Skip to main content

Splunk Log Forwarding

You can configure AIDR events to be forwarded to Splunk using the HTTP Event Collector (HEC) protocol, allowing you to consolidate Pangea logs with your existing Splunk data for centralized analysis and reporting.

Enable HTTP Event Collector in Splunk Web

Use the following resources to assist with the HTTP Event Collector (HEC) setup:

Set up log forwarding

  1. In your AIDR admin console, click Settings in the sidebar; then, select Organization Settings.

  2. Click Data Export in the sidebar menu on the organization settings page.

  3. Under Audit Log Forwarding, toggle the control in the top-right to Enabled.

  4. Set Logging Service to Splunk.

  5. For Event URL, enter the full URL for sending events (e.g., https://<myhost>.<tld>/services/collector/event).

  6. (Optional) In the Index field, specify the Splunk index to include in the HEC payload. This can also be set in the HEC token settings.

  7. (Optional) Configure Enable Indexer Acknowledgment only if this feature is enabled in your Splunk HEC settings:

    • Acknowledge URL - The URL used for acknowledgment verification, typically in the format https://<myhost>.<tld>/services/collector/ack.
    • Channel ID - Required for indexer acknowledgment. Generate a value using uuidgen or a similar tool.
  8. Click the Store HEC Token button.

    1. In the New Secret dialog, enter the HEC token from your Splunk setup in the Secret field.
    2. Click Done.
  9. (Optional) In the Provider certificate to use self-signed TLS input, upload the public certificate of your private CA if you're using a self-signed or privately issued TLS certificate. This is not required if the certificate is issued by a trusted public Certificate Authority (CA).

  10. Click Save to apply the configuration.

  11. Click Test forwarding configuration to validate the setup.

    If successful, the following message will appear:

    Successfully verified message

    In Splunk, you should see a message forwarded by the Secure Audit Log service:

    Splunk message

    If the configuration test fails, an error message will appear at the top of the screen. For example, the following message indicates a certificate misconfiguration:

    Error message

Was this article helpful?

Contact us

Secure AI from cloud to code

636 Ramona St Palo Alto, CA 94301

©2025 Pangea. All rights reserved.

PrivacyYour Privacy ChoicesTerms of UseLegal Notices
Contact Us