AWS Splunk Add-on is an integration that enables users to collect and index data from various AWS services into the Splunk platform. It provides a unified view of data in your AWS environment and allows for streamlined monitoring, troubleshooting, and security analysis.
|Product(s)||Supported Asset Type(s)||Integration Type|
Importing Sevco asset data from AWS S3 into Splunk will allow you to generate reports, create dashboards, and leverage Splunk's search language to conduct complex queries and gain insights.
This integration pulls exported asset data from AWS S3 and imports it into Splunk. This process takes place after users have configured the Sevco AWS S3 integration.
The following requirements must be met to configure this Integration:
Please review the configuration instructions in the section below before setting up permissions for apps.
- Add your AWS account to Splunk
Follow these instructions for adding and managing AWS accounts in your instance of Splunk.
|The name of your AWS account|
|AWS Account Key ID|
|AWS Account Secret Key|
|The Region Category associated with your account.|
- Create a Custom Data Type Input: Follow these instructions for creating a Custom Data Type Input for S3.
See Sevco platform documentation for details on AWS – Creating Credentials.
See Sevco platform documentation for details on AWS S3 – Required Permissions.
If you're having problems configuring an Integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the
Suggest Edits link located in the upper right hand corner of the documentation.
Updated about 1 month ago