Splunk alerts
Splunk is a software platform to search, analyze, and visualize machine-generated data gathered from websites, applications, sensors, and devices.
Prisma Cloud continually scans your environment for vulnerabilities, Complience, Runtime behavior, WAAS valiolations and more. You can now monitor your Prisma Cloud alerts in Splunk using a native integration.
Sending alerts to Splunk
Follow the instructions below to send alerts from your Prisma Cloud Console to Splunk Enterprise or Splunk Cloud Platform.
Set up Splunk HTTP Event Collector (HEC) to view alert notifications from Prisma Cloud in Splunk
Splunk HEC lets you send data and application events to a Splunk deployment over the HTTP and HTTPS protocols. This helps consolidate alert notifications from Prisma Cloud into Splunk, so that your operations team can review and take action on the alerts.
- SelectSettings > Data inputs > HTTP EventCollector and make sure you see HEC added in the list and that the status shows that it isEnabled.
Set up the Splunk integration in Prisma Cloud Compute edition
- Log in to Prisma Cloud Console
- Go toManage > Alerts > Managetab
- Click on+ Add profileto create a dedicated alert profile for Splunk
- Enter a name for your alert profile
- InProvider, selectSplunk
- InSplunk HTTP event collector URL, enter the Splunk HEC URL that you set up earlier.
- In Custom JSON, enter the structure of the JSON payload, or use the default JSON.For more details about the type of data in each field, clickShow macros.
- EnterAuth TokenThe integration uses token-based authentication between Prisma Cloud and Splunk to authenticate connections to Splunk HEC. A token is a 32-bit number that is presented in Splunk.
- InAlert triggerssection, select the triggers that you would like Splunk to be alerted by
- ClickSend test alertto test the connection. You can view the test message in Splunk
Set up the Splunk integration in Prisma Cloud Enterprise edition (SAAS)
Prisma Cloud Compute in SAAS uses the same notification settings set up in the platform for CSPM alerts. These configurations are setup in the platform under
Settings > Integrations
, and can be used in Compute by importing them as an Alert Profile. Any changes to the provider settings will need to be done on the platform side.- Importing platform configurations inside Compute:
- Navigate toManage > Alerts > Managetab in Compute, click on "Add Profile"
- From the Provider drop down, selectPrisma Cloud
- In the Integrations field, select the configuration you set up with Splunk in step 1
- Select triggers to be sent to this channel
- Click Save
Message structure
Both integrations with Splunk, via Prisma Cloud SAAS and Enterprise eddition, generate the same event format.
JSON schema
The JSON scema includes the following default fields:
- app: Prisma Cloud Compute Alert Notification
- message: contains the alert content in a JSON format as defined in theCustom JSONfield
- sender: Prisma Cloud Compute Alert Notification
- sentTs: Event sending timestamp as Unix time
- type: alert
{ app: Prisma Cloud Compute Alert Notification message: { [+] } sender: Prisma Cloud Compute Alert Notification sentTs: 1637843439 type: alert }
You can learn more about the Alert JSON macros and customizations in the Webhook Alert documentation