Steps to Create an HTTP Event Collector (HEC) in Splunk
- Log in to Splunk: Sign in to your Splunk instance.
- Navigate to HEC Settings:
- Go to "Settings" > "Data Inputs."
- Click on "HTTP Event Collector."
- Create a New Token:
- Click on "New Token."
- Provide a name for the token.
- Select Input Settings:
- Choose the allowed index where the events should be stored.
- Set "Sourcetype" (can be set to "manual").
- Review and Submit: Complete the setup and copy the generated token.
- Find Base URL: The base URL follows the format:
https://<splunk-instance>:8088
. - Use in Javelin:
- Provide the base URL and token in Javelin’s Splunk alert configuration.
- Ensure the
payload
containsevent
andsourcetype
fields.