Software Multicloud Defense
Activity Onboard

Alerting and Log Forwarding Alert Destinations / SIEMs Splunk Create a Splunk Profile Service

Last updated: Jul 03, 2025

Create a Splunk Profile Service

Use the following procedure to create an alert profile for the Splunk service:

Before you begin

You must have the following configured and ready:

Procedure

1

In the Security Cloud Control platform menu, choose Products > Multicloud Defense .

2

Navigate to System and Accounts > Service Alerts > Services.

3

Click Create.

4

Name - Enter unique name for the alert integration.

5

Description (optional) - Enter a description for the alert integration.

6

Type - Using the pulldown, choose Splunk.

7

API Key - Copy the Splunk API key generated above, or other PagerDuty API Key as desired.

8

Check the Skip Verify Certificate box if your server doesnt have certificates with SAN field matching with domain. If you server does have ceritficats with SAN fields matching the domain, leave this unchecked.

9

Index(default - main) is Splunk's default index where all the processed data is stored. This is provided when you configure the Splunk HEC.

10

Enter the API URL for the Splunk HTTP Event Collector. We recommend this URL https://<host>:<port>/services/collector .

11

Click Save.

What to do next

Create an alert rule with this new profile.