Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Fill in the details for the Syslog Input, the System ID is mapped to the source field in Splunk

  • Click Save

  • The Input should now be created and visible in the Inputs table

  • In the Inputs table, click the View button under the Actions column for the newly created Syslog input

  • Click the unhide button next to the Token and note down the value

    Image RemovedImage Added
  • The token value will be used to authenticate the syslog data coming from the SAP Cloud Foundry applications

  • The next step is to now bind create the PowerConnect Cloud syslog service

    Code Block
    cf create-user-provided-service powerconnect-syslog -l https://<pc-cloud-url>/ingest/http/<input-id>/<token>
    • <pc-cloud-url> is the url where the pc cloud agent

    syslog endpoint to any application deployed on Cloud Foundry you wish to monitor
    • is running

    • <input-id> is the input id of the syslog input you just created

    • <token> is the token belonging to the syslog input you just created

  • Then bind the new syslog service to the application you wish to send logs from

    Code Block
    cf bind-service <app-name> powerconnect-syslog
    • <app-name> is the name of the application you wish to monitor

  • The application will then need to be restaged

    Code Block
    cf restage <app-name>

  • After restaging the application logs should now be visible in Splunk under the event_type syslog

    Image Added