How to export logs to Splunk
Create an index for the logs in Splunk
Settings -> Data -> Indexes
Click New Index and follow the walk through
Create a new Splunk HEC input
Settings -> Data -> Data Inputs
Click "+ Add New" next to HTTP Event Collector
Enter a name
Select appropriate source type, or leave as automatic
Select the index you created in step 1 as both allowable and default
Copy the integration token
If you are using Splunk on-prem, ask your Splunk admin for the HEC URL and port
Configure the Smallstep webhook
Go to settings -> Webhooks
Create webhook
Add a name, select log type, select POST
For URL: it is VERY important that you send to the /raw endpoint. Sending to the straight collector endpoint will result in failures because the Smallstep webhook JSON does not format the way Splunk is expecting.
On prem - use what your Splunk admin gives you
Splunk Cloud - https://http-inputs-<host>.splunkcloud.com:443/services/collector/raw
Auth type: Bearer
Authorization: "Splunk <your-hec-token>" (for example, if your token is abcdef-1234-ghijkl, your auth string would be "Splunk abcdef-1234-ghijkl" without quotes)
