Skip to content

Commit ff93509

Browse files
cickuangelampcosta
authored andcommitted
[Logs] Update Logpush to Splunk (cloudflare#23114)
* Update splunk.mdx * Apply suggestions from code review --------- Co-authored-by: angelampcosta <[email protected]>
1 parent 3b9b7ff commit ff93509

File tree

1 file changed

+5
-6
lines changed
  • src/content/docs/logs/get-started/enable-destinations

1 file changed

+5
-6
lines changed

src/content/docs/logs/get-started/enable-destinations/splunk.mdx

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ head:
1010

1111
import { Render } from "~/components";
1212

13-
Cloudflare Logpush supports pushing logs directly to Splunk via the Cloudflare dashboard or via API.
13+
The [HTTP Event Collector (HEC)](https://dev.splunk.com/enterprise/docs/devtools/httpeventcollector/) is a reliable method to receive data from Splunk Enterprise or Splunk Cloud Platform. Cloudflare Logpush supports pushing logs directly to Splunk HEC via the Cloudflare dashboard or API.
1414

1515
## Manage via the Cloudflare dashboard
1616

@@ -19,9 +19,9 @@ Cloudflare Logpush supports pushing logs directly to Splunk via the Cloudflare d
1919
5. In **Select a destination**, choose **Splunk**.
2020

2121
6. Enter or select the following destination information:
22-
- **Splunk raw HTTP Event Collector URL**
23-
- **Channel ID** - This is a random GUID that you can generate using [guidgenerator.com](http://guidgenerator.com/).
24-
- **Auth Token**
22+
- **Splunk HEC URL**
23+
- **Channel ID** - This is a random GUID that you can generate using [guidgenerator.com](https://guidgenerator.com/).
24+
- **Auth Token** - Event Collector token.
2525
- **Source Type** - For example, `cloudflare:json`. If you are using the [Cloudflare App for Splunk](https://splunkbase.splunk.com/app/4501), refer to the appropriate source type for the corresponding datasets under the **Details** section. For instance, for Zero Trust Access requests logs, the source type is `cloudflare:access`.
2626
- **Use insecure skip verify option** (not recommended).
2727

@@ -64,10 +64,9 @@ To create a job, make a `POST` request to the Logpush jobs endpoint with the fol
6464
- **destination_conf** - A log destination consisting of an endpoint URL, channel id, insecure-skip-verify flag, source type, authorization header in the string format below.
6565

6666
- **\<SPLUNK_ENDPOINT_URL>**: The Splunk raw HTTP Event Collector URL with port. For example: `splunk.cf-analytics.com:8088/services/collector/raw`.
67-
- Cloudflare expects the HEC network port to be configured to `:443` or `:8088`.
6867
- Cloudflare expects the Splunk endpoint to be `/services/collector/raw` while configuring and setting up the Logpush job.
6968
- Ensure you have enabled HEC in Splunk. Refer to [Splunk Analytics Integrations](/analytics/analytics-integrations/splunk/) for information on how to set up HEC in Splunk.
70-
- You may notice an API request failed with a 504 error, when adding an incorrect URL. Splunk Cloud endpoint URL usually contains `http-inputs-` or similar text before the hostname. Refer to [Send data to HTTP Event Collector on Splunk Cloud Platform](https://docs.splunk.com/Documentation/Splunk/latest/Data/UsetheHTTPEventCollector#Send_data_to_HTTP_Event_Collector) for more details.
69+
- You may notice an API request failed with a 504 error, when adding an incorrect URL. Splunk Cloud endpoint URL usually contains `http-inputs-` or similar text before the hostname.
7170
- **\<SPLUNK_CHANNEL_ID>**: A unique channel ID. This is a random GUID that you can generate by:
7271
- Using an online tool like the [GUID generator](https://www.guidgenerator.com/).
7372
- Using the command line. For example: `python -c 'import uuid; print(uuid.uuid4())'`.

0 commit comments

Comments
 (0)