Integrate Kisi with Splunk
You can integrate Kisi with Splunk to analyze access events by sending them to the Splunk Cloud.
info
This is a Kisi-built integration, maintained and supported by Kisi.
Create the Splunk token
- Sign in to your Splunk account
- Navigate to Settings > Data inputs
- Click on HTTP Event Collector
- If you see a warning sign beside the Global settings button at the top right corner: Click the Global Settings button > enable the All Token option > Click Save
- Click on New token
- Enter the name of the token (e.g. Kisi). Leave the rest of the options with the default values.
- Click Next
- In the Input Settings, select your desired index under Select Allowed Indexes
- Click Review
- Click Submit
- Copy the token value. Alternatively, you can view the token value you created by going to Settings > Data Input > HTTP Event Collector
Set up the integration in Kisi
- Sign in to Kisi with your admin user
- Open the Settings and click on Integrations
- Click on Add integration
- Provide a name for your integration (e.g. Splunk)
- Open the Type dropdown and select Splunk
- Click on Add
- Under Splunk configuration, enter the token value you obtained before
- Under URL, enter your Splunk instance (e.g.
https://hec.example.com:8088
) - Click Save
- Select the desired event(s) you wish to monitor in Splunk
- Click Save
- Click Save and Return