All Apps and Add-ons

Salesforce Event Log Interval

carlhussey
New Member

We have our Splunk instance connected to an API user per the specs of the Splunk App for Salesforce.

One of the things we are trying to get more insight into is the event log so we can create alerts, dashboards, etc. in order to be proactive.

From what I can tell, even though we set up the Splunk sfdc:logfile to be on an interval of 300 seconds, I never end up getting data in Splunk until after 24 hours. This means I can't search for anything that happened unless it was 24 hours ago.

Looking at some Salesforce documentation, it appears that there is hourly log files, as well as the 24 hour.

Our Splunk admin sent me this screenshot showing me that the interval was set on that source type, although anytime I try and search that index using "today", I get no events. 

We are wanting to configure some alerts based on events that are logged, but we are unable to do so with such old data. 

Any idea of how we can increase the interval on this log file, outside of what appears to be set at 300 seconds?


Screen Shot 2020-09-15 at 12.49.37 AM.png

Labels (2)
Tags (3)
0 Karma

thambisetty
SplunkTrust
SplunkTrust

if the log files are generated hourly or once in 24 hours then there is no use of running Splunk input for every 300 seconds or 30 seconds. Input will run but it will fetch 0 results as there are no results provided by API.

I think, you need to focus more on API rather than looking into Splunk TA.

————————————
If this helps, give a like below.
0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...