icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading TA-guardium_api
SHA256 checksum (ta-guardium_api_100.tgz) 2888f9f5af51a883d7a03310f722302d717f191204505366a7e17b26ce867770
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

TA-guardium_api

Splunk Cloud
Overview
Details
IBM Guardium REST API Add-on for Splunk enables secure, automated ingestion of database activity and audit logs from IBM Guardium into Splunk using the Guardium online_report REST API.

This add-on provides a fully checkpointed, fault-tolerant modular input that continuously pulls SQL activity data at a configurable interval and resumes seamlessly after restarts without duplicating events. It supports per-input Guardium API URLs, central token-based authentication, optional SSL verification, and scalable pagination for high-volume environments.

All ingested events are structured as JSON and can be easily normalized to the Splunk Common Information Model (CIM) Database data model for use with Enterprise Security, custom dashboards, and compliance reporting.

This add-on is ideal for organizations that rely on IBM Guardium for database security monitoring and want centralized analytics, detection, and long-term retention in Splunk.

Overview

The IBM Guardium REST API Add-on for Splunk collects database audit and SQL activity events from IBM Guardium using the /restAPI/online_report endpoint.

The add-on supports:
- Continuous polling at configurable intervals
- Timestamp-based checkpointing
- Automatic resume after restart
- Scalable data collection using Guardium pagination
- CIM-ready field structure for the Database data model


Data Collection Workflow

  1. The configured input polls Guardium at a defined interval (e.g., every 60 seconds).
  2. The add-on queries Guardium using the QUERY_FROM_DATE and QUERY_TO_DATE parameters.
  3. Events are deduplicated using the Timestamp field.
  4. A checkpoint is saved after each successful run.
  5. After a restart, the add-on automatically resumes from the last saved timestamp.

Data Input Parameters

Each input supports the following parameters:

Parameter Description
guardium_url Full Guardium REST API endpoint URL
report_name Guardium report name
initial_from Initial start time (YYYY-MM-DD HH:MM:SS)
fetch_size Maximum records per API request

Global Setup Parameters

Parameter Description
auth_token Bearer token for Guardium API authentication
verify_ssl SSL verification (1 = enabled, 0 = disabled)

Example Guardium API Call

```bash
curl -k -X POST https://<guardium_host>:8443/restAPI/online_report \
-H "Authorization: Bearer <token>" \
-H "Content-Type: application/json" \
-d '{"reportName":"SQL Activity","indexFrom":"1","fetchSize":30000}'

Key Features:

Runtime checkpointing using timestamps
Automatic retry on next scheduled run
Scalable for large Guardium environments
CIM-ready field structure
Supports multiple Guardium environments via multiple inputs
Secure token-based authentication
JSON-native ingestion

Use Cases:

Database activity monitoring
SQL audit investigations
PCI, SOX, GDPR compliance
Insider threat detection
SOC monitoring and correlation

Release Notes

Version 1.0.0
Dec. 7, 2025

First release


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.