# Integrating OpManager with Splunk for centralized log analysis OpManager integrates with Splunk to forward critical network events, audits, access logs, and alerts in real time, where they are pushed as syslogs. This integration allows OpManager to serve as a centralized monitoring point, enabling Splunk to collect, analyze, and correlate event data to detect threats, streamline incident response, and enhance overall network reliability. ## Configure OpManager - Splunk integration - [Steps to configure OpManager’s Splunk integration](#how-to-configure) - [Configure Notification Profiles](#profile) - [Configuring Notification Templates](#template) ### Steps to configure OpManager’s Splunk integration 1. Go to **Settings** → **General Settings** → **Integrations** → **Splunk**. 2. Click on **Configure**. 3. Enter the **Hostname/IP Address** and **Port Number**. ![Splunk](https://www.manageengine.com/network-monitoring/help/images/splunk-1.png) 4. **Note:** The **RFC-5424** is used for forwarding the logs. 5. Check the **Send Access Logs** checkbox to forward access log files to Splunk. 6. Select the required audit modules to forward their logs to Splunk. 7. Accept Splunk’s privacy policy and click **Save** to complete the integration with OpManager. **Note:** - UDP/syslog protocol is used for forwarding the logs. - Ensure that Splunk is configured to listen on the specified UDP port. ### Configuring Notification profile You can set up a notification profile to forward alarms to Splunk platform automatically, based on defined criteria. Follow the steps to configure: - Go to **Settings -> Notifications-> Notification profiles** - Click Add on the top right corner to add a new notification profile, and select on **SIEM -> Splunk.** ![Integrating OpManager with Spunk](https://www.manageengine.com/network-monitoring/help/images/siem-profile.png) - Provide inputs for the required parameters, such as Format, Severity, Facility, Description, and variables. - If you enable the **Structured message** option, provide the required inputs as key value pair. - You can use the **Test Action** option to send a sample syslog message to the configured host and port to verify the configuration. ![Integrating OpManager with Splunk](https://www.manageengine.com/network-monitoring/help/images/splunk-profile.png) - Click **Next** to select the [criteria](https://www.manageengine.com/network-monitoring/help/configuring-notifications.html#criteria-notifications), [device](https://www.manageengine.com/network-monitoring/help/configuring-notifications.html#select-devices), and configuration [time window](https://www.manageengine.com/network-monitoring/help/configuring-notifications.html#applying-time-window). - Click **Save** ### Configuring Notification Templates You can create notification templates in OpManager to define how alerts are sent, when alarms are triggered and use them in alarm correlation rules to get notified when specific patterns of events occur. - Go to **Settings -> Notifications-> Notification templates** - Click on **Add** navigate to **SIEM** and select **Splunk** to add a notification template. ![Integrating OpManager with Splunk](https://www.manageengine.com/network-monitoring/help/images/splunk-template.png) - Enter the required parameters, including Template Name, Format, Severity, Facility, Description, and relevant Variables. - If you enable the Structured Message option, make sure to provide the required key-value pair inputs. - To verify the template, click on **Test Action.** - Click on **Save**. **Note:** Please refer to the [dynamic variables](https://www.manageengine.com/network-monitoring/help/workflow-variables.html) page for more information on the replaceable tags used in alarm details.