Skip to content

Generic SIEM Integration

Integrate TrapEye with any SIEM platform to forward threats and interaction logs in real-time. TrapEye supports integration with all major SIEM solutions through three distinct connectors.

Our connectors are designed for seamless integration, minimizing configuration effort and ensuring rapid operational deployment.


On the Integrations page of the TrapEye platform, you will find three available connectors:

Set Source Type

Select the connector that best fits your SIEM solution and follow the on-screen instructions to configure it.

For complete details on the event structure and fields, see the Event Schema Reference.


The Syslog connector encapsulates TrapEye JSON events within standard syslog messages, compatible with all syslog-compliant SIEMs.

  • Events are wrapped in RFC-compliant syslog messages
  • The JSON payload is placed in the message field
  • Supports both RFC 5424 (modern) and RFC 3164 (legacy) formats

RFC 5424 (Structured Syslog):

<134>1 2026-01-23T23:52:17.826879Z trapeye.anantis.io TrapEye 0 6 - {"additional_data":{...},"event":"new_interaction",...}

RFC 3164 (BSD Syslog):

<134>Jan 23 23:52:23 trapeye.anantis.io TrapEye[0]: {"entity_uuid":"0e28f730-18c1-429a-821e-5282cf641dd4","event":"new_threat",...}
  • Host: Target syslog server hostname or IP address
  • Port: Syslog port (default: 514)
  • Protocol: UDP, TCP, or TCP with TLS
  • RFC Format: Choose between RFC 5424 or RFC 3164
  • Source Hostname: Customize the syslog source identifier
  • Certificate Verification: For TLS connections

The TCP-JSON connector streams TrapEye events over a raw TCP connection with newline-delimited JSON. This is the most efficient option as it uses a single persistent socket connection.

  • Events are sent as pure JSON over TCP
  • Each event is separated by a newline character (\n)
  • Single persistent socket connection for all events
{"entity_uuid":"0e28f730-18c1-429a-821e-5282cf641dd4","event":"new_threat",...}
{"additional_data":{...},"event":"new_interaction",...}
  • Host: Target SIEM hostname or IP address
  • Port: TCP port for the SIEM listener
  • TLS/SSL: Enable or disable encrypted transport
  • Certificate Verification: Choose whether to verify TLS certificates

The HTTP-JSON connector sends TrapEye events via HTTP POST requests with JSON payloads. This is the most versatile option, compatible with most modern SIEM platforms and log collectors.

  • Events are sent via HTTP POST requests
  • Content-Type header is set to application/json
  • Events are sent in real-time as they occur
  • 3 custom headers can be configured to match your SIEM requirements (e.g., Authorization, X-API-Key, etc.)
  • One HTTP request per event
POST <your-endpoint-url> HTTP/1.1
Host: <your-siem-host>
Content-Type: application/json
{"entity_uuid":"0e28f730-18c1-429a-821e-5282cf641dd4","event":"new_threat",...}
  • Endpoint URL: The HTTP endpoint of your SIEM or log collector
  • Custom Headers: Up to 3 configurable headers for authentication or routing
  • TLS/SSL: Enable or disable encrypted transport
  • Certificate Verification: Choose whether to verify TLS certificates (useful for self-signed certificates)

Once a connector is enabled, you can use the Test Connection button on its configuration page to ensure logs are being forwarded correctly.