Orca Security Logs
Connecting Orca Security logs in your Panther Console
Overview
Panther ingests Orca Security alerts by configuring a webhook to post events to a Panther HTTP URL.
How to onboard Orca Security logs to Panther
Step 1: Create an Orca Security source in Panther
In the left-hand navigation bar of your Panther Console, click Configure > Log Sources.
Click Create New.
Search for “Orca Security,” then click its tile.
On the slide-out panel, click Start Setup.

Follow Panther's instructions for configuring an HTTP Source, beginning at Step 5.
For the Auth method, you will be required to use Bearer authentication. This is the only authentication method Orca Security supports.
Payloads sent to this source are subject to the payload requirements for all HTTP sources.
Do not proceed to the next step until the creation of your HTTP endpoint has been completed.
After creating the HTTP source, the Panther Console will display your HTTP Source URL. Store this value in a secure location, as you will need it in the next steps.
Step 2: Create a new Panther integration in Orca Security
In the Orca Security console, navigate to Settings > Integrations.
In the search bar in the upper-right hand corner, search for "Panther," then, on the Panther tile, click Configure.

On the Panther pop-up modal, click Create.

Under Panther Integration, fill in the form fields:
Template Name: Enter a descriptive name, e.g.,
Panther SIEM integration.Trigger URL: Enter the HTTP URL you generated in Panther in Step 1.
API Key: Enter "Bearer" followed by a space, then enter the Bearer token you generated or entered in Panther in Step 1. The complete value should look like:
Bearer SomeTokenHere.(Optional) Under Your Panther template, customize the Body and Custom Header contents by dragging and dropping fields from the Orca Optional Fields section.

Click Next.
In the upper-right hand corner, click Create Template.
Step 3: Automate alert forwarding in Orca Security
From the left-hand navigation bar in the Orca console, select Automations.
From the Orca Suggested Template section, select Forward Alerts via Integrations.
On the Create Query page, update the default Query value as desired.
This query determines which alerts will be forwarded to Panther. You may enter asterisks, use more specific values, or add/remove conditions.

Click Next.
On the Automation Details page, enter an Automation Name.

Click Next.
On the Define Results page, under SIEM/SOAR:
Select Panther.
In the Select Panther Trigger dropdown field, select the Panther integration you created in Step 2.

Click Create.
Panther-managed detections
See Panther-managed rules for Orca Security in the panther-analysis GitHub repository.
Supported log types
Starting January 1, 2026, Orca Security will be discontinuing support for their Orca.Alert schema, replacing it with Orca.AlertEvent.
Please update your integration to use the new Orca.AlertEvent schema before January 2026.
For details about the new format, see the Orca Security documentation.
Orca.AlertEvent
Orca.Alert (Legacy)
Starting January 1, 2026, Orca Security will be discontinuing support for their Orca.Alert schema, replacing it with Orca.AlertEvent.
Please update your integration to use the new Orca.AlertEvent schema before January 2026.
For details about the new format, see the Orca Security documentation.
Last updated
Was this helpful?

