Integrating with Splunk Enterprise via webhook
You can view the collected events in BMC Helix Operations Management and derive the following benefits:
BMC Helix application | Type of data collected or viewed | Benefits |
|---|---|---|
BMC Helix Operations Management | Events | Use a centralized event view to monitor, filter, and manage events, and perform event operations in one place. Process events to help identify actionable events quickly from a large volume of event data. For more information, see Monitoring events and reducing event noise. |
As a tenant administrator, perform the following steps to configure a connection with Splunk via webhook, verify the connection, and view the collected data in various BMC Helix applications.

Supported versions
BMC Helix Intelligent Integrations supports the following versions of Splunk for data collection.
- Splunk Cloud Platform
- Splunk Enterprise 9.2.2
- Splunk Enterprise 9.0.5
Before you begin
Make sure you perform the following actions before you configure a connection with Splunk:
Splunk requirements
- This connector collects data from Splunk alerts. A Splunk alert contains information about events. Ensure that the Splunk user account that you plan to use when you configure the Splunk Webhook connector has permission to query the required Splunk saved search alert report.
- Make that the Splunk alert from which you want to collect data is part of the Search & Reporting application (Search app). For details, see the Search app in the Splunk Enterprise documentation.
For example, the following figure shows the Splunk_II_Alerts alert, which is part of the Search app. It contains events from a third-party product.
- To display meaningful data in BMC Helix Operations Management from a Splunk alert containing events from a third-party product, the alert should meet the following criteria:
- The alert must have fields that contain the following type of information:
- Event ID: An identifier that can be concatenated with other fields in the report to get a unique identifier. For example, you can concatenate this identifier with issue, and differentiate events that differ only by status.
Severity: The event severity.
- Status: The event status
- Configuration ID
- Configuration Item type
- The alert must have fields that contain the following type of information:
BMC Helix Intelligent Integrations requirements
- Depending on the location of the third-party product (SaaS, on-premises), choose one or more BMC Helix Intelligent Integrations deployment modes and review the corresponding port requirements. For information about various deployment modes and port requirements, see Deployment scenarios.
- Based on the deployment mode, use the BMC Helix Intelligent Integrations SaaS deployment or the BMC Helix Intelligent Integrations on-premises gateway or both. For more information about the gateway, see Deploying the BMC Helix Intelligent Integrations on-premises gateway.
- The on-premises gateway must be able to reach the third-party product on the required port (default is 8089).
In the preceding list, third-party product refers to Splunk.
Task 1: To configure the connection with Splunk
To access BMC Helix Intelligent Integrations, perform one of the following steps depending on your deployment mode:
- BMC Helix Intelligent Integrations SaaS – Log on to BMC Helix Portal, and click the BMC Helix Intelligent Integrations tile.
- BMC Helix Intelligent Integrations on-premises gateway – Use the following URL to access BMC Helix
Intelligent Integrations: https://hostName:portNumber/swpui
- On the CONNECTORS tab, click
in the SOURCES panel. - Click the Splunk Events Webhook tile.
- Specify the following details for the source connection:
- Specify a unique instance name.
- Specify the Splunk host name.
- Specify the Splunk HTTP or HTTPS port number depending on the connection protocol (default port number is 8089).
- Select the HTTPS option to use an HTTPS connection to the Splunk host.
- Specify one of the following authentication methods:
- Basic authentication—Enter the user name and password for the Splunk host.
- API token—Select Use Token Authentication and specify a valid token to access the Splunk API. For more information about obtaining token, see Create authentication tokens in the Splunk documentation.
- Specify a unique instance name.
- Click VALIDATE AND CREATE.
- Select the source connection that you created from the list if it is not selected already.
- Make sure that you select the options for the required data types to collect data.
Configure the collectors for the selected data types by clicking the respective data type in the Collectors section.
- To create the required collector streams for the selected data types, click CREATE COLLECTORS.
- Configure the distributors for the selected data types by clicking the respective data type in the Distributors section.
- Click CREATE COLLECTORS to create the required collector stream for the selected data type.
- Configure the distributors for the selected data type by clicking the data type in the Distributors section and specifying the parameters for the selected data type, as explained in the following table:
- Click CREATE DISTRIBUTORS to create the required distributor stream for the selected data type.
