Configure HTTP Event Collector for the Amazon Kinesis Firehose on a Single-instance Splunk Enterprise Deployment¶
Install the Splunk Add-on for Amazon Web Services on a single-instance Splunk Enterprise deployment. For optimal performance, set ackIdleCleanup
to true in inputs.conf
located in $SPLUNK_HOME/etc/apps/splunk_httpinput/local/inputs.conf
for *nix users and %SPLUNK_HOME%\etc\apps\splunk_httpinput\local\inputs.conf
for Windows users.
Steps¶
- Decide what index you want to use to collect your Amazon Kinesis Firehose data. Ensure that this index is enabled and active. Sending data to a disabled or deleted index results in dropped events. If you need to create a new index, see Create custom indexes in Managing Indexers and Clusters of Indexers.
- Go to Settings > Data inputs > HTTP Event Collector click Global Settings.
- Check the box next to Enable SSL, then click Save.
- Create an HTTP event collector token with indexer acknowledgments
enabled. For a detailed walkthrough, see
Set up and use the HTTP Event Collector
in Getting Data In. During the configuration:
- Specify a Source type for your incoming data. See Source types for the Splunk Add-on for AWS for the source types supported by this add-on.
- Select an Index to which Firehose will send data.
- Check the box next to Enable indexer acknowledgement.
- Save the token that Splunk Web provides. You need this token when you configure Amazon Kinesis Firehose.
- Repeat steps 4 and 5 for each additional source type from which you want to collect data. Each source type requires a unique HTTP event collector token.
Next steps¶
Configure Amazon Kinesis Firehose to send data to the Splunk platform