Logging to Splunk
Splunk is a common Security Information and Event Management (SIEM) and log collection tool. Nametag’s logging is based on webhooks. Splunk can accept webhooks. The following steps describe how to configure Splunk and Nametag so that logs from Nametag appear in Splunk. Splunk is highly configurable and you may have additional configuration you need to do based on your specific Splunk instance; if these instructions conflict with your configuration, please let us know - we are happy to help.
These steps document the connection to a Splunk Cloud instance; the configuration for Splunk Enterprise is similar.
Splunk configuration
Nametag will send logs to Splunk using the HTTP Endpoint Collector (HEC), so the first step is to create a new HEC in Splunk.
-
From the Settings menu, select Data inputs
-
On the Data inputs page select HTTP Event Collector
-
On the HTTP Event Collector page, click the New token button and enter
Nametag
as the Name,nametag
as the Source name override andLogs from Nametag (nametag.co)
as the description; you do not need to check Enable indexer acknowledgement. Then click Next -
On the Input Settings page, accept the defaults and click Review and on the Add Data page click Submit; you can copy the token from this page or from the Data inputs/HTTP Event Collector page.
Nametag configuration
In the Nametag configuration (https://console.nametag.co/configure) page, go to the Webhooks section to create (or add) the webhook that you’ll use to send logs to Splunk. The Nametag API documentation has documentation on webhooks.
-
In the Delivery URL field, enter
https://x:HEC_TOKEN@HOST.splunkcloud.com/services/collector/raw
where you should replace the string
HEC_TOKEN_GOES_HERE
with the HEC token from Step 4 above and replaceHOST
with the name of your Splunk Cloud collection host.Note: There may also be a port number after
splunkcloud.com
; if your Splunk Cloud URL contains one you must also include it here -
For logging that has no PII you can turn on the options Data is shared with you, Data shared with you is revoked, and A user completes self-service account recovery. For verbose logging that may include PII, you can enable A request is created or updated.
At this point, the Nametag configuration will look something like:
Note: If you edit any part of the Delivery URL field, you must re-enter the
HEC_TOKEN
; it not stored or available in the UI. If you do not re-enter the token, webhooks will not be received by Splunk. -
To generate a log message, go to the Verifications page in the Nametag console and press New Verification. This will cause an event to be emitted if you have A request is created or updated enabled. (For the other settings you will need to complete a verification, revoke shared data, or perform an Autopilot self-service password or MFA recovery.)
In the Splunk console you can search using the
source="nametag"
parameter and you will see the JSON data.On the Nametag Configure/Webhooks page you will see a list of webhooks; successfully delivered webhooks will have a green checkmark by them; those with errors will have a red circled exclamation point.
Clicking on a webhook will show you the details of both the request and the response from Splunk
At this point you will start seeing logs from Nametag into Splunk.
If you have any questions about this, please contact us at help@nametag.co