6 hours 3 minutes
Hello and welcome back to the Splunk Enterprise Certified Administrator course on Cyber. In this video, we're gonna be doing a lab. Where will be reviewing the http event collector also called heck or HTC one of the Splunk in put options you have for sending data into Splunk.
So before we get into actually setting it up, let's talk about what this input is, what purpose it serves, like why we would actually use it.
So basically, there's
a couple core features to this input method. So first is that it's agent lists. And so what that means is you don't need
a Splunk universal border
and then second, uh,
it authenticates off of a token and then also, I guess, important to note that it's it. It sends logs in a streaming mechanism. That's not necessarily
ah, super unique, but still worth noting. So the use case for this is basically when either of those 1st 2 criteria is valuable. Either you have a system that you don't want to send, or you don't or can't put an index on agent on or,
if you want the authentication security provided to you by a token,
uh, it's also very good for, like, super high data volume problems because it is very scalable. So, like one of the most prevalent examples of when you would use this input as if you have a large AWS environment
and you were going to send the data down the, uh like fire hose or Lambda functions.
Then you can send it directly to http event collector. And that's like a super scalable and, uh,
better better option than, like pulling from an A p I. Because, like a P I pools, they're gonna be limited in volume base and its pool. So you get time lapses and stuff, whereas if it's being streamed directly and it's a very scalable solution, then you have something that can actually handle that high volume of data. So that's like
the biggest use case for HCP event collector.
So I have the documentation for how to set this up
here just so mostly just to reference this at the bottom, which is the Carl Command we're going to use to test that are setting it up. Worked, uh, actually setting it ups pretty straightforward, so I don't know how unnecessary these documents are, but it is interesting to note and good to know, for those of you,
that depending on how your environment is deployed, whether it be spoiling cloud if it's self service or managed or if you have a known problem deployment, that is going to have some significant impacts on how you go about setting this up. So this review is really directly relevant to on Prem deployments.
the way you set this up as you go to settings and I'm going to do this on my search head,
technically, this isn't how you would normally do this, but for the purpose of the lab, it will spice. Um, way I would normally do. This is probably
have a multiple, every four order solution, where with a load balancer in front of them. And if I was in AWS, for example, I'd have, like my firehose sending to my load balancer
the A G C. And then I would let it be load balance between the two. So that's how I would normally do this. But just for the sake of the lab and demonstrating, I'm gonna set up on my search head here, and then I'm gonna send the data from my indexer to the search head, which yeah, doesn't make any sense. But it'll
do for the purpose of demonstrating how to do this.
So you go to settings. Data inputs, http event collector, understand? Select add new because that's what we're doing. And we'll call this a C C. Test
We're not gonna bother with either of these options. Output group would be if I was forwarding this to some split devices which in this case I'm not. And then indexer acknowledgement would make it so that basically the data being streamed this ways like ST Paul. So basically, when the data sent
the indexer needs to acknowledge that the data was received.
If the data was not received, then the source can resend it, so that gives you, like, another layer of data resiliency. So that's a good feature. But we're not going to use it right now,
so source type will call it
and we won't put a description. That's fine. For now, we're going to send this to Maine
it seems like I already made that.
Let's do this custom main review
and submit. You just get a chance to look this over, Make sure everything's right before you create your token. And now we have a token. So that's gonna be valuable. I'm gonna leave this up for now. But just so you're aware there is one mawr Little trick to this and that is that by default,
your http tokens are going to be disabled. So all tokens are currently disabled. They could be enabled in the global settings. So you can see this says here disabled and you don't have an option to toggle it here. So you have to actually explicitly enable all tokens first,
and you specify the port. If you want to change it, we're not going to
so and also
you see that's where you get to enable SSL. And if you use the deployments ever, that's a valuable option. If you want to make this configuration and push it out, you'll need to check this. I think that has to do with some encryption stuff because basically each of your devices will have its own splitting secret key. So
I guess maybe this pushes it out unencrypted. And then once it gets the device and encrypt that,
not 100% sure on that. But I would think that that makes sense that that's how that works. So
now our token is good and ready to be used. So let's go back to this documentation and just see how we contest this with this. Send data so
we can use a curl command. I'm just gonna copy this
template and we are just gonna send Ah, hello, world event.
So and this is the format you have to send it data through with the HDP event collector. Basically, this is the field name on This is the value, and it needs to be event. And then whatever event data you want in there, you also set some metadata fields. This way, if you want to give you a little bit more granular control over it than just setting it for that token as a whole,
so just some good information to know. So I'm on my index there. Another thing you can see here. I had already done it, but make sure that whatever device you're forwarding to is listening on the appropriate port. So it'll either be 80 88 or if you're using SSL for 43
So up since I highlighted that I copied it. So let's go back here,
get our sample
pace. That. And so now there are a few things we need to change. Will need to sub out there token for or token. And also change this destination to three i p. Address of my device.
So let me just clear this out.
I should have it memorized by now, but I don't. So
there we go.
Paste that in.
This is gonna run it. It's not gonna work. Whatever.
Okay, that didn't even paste it in there.
So never mind.
Do it the old fashioned way. 1 92 1681108
And now we need to go grab or token
and replace this value here. With that, I could have probably done this in no pad to be a little bit
trying to do it this way is a little bit convoluted,
so now we can run this. Everything looks good. It's doing a once over. And you see the Jason response. It was a success code zero. So we should be able to go back to our search head
search and reporting.
And if we just look at in Mexico's man, I don't think I have any other data in there.
So you can see a hello world source
is the source we specified
source type. Is this source type of specified. I'm sorry, this is automatically generated. We didn't specify this. So it's just gonna be http colon and then the name of that token
the source type of specified and that is the host where the data came in through. So that's it? That's how you do they see to be event collector, you just need to set up a token and then leverage that token and Ford events in the correct format
and Splunk will receive them. Make one
trick. Make sure that your firewall has an opening so that that connection could go through and also make sure that you enable your tokens globally
so that you can actually use the token. If we had not done that, I could do a quick example
of just disabling this and trying to send that event again.
this notification if the individual token is disabled. I think you'll get a different
Yes, so you'll get failed to connect. Connection refused if all tokens are disabled. So essentially, this device basically still isn't listening for this information. Um,
if you didn't have ah, row double. If you couldn't route to this, you would get like
like no no available route error log or something.
And then, as you could see, if the device is listening for tokens But this individual tokens disabled, you'll get this message. So that's everything you need to know about the A. C. C. Input to get started working with it. Some of this might take some play around in a deaf environment toe to really get down hat.
But this should give you a very good starting point and help you understand.
You know what this input is and when you should use it and how to set it up. So that's it for this video and we'll see you in the next one
Certified Information Security Manager (CISM)
A CISM certification shows you have an all-around technical competence and an understanding of the ...
13 CEU/CPE Hours Available
Certificate of Completion Offered
Microsoft 365 Identity and Services (MS-100)
Prepare for the Microsoft 365 Identity and Services (MS-100) exam, which measures your ability to ...