Splunk Integration

This page explains how to:

  • Stream GPT Driver test execution events into Splunk in real time.

  • Map GPT Driver payload fields to Splunk event metadata.

Good to Know

  • Uses Splunk HTTP Event Collector (HEC) over HTTPS. Tokens are validated and stored only in memory.

  • Payloads are batched per suite (≤ 512 KB or 100 events) with up to 3 retry attempts.

Export Setup

  1. Enable HEC in Splunk Navigate to: Settings → Data Inputs → HTTP Event Collector → New Token

  2. Note your HEC URL and Token Example: https://splunk.acme.com:8088/services/collector Token: 41159b4e‑...

  3. Configure GPT Driver Go to: Settings → Integrations → Splunk

    • Paste the HEC URL and Token

    • Optionally set:

      • index (default: main)

      • sourcetype (default: gptdriver:test)

  4. Click Test Connection A health-check event should appear in Splunk within a few seconds.

  5. Save Settings Every completed suite will now stream automatically.

Sample Event Payload

Field Mapping

GPT Driver Field
Splunk Field

test.id

event.tests[].id

test.status

event.tests[].status

meta.branch

event.meta.branch

meta.gitSha

event.meta.gitSha


Verifying Ingestion

In Splunk Search, try:

Other useful queries:

  • Show failed tests:

  • Filter by branch or tag:

Last updated