Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To view your event collections in Splunk, follow these steps:

...

UI Steps
sizesmall


UI Step

After executing your bulk share for Splunk or creating your dynamic share for Splunk and creating/updating/deleting records, log into your Splunk instance and click the Splunk logo to navigate to your instance's homepage.


UI Step

From the left side navigation menu, click Search and Reporting.


UI Step

On the resulting page, click the Data Summary button under What to Search. Then, click your Spunk instance name under Host.


UI Step

Your event collection data will appear on the resulting page.



If no data appears or if you want to view data for a specific time/date range, click the Last 24 hours dropdown at the top right-hand corner of the form to change the time range for which your event collection data will be displayed.

By default, data is saved into Splunk where the event name is the name field of the outbound message such as incident.bulk and the fields of the shared record are saved as fields in the Splunk event:

But data can also be saved such that all the record's fields are saved in the Event name instead:


To save data in this format, update the Splunk meshlet's configuration file to have the saveInEvent configuration as true:

Code Block
languageyml
perspectium:
        message:
            saveInEvent: true

Contact support@perspectium.com if you have any questions on updating this and other configurations.


...