Export analytics data from Cerby to Splunk

This article describes how to set up the integration to export analytics data from Cerby to Splunk.

circle-info

Who can use this feature?

  • WorkspaceOwners , Super Admins , and Admins

  • This is a beta feature currently available to a limited number of workspaces

With Cerby, you can export the analytics data of your workspace to a security information and event management (SIEM) solution like Splunk via an integration. This is a feature that customers can request to be enabled by the Cerby Customer Support team.

The integration leverages an HTTP Event Collector, where Cerby exports the logs of analytic events in JSON format every minute as long as Cerby has registered events. The Appendix: Analytic events format section details the JSON object structure.

circle-info

NOTE: Email your request to enable this feature to the Customer Support team at support@cerby.comenvelope. You must also send a URI as part of step 1. Create and set up an HTTP Event Collector in Splunk.

This article describes how to set up the analytics data export to Splunk.


Set up the analytics data export to Splunk

To set up the export of the analytics data that Cerby registers and stores for a workspace, you must complete the following main steps:

The following sections describe each main step.

1. Create and set up an HTTP Event Collector in Splunk

To create and configure an HTTP Event Collector in Spunk, complete the following steps:

  1. Create a Splunk HTTP Event Collector for receiving events by following the instructions in the Getting Data Inarrow-up-right official documentation.

IMPORTANT: When creating the Event Collector token, disable the Enable indexer acknowledgement checkbox.

  1. Share the HTTP Event Collector token and URI with the Cerby Customer Support team. The following is an example of the URI: https://demouri.splunkcloud.com:8088/services/collector/event.

The Splunk system provides the URI and may contain a port. If applicable, ensure you share the port to prevent issues receiving the events.

IMPORTANT: Use a Cerby secure secret instead of sending sensitive details directly. For more information, refer to the articles Share items with external users via a linkarrow-up-right and [Video] How to share a secret with external users via a public linkarrow-up-right to learn how to share the values securely.

The next step is 2. Search for Cerby events via the Splunk Search app.

2. Search for Cerby analytic events via the Splunk Search app

To search for Cerby analytic events using the Splunk Search app, follow the instructions in the Search Tutorialarrow-up-right official documentation.

Now you’re done with the setup.


Appendix: Analytic events format

The following is an example of the JSON object with the analytic events that Cerby sends to Splunk. The object contains a description of each key-value pair.

Last updated