Integrate Postman with Splunk

Splunk is a monitoring service for cloud-scale applications. It combines data from servers, databases, tools, and services to present a unified view of an entire stack. This integration allows you to configure your Postman Monitors to send metrics to Splunk where you can visualize and compare them with other metrics.

To set up a Splunk integration, you must get an HTTP Event Collector (HEC) token from Splunk and configure your monitors. After you set up the integration, you can view real-time alerts based on the results of your monitors.

Retrieving your Splunk HEC token

  1. Sign in to your Splunk account.
  2. Follow Splunk's instructions to create an HEC token.
  3. Save the HEC token to use later.
save splunk HEC token

Configuring Postman Splunk integration

  1. From the Home page, select Integrations.

    Home page and integrations
  2. Select Browse All Integrations.

  3. Search and select Splunk.

  4. Select Add Integration.

    Add Splunk integration
  5. Enter the following in the Add Integration window:

    • Nickname - A nickname for your integration.
    • Workspace - The workspace that has your monitor.
    • Monitor - The collection-based monitor which will send its results to Splunk.
    • Splunk HEC Token - Enter the Splunk HEC token.
    • Splunk HEC URL - Enter the Splunk URL that hosts the HEC token in the format <protocol>://<host> (for example, https://192.0.2.255). To learn more, see Splunk's documentation.
    • Splunk port - Enter the Splunk port number.
  6. Select Add Integration to save the configuration.

You can view your configured integrations on the Browse Integrations page. You can also view integrations that have been configured for a monitor by opening the monitor and selecting the information icon Information icon in the right sidebar. Learn more about viewing or editing integrations.

Viewing data in Splunk

When your monitor runs, the data starts flowing into Splunk.

Viewing data in a list

  1. Sign in to your Splunk account, and open the homepage.

  2. From the navigation menu, select Apps > Search & Reporting. Then select the Search tab.

  3. Select the Events tab, and enter a metric to search for.

  4. Select a metric from the results to view details about it.

To learn more about viewing data in Splunk, see Splunk's documentation.

splunk metrics search splunk metric details

Viewing data as a Pivot table

  1. Sign in to your Splunk account, and open the homepage.

  2. From the navigation menu, select Apps > Search & Reporting. Then select the Search tab.

  3. Select the Visualization tab, and enter a metric to search for.

  4. Select Pivot.

  5. Select the metrics and filters you need to visualize on the table.

To learn more about viewing data in Splunk, see Splunk's documentation.

splunk pivot table

Once the data is present in Splunk, you can filter it based on the monitor name/uid, collection name/uid, user name/id, and environment name/uid (if present).

Last modified: 2023/04/12