HashiCorp Cloud Platform
Set up alerting - Splunk
You can integrate with Splunk to subscribe events you wish to monitor.
Prerequisites
Create a Splunk Connection
Select Settings from the side navigation. Under the Integration menu, click Splunk.
Click the + Connection button.
Enter a unique name for the connection.
Generate an integration token following the Splunk docs
Copy your integration token and paste it into the token field.
Enter the port number (default is
8088
).If you are testing with a free trial, select the Free Trial check-box.
Enter the base URL of your Splunk account.
Click Test & Save.
Create a Splunk subscription
Click the + Subscription button to begin the creation process.
Choose a name for the subscription as well as the saved filters you would like the subscription to be based on.
Choose the connection for the subscription output.
Enter the Splunk index.
Enter a Splunk source type.
Click Test & Save
Vault Radar events matching your filters will create events in the specified Splunk index.