Toktra’s SIEM integration delivers security events to your existing monitoring stack as they happen. All events are HMAC-signed so your SIEM can verify authenticity before ingesting.Documentation Index
Fetch the complete documentation index at: https://docs.toktra.dev/llms.txt
Use this file to discover all available pages before exploring further.
Supported platforms
Splunk
HTTP Event Collector (HEC) — events are delivered to
/services/collector/event with a Splunk bearer token.Datadog
Logs API (
/api/v2/logs) and Metrics API (/api/v2/series) — uses an DD-API-KEY header.Elasticsearch
Bulk index API — daily indices named
toktra-security-events-YYYY.MM.DD.Configuring a SIEM connector
Open the Integrations page
In your Toktra dashboard, go to Integrations → SIEM (
/integrations/siem). Click Add connector.Enter credentials
Fill in the platform-specific fields. See Required credentials below for what each platform needs.
Configure event filters
Optionally restrict which event types and severity levels are forwarded. See Filtering events.
Send a test event
Click Test delivery. Toktra sends a synthetic
test_connection event to your SIEM and shows you the response. Confirm the event appears before saving.Required credentials
- Splunk
- Datadog
- Elasticsearch
| Field | Description |
|---|---|
| HEC URL | Base URL of your Splunk instance, e.g. https://splunk.company.com:8088. Toktra appends /services/collector/event automatically. |
| HEC token | The HTTP Event Collector token from Settings → Data Inputs → HTTP Event Collector in Splunk. |
| Signing secret | Optional. Set this to the same value as SIEM_SIGNING_SECRET in your Toktra environment to enable HMAC verification. |
Environment variables
Event payload format
Every event Toktra delivers has this JSON structure:Policy violation event
event_id (UUID), summary (human-readable description), source ("toktra"), user_email, and a tags object for custom metadata.
Event types
event_type | When it fires |
|---|---|
policy_violation | A usage policy threshold is breached |
anomaly | Pre-departure or unusual usage pattern detected |
budget_alert | Spend crosses an alert threshold |
lockout | Employee access revoked |
test_connection | Manual test delivery |
Signature verification
Toktra signs every outbound payload with HMAC-SHA256 using yourSIEM_SIGNING_SECRET. The signature is included in the X-Toktra-Signature header in the format sha256=<hex-digest>.
To verify the signature on your SIEM side:
Python verification example
Node.js verification example
Retry behavior
If delivery fails (non-2xx response or network error), Toktra retries up to 3 times using exponential backoff:| Attempt | Delay before retry |
|---|---|
| 1 | immediate |
| 2 | 1 second |
| 3 | 2 seconds |
failed and logged. You can inspect delivery logs in Integrations → SIEM → [connector name] → Delivery history.
Test delivery
Click Test delivery on any connector to send a synthetictest_connection event. The dashboard shows whether delivery succeeded and returns the event_id. Use this button after:
- Initial setup to confirm credentials are correct
- Rotating credentials
- Recovering from a delivery failure
Filtering events
By default, all event types at all severity levels are forwarded. To restrict forwarding, set an event filter in the connector configuration:Events filter example
Splunk index template
Toktra delivers events to thetoktra index with sourcetype toktra:security. To use a different index, update the connector configuration and ensure that index exists in Splunk with appropriate access controls.
Elasticsearch index template
Toktra creates a daily index namedtoktra-security-events-YYYY.MM.DD (UTC). Apply the built-in index template via the Create index template button on your Elasticsearch connector to ensure correct field mappings and shard configuration.
Index template (applied automatically)