- Download and install the add-on in your Splunk environment, and navigate to the app. Ensure that you have created an index for this data.
- From the Configuration screen click ‘Add’ and then choose a name and enter your credentials.
Note: Credentials can be either a username/password combination OR client_id/client_secret from a connected app. Any credentials provided are stored locally in the Splunk environment and the password is encrypted.
- From the Inputs screen click ‘Create New Input’ then choose a name for the input (e.g. applications)
- Fill in the form appropriate to your input.When setting the polling interval, choose a value of 60s or greater.
Note: If you are uncertain of what Org IDs/Env IDs etc are available on your account then you might want to set up the 'Discovery' input first.