Page created: 9 Jan 2023
|
Page updated: 2 Feb 2023
The PingOne App for Splunk correlates your PingOne data into a meaningful dashboard. The app allows you to create custom dashboards and reporting, monitor activity data, and analyze event data over time.
You must:
- Have Splunk administrator account.
- Create a webhook to send your PingOne data to your Splunk
instance. We recommend collecting the data in
index=pingone
so that the data model attached to the PingOne App for Splunk will automatically pick up the data.- Create a data input in Splunk to receive the webhook data from PingOne. In Splunk, click .
- For HTTP Event Collector, click +Add
new. Send the data to
index=pingone
. Make sure to copy the token provided by Splunk. For more information, refer to the Splunk HTTP Event Collector documentation.Note:To use a different index, refer to step 2 below to configure the PingOne App for Splunk to capture webhook data stored in other indexes.
- Create the webhook in PingOne and enter the token provided by Splunk when you created the HTTP Event Collector input.
- Download the PingOne App for Splunk package in Splunkbase. Search for pingone in Splunkbase to find the file.
To install the PingOne App for Splunk: