icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Add-on for Mulesoft Cloudhub
SHA256 checksum (add-on-for-mulesoft-cloudhub_117.tgz) c1bd99c01bca1e155ae1d852d9f8641c6e4c12a8621c1ff2bc79d9cfab7029ca SHA256 checksum (add-on-for-mulesoft-cloudhub_116.tgz) 775300c08f8a484db114d05fab81c3feec8d4ef48a0420292e50d6a17b7e3d9f SHA256 checksum (add-on-for-mulesoft-cloudhub_110.tgz) 10b154dd938ebb75b699acef91a57a56f1cb09ad1bb345a45fbfc29e33d945bc
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate


Add-on for Mulesoft Cloudhub

Splunk Cloud
This add-on allows the following data to be ingested from your Mulesoft Cloudhub environment:

worker performance stats
- CPU utilisation
- memory utilisation
- network
- disk read/write bytes

meta-data about your environment
- Organisations and Business Groups
- Environments
- Applications and Domains
- Mulesoft versions supported
- Deployments

MQ stats
- real-time messages on queue and inflight messages

- alerts
- notifications
- instance logs
- ping


This add-on is for users of Mulesoft’s Cloudhub platform.

In order to configure the add-on you need to enter your Anypoint Platform username and password or Connected Apps credentials. Any credentials provided are stored locally in the Splunk environment and the password is encrypted.

The Anypoint Platform credentials supplied must have ‘Read Applications’ permissions enabled for the environments you wish to monitor. You can add multiple sets of credentials.

OS Support

This app has been developed using the Splunk Add-On builder. It has been developed and tested in MacOS and Linux (CentOS) environments but should work on other OS.


Please contact us via the developer email listed with any feedback or feature requests.


Once the add-on is installed, API data can be ingested by following these steps:

  1. From the Configuration screen click 'Add' and then choose a name and enter your credentials.
    Note: Credentials can be either a username/password combination OR client_id/client_secret from a connected app.

  2. From the Inputs screen click 'Create New Input' then choose a name for the input (e.g. applications)

  3. Fill in the form appropriate to your input. When setting the polling interval, choose a value of 60s or greater.

If you are uncertain of what Org IDs/Env IDs etc are available on your account then you might want to setup the "discovery" input first.

Further Documentation


Release Notes

Version 1.1.7
Aug. 27, 2021

1.1.7 - idelta.co.uk - Edinburgh, UK
- Add-on rebuild using Add-on builder v4

Version 1.1.6
June 8, 2021

1.1.6 - idelta.co.uk - Edinburgh, UK
new input for instance logs
introduced error handling to provide information for when API calls return non-2XX values
notifications has been updated to only checkpoint once per loop
timestamp writing code has been updated to ensure that millisecond precision
triggered alerts and notifications inputs are using checkpoints to ensure collection of new alerts/notifications only
queue discovery is working
applications - fixes problem where environments with no applications are returning [] as an event - log event when this happens
additional information in some of the inputs (primarily, orgid and envid are now recorded within the event)
* mqstats now has additional error logging to indicate when the destination supplied in the input does not exist

Version 1.1.0
March 27, 2021

1.1.0 - idelta.co.uk - Edinburgh, UK
* initial splunkbase release


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.