Splunk is a software platform for searching, monitoring, and analyzing machine-generated data. User need to generate credentials from Splunk cloud and provide it to SCE.
To enable external logging service using Splunk, please follow the steps.
- Visit Splunk Cloud and login to the portal Logging in to the Splunk Cloud portal using your credentials. If you don't have an account, sign up to get started.
- Visit a setting section and click on Data inputs.
- Select the Http Event Collector in the Local inputs section.
- Configure the Global settings enable(SSL and All tokens).
- Click on “New Token”, provide name, source name and description.
- Click on “Next”, will be prompted with “Token Value” and “Start searching” option.
Note: For additional information regarding HEC, tokens, and host URLs, please refer to the Splunk official documentation. Once you have obtained the token and host URL, you can proceed to create container group on salad portal.
while container group creation or configuration process, locate the "External Logging Services" section in Optional Settings and click on the "Edit" button.
- Click “Edit” on External Logging Services.
- In the sidebar appears at right, click on "Splunk" under the option of “Select a Container Logging Service”. Finally past the Host URL and token that we generated from Splunk and simple click on “Configure”.
Once the container is configured, you can deploy it by clicking on button “Deploy” and "Start".
Once you've started the container and it comes in running state, the logs will be seamlessly transmitted to the Splunk portal. Monitor your container's status to ensure it's in the running state, and then head to the Splunk portal to see your Salad Container logs in action.
Updated 24 days ago