Reco enables you to create SIEM and SOAR connectors, allowing you to send alerts directly to your organization's centralized event management system.
From Splunk, you can drill down into Reco alerts to investigate and remediate as needed.
To send Reco alerts to the Splunk alert pipeline, follow these steps:
Step 1: Generate the Splunk Instance URL
Log in to your Splunk account.
From the top menu, navigate to Settings > Data > Data inputs.
On the Data inputs page, select HTTP Event Collector > Global settings.
In the Edit Global settings popup, note the HTTP port number and close the popup.
Copy the Splunk URL in the following format (Splunk Docs):
<protocol>://http-inputs-<host>.splunkcloud.com:<port>/<endpoint>
Endpoint can be:
/services/collector/event
or/services/collector/raw
Save this URL for use in the next step.
Step 2: Generate the HTTP Event Connector Token in Splunk
In the top menu, go to Settings > Data > Data inputs.
On the Data inputs page, select HTTP Event Collector > Add new.
In Select Source, name the source (e.g., Reco) and click Next.
Under Input Settings > Source type, choose Automatic and then click Review > Submit.
Save the event connector token for the final step.
Step 3: Connect Splunk SIEM to Reco
In Reco, navigate to Integrations.
Open the SIEM & Automation tab.
Click Add Webhook to start configuring the connection.
Enter the URI you generated earlier (the Splunk Instance URL).
Under Add Header, set the following:
Key:
Authorization
Value:
Splunk <<event connector token>>
Save the configuration to complete the integration, enabling Reco alerts to flow directly into Splunk.