On This Page

Home / Search/ Get Data In/ Add Sources/Ingest Splunk HEC Events into Cribl Search

Ingest Splunk HEC Events into Cribl Search

Collect data sent via HTTP(S) protocols to store it in Cribl Search for fast analysis.


Before You Begin

You’ll need:

  • Cribl.Cloud Enterprise. For details, see Pricing.
  • A lakehouse engine. See how to get one at lakehouse engines.
  • Search Admin Permission, or higher. Learn who can do what at Cribl Search Permissions.
  • A Splunk HEC sender that can reach Cribl Search over HTTP(S): universal forwarder, heavy forwarder, or any other HEC client.

You don’t need Cribl Stream, Edge, or Lake. (Looking for the Splunk HEC Source in Cribl Stream instead?)

1. Add a Splunk HEC Source in Cribl Search

On the Cribl.Cloud top bar, select Products > Search > Data > Add Source > Splunk HEC.

Describe Your Source and Set the HEC Endpoint

Under General, configure:

SettingDescriptionExample
ID
Source ID, unique across your Cribl.Cloud Workspace.

Use letters, numbers, underscores, hyphens.
splunk_hec_prod
DescriptionDescribe your Source so others know what it’s for.Ingests HEC from prod Splunk
AddressHostname (FQDN) that your HEC client connects to.

You’ll need this to set up your HEC client.
search.main.foo-bar-abc123.cribl.cloud
PortNetwork port to listen on.

Keep the default unless it conflicts with another service.
8088 (default)
Splunk HEC endpointBase path on which to listen for Splunk HEC API requests.

Cribl Search automatically handles these sub-paths:
/event
/raw
/s2s
/health
/services/collector (default)

Handles:
/services/collector/event
/services/collector/raw
/services/collector/s2s
/services/collector/health

Set up Authentication

Use authentication to make sure only authorized HEC clients can send data to your Cribl Search Source.

Under Authentication, select Add Token. Add as many tokens as you need. Check Enable token for the tokens you want active.

For each token, set Authentication method to:

ManualSecret

Set Up Encryption

Use TLS encryption to protect your data in transit between upstream Splunk HEC senders and your Cribl Search Source.

Under Encrypt, select Enabled, and set the Minimum TLS version you want to accept.

TLS VersionWhen to Use
1.3Recommended. Provides the best security.
1.2Use only when connecting to older systems that don’t support TLS 1.3.
Older than 1.2Avoid if possible. These versions are no longer considered secure.

Select Save to create the Source.

2. Set Up Datatyping

Configure Datatype rules to parse, filter, and normalize your data into structured fields. We call this process Datatyping.

On the Cribl.Cloud top bar, select Products > Search > Data > Datatyping (auto). Here, you can:

See also:

3. Set Up Datasets and Dataset Rules

Configure Dataset rules to organize the parsed events into Datasets. This also determines how long the data is kept, as each Dataset has its own retention period.

On the Cribl.Cloud top bar, select Products > Search > Data > Datasets: Organize Your Data, and see Organize Your Data for details.

4. Set Up Your HEC Client

Configure your upstream Splunk HEC client to send data to Cribl Search.

You’ll need these details from your Source configuration:

Name
Example
Addresssearch.main.foo-bar-abc123.cribl.cloud
Port8088 (default)
Splunk HEC endpoint/services/collector
Token / Auth Token420

To find these for an existing Source: On the Cribl.Cloud top bar, select Products > Search > Data > Sources, and select your Source.

Example Request (Splunk HEC > Cribl Search)

Replace the example address (search.main.foo-bar-abc123.cribl.cloud) and port (if you changed the default 8088) with your Source values.

JSON EventHealth Check

5. See Live Data Flow

Verify that events are successfully flowing from Splunk into Cribl Search.

On the Cribl.Cloud top bar, select Products > Search > Data > Live Data.

Here, check for your Splunk HEC Source. For details, see See Live Data Flow.

Next Steps

Now that your data is in Cribl Search, you can start using it. For example: