Introduction
Integrating OpsRamp with Splunk enables IT teams to centralize and analyze critical IT operations data, including alerts, events, and logs, within Splunk’s powerful analytics platform.
This integration allows real-time data ingestion from OpsRamp into Splunk, improving visibility, incident management, and security monitoring. By leveraging Splunk’s advanced search, visualization, and machine learning capabilities, you can gain deeper insights into your IT infrastructure and proactively address issues before they impact business operations.
Key Benefits of OpsRamp-Splunk Integration
- Real-Time Alert and Log Correlation – Seamlessly stream OpsRamp alerts and logs into Splunk to correlate IT and security events, enabling faster identification of root causes and reducing downtime.
- Faster Incident Resolution – Leverage Splunk’s analytics alongside OpsRamp’s alert management to automate incident detection and response, significantly lowering mean time to resolution (MTTR).
- Comprehensive IT Visibility – Integrate OpsRamp data with system logs, network activity, and application performance metrics in Splunk to create a holistic view of your IT infrastructure.
- Enhanced threat detection and Compliance – Enhance security monitoring by feeding OpsRamp alerts into Splunk Security Information and Event Management (SIEM), helping detect threats, mitigate risks, and ensure compliance with industry standards.
- Intelligent Automation and Response – Use Splunk’s automation capabilities to trigger actions in OpsRamp, such as incident creation, remediation scripts, or team notifications, improving operational efficiency.
Prerequisite
- Define Create Alert task in Process Definition to enrich and create the alert.
Install Splunk integration
Navigate to Setup → Account. The Account Details screen is displayed.
Select the Integrations tile. The Installed Integrations screen is displayed, with all the installed applications.
If you do not have any installed applications, you will be navigated to the Available Integrations screen. The Available Integrations screen displays all the available applications along with the newly created application with the version.
Note: Search for Splunk application using the search option available. Alternatively, search for Events from All Categories option and select it.Click ADD in Splunk tile. The SPLUNK (Inbound) screen is displayed.
Enter the following basic details:
Configure INBOUND communication
AUTHENTICATION:
Field Name Field Type Description Authentication Type Dropdown OpsRamp supports APIs with OAUTH2 for Custom. Select OAUTH2. Tenant ID String Click to generate the Tenant ID. Token String Use the copy icon to make a note of the token. Below is the Curl command to get the Alert data String Use the copy icon to make a note of the token. MAP ATTRIBUTES: Map Splunk entity attributes with OpsRamp entity.
Click +ADD in the MAP ATTRIBUTES section. The ADD MAP ATTRIBUTES window is displayed.
Enter the following information:
Field Name Field Type Description OpsRamp Entity Dropdown Select OpsRamp entity from the dropdown. OpsRamp Property Dropdown Select OpsRamp property from the dropdown. It will change based on entity selection. CUSTOM Entity String Enter the Custom Entity in the box. CUSTOM Property String Enter the Custom Property in the box. PARSING CONDITION:
- Click +ADD and provide the parsing condition:
- Select an operator from the dropdown:
- BETWEEN – Define a range of values.
- BEFORE – Extracts values occurring before a specified point.
- AFTER – Extracts values occurring after a specified point.
- Regex – Uses a regular expression pattern for flexible matching.
- Click SAVE.
- Click +ADD to add more conditions.
- Click +ADD to add more conditions.
PROPERTY VALUES:
- Click +PROPERTY VALUE.
- Enter the following information and click SAVE:
Field Name Field Type Description SPLUNK Property Value String Enter Splunk property value in the box. OpsRamp Property Value Dropdown Select a value from the dropdown.
Based on the OpsRamp Property selected above, the options are displayed in this field.Click ADD MAP ATTRIBUTES. The mapped information is displayed in the MAP ATTRIBUTES section.
- Click +ADD to add additional map attributes.
- Use the three dots menu to edit or remove the map attributes.
- Use Filter to filter the map attributes.
ADDITIONAL SETTINGS: Select the Drop alerts from unmanaged resources checkbox if you do not want to trigger alerts from unmanaged resources.
ENRICH AND CREATE ALERT: Select a process definition from the dropdown. You can customize the incoming alerts according to the properties defined in the Create Alert process definition.
Click FINISH. The integration is installed.
If the provided Information is correct, then the integration will be saved without any errors.
