Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Integrating Splunk with Openpath Avigilon Alta lets you forward event data (entry, input, reader, relay, and lockdown events) from Openpath Avigilon Alta to Splunk.

First, set up a token in Splunk

...

highlightfalse
highlightStylea11y-dark

...

  1. Go to Data Inputs.

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/splunk-data-inputs.png

...

width200
frameborderhide
titleData Inputs
alignmiddle
height90
longdescSplunk Data Inputs

2. Click HTTP Event Collector.

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/splunk-click-http.png

...

width700
frameborderhide
titleevent collector
alignmiddle
height223
longdescHTTP Event Collector

3. Click New Token.

4. Enter a name and (optional) description for the token, then click Next.

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/splunk-name.png

...

width700
frameborderhide
titleselect name
alignmiddle
height403
longdescSplunk select name

5. Select an Index to send the data to (or create a new one).

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/Openpath/images/kustomer-articles/splunk-select-

...

index.png
width700
frameborderhide
titleselect index
alignmiddle
height338
longdescSplunk Select Index

6. On the Data Inputs page, you'll see the new Token you just created.

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/splunk-view-input.png

...

width700
frameborderhide
titleView Input
alignmiddle
height60
longdescSplunk View Input

Next, create a rule in

...

Avigilon Alta

  1. Go to https://control.openpath.com/login

...

  1. and

...

  1. log

...

  1. in.

...

  1. To

...

  1. access

...

  1. the

...

  1. European

...

  1. Partner

...

  1. Center,

...

  1. please

...

  1. go

...

  1. to

...

  1. https://control.eu.openpath.com/login

...

  1. .

...

  1. Go

...

  1. to

...

  1. Configurations

...

  1. >

...

  1. Rules.

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/config-rules-engnie.png

...

width200
frameborderhide
titlerules engine
alignmiddle
height88
longdescConfiguration Rules Engine

3. Click the plus(+) sign in the top right corner to Add a Rule.

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/add-rule.png

...

width400
frameborderhide
titleadd rule
alignmiddle
height337
longdescAdd Rule

4. Enter a name and description for the rule, then select a Trigger Type and Event that you want to forward to Splunk.

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/splunk-edit-rule.png

...

width700
frameborderhide
titleedit rule
alignmiddle
height305
longdescEdit Rule

5. Click Use JSON Editor, copy the JSON below, and paste it over the "requests" section of the rule, using your Splunk token and URL where indicated.

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/use-json.png

...

width200
frameborderhide
titleuse json
alignmiddle
height109
longdescEdit JSON
Code Block
  "requests": [
    {
      "type": "http",
      "httpParams": {
        "headers": [
          "User-Agent: Openpath/Rules Engine",
          "Content-Type: application/json",
          "Authorization: Splunk YOUR SPLUNK TOKEN"
        ],
        "method": "post",
        "url": "http://YOUR URL/services/collector/event",
        "body": "{\"event\": {{json event}} }"
      }
    }
  ]
}

View the data in Splunk

Search for the Openpath Avigilon Alta data in the index you selected previously.

...

Iframe
allowfullscreentrue
srchttps://info.openpath.com/hubfs/images/kustomer-articles/splunk-view-data.png

...

width700
frameborderhide
titleview data
alignmiddle
height543
longdescSplunk View Data