Azure

/

Splank

/
Use template

Azure Activity Logs to Splunk

This Bridge consumes Azure Activity Logs generated within an Azure Subscription and sends them as CloudEvents to Splunk, where they can be further analyzed and visualized.

How it works
What you’ll need
  1. Azure account
  2. Splank account
Other possible targets
No items found.

Another bridges ready to use

Select from an extensive catalog of pre-build cloud bridges

Cloud services

Slack to Confluent

Listen to Slack events and forward them to a Confluent Kafka cluster for further processing.

Cloud services

GitLab to Elasticsearch

This Bridge forwards GitLab events from a specific repository to be indexed by Elasticsearch.

Enterprise providers

GitHub to AWS EventBridge

This Bridge listens to GitHub events from a specific repository and forwards these events to AWS EventBridge.

Let’s start integrating

Connect services together to automate workflows and accelerate the flow of information across your organization.