Skip to content

External Integrations: Splunk

Sekoia is providing an application for Splunk to detect threats in your logs based on CTI feed.


  • An operational Splunk instance with administrator privileges (Enterprise for OnPrem or Cloud for the Saas version)
  • An active license with access to the CTI
  • An access to User Center with the role that contains the permission to create an API key (e.g. Built-in Analyst Role or create a custom role with ic_viewer permissions


This following guide is for Splunk solutions (Enterprise (OnPrem) or Splunk Cloud (Cloud)).

1. Connect to Splunk Enterprise

  1. In a Web browser, type the following and replace server_ip and port by their values: http://server_ip:port

!!!note For Cloud version, only the next step is required

  1. Enter your login and password of your Splunk Enterprise instance Splunk-Login

2. Install and configure your Sekoia application for Splunk

  1. Go to Application Setup Page by clicking on Apps > Find more Apps Splunk_Applications_access

  2. Search for application and install it Splunk-Sekoia_in_App

  3. Configure your Sekoia application for Splunk by completing fields Splunk-Sekoia_API_key_in_Sekoia_application

Please find below the explanation of the fields to be configured


  • SEKOIA.IO API Key: Sekoia API Key to be created as stated in the Prerequisites


  • Sekoia API url: the default url is
  • Feed ID: default feed is used by default. For custom feed, add the feed ID. Please find more information on this documentation
  • Proxy URL - Here are 2 ways to configure a proxy:
    1. If you need the Sekoia application for Splunk to connect directly through a proxy, this field needs to be filled on the installation page (To connect, in a Web browser, type and replace username, password,host and port by their values: http://[username:password@]host:port)
    2. If you don't want to distinguish the Sekoia application for Splunk network configuration from the configuration of your Splunk instance, the Sekoia application for Splunk takes into account the global Splunk proxy configuration provided by means of the HTTP_PROXY and HTTPS_PROXY environment variables.


After the launch of Sekoia application for Splunk, only valid IOCs of these types will be downloaded and updated on Splunk from current date.

3. Sekoia Intelligence in Splunk

In the following section, here are the Sekoia IOC types available in Splunk:

IOC type Meaning
domain Domain name
url Url website
ipv4 Internet Protocol version 4 (32-bit number e.g. )
md5 Cryptographic hash function that results in a 128-bit hash value
sha1 Hash function which takes an input and produces a 160-bit (20-byte)
sha256 Secure Hash Algorithm 256-bit

An IOC is an observable that represents a malicious activity. For more information, please consult this page.


Only these Sekoia Indicator types will be updated.

Update is scheduled every night to ensure that valid IOCs are used to detect threats.

4. Search Sekoia Intelligence and match with IOCs in Splunk

Search existing Sekoia IOCs in Splunk with expiry date

  1. Go to Application Setup Page by clicking on Apps >
  2. In the search tab, query on | inputlookup sekoia_iocs_url | rename _key as indicator | convert ctime(valid_until)


Search and compare Sekoia IOCs with logs in Splunk


Logs have to be collected in Splunk. Please consult Splunk documentation.

  1. Setup a lookup table

    A typical query would be index=* sourcetype=<YOUR_SOURCETYPE> (<YOUR_SOURCETYPE> is to be replaced by the Sekoia IOCs types listed above).

    When installing Sekoia application for Splunk, a message will be displayed requesting to configure the lookup table.

  2. Sightings will be displayed on a section App for Splunk

Please refer to our documentation to search IOCs in Intelligence page for more information.

5. Troubleshoot

1. False positive

Compare Sekoia IOCs valid date in Sekoia Intelligence.

2. Splunk issues

Search in the Internal logs for errors. Please consult Splunk documentation for more information.

6. Other resources

  • App for Splunk

  • Splunk official documentation