Ready to help

Ingesting events using Splunk Cloud

Configure Splunk Cloud to allow for ingesting Push webhook logs.

Configure the log source in Splunk Cloud

To use the HTTP Event Collector (HEC), you must configure at least one token. Splunk Cloud distributes the token across the deployment. Note that the token will not ready for use until distribution is complete.

In the Splunk Cloud console, go to Settings > Data inputs.

Splunk SIEM setup - data inputs

Choose HTTP Event Collector.

Splunk SIEM setup - event collector

Select New Token in the top right and configure the token for your environment.

Splunk SIEM setup - new token

Then go back to the Data inputs page and copy the Token Value.

Splunk SIEM setup - token value

Configure the integration in Push

In the Push admin console, go to Settings > Integrations and select the Splunk Cloud tile.

Input the Token Value and your Splunk Cloud HTTP Event Collector URL.

Your URL should be similar to https://your-instance.splunkcloud.com:443/services/collector/event

Splunk SIEM setup - tile config

When you've entered those values, click Connect.