PingOne Advanced Identity Cloud

Stream logs to an external monitoring tool

You can stream Advanced Identity Cloud logs to an external monitoring tool, a process sometimes known as push logging. This lets you monitor certain events in real time and troubleshoot issues using your preferred SIEM or event monitoring solution, such as Splunk or an OpenTelemetry-compatible SIEM like Grafana Cloud, Datadog, or New Relic.

Advanced Identity Cloud supports streaming log data in OpenTelemetry Protocol (OTLP) and Splunk formats.

To configure a log-streaming service, use REST API calls to define the telemetry format, the log sources to stream, and the destination monitoring tool. Advanced Identity Cloud’s log-streaming service then retrieves the logs and sends them to your chosen monitoring tool in real time.

log events push
An Advanced Identity Cloud tenant environment can have only one log-streaming service configuration. This means you can only send logs to one external monitoring tool or SIEM.

Use cases

Streaming Advanced Identity Cloud logs to an external monitoring tool in real time has many use cases, including:

  • Debug journeys while viewing real-time events and errors.

  • Monitor the performance of authentications during journey creation.

  • Collect events from Advanced Identity Cloud and enrich them with data from other sources.

  • Detect and respond to critical events. For example, a sudden spike in registrations might mean an effective marketing program or suspicious activity.

  • Set alerts on authentication and registration requests from particular regions.

  • Monitor the improper use of APIs.

  • Monitor user activity, success/failure rates, and password reset requests.

Supported formats

The log-streaming service supports the following formats:

Supported monitoring tools

Set up a log-streaming service

Follow these steps to set up a log-streaming service:

  1. Determine the Advanced Identity Cloud log sources to stream.

  2. Configure your destination monitoring service to receive log events from Advanced Identity Cloud.

    Refer to your monitoring tool vendor documentation for configuration details.

    Grafana
    1. Go to your Grafana Cloud Stacks page.

    2. Under OpenTelemetry, click Configure.

    3. Copy the OTLP Endpoint, adding /v1/logs to the end. For example, https://example.grafana.net/otlp/v1/logs.

    4. Copy the Instance ID for the username.

    5. Under Password / API Token, click Generate Now to generate the password.

    Datadog
    • Follow the Datadog documentation to get DD_API_KEY and YOUR_ENDPOINT. The value in YOUR_ENDPOINT must end in /v1/logs.

    New Relic
    • Follow the New relic documentation to get OTEL_EXPORTER_OTLP_ENDPOINT and your api-key. The endpoint must end in /v1/logs.

    Splunk
    1. Configure HTTP Event Collector (HEC).

    2. Make a note of the HEC token. You’ll need this when you configure log streaming in Advanced Identity Cloud.

      You must disable indexer acknowledgment for the HEC token. The Advanced Identity Cloud log-streaming service isn’t compatible with this feature.

  3. Configure the log-streaming service in Advanced Identity Cloud using the REST API. Learn more in Manage log streaming using the API.

  4. Verify that the log events are arriving at the external monitoring tool correctly.