Export log events to an external monitoring tool
You can export Advanced Identity Cloud log event data to an external monitoring tool, a process sometimes known as push logging. This lets you monitor certain events in real time and troubleshoot issues using your preferred SIEM or event monitoring solution, such as an OpenTelemetry-compatible SIEM or Splunk.
Advanced Identity Cloud supports streaming log event data in OpenTelemetry Protocol (OTLP) and Splunk formats.
To configure a log event exporter, use REST API calls to define the telemetry format, the log sources to export, and the destination monitoring tool. Advanced Identity Cloud’s log event exporter service then retrieves the logs and sends them to your chosen monitoring tool in real time.

An Advanced Identity Cloud tenant environment can have only one log event exporter. This means you can only send logs to one external monitoring tool or SIEM. |
Use cases
Exporting Advanced Identity Cloud log events to an external monitoring tool in real time has many use cases, including:
-
Debug journeys while viewing real-time events and errors.
-
Monitor the performance of authentications during journey creation.
-
Collect events from Advanced Identity Cloud and enrich them with data from other sources.
-
Detect and respond to critical events. For example, a sudden spike in registrations might mean an effective marketing program or suspicious activity.
-
Set alerts on authentication and registration requests from particular regions.
-
Monitor the improper use of APIs.
-
Monitor user activity, success/failure rates, and password reset requests.
Supported export formats
The log event exporter service supports the following formats:
-
-
HTTP transport:
-
gRPC over TLS:
-
-
Splunk
-
HTTP transport:
-
HTTP header with Splunk token required (example)
-
Set up a log event exporter
Follow these steps to set up a log event exporter:
-
Determine the Advanced Identity Cloud log sources to export.
-
Configure your destination monitoring service to receive log events from Advanced Identity Cloud.
Refer to your monitoring tool vendor documentation for configuration details.
- Grafana
-
-
Go to your Grafana Cloud Stacks page.
-
Under OpenTelemetry, click Configure.
-
Copy the OTLP Endpoint, adding
/v1/logs
to the end. For example,https://example.grafana.net/otlp/v1/logs
. -
Copy the
Instance ID
for the username. -
Under Password / API Token, click Generate Now to generate the password.
-
- Datadog
-
-
Follow the Datadog documentation to get
DD_API_KEY
andYOUR_ENDPOINT
. The value inYOUR_ENDPOINT
must end in/v1/logs
.
-
- New Relic
-
-
Follow the New relic documentation to get
OTEL_EXPORTER_OTLP_ENDPOINT
and yourapi-key
. The endpoint must end in/v1/logs
.
-
- Splunk
-
-
Configure HTTP Event Collector (HEC).
-
Make a note of the HEC token. You’ll need this when you configure the log event export in Advanced Identity Cloud.
You must disable indexer acknowledgment for the HEC token. The Advanced Identity Cloud log event exporter is not compatible with this feature.
-
-
Configure the log event export in Advanced Identity Cloud using REST. Learn more in Manage log event exporters using the API.
-
Verify that the log events are arriving at the external monitoring tool correctly.