Skip to content

Commit f2e0bd4

Browse files
kbitrangelampcosta
authored andcommitted
Adding details for the source type for the Cloudflare Splunk app (#17899)
* Adding details for the source type for the Cloudflare Splunk app Adding details for the source type for the Cloudflare Splunk app * Update src/content/docs/logs/get-started/enable-destinations/splunk.mdx --------- Co-authored-by: angelampcosta <[email protected]>
1 parent 1ebb566 commit f2e0bd4

File tree

1 file changed

+1
-1
lines changed
  • src/content/docs/logs/get-started/enable-destinations

1 file changed

+1
-1
lines changed

src/content/docs/logs/get-started/enable-destinations/splunk.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Cloudflare Logpush supports pushing logs directly to Splunk via the Cloudflare d
2323
* **Splunk raw HTTP Event Collector URL**
2424
* **Channel ID** - This is a random GUID that you can generate using [guidgenerator.com](http://guidgenerator.com/).
2525
* **Auth Token**
26-
* **Source Type** - For example, `cloudflare:json`.
26+
* **Source Type** - For example, `cloudflare:json`. If you are using the [Cloudflare App for Splunk](https://splunkbase.splunk.com/app/4501), refer to the appropriate source type for the corresponding datasets under the **Details** section. For instance, for Zero Trust Access requests logs, the source type is `cloudflare:access`.
2727
* **Use insecure skip verify option** (not recommended).
2828

2929
When you are done entering the destination details, select **Continue**.

0 commit comments

Comments
 (0)