SIEM Forwarding Quickstart
Set up SIEM forwarding end to end — enable a saved search, install the Event Forwarder, and verify events reach your SIEM.
This guide walks you through the full SIEM forwarding setup: enabling forwarding on a saved search, installing the Event Forwarder, and confirming that events are flowing to your destination.
Prerequisites
Spyderbat Nano Agents deployed and healthy on the hosts you want to monitor
org:ManageSiemForwardingpermission (contact your org admin if you don't have it)A destination ready to receive events: a SIEM, Splunk instance, webhook endpoint, or a Linux host with disk space for log files
Step 1: Enable SIEM forwarding on a saved query
The Event Forwarder only delivers records that a saved search has already selected for forwarding. Complete this step first — skipping it means the forwarder has nothing to deliver.
If you don't have a saved search yet, create one first. Two common starting points:
Forward targeted events (recommended): create a query scoped to what you actually care about — for example, schema
model_spydertracewith filterscore > 50for high-scoring traces, or schemaevent_redflagwith filterseverity = "high"for high-severity flags only.Forward everything (use with caution — high volume): use filter
*to match all records in a schema. Start withmodel_spydertraceto get behavioral traces, orevent_redflagto get all security flags.
Then enable the SIEM Forwarding toggle on at least one saved search. See SIEM Forwarding — Enable forwarding on a saved query for detailed instructions.
To confirm forwarding is enabled, open Saved Searches: expand the Search icon in the sidebar, then click Saved Searches. Scroll right in the table to the SIEM Forwarding column — it should show a checkmark (✓) for your query. (The column may be off-screen at standard viewport widths.) Alternatively, click the SIEM Forwarding filter button at the top of the table to show only SIEM-enabled queries.
Step 2: Install the Event Forwarder
Choose your deployment method:
Kubernetes: Follow the Helm Chart guide.
Linux: Follow the Traditional Installer guide.
Both guides require these two values from your Spyderbat console:
Your org UID appears in the URL of any org-level page (for example, the Dashboard). Navigate to such a page first — the API Keys page (/app/user/apikey) does not include the org UID in its URL. To generate an API key, see How to Create and Use a Spyderbat API Key.
A wrong org UID produces zero events with no error message. If your API key has access to multiple orgs, double-check that you're using the UID for the org where you enabled SIEM forwarding.
Create a dedicated service account for the API key rather than using a personal account. API keys can expire — check your key's expiration date and rotate before it lapses to avoid a forwarding outage.
Step 3: Verify events are flowing
Linux:
You should see ndjson records appearing within a minute or two of activity that matches your saved query. Each record is one JSON object per line.
Kubernetes:
The forwarder logs status as JSON. Look for lines where the "message" field reports new record counts:
A log that shows the forwarder running but reports zero new records usually means no activity is currently matching the saved search — not a forwarder problem. Run the saved search manually from the Search page to confirm it returns results.
Troubleshooting
No events after several minutes:
Check that SIEM forwarding is enabled on at least one saved search. Open Saved Searches (expand the Search icon in the sidebar → Saved Searches) and scroll right to the SIEM Forwarding column — it should show a checkmark (✓). Alternatively, use the SIEM Forwarding filter button at the top of the table to show only SIEM-enabled queries.
Run the saved search manually from the Search page. If it returns no results, no activity matches — adjust the query.
Confirm the forwarder is running. On Linux:
journalctl -fu spyderbat-event-forwarder.service. On Kubernetes: check the pod logs above.Verify credentials: a wrong org UID silently produces zero events (no error), while an invalid API key causes authentication errors in the forwarder logs.
Service fails to start on Linux (crash loop):
If the forwarder crashes repeatedly on startup, check the logs for a DNS or URL error:
A common cause is an incorrectly formatted api_host — the value must be a hostname only, without a scheme (correct: api.example.com, not https://api.example.com). After fixing the config, clear the failed state before restarting:
Duplicate events:
Run only one Event Forwarder instance per organization. Multiple instances poll the same API endpoint independently — each one receives and delivers the full event stream, causing duplicates in your SIEM.
Events stopped flowing after working previously:
API keys can expire. Check the forwarder logs for authentication errors, then generate a new key and update the config.
Related pages
SIEM Forwarding — full architecture and reference
Spyderbat Event Forwarder — detailed forwarder reference
Last updated
Was this helpful?