Integrating Zoho Vault with Splunk
- Log in to Splunk console. Navigate to Settings at the top-right corner and select Data inputs.

- From the list of data input options, choose HTTP Event Collector.

- Click Global Settings. Note the listed Port Number, as you will need this when configuring Zoho Vault.

- Go back to the main HTTP Event Collector page and click New Token.
- In the Name field, provide a descriptive name for this log source (e.g., "ZohoVaultLogs"). This name will help you filter and identify logs originating from Zoho Vault within Splunk.

- Once you've entered the name, proceed through the required setup steps for your Splunk environment.
- Upon completion, Splunk will generate an API token. Make sure to copy and securely store this token, as you will need to enter it in Zoho Vault.

Configuring Splunk details in Vault
- Log in to your Zoho Vault account as a super admin.
- In the Settings menu, select SIEM Integration, then click Edit Configurations under Splunk.

- Enter the Collector Hostname and Port details provided by Splunk, then click Save Configuration.
- Select the list of audit trails to be sent to your SIEM service from Zoho Vault under Manage Syslog Configuration.

Accessing Zoho Vault logs from Splunk
To view all Zoho Vault audit logs in Splunk:
- Log in to your Splunk account.
- In the search bar, enter the log name you previously set to find the Zoho Vault logs.
