Setup Splunk

Configure Splunk to receive logs from logcannon.com. Data is transmitted via Splunk HEC (HTTP Event Collector). See Supported Destinations for platform overview.

Prerequisites

  • A Splunk instance with HEC enabled
  • An HEC token with write permissions
  • An index created in Splunk (or use an existing one)

Step 1: Enable HEC in Splunk

  1. Log into your Splunk instance
  2. Navigate to Settings → Data Inputs → HTTP Event Collector
  3. Click New Token to create a new HEC token
  4. Configure the token:
    • Set a name (e.g., "logcannon")
    • Select the index where logs should be stored
    • Enable the token
  5. Copy the token value - you'll need it for logcannon.com configuration

Step 2: Configure in logcannon.com

ParameterDescriptionExample
Splunk Web UI URLURL for Splunk's web interface. Cloud/reverse-proxy: same URL for web and ingestion. Self-hosted: include port 8000; logcannon uses 8088 for data ingestion.https://splunk.example.com:8000https://inputs-xxx.splunkcloud.com
Splunk Address (optional)If HEC uses a different URL than the web UI, enable "Use separate Splunk address" and provide it.https://splunk.example.com:8088
Splunk TokenThe HEC token from Step 1. Stored encrypted.
IndexSplunk index for logs. Must match the index in your HEC token.
SSL VerificationEnable for secure connections. Disable only for self-signed certs in development.

Step 3: Test Connection

Use the "Test Connection" button in logcannon.com to verify your configuration. This will send a test event to your Splunk instance to ensure everything is working correctly.