The current Openpath Jira and Confluence instances will be migrated to the MSI On-Premise solution from August 9th-11th, the current platform will be set to read-only and all future usage will be in the Avigilon Instance. Please ensure access to MSI Jira & MSI Confluence, both are accessible through OKTA. For additional information and details please refer to the Atlassian migration page
How to integrate Splunk with Avigilon Alta
Integrating Splunk with Avigilon Alta lets you forward event data (entry, input, reader, relay, and lockdown events) from Avigilon Alta to Splunk.
First, set up a token in Splunk
Go to Data Inputs.
2. Click HTTP Event Collector.
3. Click New Token.
4. Enter a name and (optional) description for the token, then click Next.
5. Select an Index to send the data to (or create a new one).
6. On the Data Inputs page, you'll see the new Token you just created.
Next, create a rule in Avigilon Alta
Go to https://control.openpath.com/login and log in. To access the European Partner Center, please go to https://control.eu.openpath.com/login.
Go to Configurations > Rules.
3. Click the plus(+) sign in the top right corner to Add a Rule.
4. Enter a name and description for the rule, then select a Trigger Type and Event that you want to forward to Splunk.
5. Click Use JSON Editor, copy the JSON below, and paste it over the "requests" section of the rule, using your Splunk token and URL where indicated.
"requests": [
{
"type": "http",
"httpParams": {
"headers": [
"User-Agent: Openpath/Rules Engine",
"Content-Type: application/json",
"Authorization: Splunk YOUR SPLUNK TOKEN"
],
"method": "post",
"url": "http://YOUR URL/services/collector/event",
"body": "{\"event\": {{json event}} }"
}
}
]
}
View the data in Splunk
Search for the Avigilon Alta data in the index you selected previously.