The following table shows attribute mappings:
Third-Party Entity | OpsRamp Entity | Third-Party Property | OpsRamp Property | Third-Party Property Value | OpsRamp Property Value |
---|---|---|---|---|---|
Event | Alert | result.status | alert.currentState | 200 | Ok |
Event | Alert | result.status | alert.currentState | 400 | Warning |
Event | Alert | uri_query | alert.serviceName | ||
Event | Alert | search_name | alert.description | ||
Event | Alert | result.clientip | alert.deviceName | ||
Event | Alert | result.req_time | alert.alertTime | ||
Event | Alert | search_name | alert.subject |
Splunk configuration
Step 1: Configure webhook for search and reporting
- Log into Splunk Admin UI.
- From the left pane of Splunk Cloud Home, click Search & Reporting.
- Click Save As and from the drop-down options, click Alert.
- Perform the following:
- Enter details as required.
- For Trigger Actions, click Add Actions and from the drop-down options select Webhook.
- For Webhook, enter the server URL to connect.
- Click Save.
Step 2: Configure webhook for the monitoring Console
- From Splunk Cloud Home, click Settings, Monitor Console. Open in Search for required statistics, performance, or usage.
- Click Save As and save it as Alert.
- Enter the alert details, webhook URL, and save the alert.
Example request payload
{
"owner":"eswaropsramp",
"sid":"scheduler__eswaropsramp__search__RMD5a012f6d028c57497_at_1570182600_80",
"app":"search",
"results_link":"<https://prd-p-kxc7q86hbsqw.cloud.splunk.com/app/search/@go?sid=scheduler__eswaropsramp__search__RMD5a012f6d028c57497_at_1570182600_80>)",
"search_name":"Week toDate",
"result":{
"method":"GET",
"cookie":"",
"Internal":
{
"test":{
"name":"Test"
}
},
"_kv":"1",
"clientip":"91.208.184.24",
"sourcetype":"access\_combined\_wcookie",
"_si":\[
"prd-p-kxc7q86hbsqw",
"main"
],
"date_hour":"8",
"version":"1.1",
"_eventtype_color":"",
"uri_path":"/category.screen",
"productId":"",
"date_mday":"2",
"eventtype":"",
"itemId":"EST-11",
"splunk_server_group":"",
"root":"",
"uri_domain":"",
"referer":"[http://www.buttercupgames.com/oldlink?itemId=EST-11](http://www.buttercupgames.com/oldlink?itemId=EST-11)",
"timestartpos":"19",
"file":"category.screen",
"uri":"/category.screen?categoryId=ACCESSORIES&JSESSIONID=SD4SL7FF1ADFF50438",
"splunk_server":"prd-p-kxc7q86hbsqw",
"user":"-",
"categoryId":"ACCESSORIES",
"timeendpos":"39",
"_cd":"0:201776",
"bytes":"2396",
"date_wday":"wednesday",
"date_zone":"local",
"ident":"-",
"index":"main",
"useragent":"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS)",
"_serial":"0",
"_sourcetype":"access_combined_wcookie",
"_bkt":"main~0~B9626C15-AE58-49B8-8B5B-AF85CD3F65CB",
"source":"tutorialdata.zip:./www1/access.log",
"status":"200",
"tag":"",
"date_month":"october",
"_raw":"91.208.184.24 - - [02/Oct/2019:08:47:48\] " GET /category.screen?categoryId=ACCESSORIES&JSESSIONID=SD4SL7FF1ADFF50438 HTTP 1.1" 200 2396 "[http://www.buttercupgames.com/oldlink?itemId=EST-11](http://www.buttercupgames.com/oldlink?itemId=EST-11)" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS)" 614",
"linecount":"1",
"punct":"..._-_-_[//:::]_"_/.?=&=__."___"://../?=-"_"/._(;_",
"tag::eventtype":"",
"_time":"1570006068",
"uri_query":"categoryId=ACCESSORIES&JSESSIONID=SD4SL7FF1ADFF50438",
"date_minute":"47",
"date_year":"2019",
"req_time":"02/Oct/2019:08:47:48",
"host":"127.0.0.1",
"action":"",
"other":"614",
"referer_domain":"[http://www.buttercupgames.com](http://www.buttercupgames.com/)",
"date_second":"48",
"JSESSIONID":"SD4SL7FF1ADFF50438",
"_indextime":"1570096125"
}
}
Next steps
The next step is to install the Streaming Export integration.
To View Splunk-related alerts in OpsRamp:
- From Command Center menu, click Alerts.
- On the Alerts screen, search with the Source name as Splunk. Related alerts are displayed.
- Click an Alert ID to view.