event shown in an analysis includes:

  • Timestamp (from _time)
  • Log level (from severity, level, or parsed from _raw)
  • Service name (from source, host, or sourcetype)
  • Message (from _raw)
  • All other indexed fields carried through as metadata

Quirks

QuirkNotes
REST portDefault is :8089, not the web UI port (:8000)
TLSSelf-signed certs require either a public CA chain or pre-shared trust
Cloud vs EnterpriseSplunk Cloud uses https://<stack>.splunkcloud.com:8089; same auth model
Token vs basic authWe support tokens only — basic auth (username + password) is deprecated

Troubleshooting

ErrorFix
401 UnauthorizedToken expired or user lacks search permission
404 Not FoundWrong port (use :8089) or path issue
SSL certificate verify failedSplunk has a self-signed cert; install a real cert or contact support
Slow queriesReduce indexes, narrow the search clause, or use sourcetype hints