Splunk® IT Service Intelligence

Entity Integrations Manual

Configure the HTTP Event Collector to collect entity integration data in ITSI

(ITSI) uses the HTTP Event Collector (HEC) to receive data from entity integrations. You have to enable HEC and set up HEC tokens before you configure integrations and start analyzing entity data. Create HEC tokens for entity integration data sources that send data via HTTPS.

You can create one HEC token that sends data to the default indexes. You can also create additional HEC tokens to send specific data sources to specific indexes. For example, you can send *nix metrics data to a metrics index called *nix_metrics.

You need to configure HEC tokens that send data to specific index types for the following integrations. The index names are default indexes ITSI creates for entity integrations. If you want to send entity integration data to different indexes, see Use custom indexes in ITSI.

Entity integration Events index Metrics index
*nix Not applicable. Because you collect *nix entity event data with a universal forwarder, you don't need to set up HEC to receive *nix entity events.


You can create a single HEC token if you specify the main, em_meta, and itsi_im_metrics indexes in the HEC token's configuration and define the itsi_im_metrics index as the default index. You have to specify the default index so entity integrations that don't use the other indexes send data to the correct index.


Requirement Description
HEC enabled You have to enable HEC and create an HEC token to receive AWS and Microsoft Azure entity integrations. If you're using Splunk Cloud Platform, contact Splunk Support if you don't already have HEC enabled. For more information, see Enable HTTP Event Collector in the Splunk Enterprise Getting Data In guide.


Follow these steps to configure an HEC token for ITSI entity integrations. You can configure an HEC token in Splunk Web or with configuration files.

Configure an HEC token in Splunk Web

These steps show you how to create an HEC token in Splunk Web to collect data for every integration in ITSI. For more information about configuring an HEC token in Splunk Web, see Set up and use HTTP Event Collector in Splunk Web in the Splunk Enterprise Getting Data In guide.

  1. In Splunk Web, log in as an administrator.
  2. Go to Settings > Data inputs, select HTTP Event Collector, and click Global Settings. Ensure that All Tokens is set to Enabled. Also take note of the HTTP Port Number because you will need it later when you start adding data. When you're done, click Save.
  3. Click New Token.
  4. Type name of token.
  5. Click Next in Add Data.
  6. If you're going to use the HEC token to collect AWS CloudWatch Events and CloudWatch Logs data, check Enable indexer acknowledgement under Select Source. If you're not going to use the HEC token to collect data from those sources, don't check this option.
  7. For Input Settings, these are the required settings for ITSI integrations in a single HEC token:
    Setting Value
    Source type itsi_im_metrics
    App context Splunk_TA_Infrastructure
    Select Allowed Indexes
    • main
    • itsi_im_metrics
    Default Index itsi_im_metrics
  8. Review the settings and then generate the HEC Token to send data over HEC to the Splunk Enterprise instance running ITSI.
  9. Confirm the token was created and copy the Token Value. Along with the HTTP Port Number you took note of earlier, you'll use the token when you configure entity integrations.

Configure an HEC token from inputs.conf

These steps show you how to set up an HEC token with conf files to collect metrics data from collectd and fluentd in ITSI. For more information about configuring an HEC token with conf files, see Set up and use HTTP Event Collector with configuration files in the Splunk Enterprise Getting Data In guide.

  1. Go to the $SPLUNK_HOME/etc/system/local directory.
  2. Open the inputs.conf file with a text editor. If it doesn't exist yet, create it.
  3. Enter this HEC token stanza to create a single HEC token for every ITSI integration.
    disabled = 0
    index = itsi_im_metrics
    indexes = itsi_im_metrics, main
    sourcetype = itsi_im_metrics
    token = <string>
  4. Save your changes and close the file.
  5. Restart splunkd:
    $SPLUNK_HOME/bin/splunk restart
Last modified on 28 April, 2023
What is an entity integration?   Use custom indexes in ITSI

This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.11.0, 4.11.1, 4.11.2, 4.11.3, 4.11.4, 4.11.5, 4.11.6, 4.12.0 Cloud only, 4.12.1 Cloud only, 4.12.2 Cloud only, 4.13.0, 4.13.1, 4.13.2, 4.13.3, 4.14.0 Cloud only, 4.14.1 Cloud only, 4.14.2 Cloud only, 4.15.0, 4.15.1, 4.15.2, 4.15.3, 4.16.0 Cloud only, 4.17.0, 4.17.1, 4.18.0, 4.18.1, 4.19.0

Was this topic useful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters