Skip to main content
Skip table of contents

Services

The Services page of the Signum Admin Web Console gives the administrator the option for configuring external logging services for the Signum Event Logs. The supported logging services are Syslog and Splunk.

SysLog

Setting

Description

SysLog

Enable to activate SysLog exports.

Protocol

The Communication protocol to use TCP or UDP.

Server

The SysLog Server URL.

Port

Optional Port configuration.

TLS

Enable to use TLS.

TLS Certificate

The TLS certificate of the SysLog server

Splunk - HTTP Event Collector

This setting configures Signum to send Event Log data to a configured Splunk server using their Event Collector framework.

For information on setting up the HTTP Event Collector, see the Splunk documentation.

The Signum Server must be running version 4.20 or later before enabling this feature.

Setting

Description

Splunk logs enabled

Enable to activate sending the logs to Splunk.

Validate service connection certificate enabled

Choose whether Signum must validate the Splunk server certificate.

If your Splunk server is using a private CA certificate, contact Keyfactor Support to add the certificate to Signum.

Splunk HEC URL

The URL of your Splunk HTTP Event Collector. To make sure the URL is configured properly, see the Splunk documentation.

The http-inputs prefix is not needed as Signum is hosted in Azure.

An example of a URL from a trial Splunk instance may look like:

CODE
https://<host>.splunkcloud.com:8088/services/collector/event

Splunk HEC Token

The HEC Access token from Splunk.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.