Integrating using the FortiDLP Add-on for Splunk
Our technology add-on for Splunk makes integrating with our Event Streaming Service quick and simple. The add-on is already set up to request events for you, minimizing configuration time. By default, the add-on will stream events in websocket mode.
Prerequisites
- Complete Generating an event stream and access token.
- Install the Next DLP Reveal Technology Add-on in Splunk.
How to integrate an event stream with the Splunk add-on
- In Splunk, go to Apps.
- On the row of the FortiDLP add-on, select Launch app.

- On the top-right corner of the Inputs page, click Create New Input.

- In the Add Event Stream dialog box, do the following:
- In the Name field, enter a name without special characters.
- In the Interval field, enter a number of seconds. In case of a disconnection with the event stream, the add-on will wait for this amount of time before attempting to reconnect.
- In the Connector URL field, paste the URL of the event stream you generated in Generating an event stream and access token.
- In the Access token field, paste the API access token you generated in Generating an event stream and access token.

- Optionally, to disable extended metadata for policy detection events, select the Discard Extended Metadata checkbox.

This option is only available with version 2.1.0+ of the add-on.
- Click Add.
How to view events in the Splunk add-on
Once you have set up the integration, you can start analyzing the events that are pulled into Splunk. To view the events, follow these steps.
- In Splunk, go to Apps.
- On the row of the FortiDLP add-on, select Launch app.
- Select the Search tab at the top of the page.
- Do one of the following to view events:
- To view all events, enter
index="*" sourcetype="Reveal:EventStream:*:JSON"into the search bar. - To view detection events, enter
index="*" sourcetype="Reveal:EventStream:Detections:JSON"into the search bar. - To view incident events, enter
index="*" sourcetype="Reveal:EventStream:Incidents:JSON"into the search bar. - To view audit log events, enter
index ="*" sourcetype="Reveal:EventStream:AuditLogs:JSON"into the search bar.
- To view all events, enter
How to troubleshoot the Splunk add-on
If you encounter an issue when integrating the Splunk add-on with an event stream, try these troubleshooting options. If you still experience the issue, contact Fortinet Support.
- If you experience an issue with websocket mode, do the following to try long polling mode:
- In Splunk, go to Apps.
- On the row of the FortiDLP add-on, select Launch app.
- Select the Configuration tab.
- Select Add-on Settings.

- Deselect the Websocket Streaming Mode checkbox.

The time set in the Interval field of the Input will then be used as the interval between each batch request. We recommend you set the Interval field to 10 seconds when long polling mode is enabled.
- In Splunk, go to Apps.
- On the row of the FortiDLP add-on, select Launch app.
- Select the Configuration tab.
- Select Add-on Settings.
- Select the Disable TLS certificate verification checkbox.