Installation

akamai CM not working

mintughosh
Path Finder

We have akamai Cloud Monitor App installed on the Splunk. IT used to work when we we were using the Splunk Trial version; later on we purchased 200Gb licensing but I am not able to find any events for the last 6 months. The last time, it generated logs when we had the trial version. We already have the Http EventCollector setup on the Heavy Forwarder. I can see that it is enabled from the HF. Is there any way we can check or enable it so that it starts indexing new logs and display the newer results.

0 Karma

appalisudhakar
Path Finder

Hi,

The best way to check if the akamai logs are ingesting to Splunk or not is to run a curl command on your Splunk HF where HEC is enabled. This will indicate if HEC input is working correctly or not in first place.

Example:
curl -k http://splunkHFserver1:8088/services/collector/event -H "Authorization: Splunk xxxxxxxxxxxxxxxxxxxxxxxxxxx" -d '{"sourcetype": "akamai:cm:json", "event": "TEST-EVENT-1"}'

{"text":"Success","code":0}

You should see a success message with Error code 0.

  1. if there are errors then check the SSL version used by Akamai and set cipherSuite setting accordingly in $SPLUNK_HOME/etc/apps/splunk_httpinput/local/inputs.conf

  2. Check if the version used by Akamai CM is compatible with your Splunk Version or not.

Hope this info helps.

Thanks,
Sai Appali

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...