Integration with Splunk

Overview

The Splunk Enterprise SIEM integration enables organizations to stream MangoApps platform events directly into Splunk for centralized security monitoring, analytics, and compliance auditing.

With this integration, MangoApps pushes key account and system activity events to a Splunk HTTPS Event Collector (HEC) endpoint, allowing IT teams to correlate MangoApps activity with events from other enterprise systems.

This capability is especially useful for organizations that rely on Splunk for security monitoring, compliance reporting, and operational analysis.


Key Benefits

Centralized Security Monitoring

Track user authentication, access control changes, and account lifecycle events from MangoApps in your SIEM platform.

Improved Compliance

Maintain auditable records of platform access, permissions changes, and user account updates.

Real-Time Visibility

Events from MangoApps are automatically pushed to Splunk at configurable intervals.

Enterprise Observability

Combine MangoApps data with logs from other enterprise applications inside Splunk dashboards.


How the Integration Works

The integration uses a MangoApps Push Agent to send platform activity events to a Splunk HTTPS Event Collector (HEC) endpoint.

Event Flow

  1. User activity occurs in MangoApps.

  2. MangoApps records the event internally.

  3. The Splunk Push Agent collects eligible events.

  4. Events are sent to the Splunk HEC endpoint.

  5. Splunk ingests and indexes the events for monitoring and analytics.

Events are delivered using NDJSON format (newline-delimited JSON) where each line represents a separate event.

The system also supports cursor-based pagination for event delivery to ensure reliable event processing.


Prerequisites

Before configuring the integration, ensure you have:

  • A Splunk Enterprise or Splunk Cloud instance

  • HTTPS Event Collector (HEC) enabled in Splunk

  • A valid HEC authentication token

  • Access to the MangoApps Admin Portal

  • Network connectivity allowing MangoApps to reach the Splunk HEC endpoint


Configure the Splunk Integration

Step 1: Open Built-In Integrations

  1. Log in to MangoApps Admin Portal

  2. Navigate to:

  1. Select Splunk Integration


Step 2: Enable the Splunk Push Agent

Enable the Splunk HEC Push Agent to start sending events from MangoApps to Splunk.

The push agent is responsible for automatically transmitting events to Splunk at a defined interval.


Step 3: Enter Splunk Connection Details

Provide the required connection settings:

Setting
Description

Name

Friendly name for the integration

HEC Endpoint URL

Splunk HTTPS Event Collector endpoint

SSL

Enable if the endpoint requires SSL

HEC Token

Authentication token from Splunk

Index

Splunk index where events will be stored

Source Type

Splunk source type identifier

Host

Identifier used by Splunk to identify MangoApps

These values correspond to configuration parameters required by Splunk for event ingestion.


Step 4: Configure Event Push Frequency

Choose how frequently MangoApps pushes events to Splunk.

Available options:

  • Every 5 minutes

  • Every 10 minutes

  • Every 30 minutes

  • Every 1 hour

  • Up to 24 hours

Shorter intervals provide more real-time monitoring but increase event traffic.


Step 5: Save the Configuration

Click Save to activate the integration.

Once enabled, MangoApps begins pushing events to Splunk according to the configured schedule.


Events Sent to Splunk

The current integration focuses on security, authentication, and user lifecycle events.

Examples of events pushed to Splunk include:

Authentication Events

  • User login

  • User logout

  • Password reset

  • Login attempts from different locations

User Lifecycle Events

  • New user creation

  • User deletion

  • User suspension

  • User lockout

Role and Access Changes

  • Network admin assignment or removal

  • Team admin assignment or removal

  • Assistant role assignment or removal

  • Alias assignment or removal

Account Status Changes

  • Guest user converted to network user

  • Network user converted to guest

  • User moved to restricted status

Security Access Events

  • Attempts to access restricted URLs

  • Permission-based access denial

These events provide the necessary telemetry for organizations to monitor access and detect suspicious activity.


Viewing Splunk Integration Logs in MangoApps

Administrators can review the events that MangoApps sends to Splunk.

Access Splunk Logs

Navigate to:

The Splunk Logs page allows administrators to:

  • Search logs by keyword

  • Filter by event type

  • Filter by date range

These logs show the events that were pushed to Splunk and confirm whether event delivery occurred successfully.


Security and Data Protection

The integration is designed to prevent sensitive data exposure.

Key safeguards include:

  • No passwords, tokens, or secrets are included in event payloads

  • Only security-relevant event metadata is transmitted

  • Event logs exclude sensitive authentication information

This ensures the integration remains compliant with enterprise security standards.


Typical Use Cases

Security Monitoring

Track login activity and permission changes to detect unauthorized access.

Compliance Reporting

Maintain historical logs for audits and regulatory compliance.

User Activity Analysis

Analyze authentication trends and platform usage patterns.

Incident Investigation

Correlate MangoApps activity with other systems during security investigations.


Troubleshooting

Events Not Appearing in Splunk

Verify the following:

  • HEC endpoint URL is correct

  • HEC token is valid

  • SSL settings match Splunk configuration

  • Firewall rules allow outbound traffic to Splunk

  • Push frequency interval has elapsed


Connection Issues

Check the Splunk Logs in MangoApps to identify:

  • Authentication failures

  • Endpoint connectivity errors

  • Delivery failures


Best Practices

  • Use a 5–10 minute push interval for security monitoring.

  • Store MangoApps events in a dedicated Splunk index.

  • Create Splunk dashboards for:

    • Login activity

    • Role changes

    • User lifecycle events

  • Set alerts for unusual login patterns or privilege changes.

Last updated

Was this helpful?