Getting Data In

Looking for the Hostname or IP of splunk cloud

Sponi
Engager

Hello


I have a restricted rsyslog client. I can there only specify a Hostname or IP and port as target to send the syslog. Where can I found the Hostname or IP for my splunk cloud to receive the according syslog?

 

Thank you

Labels (1)
0 Karma
1 Solution

PickleRick
SplunkTrust
SplunkTrust

You can only send HEC (or s2s embedded in HTML) to your Cloud HEC inputs. So in order to ingest syslog you need to have something in place on-premise to receive the syslogs and push it as something that Cloud will accept. That can be a UF as @gcusello suggested or a SC4S or properly configured rsyslog/syslog-ng instance with HTTP output.

View solution in original post

PickleRick
SplunkTrust
SplunkTrust

You can only send HEC (or s2s embedded in HTML) to your Cloud HEC inputs. So in order to ingest syslog you need to have something in place on-premise to receive the syslogs and push it as something that Cloud will accept. That can be a UF as @gcusello suggested or a SC4S or properly configured rsyslog/syslog-ng instance with HTTP output.

gcusello
SplunkTrust
SplunkTrust

Hi @Sponi,

you cannot directly receive syslogs on Splunk Cloud.

Usually the best approach is to have one (better two) Forwarder (Heavy or Universal) on premise as syslog server and it has the job to send the logs to Splunk Cloud.

Ciao.

Giuseppe

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...