You can verify with a search in Splunk Cloud inn few minutes after configuration, for example From the events drop down, “select all” events or one the events you are interested in. Type in a name, and with the data from section 3.1, fill in the values for HEC Token, HEC Host and HEC Port. Click on “Integrations” and click on “SIEM”Ĭlick the “+” sign next to Splunk. Access BI admin console through your SSO integration. The configuration is done using the BI admin console. This port should be open for SSL traffic in the firewall for BI event integration to work. Splunk Cloud HTTP Event collector listens on port 8088 by default. ![]() With Splunk cloud trial account, it is not possible to change the SSL certificate. Configure HTTP Event Collector with SSL certificate.You should see the newly created HTTP Event Collector Copy the token value and provide it to BI SME. You will see “Token has been created successfully”. In the “Default Index” drop down choose “main” and then click “Review” Click “Next”Ĭlick “add all” next to “Available items”. Leave other fields to the default values. Type in a name for the HTTP Event Collector, for example “ BI_events_http” and add a relevant description. In the drop-down options, click “Data inputs”, In “Data inputs” screen, click “Add new” to the right of “HTTP Event Collector” You have a tenant configured for your organization and able to enroll users.Īccess your Splunk Cloud admin console and login as a user with administrative privileges. ![]() ![]() Integrate BI events data with Splunk Cloud.This guide provides instructions on how to:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |