User Tools

Site Tools


splunk_integration

This is an old revision of the document!


Receiving Alerts in Splunk

1. First of all, remember the hostname of your Splunk instance - it will be needed later when configuring Kaduu to send alerts to Splunk

2. Go to "Settings" → "Data Inputs"


3. Add a new HTTP Event Collector by clicking the "Add New" link


4. Put any name for that collector and hit "Next"


5. Set "Source Type" as "Automatic"

6. Select any index as default - all Kaduu events will be stored there

7. Hit "Review"


8. Check all settings are valid on the Review page and hit next. Splunk will say that "Token has been created successfully" and show you a token, that you should copy and save it somewhere - it will be used on the next step


9. Configure your Kaduu account to send alerts over HTTP

10. Enter webhook URL in this form: https://<host>.splunkcloud.com:8088/services/collector/event?token=<token>, where <host> is the hostname of your Splunk instance and <token> is the token you copied on the previous step

11. Hit "Save" and wait for new alert events to arrive to your Splunk instance

splunk_integration.1668816478.txt.gz · Last modified: 2023/05/22 20:40 (external edit)