Skip to main content
Last Reviewed: December 10, 2025

Log Forwarding with Splunk


Information:
Beta Access Required

This documentation describes support for log forwarding that is under active development and is available only to customers who have been individually approved as part of our Private Beta program.

To request an invite, submit this form.

Requirements

Add Splunk configuration

Configure a secure HTTP Event Collector (HEC) in Splunk:

  1. In your Splunk instance, navigate to Settings > Data Inputs > HTTP Event Collector.

  2. Create a New Token (e.g., named pantheon_logs).

  3. Configure the token settings, ensuring you set the appropriate Index.

    Information:
    Note

    Pantheon forwards logs as raw text (or JSON, depending on the internal format). Consult your Splunk administrator for the ideal Source Type setting.

  4. Once created, copy the HEC Token (this is a GUID).

  5. Copy the Splunk HEC Endpoint including both the hostname and port (e.g., https://my-splunk.com:8088).

Request Pantheon configuration

Reply to your beta program welcome email, or reach out to your Customer Success Manager (CSM), with the following information:

  1. Workspace UUID: Specify which workspace you want enabled.
  2. Splunk HEC Endpoint URL: The host and port (e.g., https://my-splunk.com:8088).
  3. HEC Token: The unique GUID copied in the previous section.

Test log streaming

Once Pantheon confirms that forwarding is active, use the Splunk search interface (e.g., index=<your_index> token="<HEC_token>") to verify that log events are being ingested.