Splunk Connector
This feature is available for Enterprise deployments only. If you’d like to get started, please contact support@loginid.io for further details.
The Splunk Connector allows you to stream real-time LoginID event data directly into your Splunk instance. It enables push-based delivery of authentication events through the HTTP Event Collector (HEC) interface. You can use these pushed events to create reports, charts, and alerts with Splunk.
Prerequisites
- Access to a running Splunk instance with HEC enabled.
- Your Splunk HEC endpoint URL.
- A valid HEC token generated from your Splunk instance.
Splunk Configuration
Creating HEC Token
-
Log in to your Splunk instance.
Navigate to:
Settings → Data Inputs → HTTP Event Collector → + Add New -
Create a new HEC token.
- Provide a name (e.g.,
LoginID Connector) - Note the token value — you will need it in the LoginID configuration.
- Optionally, enable SSL if your instance uses HTTPS.
- You can optionally define a Source Type to help categorize LoginID events in Splunk.
- Provide a name (e.g.,
Formatting HEC URI
This setup provides a quick way to get your Splunk configuration running. For detailed instructions on enabling the HTTP Event Collector in Splunk, refer to the Splunk Documentation.
-
Form your Splunk HEC URI.
-
The URI follows this format:
<protocol>://<splunk-host>:<port>-
For the protocol, you may also use HTTP (instead of HTTPS) if SSL is disabled on your HEC global settings.
-
The Splunk host is the domain of your Splunk instance.
-
Port 8088 is the default port used by Splunk’s HTTP Event Collector (HEC) to receive event data. If your Splunk instance is configured with a different port, update the URI accordingly.
-
-
For example:
https://splunk.acme.local:8088
-
-
Test your endpoint (optional). You can test connectivity using a
curlcommand:curl -k https://splunk.acme.local:8088/services/collector/event \
-H "Authorization: Splunk ${SPLUNK_TOKEN}" \
-d '{"event": "test"}'The
-kflag disables SSL certificate verification, which may be necessary if your Splunk instance uses a self-signed certificate.If you receive a response like
{ "text": "Success", "code": 0 }, your endpoint and token are valid.
Configure in LoginID
Once your HEC token and URI are ready, configure the connector on the LoginID Dashboard.
- Go to Applications → [Your App] → Connectors → New
- Select Splunk as the Connector Type.
- Fill out the required fields:
| Field | Description |
|---|---|
| Name | A name to identify your Splunk connector (e.g., Splunk-Prod). |
| URI | Your Splunk HEC endpoint, e.g. https://splunk.acme.local:8088. |
| Authorization Token | The Splunk token generated in the previous step. |
| Index | (Optional) The Splunk index for storing LoginID events. |
- Click Create to save and activate your connector.
Once enabled, LoginID will immediately begin streaming real-time event data into your specified Splunk index.

Monitoring and Validation
You can verify data ingestion within your Splunk instance:
-
Open the Search & Reporting app.
-
Run a query such as:
index="<your_index>" source="<your_source_type>" -
You should see new events appearing as users interact with your application.