Date: Thu, 28 Mar 2024 16:20:51 +0000 (UTC) Message-ID: <1967652602.245.1711642851031@ip-10-0-0-180.us-west-2.compute.internal> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_244_1080498884.1711642851027" ------=_Part_244_1080498884.1711642851027 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: file:///C:/exported.html
Splunk Event Collector tokens handle the authentication= of data shared from your ServiceNow instance to Splunk. Each token ha= s a unique value consisting of a 128-bit number that is represented as a 32= -character globally unique identifier (GUID). You will need to provide the = token that is generated for your Splunk instance to Perspectium Su= pport so that the sharing of ServiceNow data to Splunk can be properly = configured. Learn more about Splunk Event Collector tokens= .
First, you= will need to create a= ServiceNow bulk/dynamic share for Splunk.
You will a= lso need to point your Splunk HTTP Event C= ollector port to the Perspectium Integration Mesh.
To generate a token for your Splunk Event Collector token, follow these = steps:
Log into Splunk and navigate to Settings > D= ata inputs from the top left-hand side navigation menu.
Click HTTP Event Collector under Type.=
At the top right-hand corner of the screen, click New Token.
Type any Name for your token and optionally type a
Click Review at the top of the form.
NOTE: Optionally, you can select Source types, an App context, and Indexes. However, you must prov= ide this information to Perspectium Support so that your Splun= k integration can be properly configured.
Click Submit. Then, on the resulting page, copy your Token Value and paste it in a secure place. You will need to=
provide this token to Perspectium Support so that the sharing=
of ServiceNow data to Splunk can be properly configured.