Splunk Enterprise Log Delivery

RTLD may automatically deliver compressed log data to Splunk Enterprise by submitting HTTPS POST requests to it. The Splunk HTTP Event Collector (HEC) will collect and log each request. Each request contains a compressed JSON document that describes one or more log entries.
The format for log data delivered to Splunk Enterprise is JSON Lines. This log format does not provide information that uniquely identifies a set of log data. As a result, there is no way to check for gaps in sequence numbers when attempting to identify missing log data.
Key information:
To set up Splunk Enterprise log delivery
  1. Set up Splunk Enterprise’s HTTP Event Collector to accept CDN log data in JSON format.
    1. From with Splunk Enterprise, click Settings and then Add Data.
    2. Click Monitor.
    3. Click HTTP Event Collector.
    4. In the Name option, define a name for the CDN log data that will be collected.
    5. Click Next >.
    6. Click Select to display the Select Source Type option. Click that option, type \_json to filter source types, and then select it.
    7. Click Review.
    8. Click Submit > to finish setting up the HTTP Event Collector. An HEC token will be generated. Use this token to authorize requests posted to the HEC.
  2. Perform the following steps if you have hosted Splunk Enterprise within your network:
    1. Configure your firewall to allow POST requests from this IP block:
    2. Set up support for the HTTPS protocol.
      Log delivery requires a certificate whose trust anchor is a publicly trusted certificate authority (CA). Additionally, the certificate must include a chain of trust for all intermediate certificate(s) and a leaf certificate.
  3. Upon completing the above steps, you should create a log delivery profile for Splunk Enterprise.
To set up a log delivery profile
  1. From the Real-Time Log Delivery page, click + New Log Delivery Profile and then select the desired type of log field.
    1. Open the desired property.
      1. Select either your private space or a team space.
      2. Click on the desired property.
    2. From the left pane, click on the desired environment.
    3. From the left pane, click Realtime Log Delivery.
    4. Click + New Log Delivery Profile and then select either CDN, WAF, Rate Limiting, Bot, or Cloud Functions.
  2. From the Profile Name option, assign a name to this log delivery profile.
  3. From the Log Delivery Method option, select Splunk Enterprise.
  4. Define how RTLD will communicate with Splunk Enterprise.
    1. Set the Splunk URL option to a URL that points to your Splunk Enterprise’s HTTP Event Collector configuration.
      Default URL syntax: https://<SPLUNK ENTERPRISE HOSTNAME>:<PORT>/services/collector/raw
      Replace <SPLUNK ENTERPRISE HOSTNAME> with the hostname where your instance of Splunk Enterprise is hosted. Replace <PORT> with the port number (e.g., 8088) that the HTTP Event Collector is listening for data. This port number may be configured when defining your HEC’s global settings.
    2. Set the HEC Token option to the token generated for your HTTP Event Collector configuration.
  5. From the Log Format option, select whether to format log data using our standard JSON format, as a JSON array, as JSON lines, or as a CSV (RTLD CDN only).
    Learn more about these formats: RTLD CDN | RTLD WAF | RTLD Rate Limiting | RTLD Bot | RTLD Cloud Functions
  6. From the Downsample the Logs option, determine whether to reduce the amount of log data that will be delivered. For example, you may choose to only deliver 1% of your log data.
    • All Log Data: Verify that the Downsample the Logs option is cleared.
    • Downsampled Log Data: Downsample logs to 0.1%, 1%, 25%, 50%, or 75% of total log data by marking the Downsample the Logs option and then selecting the desired rate from the Downsampling Rate option.
      Use this capability to reduce the amount of data that needs to be processed or stored within your web server(s).
      RTLD CDN Only: Downsampling log data also reduces usage charges for this service.
  7. Determine whether log data will be filtered.
  8. By default, all log fields are enabled on a new log delivery profile. From within the Fields section, clear each field for which log data should not be reported.
  9. Click Create Log Delivery Profile.