Skip to main content
All CollectionsHOW-TO guides
Integrate Splunk SIEM with Reco
Integrate Splunk SIEM with Reco
Reco Product Management avatar
Written by Reco Product Management
Updated over 2 weeks ago

Reco enables you to create SIEM and SOAR connectors, allowing you to send alerts directly to your organization's centralized event management system.

From Splunk, you can drill down into Reco alerts to investigate and remediate as needed.

To send Reco alerts to the Splunk alert pipeline, follow these steps:

Step 1: Generate the Splunk Instance URL

  1. Log in to your Splunk account.

  2. From the top menu, navigate to Settings > Data > Data inputs.

  3. On the Data inputs page, select HTTP Event Collector > Global settings.

  4. In the Edit Global settings popup, note the HTTP port number and close the popup.

  5. Copy the Splunk URL in the following format (Splunk Docs):

    <protocol>://http-inputs-<host>.splunkcloud.com:<port>/<endpoint>
  6. Endpoint can be: /services/collector/event or /services/collector/raw

  7. Save this URL for use in the next step.

Step 2: Generate the HTTP Event Connector Token in Splunk

  1. In the top menu, go to Settings > Data > Data inputs.

  2. On the Data inputs page, select HTTP Event Collector > Add new.

  3. In Select Source, name the source (e.g., Reco) and click Next.

  4. Under Input Settings > Source type, choose Automatic and then click Review > Submit.

  5. Save the event connector token for the final step.

Step 3: Connect Splunk SIEM to Reco

  1. In Reco, navigate to Integrations.

  2. Open the SIEM & Automation tab.

  3. Click Add Webhook to start configuring the connection.

  4. Enter the URI you generated earlier (the Splunk Instance URL).

  5. Under Add Header, set the following:

    1. Key: Authorization

    2. Value: Splunk <<event connector token>>

  6. Save the configuration to complete the integration, enabling Reco alerts to flow directly into Splunk.

Did this answer your question?