Splunk® Enterprise

Add AWS CloudTrail data with Kinesis Firehose: Splunk Cloud

Download manual as PDF

Download topic as PDF

Install and configure the Splunk Add-on for Amazon Kinesis Firehose on a managed Splunk Cloud deployment

Follow these steps to install and configure the Splunk Add-on for Amazon Kinesis Firehose in your managed Splunk Cloud deployment.

Install and configure on a managed Splunk Cloud deployment

If your managed Splunk Cloud deployment has a search head cluster, Splunk Support must complete this configuration. You can do this through the Splunk Support Portal.

If your managed Splunk Cloud instance does not have a search head cluster:

  1. Select an index to collect your Amazon Kinesis Firehose data. Ensure that this index is enabled and active. Sending data to a disabled or deleted index results in dropped events.
  2. Install the add-on onto your Splunk Cloud deployment.
  3. Submit a case to Splunk Support. In the case, ask Splunk Support to enable HEC and create or modify an Elastic Load Balancer to use with this add-on.
  4. Once Splunk Support performs setup, confirm that HEC is enabled and your Elastic Load Balancer is ready. Splunk Support gives you a URL to use for your HEC endpoint. It should match this format: https://http-inputs-firehose-<your unique cloud hostname here>.splunkcloud.com:443.
  5. Create a HEC token with indexer acknowledgments enabled. For step-by-step instructions, see Configure an HTTP Event Collector token. During the configuration:
    1. Specify the Source type for your incoming data.
    2. Select the Index to which Amazon Kinesis Firehose will send data.
    3. Check the box next to Enable indexer acknowledgement.
  6. Save the token that Splunk Web provides. You need this token when you configure Amazon Kinesis Firehose.
  7. Repeat steps 5 and 6 for each source type from which you want to collect data. Each source type requires a unique HEC token.

Create a HEC token

To use HEC, you must configure at least one token.

  1. Click Settings > Add Data.
  2. Click monitor.
  3. Click HTTP Event Collector.
  4. In the Name field, enter a name for the token.
  5. (Optional) In the Source name override field, enter a name for a source to be assigned to events that this endpoint generates.
  6. (Optional) In the Description field, enter a description for the input.
  7. (Optional) If you want to enable indexer acknowledgment for this token, click the Enable indexer acknowledgment checkbox.
  8. Click Next.
  9. (Optional) Make edits to source type and confirm the index where you want HEC events to be stored.
  10. Click Review.
  11. If all settings are what you want, click Submit. Otherwise, click < to make changes.
  12. (Optional) Copy the token value that Splunk Web displays and paste it into another document for reference later.

See the "Additional resources" topic at the end of this manual for more information about HEC.

PREVIOUS
Configure Amazon Web Services to collect data
  NEXT
Install the Splunk Add-on for AWS in a Splunk Cloud deployment

This documentation applies to the following versions of Splunk® Enterprise: 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.3.0, 7.3.1


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters