How to export logs to Splunk
Smallstep provides webhooks that can be used to export logs. This guide outlines how to export them to your Splunk environment.
- Create an index for the logs in Splunk
- Settings -> Data -> Indexes
- Click New Index and follow the walk through
- Create a new Splunk HEC input
- Settings -> Data -> Data Inputs
- Click "+ Add New" next to HTTP Event Collector
- Enter a name
- Select appropriate source type, or leave as automatic
- Select the index you created in step 1 as both allowable and default
- Copy the integration token
- If you are using Splunk on-prem, ask your Splunk admin for the HEC URL and port
- Configure the Smallstep webhook
- Go to settings -> Webhooks
- Create webhook
- Add a name, select log type, select POST
- For URL: it is VERY important that you send to the /raw endpoint. Sending to the straight collector endpoint will result in failures because the Smallstep webhook JSON does not format the way Splunk is expecting.
- On prem - use what your Splunk admin gives you
- Splunk Cloud - https://http-inputs-<host>.splunkcloud.com:443/services/collector/raw
- Auth type: Bearer
- Authorization: "Splunk <your-hec-token>" (for example, if your token is abcdef-1234-ghijkl, your auth string would be "Splunk abcdef-1234-ghijkl" without quotes)