Splunk Cloud

Splunk Cloud allows you to search, analyze and view data collated from various systems in your IT infrastructure.

Integrating Splunk Cloud

Step 1 - Setting Up the HTTP Event Collector

The HTTP Event Collector (HEC) allows you send data and application events to a Splunk deployment over HTTP and HTTPS protocols. You can use HEC to generate a token and use it to configure a log library with data in a specific format. This eliminates the requirement for a Splunk forwarder when you send application events.

Step 2 - Enabling an HTTP Event Collector

When you enable HEC, applications use the HEC tokens to send data to HEC, eliminating the requirement for Splunk credentials in your application or supported files.

Note - If you have managed Splunk, contact Splunk customer support for assistance.

To enable an HTTP Event Collector:

  1. Log in to the Splunk web portal.

  2. Click Settings > Data Inputs.

  3. Click HTTP Event Collector.

  4. Click Global Settings.

  5. In the All Tokens field, select Enabled.

  6. To enable communication over HTTPs, select the Enable SSLcheckbox.

    Note - It is enabled by default. You can disable it only through Splunk Enterprise.

  7. Click Save.

Step 3 - Creating an Event Collector Token

  1. Log in to the Splunk web portal.

  2. Go to Settings > Add Data.

  3. Click Monitor.

  4. Click HTTP Event Collector.

  5. In the Name field, enter a name for the token.

  6. Make sure indexer acknowledgment is disabled for this token.

  7. Click Next.

  8. Click Review.

  9. Verify the settings.

  10. Click Submit.

Configuring the Splunk Integration in the Harmony SASE Administrator Portal

  1. Access the Harmony SASE Administrator Portal and click SettingsIntegrations.

  2. In the SIEM integrations section, in the Splunk row, click Add.

  3. Enter these:

    Item

    Description

    Splunk HEC Host

    Enter an appropriate value according to your Splunk tier.

    Replace {hostname} with your Splunk server hostname.

    • Splunk Cloud (paid): inputs-<host>

    • Splunk Cloud (free-trial): <host> ORinputs.<host>

    HEC Port

    • Splunk Cloud free trial: 8088

    • Splunk Cloud paid: 443

    Protocol

    • Splunk Cloud free trial: HTTP

    • Splunk Cloud paid: HTTPS

    (For HTTPS only) Verify server SSL certificate:

    • If you are using a self-signed certificate disable SSL verification.

    • If you are using a CA-signed certificate make sure to enable it.

    HEC URI

    Value is automatically populated.

    Authentication token

    Enter the token generated in the Splunk web portal.

  4. Click Validate.

Troubleshooting

This table shows the status codes for all HTTP Event Collector endpoints.

HTTP status code ID HTTP status code Status message Action required
200 OK Success None
403 Forbidden Token disabled Enable token at Splunk Web.
401 Unauthorized Invalid authorization Make sure you entered a valid token.
403 Forbidden Invalid token Make sure you entered a valid token.
500 Internal Error Internal server error Contact Check Point Support.
503 Service Unavailable Server is busy There are too many requests pending in the Splunk server queue. Try again later.
400 Bad Request Data channel is missing

Edit the token at the Splunk web portal and make sure the Indexer Acknowledgement is disabled.

400 Bad Request Error in handling indexed fields

Contact Check Point Support .