- Click VALIDATE AND CREATE and then click SAVE STREAM to save the stream.
After you save the stream, the connector that you just created is listed on the SOURCES panel. - On the SOURCES panel, click Configure Mediator
for the source connection that you created and then expand SPLUNK EVENTS WEBHOOK. - Click copy
to copy the auto-generated Spulnk webhook collector URL and save it in a temporary file.
For example, https://hostA/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdf?token=API-KEY. - Depending on whether you are using only a SaaS deployment of BMC Helix Intelligent Integrations or BMC Helix Intelligent Integrations on-premises gateway, perform the following steps:
- If you are using only SaaS deployment of BMC Helix Intelligent Integrations or the on-premises gateway with authentication enabled, perform the following steps:
- Log on to BMC Helix Portal and generate an access key.
For instructions, see Setting up access keys for programmatic access. - Copy the generated access key and save it in a temporary file.
The key is generated in the format: <accessKey>::<secretKey>,tenant id:<tenantID>.
For example, Y40OSC49QZA11Q8A1H9H6::MnVLk69TNyCEponsthHJ1Hj1uKcjTB,tenant id:385261281 - Change the format of the access key to <tenantID>::<accessKey>::<secretKey>.
For example, 385261281::Y40OSC49QZA11Q8A1H9H6::MnVLk69TNyCEponsthHJ1Hj1uKcjTB - In a temporary file, modify the auto-generated collector URL by replacing API-KEY with the access key that you formatted in the previous step.
For example, https://host.ab.com/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdfd?
token=385261281::Y40OSC49QZA11Q8A1H9H6::MnVLk69TNyCEponsthHJ1Hj1uKcjTB - (If you are collecting data in a high-availablity environment and using load balancers) Replace the host name with the DNS record that you have created for the virtual IP (VIP). For example, if the DNS record is named VIP_HII, the updated collector URL looks like the following:
https://VIP_HII/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdfd?
token=385261281::Y40OSC49QZA11Q8A1H9H6::MnVLk69TNyCEponsthHJ1Hj1uKcjTB.
For more information about collecting data in a high availablity environment, see Configuring the on-premises gateway for high availability on Docker and Podman containers. - Configure Splunk to forward incidents data to BMC Helix Intelligent Integrations.
- Log on to BMC Helix Portal and generate an access key.
- If you are using the on-premises gateway with authentication disabled, perform the following steps:
- Save the URL in a temporary file.
- Remove the following string from the collector URL:?token=API-KEY
The updated collector URL looks like the following example:
https://hostA/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdf - (If you are collecting data in a high-availablity environment and using load balancers) Replace the host name with the DNS record that you have created for the VIP. For example, if the DNS record is named VIP_HII, the updated collector URL looks like the following:
https://VIP_HII/hii/api/mediator/v3/push/9mn-6c97-4c2e-8pc5-12c0asdf
For more information about collecting data in a high availablity environment, see Configuring the on-premises gateway for high availability on Docker and Podman containers. - Configure Splunk to forward incidents data to BMC Helix Intelligent Integrations.
- If you are using only SaaS deployment of BMC Helix Intelligent Integrations or the on-premises gateway with authentication enabled, perform the following steps:
- On the SOURCES panel, move the slider to the right to start the event stream for the connector.
Task 2: To configure Splunk Enterprise to forward events data to BMC Helix Intelligent Integrations
- Log on to Splunk Enterprise.
- On the Alerts tab, select Edit > Edit Alerts for the alerts that you want to configure.
- Depending on whether you are using only SaaS deployment of BMC Helix Intelligent Integrations or the on-premises gateway, in the Trigger Actions section, copy the collector URL that you modified in step 13 and paste it as the default value of the parameter, enclosed in double quotes.
- Click Save to save the alert.
- Select Edit > Enable, and then click Enable to enable the alert that you have edited.
- Go to step 15 to start the event stream.
Task 3: To verify the connection
From BMC Helix Intelligent Integrations, on the SOURCES panel, confirm that the event stream for the connection you created is running.

A moving blue arrow (
) indicates that the event stream is running. Event data will be pushed as soon as events are available.
Task 4: To view data in BMC Helix applications
View data collected from Splunk in multiple BMC Helix applications.
To view events in BMC Helix Operations Management
- In BMC Helix Operations Management, select Monitoring > Events.
- Filter the events by the SplunkEvent class.

Incoming events from Splunk are processed in BMC Helix Operations Management through a set of deduplication rules to determine whether the incoming event is a duplicate event or a new event. For more information, see Event deduplication, suppression, and closure for reducing event noise.
For more information about events, see Monitoring and managing events.