Set up alerting - Splunk
You can integrate with Splunk to subscribe events you wish to monitor.
Select Settings from the side navigation. Under the Integration menu, click Splunk.
Click the + Connection button.
Enter a unique name for the connection.
Generate an integration token following the Splunk docs
Copy your integration token and paste it into the token field.
Enter the port number (default is
If you are testing with a free trial, select the Free Trial check-box.
Enter the base URL of your Splunk account.
Click Test & Save.
Click the + Subscription button to begin the creation process.
Choose a name for the subscription as well as the saved filters you would like the subscription to be based on.
Choose the connection for the subscription output.
Enter the Splunk index.
Enter a Splunk source type.
Click Test & Save
HCP Vault Radar events matching your filters will create events in the specified Splunk index.