Source types for the Splunk Add-on for Salesforce
The Splunk Add-on for Salesforce provides the index-time and search-time knowledge for Salesforce event log file data and Salesforce object queries in the following formats.
Source type | Description | CIM data models |
---|---|---|
sfdc:logfile
|
Salesforce event log data. | Web, Change, Authentication |
sfdc:<object_name>
|
Enter the object name you want to get data from in the <object_name> field. You can either get data from a Salesforce standard object or a customized object. For example, search for |
sourcetype=sfdc:LoginHistory is mapped to Authentication.
|
Splunk Add-on for Salesforce | Release notes for the Splunk Add-on for Salesforce |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!