Verkada Splunk Integration
Learn how to set up the Verkada Splunk integration
Splunk is a software platform that helps organizations search, monitor, and analyze data from various third-party sources. Verkada allows users to build out efficient workflows to push information from their Command organizations into their Splunk instances through a built-in integration.
When you integrate Verkada with Splunk, it allows you to centralize and analyze your video surveillance data within the broader context of your operational data, which enables better insights and decision-making. You can use this implementation to bring in people and vehicle counts across all cameras in your organization, including device notifications.
Before you begin, you must have:
An active Splunk instance with Admin access. Learn more about Roles and Permissions for Command.
Org Admin permissions to your Verkada organization.
A valid Verkada API key. Learn how to generate a Verkada API key
There are 2 ways you can set up the integration:
Download and install the Splunk Enterprise software
Download the Splunk Enterprise software at https://www.splunk.com/en_us/download.html. If you already have a Splunk Enterprise account installed and setup, proceed to step 4.

Once the Splunk Enterprise package is installed, open the application. You should be redirected to a Terminal or PowerShell window where you can create your account credentials (username and password).
​ ​Important: Keep these credentials. You need them (later) to log in to Splunk and set up the Verkada integration. Once you create your account, you should receive an email to verify your account. Be sure to check your inbox and complete this step before moving forward with the setup process.
The Splunk application should open automatically after setting your username and password. Log in using the credentials you set up in step 3. If the Splunk Enterprise window does not open, navigate to the following URL to log in:
​ http://localhost:8000/en-US/account/login?return_to=%2Fen-US%2Fapp%2Flauncher%2Fhome

The Splunk homepage is where all of your applications for various integrations, including Verkada, are managed and configured.
On Login and Install:
a. Enter your Splunk account credentials to verify your account. ​ ​Note: These credentials are different from those created in step 3. To install the app, use the email and password used to log in to your general Splunk account. (https://www.splunk.com/). ​ b. Click Agree and Install. ​

Download and install the software on Splunkbase
If the above install method does not work, there is an alternative way described here.
Download the app at https://splunkbase.splunk.com/app/6971.
On your Verkada App page, at the top right, click Add Input. This allows you to create 2 different types of inputs:
verkada_insights provides the object-detection information for each camera in your organization. At regularly scheduled intervals, it displays the count for both people and vehicles that were detected, and the associated timestamp for those counts.
verkada_notifications provides the full list of all notifications generated by your Verkada devices.
Once you have selected your input, you are prompted to enter the following settings:
a. Unique name for your data input b. Time interval (in seconds) for each processed input c. Index (recommended default) d. Your Verkada Command organization ID e. Your Verkada API key. f. Click Add.

Troubleshooting
When updating from version 1.1.0 to version 1.2.6, there may be some new inputs which may not show up immediately. If this is the case, please follow the steps below to resolve the issue:
Restart your Splunk instance and log back into your account.
If all 3 inputs are still not showing up, delete and reinstall the Verkada Add-On App:
Navigate to your Splunk Application directory.
Delete the folder
SPLUNK_HOME/etc/apps/TA-verkada-add-on.Note: You may need to restart your Splunk instance for the change to take effect.
Proceed back to step 1 of this setup guide to download the Verkada Add-On application from Splunk.
You should now see the new inputs under the Verkada application.
There may be other common issues which could lead to errors in data pulling:
Expired Verkada API key.
Incorrect Command Organization ID
For a more detailed view and understanding of ongoing integration issues, users can access the full Splunk logs located in SPLUNK_HOME/var/log/splunk. You can adjust the logging level in the add-on configuration tab
Need more help? Contact Verkada Support.
Last updated
Was this helpful?













